s(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) r2 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_GET_STATION(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x1c, r4, 0xf2b, 0x0, 0x0, {0x32}, [@NL80211_ATTR_STA_PLINK_ACTION={0x4}]}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_STOP_AP(r2, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000140)={&(0x7f00000003c0)={0x884, r4, 0x200, 0x1, 0x25dfdbfc, {}, [@NL80211_ATTR_IE_PROBE_RESP={0x870, 0x7f, "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"}]}, 0x884}, 0x1, 0x0, 0x0, 0x8c0}, 0x20000000) read$dsp(r1, &(0x7f0000000180)=""/186, 0xba) 05:32:08 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c20010000000000000000000c0004"], 0x30}}, 0x0) 05:32:08 executing program 4: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_x25_SIOCADDRT(r0, 0x89e5, &(0x7f0000000240)={@null=' \x00', 0x8, 'batadv_slave_1\x00'}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/bsg\x00', 0x200, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000600), 0x4) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) writev(r3, &(0x7f00000000c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) write(0xffffffffffffffff, 0x0, 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x12e) sendmsg$BATADV_CMD_TP_METER(0xffffffffffffffff, 0x0, 0x0) 05:32:08 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_x25_SIOCADDRT(r0, 0x89e7, &(0x7f00000002c0)={@remote={[], 0x2}, 0x0, 'nr0\x00'}) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_CROP(r2, 0xc038563c, &(0x7f0000000140)={0x0, 0x0, {0xfff, 0x80000, 0x2, 0x800}}) read$dsp(r2, &(0x7f0000000180)=""/186, 0xba) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r3, &(0x7f0000000180)=""/186, 0xba) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r3, 0xc01064b5, &(0x7f00000000c0)={&(0x7f0000000080)=[0x0, 0x0, 0x0], 0x3}) ioctl$DRM_IOCTL_MODE_SETPLANE(r2, 0xc03064b7, &(0x7f0000000100)={r4, 0x7, 0x1000, 0x4, 0x7fffffff, 0x3, 0x5, 0x800, 0x9, 0x25145df2, 0x7, 0x6}) prlimit64(r1, 0x3, &(0x7f0000000000)={0x6, 0x7}, &(0x7f0000000040)) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r5, &(0x7f0000000180)=""/186, 0xba) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r5, 0x800448d3, &(0x7f00000003c0)={@fixed={[], 0x11}, 0x6, 0x200, 0x7fff, 0x200, 0x81, "354a7daaca2eeae7f37d9bc43784026e03d20fc49ea6f39414c46c07c57f4ee2de0166c9fd78bb7fdbc624badcc525160f8629b161da61e20f0726f89b4995ca50d7f597f1fe4938c44ec2770066c592bb221a7fd66f917b711e344dbfc469f3fc4f37ead56c424deb042cd9f4ffefe5d0c53ada0572288ffff07bab23d3196e"}) 05:32:08 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r0, &(0x7f0000000080)={0x9, @null=' \x00'}, 0x12) ioctl$sock_x25_SIOCADDRT(r0, 0x89e7, &(0x7f00000002c0)={@remote={[], 0x2}, 0x0, 'nr0\x00'}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_GET_STATION(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x1c, r3, 0xf2b, 0x0, 0x0, {0x32}, [@NL80211_ATTR_STA_PLINK_ACTION={0x4}]}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_STOP_AP(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000140)={&(0x7f00000003c0)={0x884, r3, 0x200, 0x1, 0x25dfdbfc, {}, [@NL80211_ATTR_IE_PROBE_RESP={0x870, 0x7f, "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"}]}, 0x884}, 0x1, 0x0, 0x0, 0x8c0}, 0x20000000) 05:32:08 executing program 1: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_x25_SIOCADDRT(r0, 0x89e5, &(0x7f00000002c0)={@remote={[], 0x2}, 0x0, 'nr0\x00'}) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f0000000000)={0x7, 0x2, {0x55, 0xa85a, 0x4, {0x8, 0x8}, {0x7da, 0x2a}, @cond=[{0x1800, 0x762b, 0x93ce, 0x81, 0x16, 0x3f}, {0x93, 0x4, 0x7f, 0x4, 0x2f, 0x7fff}]}, {0x56, 0x511, 0x0, {0x1, 0x1c00}, {0x94a, 0x3}, @rumble={0x7f, 0x3}}}) 05:32:08 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_x25_SIOCADDRT(r0, 0x89e7, &(0x7f00000002c0)={@null=' \x00', 0x0, 'nr0\x00'}) [ 3198.886627] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 05:32:08 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c02030000000000000000000c0004"], 0x30}}, 0x0) 05:32:08 executing program 4: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_x25_SIOCADDRT(r0, 0x89e5, &(0x7f0000000240)={@null=' \x00', 0x8, 'batadv_slave_1\x00'}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/bsg\x00', 0x200, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000600), 0x4) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) writev(r3, &(0x7f00000000c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) write(0xffffffffffffffff, 0x0, 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x12e) 05:32:08 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r0, &(0x7f0000000080)={0x9, @null=' \x00'}, 0x12) ioctl$sock_x25_SIOCADDRT(r0, 0x89e7, &(0x7f00000002c0)={@remote={[], 0x2}, 0x0, 'nr0\x00'}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_GET_STATION(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x1c, r2, 0xf2b, 0x0, 0x0, {0x32}, [@NL80211_ATTR_STA_PLINK_ACTION={0x4}]}, 0x1c}}, 0x0) [ 3199.063286] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 05:32:09 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000100)={&(0x7f00000003c0)={0x470, 0x3f3, 0x500, 0x70bd27, 0x25dfdbff, {0x6, 0x2, 0x0, [0x1, 0x7, 0x3, 0x29, 0xd8a1, 0x6, 0x800, 0x6, 0x6fb7, 0x3f, 0xd8, 0x1000, 0x8, 0x3f, 0x1ff, 0x0, 0x6, 0x3ff, 0xe0e4, 0x2, 0x9, 0xb54d, 0x8, 0x9, 0x800, 0x7a, 0x1, 0x7fff, 0x0, 0x200, 0x10000, 0x40, 0x5, 0x6, 0x81, 0x7, 0xfffffe01, 0xf8, 0x28, 0x1, 0x9, 0xffffffff, 0x8, 0x4, 0x0, 0x0, 0x800, 0x400, 0x1, 0xc2ec, 0xffffffa6, 0xffff, 0x4, 0x5, 0x7, 0x9, 0x0, 0x6, 0x3d, 0x8, 0x1, 0x6, 0xa, 0x1], [0x2, 0x84, 0x8001, 0x1, 0x4, 0x80000001, 0x5, 0x401, 0x100, 0x80000001, 0x6, 0x40c, 0x8, 0x8000, 0x1, 0x40000000, 0x7, 0x32, 0x1, 0x0, 0x800, 0x2, 0x7, 0x4, 0x7fffffff, 0x7, 0x7f, 0x400, 0x2, 0x0, 0x9d6, 0x2, 0x5, 0x7, 0x1f, 0x8, 0x0, 0x7, 0x5, 0x1, 0x7fff, 0x2f5, 0x80000001, 0x2, 0x8, 0x7ff, 0x0, 0x9, 0x401, 0x0, 0x3a97, 0xc6e, 0xfc, 0x7, 0x0, 0x8001, 0x4, 0x6, 0x8, 0x6, 0x8000, 0x7fff, 0x1, 0x4], [0xfffffffb, 0x9, 0x2, 0x0, 0x7fffffff, 0x10001, 0x6aa, 0xfffffffa, 0x800, 0x1, 0xbada, 0x7, 0x2, 0x7fffffff, 0x7, 0x7, 0x4, 0x5, 0x7fffffff, 0xfff, 0x80, 0x47, 0x4, 0x81, 0x9, 0x9, 0x0, 0x0, 0xe23, 0xcb, 0x3ff, 0x1000, 0xffffffff, 0x4, 0x7, 0x100, 0x4, 0x9, 0x7f, 0xfdd, 0x7, 0xffffe672, 0x3, 0xfff, 0xffffffff, 0x60000, 0x0, 0x101, 0x26b, 0x1f, 0x6, 0x100, 0x3, 0x5b7, 0x3, 0x80, 0x2, 0x7, 0xe5, 0x1, 0x252194d1, 0xa977, 0xc748, 0x7], [0x7f, 0x55a3cd1e, 0x4, 0x5, 0x400, 0x2, 0x4, 0x40, 0x20, 0xffffffa1, 0x3, 0x8, 0x7, 0x1, 0x81, 0x8, 0x5, 0x4, 0xffffffff, 0xf48, 0x1, 0xffffffc1, 0xbd50a269, 0x3, 0x9, 0x3ff, 0x3, 0x8, 0x4, 0x5, 0xffff, 0x2, 0x400, 0x7fff, 0x31, 0x0, 0x1, 0xe6, 0x0, 0x3ff, 0x400000, 0x3, 0x3, 0x1000, 0x3f, 0xc693, 0x1000, 0x8000, 0xbb7, 0xf89d, 0x0, 0x8, 0x7, 0xeada, 0x105, 0x1000, 0x5, 0x1, 0x8000, 0x9, 0x8, 0x80000001, 0x9, 0x80000001], 0x50, ['-[/\x00', '&/\x00', ' \x00', 'trusted.overlay.origin\x00', 'trusted.overlay.origin\x00', 'nr0\x00', ',-{!\x00', '/\x00']}, [""]}, 0x470}, 0x1, 0x0, 0x0, 0x4c0}, 0x400000c0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r1, &(0x7f0000000180)=""/186, 0xba) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000240)=0xfffff000, 0x4) r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000080)='y\x00', 0x2, 0x3) ioctl$sock_x25_SIOCADDRT(r2, 0x89e7, &(0x7f00000002c0)={@null=' \x00', 0x7, 'nr0\x00'}) 05:32:09 executing program 1: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r1, &(0x7f0000000180)=""/186, 0xba) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000000)={r3, 0xffff, 0x8001}, &(0x7f0000000040)=0x8) r4 = openat(r1, &(0x7f0000000080)='./file0\x00', 0xc0000, 0x40) write$tun(r4, &(0x7f00000004c0)={@void, @val={0x1, 0x1, 0x1, 0x6ef, 0x2, 0x5}, @ipv6=@gre_packet={0x0, 0x6, "00c795", 0x1256, 0x2f, 0xff, @private2, @private2, {[@routing={0x3b, 0xe, 0x0, 0x80, 0x0, [@private2, @dev={0xfe, 0x80, [], 0x14}, @mcast1, @loopback, @mcast1, @ipv4={[], [], @local}, @empty]}, @srh={0x5e, 0x2, 0x4, 0x1, 0x6, 0x60, 0x0, [@rand_addr=' \x01\x00']}, @srh={0x5e, 0x4, 0x4, 0x2, 0x81, 0x10, 0x5, [@initdev={0xfe, 0x88, [], 0x1, 0x0}, @dev={0xfe, 0x80, [], 0x3c}]}], {{0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x1000, 0x0, [0x1, 0x7f], "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"}, {0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x800, [], "1087aa9bfc84eb20a6e7ea1e24e95d3083a39484ad32785fbdd03504de751c22064d112892c032450a385308787d7dfa2c6bab2d5bd21ea78549145fad861a3ba01960d49e142b02c4b547155b75ccb0594284bbac1410d1b18e1262440ce2aea1479a11723728458fe502ca9cc9bbf068c7e9d44357f8e1c57596ab0af5791322dc52cfd842ab7683cf5e977024221d7c8bdb3c918e9ead60e37eb93fcc5984f9ad8c9b2703"}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd, [0x5], "93e800ba0ce592"}, {0x8, 0x88be, 0x0, {{0x6, 0x1, 0x1, 0x0, 0x0, 0x1, 0x7, 0x7f}, 0x1, {0x9}}}, {0x8, 0x22eb, 0x4, {{0xf, 0x2, 0x7, 0x0, 0x0, 0x2, 0x1, 0x5}, 0x2, {0xed4, 0x5, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1}}}, {0x8, 0x6558, 0x2, "dfe5facb762cb165922a4ba674ea722a2cf96d9c3aebfd5a26e5f6f0936e044f2aa2d30b7df49fa85830c501f77cb92be7abe863cde159490cf141105415dceea46c3609b435c188f16175953f5f0378579aed052d5315d65161d952d64475b0fecacf095e83a0e1fb86f8f52a9c1094791edec2e75c5ffea1c580d1912a56f4420316767566f37ca89889c70263a64b5740fd3be73d65f65b88ccda60b76d6b1d90d474e21d52"}}}}}, 0x1288) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f00000000c0)={r3, 0x0, &(0x7f00000004c0)}, &(0x7f0000000100)=0x10) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r5, &(0x7f0000000180)=""/186, 0xba) write$binfmt_misc(r5, &(0x7f00000003c0)={'syz1', "8eebaf7b12ad195e95d5a2712147d47b75a805ea5ca7060d43fd12099d1b8cddd1746cd2782731a99d593aab0a0b32f43a8e62af637bb418f07055d0c675970889fbb15c61be38975834d7b5fae0dcb960af6feff8edff7280730556c68c2a146c7b85f71f45968383b84d3c442a67183bfd430e68373ecf023f9fa5a43cf10899e67551c669a952e8d76cbe6ff87c148de9c5d861f4d1b03a91d480af05d92f63fc35c19ea18fbe18c56ad5beabaca3cfc264a4d28da28872792d4b07af144d8c1304c8b27ce29ce7ec764daec15f79d57c270612401e6ec8afb143e0bb10f603e61a784b3a4c8fbb8a501a7f0d18f5d8093c10"}, 0xf8) ioctl$sock_x25_SIOCADDRT(r0, 0x89e5, &(0x7f00000002c0)={@remote={[], 0x2}, 0x0, 'nr0\x00'}) 05:32:09 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}, 0x1, 0xff7f}, 0x0) 05:32:09 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r0, &(0x7f0000000080)={0x9, @null=' \x00'}, 0x12) ioctl$sock_x25_SIOCADDRT(r0, 0x89e7, &(0x7f00000002c0)={@remote={[], 0x2}, 0x0, 'nr0\x00'}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') 05:32:09 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c03030000000000000000000c0004"], 0x30}}, 0x0) 05:32:09 executing program 4: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_x25_SIOCADDRT(r0, 0x89e5, &(0x7f0000000240)={@null=' \x00', 0x8, 'batadv_slave_1\x00'}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/bsg\x00', 0x200, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000600), 0x4) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) writev(r3, &(0x7f00000000c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) write(0xffffffffffffffff, 0x0, 0x0) 05:32:09 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_x25_SIOCADDRT(r0, 0x89e7, &(0x7f00000002c0)={@remote={[], 0x2}, 0x0, 'nr0\x00'}) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r1, &(0x7f0000000180)=""/186, 0xba) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000000)) 05:32:09 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c0f030000000000000000000c0004"], 0x30}}, 0x0) [ 3199.393466] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 05:32:09 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r0, &(0x7f0000000080)={0x9, @null=' \x00'}, 0x12) ioctl$sock_x25_SIOCADDRT(r0, 0x89e7, &(0x7f00000002c0)={@remote={[], 0x2}, 0x0, 'nr0\x00'}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 05:32:09 executing program 1: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_x25_SIOCADDRT(r0, 0x89e5, &(0x7f00000002c0)={@remote={[], 0x2}, 0x0, 'batadv0\x00'}) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r1, &(0x7f0000000180)=""/186, 0xba) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r4, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800070006"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=@newqdisc={0x50, 0x24, 0x10, 0x70bd29, 0x25dfdbfc, {0x0, 0x0, 0x0, r4, {0x10, 0xd}, {0x2, 0xffff}, {0xd, 0xb}}, [@TCA_RATE={0x6, 0x5, {0x3, 0xfa}}, @TCA_RATE={0x6, 0x5, {0x80, 0xbf}}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x80000001}, @TCA_EGRESS_BLOCK={0x8}, @qdisc_kind_options=@q_ingress={0xc, 0x1, 'ingress\x00'}]}, 0x50}, 0x1, 0x0, 0x0, 0x4}, 0x10) 05:32:09 executing program 4: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_x25_SIOCADDRT(r0, 0x89e5, &(0x7f0000000240)={@null=' \x00', 0x8, 'batadv_slave_1\x00'}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/bsg\x00', 0x200, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000600), 0x4) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) writev(r3, &(0x7f00000000c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) write(0xffffffffffffffff, 0x0, 0x0) 05:32:09 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1, 0x610a00) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r2, &(0x7f0000000180)=""/186, 0xba) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r3, &(0x7f0000000180)=""/186, 0xba) getsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f0000000140), &(0x7f0000000240)=0x4) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r4, &(0x7f0000000180)=""/186, 0xba) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r5, &(0x7f0000000180)=""/186, 0xba) write$RDMA_USER_CM_CMD_GET_EVENT(r5, &(0x7f0000000540)={0xc, 0x8, 0xfa00, {&(0x7f00000003c0)}}, 0x10) r6 = fcntl$dupfd(r4, 0x406, 0xffffffffffffffff) ioctl$SIOCX25SDTEFACILITIES(r6, 0x89eb, &(0x7f0000000280)={0xa0, 0x8b, 0x7fff, 0x7, 0x4, 0x1d, 0x8, "9723591fa7ece25406d531cd5f4abbd9c83cecfc", "63fa47766a9cd36d75460c74081b461dd0c31dda"}) bind$l2tp6(r2, &(0x7f0000000100)={0xa, 0x0, 0x4, @private2, 0x9, 0x1}, 0x20) accept$nfc_llcp(r1, &(0x7f0000000040), &(0x7f00000000c0)=0x60) ioctl$sock_x25_SIOCADDRT(r0, 0x89e7, &(0x7f00000002c0)={@remote={[], 0x2}, 0x0, 'nr0\x00'}) [ 3199.544694] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 05:32:09 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r0, &(0x7f0000000080)={0x9, @null=' \x00'}, 0x12) ioctl$sock_x25_SIOCADDRT(r0, 0x89e7, &(0x7f00000002c0)={@remote={[], 0x2}, 0x0, 'nr0\x00'}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) 05:32:09 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c000f0000000000000000000c0004"], 0x30}}, 0x0) 05:32:09 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}, 0x1, 0xfffe}, 0x0) 05:32:09 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r0, &(0x7f0000000080)={0x9, @null=' \x00'}, 0x12) ioctl$sock_x25_SIOCADDRT(r0, 0x89e7, &(0x7f00000002c0)={@remote={[], 0x2}, 0x0, 'nr0\x00'}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) 05:32:09 executing program 1: syz_init_net_socket$x25(0x9, 0x5, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x612040, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x2000, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) ioctl$sock_x25_SIOCADDRT(r0, 0x89e5, &(0x7f00000002c0)={@null=' \x00', 0x102, 'virt_wifi0\x00'}) 05:32:09 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) accept4$ax25(0xffffffffffffffff, &(0x7f0000000000)={{0x3, @null}, [@rose, @remote, @null, @default, @null, @rose, @bcast, @netrom]}, &(0x7f0000000080)=0x48, 0x0) close(r0) ioctl$sock_x25_SIOCADDRT(r0, 0x89e7, &(0x7f00000002c0)={@remote={[], 0x2}, 0x20000000, 'bridge0\x00'}) geteuid() 05:32:09 executing program 4: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_x25_SIOCADDRT(r0, 0x89e5, &(0x7f0000000240)={@null=' \x00', 0x8, 'batadv_slave_1\x00'}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/bsg\x00', 0x200, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000600), 0x4) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) writev(r3, &(0x7f00000000c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) 05:32:09 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00150000000000000000000c0004"], 0x30}}, 0x0) 05:32:09 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_x25_SIOCADDRT(r0, 0x89e7, &(0x7f00000002c0)={@remote={[], 0x2}, 0x0, 'nr0\x00'}) r1 = semget$private(0x0, 0x5, 0x10) semctl$SEM_STAT_ANY(r1, 0x0, 0x14, &(0x7f0000000000)=""/122) 05:32:09 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r0, &(0x7f0000000080)={0x9, @null=' \x00'}, 0x12) ioctl$sock_x25_SIOCADDRT(r0, 0x89e7, &(0x7f00000002c0)={@remote={[], 0x2}, 0x0, 'nr0\x00'}) 05:32:09 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00040000000000000000000c0004"], 0x30}}, 0x0) 05:32:09 executing program 1: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_x25_SIOCADDRT(r0, 0x89e5, &(0x7f00000002c0)={@remote={[], 0x2}, 0x0, 'nr0\x00'}) io_setup(0x6ef, &(0x7f0000000000)) 05:32:09 executing program 4: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_x25_SIOCADDRT(r0, 0x89e5, &(0x7f0000000240)={@null=' \x00', 0x8, 'batadv_slave_1\x00'}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/bsg\x00', 0x200, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000600), 0x4) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) 05:32:09 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r1, &(0x7f0000000180)=""/186, 0xba) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r2, &(0x7f0000000180)=""/186, 0xba) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x400448c8, &(0x7f0000000000)={r2, r3, 0x52, 0x1000, &(0x7f00000003c0)="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", 0x6, 0x0, 0x7f, 0x9, 0x8, 0x2, 0x2, 'syz1\x00'}) ioctl$sock_x25_SIOCADDRT(r0, 0x89e7, &(0x7f00000002c0)={@remote={[], 0x1}, 0x0, 'nr0\x00'}) 05:32:10 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}, 0x1, 0x20000}, 0x0) 05:32:10 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r0, &(0x7f0000000080)={0x9, @null=' \x00'}, 0x12) 05:32:10 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c000f0000000000000000000c0004"], 0x30}}, 0x0) 05:32:10 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) ioctl$VIDIOC_G_EXT_CTRLS(r1, 0xc0205647, &(0x7f00000000c0)={0xa10000, 0x4, 0x2, r0, 0x0, &(0x7f0000000080)={0x9909da, 0x8, [], @p_u8=&(0x7f0000000040)=0xfd}}) ioctl$sock_x25_SIOCADDRT(r0, 0x89e7, &(0x7f00000002c0)={@remote={[], 0x2}, 0x0, 'nr0\x00'}) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r2, &(0x7f0000000180)=""/186, 0xba) r3 = accept4$x25(r2, &(0x7f0000000100)={0x9, @remote}, &(0x7f0000000140)=0x12, 0x80800) connect$x25(r3, &(0x7f0000000180)={0x9, @null=' \x00'}, 0x12) 05:32:10 executing program 1: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_x25_SIOCADDRT(0xffffffffffffffff, 0x89e5, &(0x7f00000002c0)={@null=' \x00', 0xb, 'nr0\x00'}) 05:32:10 executing program 4: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_x25_SIOCADDRT(r0, 0x89e5, &(0x7f0000000240)={@null=' \x00', 0x8, 'batadv_slave_1\x00'}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/bsg\x00', 0x200, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000600), 0x4) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) 05:32:10 executing program 5: bind$x25(0xffffffffffffffff, &(0x7f0000000080)={0x9, @null=' \x00'}, 0x12) 05:32:10 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00150000000000000000000c0004"], 0x30}}, 0x0) 05:32:10 executing program 4: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_x25_SIOCADDRT(r0, 0x89e5, &(0x7f0000000240)={@null=' \x00', 0x8, 'batadv_slave_1\x00'}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/bsg\x00', 0x200, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000600), 0x4) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) 05:32:10 executing program 5: bind$x25(0xffffffffffffffff, &(0x7f0000000080)={0x9, @null=' \x00'}, 0x12) 05:32:10 executing program 2: syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r1, &(0x7f0000000180)=""/186, 0xba) syncfs(r0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r2, &(0x7f0000000180)=""/186, 0xba) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r3, &(0x7f0000000180)=""/186, 0xba) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r3, 0x81785501, &(0x7f0000000280)) write$cgroup_int(r2, &(0x7f0000000080)=0x80, 0x12) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r4, &(0x7f0000000180)=""/186, 0xba) recvfrom$inet6(r4, &(0x7f00000000c0)=""/138, 0x8a, 0x10000, 0x0, 0x0) connect$vsock_dgram(r1, &(0x7f0000000040)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000240)) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r5, &(0x7f0000000180)=""/186, 0xba) ioctl$sock_x25_SIOCADDRT(0xffffffffffffffff, 0x89e7, &(0x7f00000002c0)={@remote={[], 0x1}, 0x4000000, 'veth0\x00'}) 05:32:10 executing program 1: bind$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x7, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, 0xffffffffffffffff) r3 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_x25_SIOCADDRT(r3, 0x89e5, &(0x7f00000002c0)={@remote={[], 0x2}, 0x0, 'nr0\x00'}) r4 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xfffffffffffffeff, 0x101000) ioctl$TIOCNXCL(r4, 0x540d) socket$inet6(0xa, 0x800, 0x3) 05:32:10 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}, 0x1, 0x2a1a8}, 0x0) 05:32:10 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00012000000000000000000c0004"], 0x30}}, 0x0) 05:32:10 executing program 5: bind$x25(0xffffffffffffffff, &(0x7f0000000080)={0x9, @null=' \x00'}, 0x12) 05:32:10 executing program 4: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_x25_SIOCADDRT(r0, 0x89e5, &(0x7f0000000240)={@null=' \x00', 0x8, 'batadv_slave_1\x00'}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/bsg\x00', 0x200, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000600), 0x4) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) 05:32:10 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_x25_SIOCADDRT(r0, 0x89e7, &(0x7f00000002c0)={@null=' \x00', 0x3ffd, 'nr0\x00'}) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmctl$IPC_RMID(r1, 0x0) shmctl$SHM_STAT(r1, 0xd, &(0x7f0000000000)=""/239) 05:32:10 executing program 5: syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(0xffffffffffffffff, &(0x7f0000000080)={0x9, @null=' \x00'}, 0x12) 05:32:10 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c0000f800000000000000000c0004"], 0x30}}, 0x0) 05:32:10 executing program 4: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_x25_SIOCADDRT(r0, 0x89e5, &(0x7f0000000240)={@null=' \x00', 0x8, 'batadv_slave_1\x00'}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/bsg\x00', 0x200, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000600), 0x4) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:10 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_x25_SIOCADDRT(r0, 0x89e7, &(0x7f00000002c0)={@remote={[], 0x2}, 0x0, 'nr0\x00'}) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r1, &(0x7f0000000180)=""/186, 0xba) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r2, &(0x7f0000000180)=""/186, 0xba) connect(r2, &(0x7f00000000c0)=@isdn={0x22, 0x6, 0x9, 0x5, 0x7f}, 0x80) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x100, 0x0) getsockopt$X25_QBITINCL(r3, 0x106, 0x1, &(0x7f0000000040), &(0x7f0000000080)=0x4) 05:32:10 executing program 5: syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(0xffffffffffffffff, &(0x7f0000000080)={0x9, @null=' \x00'}, 0x12) 05:32:11 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030200000000000000000c0004"], 0x30}}, 0x0) 05:32:11 executing program 5: syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(0xffffffffffffffff, &(0x7f0000000080)={0x9, @null=' \x00'}, 0x12) 05:32:11 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}, 0x1, 0x2a1a9}, 0x0) 05:32:11 executing program 4: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_x25_SIOCADDRT(r0, 0x89e5, &(0x7f0000000240)={@null=' \x00', 0x8, 'batadv_slave_1\x00'}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/bsg\x00', 0x200, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000600), 0x4) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:11 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000000)={r2, 0xffff, 0x8001}, &(0x7f0000000040)=0x8) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r3, &(0x7f0000000180)=""/186, 0xba) setsockopt$inet_mreqsrc(r3, 0x0, 0x27, &(0x7f0000000300)={@remote, @empty, @private=0xa010101}, 0xc) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000000c0)={r2, 0x7}, &(0x7f0000000240)=0x8) r4 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000000280)='/dev/vcsa#\x00', 0x1000, 0x204000) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r5, 0x84, 0x16, &(0x7f00000002c0)={0x1, [0x1]}, 0x6) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/locks\x00', 0x0, 0x0) accept$netrom(r6, &(0x7f0000000040)={{0x3, @rose}, [@null, @netrom, @netrom, @rose, @bcast, @rose, @rose, @null]}, &(0x7f0000000200)=0x48) ioctl$sock_x25_SIOCADDRT(r4, 0x89e7, &(0x7f0000000100)={@null=' \x00', 0x0, 'veth1\x00'}) 05:32:11 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030300000000000000000c0004"], 0x30}}, 0x0) 05:32:11 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r0, 0x0, 0x0) 05:32:11 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r0, 0x0, 0x0) 05:32:11 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_x25_SIOCADDRT(r0, 0x89e7, &(0x7f00000002c0)={@remote={[], 0x2}, 0x0, 'nr0\x00'}) 05:32:11 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030f00000000000000000c0004"], 0x30}}, 0x0) 05:32:11 executing program 4: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_x25_SIOCADDRT(r0, 0x89e5, &(0x7f0000000240)={@null=' \x00', 0x8, 'batadv_slave_1\x00'}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/bsg\x00', 0x200, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000600), 0x4) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:11 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r0, 0x0, 0x0) 05:32:11 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c0003f000000000000000000c0004"], 0x30}}, 0x0) 05:32:11 executing program 4: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_x25_SIOCADDRT(r0, 0x89e5, &(0x7f0000000240)={@null=' \x00', 0x8, 'batadv_slave_1\x00'}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/bsg\x00', 0x200, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000600), 0x4) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3202.297418] validate_nla: 15 callbacks suppressed [ 3202.297426] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 05:32:12 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}, 0x1, 0x2a1aa}, 0x0) 05:32:12 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x202001, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r1, 0x80045700, &(0x7f0000000040)) ioctl$sock_x25_SIOCADDRT(r0, 0x89e7, &(0x7f00000002c0)={@remote={[], 0x2}, 0x0, 'nr0\x00'}) 05:32:12 executing program 5: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_x25_SIOCADDRT(r0, 0x89e5, &(0x7f0000000240)={@null=' \x00', 0x8, 'batadv_slave_1\x00'}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/bsg\x00', 0x200, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000600), 0x4) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) writev(r3, &(0x7f00000000c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) 05:32:12 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030003000000000000000c0004"], 0x30}}, 0x0) 05:32:12 executing program 4: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_x25_SIOCADDRT(r0, 0x89e5, &(0x7f0000000240)={@null=' \x00', 0x8, 'batadv_slave_1\x00'}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/bsg\x00', 0x200, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000600), 0x4) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3202.716069] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 05:32:12 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_x25_SIOCADDRT(r0, 0x89e7, &(0x7f00000002c0)={@null=' \x00', 0x0, 'nr0\x00'}) 05:32:12 executing program 4: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_x25_SIOCADDRT(r0, 0x89e5, &(0x7f0000000240)={@null=' \x00', 0x8, 'batadv_slave_1\x00'}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/bsg\x00', 0x200, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000600), 0x4) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:12 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c0003000f000000000000000c0004"], 0x30}}, 0x0) 05:32:12 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) syz_extract_tcp_res(&(0x7f0000000000), 0x2, 0x200) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x3ff, 0x200) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r1, &(0x7f0000000180)=""/186, 0xba) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r1, 0x4008af23, &(0x7f00000000c0)={0x1, 0x989}) openat$6lowpan_enable(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/bluetooth/6lowpan_enable\x00', 0x2, 0x0) ioctl$sock_x25_SIOCADDRT(r0, 0x89e7, &(0x7f00000002c0)={@remote={[], 0x2}, 0x0, 'nr0\x00'}) 05:32:12 executing program 5: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_x25_SIOCADDRT(r0, 0x89e5, &(0x7f0000000240)={@null=' \x00', 0x8, 'batadv_slave_1\x00'}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/bsg\x00', 0x200, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000600), 0x4) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) writev(r3, &(0x7f00000000c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) 05:32:12 executing program 4: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_x25_SIOCADDRT(r0, 0x89e5, &(0x7f0000000240)={@null=' \x00', 0x8, 'batadv_slave_1\x00'}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/bsg\x00', 0x200, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000600), 0x4) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:12 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c0003542d000000000000000c0004"], 0x30}}, 0x0) [ 3203.194749] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 05:32:13 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}, 0x1, 0x2a1ab}, 0x0) 05:32:13 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2000, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000000000000000000c0004"], 0x30}}, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10004000}, 0xc, &(0x7f0000000180)={&(0x7f0000000440)={0xe8, r3, 0x800, 0x70bd25, 0x25dfdbfd, {}, [@TIPC_NLA_LINK={0x1c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}, @TIPC_NLA_NET={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0xffffffffffffff12, 0x1, 0x80000000}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x6}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xfff}]}, @TIPC_NLA_NODE={0x60, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_KEY={0x44, 0x4, {'gcm(aes)\x00', 0x1c, "b79401a7adaea838efc56dc6b29da7553eed8be5481d347dfc983050"}}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3f}]}, @TIPC_NLA_SOCK={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x400}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}]}]}, 0xe8}, 0x1, 0x0, 0x0, 0x8000}, 0x4) ioctl$sock_x25_SIOCADDRT(r0, 0x89e7, &(0x7f00000002c0)={@remote={[], 0x2}, 0x0, 'nr0\x00'}) fallocate(r0, 0x8, 0x2, 0x10001) 05:32:13 executing program 4: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_x25_SIOCADDRT(r0, 0x89e5, &(0x7f0000000240)={@null=' \x00', 0x8, 'batadv_slave_1\x00'}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/bsg\x00', 0x200, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000600), 0x4) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:13 executing program 1: syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x28a101, 0x0) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000080)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, r1, 0x200, 0x70bd2c, 0x25dfdbfb, {}, [@NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x40044}, 0x20004810) 05:32:13 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c0003003f000000000000000c0004"], 0x30}}, 0x0) 05:32:13 executing program 5: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_x25_SIOCADDRT(r0, 0x89e5, &(0x7f0000000240)={@null=' \x00', 0x8, 'batadv_slave_1\x00'}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/bsg\x00', 0x200, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000600), 0x4) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) writev(r3, &(0x7f00000000c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) [ 3203.344746] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 05:32:13 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00032d54000000000000000c0004"], 0x30}}, 0x0) 05:32:13 executing program 1: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_x25_SIOCADDRT(r0, 0x89e5, &(0x7f00000002c0)={@remote={[], 0x3}, 0x0, 'nr0\x00'}) [ 3203.455732] Cannot configure node identity twice [ 3203.498160] Cannot configure node identity twice 05:32:13 executing program 4: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_x25_SIOCADDRT(r0, 0x89e5, &(0x7f0000000240)={@null=' \x00', 0x8, 'batadv_slave_1\x00'}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/bsg\x00', 0x200, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000600), 0x4) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:13 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) ioctl$SCSI_IOCTL_DOORUNLOCK(r0, 0x5381) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) sendmsg$IPSET_CMD_PROTOCOL(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x44, 0x1, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x8040}, 0x4000000) ioctl$sock_x25_SIOCDELRT(r0, 0x890c, &(0x7f00000003c0)={@null=' \x00', 0x5, 'bridge0\x00'}) ioctl$sock_x25_SIOCADDRT(r1, 0x89e5, &(0x7f00000002c0)={@remote={[], 0x2}, 0x0, 'nr0\x00'}) 05:32:13 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c000300f0000000000000000c0004"], 0x30}}, 0x0) 05:32:13 executing program 1: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_x25_SIOCADDRT(r0, 0x89e5, &(0x7f00000002c0)={@remote={[], 0x2}, 0x0, 'nr0\x00'}) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r1, &(0x7f0000000180)=""/186, 0xba) r2 = gettid() r3 = add_key$keyring(&(0x7f00000003c0)='keyring\x00', 0x0, 0x0, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="757064617465206563727970746673202fbae039abae2e"], 0x1e, r3) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000280)={r3, 0x9d, 0xbb}, &(0x7f00000003c0)=ANY=[@ANYBLOB='enc=oaep hash?blake2b-512\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'/78], &(0x7f0000000440)="51ab812e90d8e641d3f97b9d65e4d33fdaaad46e1a192ad592652f40704fcdec7a316f97179e6a2bb1c1390c8ca1dc3994380fbacb781149ba6e792c768beea11e55d0cbfb1317efba3f08440f5c64601eb0076968f3e2a3d55ad85d554feaf2204915291f5d684441bce181bc626d8fde2bfda857ceeb98d7fa23a7b6560ff3fc97ceb0bdb1d1371d5afebb5b63880f7abb9ebc53cdbdab339ded574e", &(0x7f0000000500)=""/187) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x2) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x20000003, 0x84) gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000040)={{0x2, 0x0, 0x1ce8, 0x3ff, '\x00', 0x5}, 0x0, 0x4, 0x40, r2, 0x3, 0xe3, 'syz1\x00', &(0x7f0000000240)=['4]\x00', 'nr0\x00', '.{]\x00'], 0xb, [], [0xfff8, 0x40, 0xe72a, 0xfff]}) [ 3203.913261] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 05:32:13 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}, 0x1, 0x2a1ac}, 0x0) 05:32:13 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030040030000000000000c0004"], 0x30}}, 0x0) 05:32:13 executing program 4: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_x25_SIOCADDRT(r0, 0x89e5, &(0x7f0000000240)={@null=' \x00', 0x8, 'batadv_slave_1\x00'}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/bsg\x00', 0x200, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000600), 0x4) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:13 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x34, r1, 0x1, 0x0, 0x25dfdbfe, {{}, {}, {0x18, 0x17, {0x2, 0xfffffffc, @udp='udp:syz0\x00'}}}}, 0x34}}, 0x810) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r2, &(0x7f0000000180)=""/186, 0xba) fcntl$dupfd(r2, 0x406, r0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x1c, r1, 0x800, 0x70bd26, 0x25dfdbfc, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x810) r3 = syz_init_net_socket$x25(0x9, 0x5, 0x0) socket(0x23, 0xa, 0x80000000) ioctl$sock_x25_SIOCADDRT(r3, 0x89e5, &(0x7f00000002c0)={@remote={[], 0x2}, 0x0, 'veth0\x00'}) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000000)=0x1) delete_module(&(0x7f0000000080)='--\"\x00', 0x400) 05:32:13 executing program 5: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_x25_SIOCADDRT(r0, 0x89e5, &(0x7f0000000240)={@null=' \x00', 0x8, 'batadv_slave_1\x00'}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/bsg\x00', 0x200, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000600), 0x4) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) [ 3204.110794] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 05:32:14 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030003400000000000000c0004"], 0x30}}, 0x0) 05:32:14 executing program 4: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_x25_SIOCADDRT(r0, 0x89e5, &(0x7f0000000240)={@null=' \x00', 0x8, 'batadv_slave_1\x00'}) openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/bsg\x00', 0x200, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:14 executing program 1: syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000100)=""/187, 0xbb) ioctl$sock_x25_SIOCADDRT(r0, 0x89e5, &(0x7f00000002c0)={@null=' \x00', 0x0, 'nr0\x00'}) 05:32:14 executing program 5: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_x25_SIOCADDRT(r0, 0x89e5, &(0x7f0000000240)={@null=' \x00', 0x8, 'batadv_slave_1\x00'}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/bsg\x00', 0x200, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000600), 0x4) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) 05:32:14 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c0003fffff00000000000000c0004"], 0x30}}, 0x0) 05:32:14 executing program 4: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_x25_SIOCADDRT(r0, 0x89e5, &(0x7f0000000240)={@null=' \x00', 0x8, 'batadv_slave_1\x00'}) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:14 executing program 1: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x254900, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f0000000040)={0x1, {{0xa, 0x4e22, 0x6, @remote}}, {{0xa, 0x4e26, 0xa, @local, 0x401}}}, 0x108) ioctl$sock_x25_SIOCADDRT(r0, 0x89e5, &(0x7f00000002c0)={@null=' \x00', 0x0, 'nr0\x00'}) [ 3205.141359] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 05:32:15 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}, 0x1, 0x2a1ad}, 0x0) 05:32:15 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000000100000000000c0004"], 0x30}}, 0x0) 05:32:15 executing program 5: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_x25_SIOCADDRT(r0, 0x89e5, &(0x7f0000000240)={@null=' \x00', 0x8, 'batadv_slave_1\x00'}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/bsg\x00', 0x200, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000600), 0x4) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) 05:32:15 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) ioctl$SNDCTL_DSP_SYNC(r0, 0x5001, 0x0) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_x25_SIOCADDRT(r1, 0x89e5, &(0x7f00000002c0)={@remote={[], 0x2}, 0x0, 'nr0\x00'}) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r2, &(0x7f0000000180)=""/186, 0xba) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000000)='veno\x00', 0x5) 05:32:15 executing program 4: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3205.256039] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 05:32:15 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000000200000000000c0004"], 0x30}}, 0x0) 05:32:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r1) setfsuid(r1) mount$9p_xen(&(0x7f00000000c0)='syz\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x0, &(0x7f0000000280)={'trans=xen,', {[{@version_9p2000='version=9p2000'}, {@noextend='noextend'}], [{@euid_lt={'euid<', r1}}]}}) ioctl$sock_x25_SIOCADDRT(0xffffffffffffffff, 0x89e5, &(0x7f00000002c0)={@remote={[], 0x2}, 0x0, 'nr0\x00'}) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r2, &(0x7f0000000100)=""/195, 0xc3) r3 = accept4$llc(0xffffffffffffffff, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000080)=0x10, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r3, 0x6612) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r2, 0x8982, &(0x7f0000000000)={0x2, 'ip6gre0\x00', {0x4be}, 0xb9e0}) sendmsg$sock(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f00000003c0)="b247213ea5f2", 0x6}, {&(0x7f0000000400)="f74db5", 0x3}, {&(0x7f0000000440)="bef55cc44bb64cee1936979b5fd7bfeae3a7e2d20d7b32b5445b04a5ff45d257", 0x20}], 0x3, &(0x7f00000004c0)=[@mark={{0x14, 0x1, 0x24, 0xffff7fff}}, @mark={{0x14, 0x1, 0x24, 0x6}}, @mark={{0x14, 0x1, 0x24, 0x101}}, @mark={{0x14, 0x1, 0x24, 0x9}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x14, 0x1, 0x24, 0xfd6e}}], 0x90}, 0x0) 05:32:15 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000000300000000000c0004"], 0x30}}, 0x0) 05:32:15 executing program 5: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_x25_SIOCADDRT(r0, 0x89e5, &(0x7f0000000240)={@null=' \x00', 0x8, 'batadv_slave_1\x00'}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/bsg\x00', 0x200, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000600), 0x4) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) 05:32:15 executing program 4: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:15 executing program 1: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r2, &(0x7f0000000180)=""/186, 0xba) read$dsp(r2, &(0x7f0000000100)=""/193, 0xc1) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f0000000000)=0x1, 0x4) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f0000000040)={0x0, 0x0, 0x1f}) ioctl$DRM_IOCTL_GEM_CLOSE(r2, 0x40086409, &(0x7f0000000080)={r3}) ioctl$sock_x25_SIOCADDRT(r0, 0x89e5, &(0x7f00000002c0)={@remote={[], 0x2}, 0x0, 'nr0\x00'}) 05:32:15 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000000f00000000000c0004"], 0x30}}, 0x0) [ 3205.889038] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 05:32:15 executing program 4: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:15 executing program 5: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_x25_SIOCADDRT(r0, 0x89e5, &(0x7f0000000240)={@null=' \x00', 0x8, 'batadv_slave_1\x00'}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/bsg\x00', 0x200, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000600), 0x4) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:15 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000542d00000000000c0004"], 0x30}}, 0x0) 05:32:15 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) write$dsp(r0, &(0x7f0000000340)="0b217c23653ed49e4bf924c25dc51b59f0ac754d16872c0de67612d936945db7163f4d73e4ce73f95e9496a0d4377d1e0e4eb7cd3eacdfbecb2ec57b454782929f69d25dbb9af84a78e3ffbfce53f47847fe92b3daf61a71b839d21e3e7fe292e892138e5c1fd3cc4af4a23c7dcb04ab69986ba9a06ec468d20c5a6b6d3858", 0x7f) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_x25_SIOCADDRT(r1, 0x89e5, &(0x7f0000000040)={@remote={[], 0x2}, 0x2, 'nr0\x00'}) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r2, &(0x7f0000000180)=""/186, 0xba) sendto$rxrpc(r2, &(0x7f0000000240)="8cb04d4cf8528dd56e3211724cc1c9c7abd6cfffe643e11b05448ac0195c3d1349e9cf522771811d02e0583dff1ef1b0c861678677ee9a8b2da868659cf3aafc61204c5813cb747fdb68e49fcb1f9b54efc3dfda7a468f19aae7c972aece44fdd9e1736232961ceb503af77e95779fc9f62d8e9b9ac1383153949f4d98c69c5b998f545ad5d9763f94adbc5a7dbda6c66e8839f3d3e01604c288f4023e6764cd0784a8b7fe9c184ec9e6203b6928fab5ea25f116a513693afe4138c18bb0c16f34a6a75bc26d7a147d8a769ded26d9959f7f3247d9cff74e02237a1f5b5b54c9d62607e22987ac1a9957aab461ae06e6b9dc", 0xf2, 0x20000000, &(0x7f0000000140)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e23, @local}}, 0x24) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r3, &(0x7f0000000180)=""/186, 0xba) socket$tipc(0x1e, 0x2, 0x0) ioctl$KIOCSOUND(r3, 0x4b2f, 0x8) 05:32:15 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}, 0x1, 0x2a1ae}, 0x0) 05:32:15 executing program 2: syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_REMOVEDEF(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)={0x1c, r1, 0x2, 0x70bd2c, 0x25dfdbfe, {}, [@NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @empty}]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x20008080) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r2, &(0x7f0000000180)=""/186, 0xba) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x34, r4, 0x10, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @udp='udp:syz2\x00'}}}}, 0x34}}, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x30, r4, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}}, 0x30}, 0x1, 0x0, 0x0, 0x4040000}, 0x4000) read$dsp(0xffffffffffffffff, &(0x7f0000000180)=""/186, 0xba) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(0xffffffffffffffff, 0x8008ae9d, &(0x7f00000000c0)=""/64) [ 3205.972965] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 05:32:15 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000003f00000000000c0004"], 0x30}}, 0x0) 05:32:15 executing program 1: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_x25_SIOCADDRT(r0, 0x89e5, &(0x7f0000000240)={@null=' \x00', 0x8, 'batadv_slave_1\x00'}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/bsg\x00', 0x200, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000600), 0x4) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) 05:32:15 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_x25_SIOCADDRT(r0, 0x89e7, &(0x7f00000002c0)={@remote={[], 0x2}, 0x0, 'nr0\x00'}) r1 = add_key$keyring(&(0x7f00000003c0)='keyring\x00', 0x0, 0x0, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="757064617465206563727970746673202fbae039abae2e"], 0x1e, r1) keyctl$revoke(0x3, r1) 05:32:16 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_x25_SIOCADDRT(r0, 0x89e7, &(0x7f00000002c0)={@remote={[], 0x2}, 0x0, 'nr0\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r2) setfsuid(r2) ioprio_set$uid(0x0, r2, 0xfff) 05:32:16 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c0003ffffff9e00000000000c0004"], 0x30}}, 0x0) 05:32:16 executing program 4: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:16 executing program 5: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_x25_SIOCADDRT(r0, 0x89e5, &(0x7f0000000240)={@null=' \x00', 0x8, 'batadv_slave_1\x00'}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/bsg\x00', 0x200, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000600), 0x4) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:16 executing program 1: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_x25_SIOCADDRT(r0, 0x89e5, &(0x7f0000000240)={@null=' \x00', 0x8, 'batadv_slave_1\x00'}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/bsg\x00', 0x200, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000600), 0x4) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) 05:32:16 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_x25_SIOCADDRT(r0, 0x89e7, &(0x7f00000002c0)={@remote={[], 0x2}, 0x0, 'nr0\x00'}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)) 05:32:16 executing program 4: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:16 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}, 0x1, 0x2a1af}, 0x0) 05:32:16 executing program 2: openat$bsg(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/bsg\x00', 0x8000, 0x0) r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl(r0, 0x3f, &(0x7f0000000000)="dd5b5dbbc88450f9634b8980adcaf6e8c680642690803149648d57520fc7e96a5f735b902d189933969f703cfb7f8d4687a9499844c139d02ef77a819b428f72f289c9d67d9062553d8b39adec068475c9c4713d66aa88964b914aef5ae278815d63f0b121ce3b0839592c581a8fd9fd2e34a1a0f3727a4a5ad87051633dcaf0293d4c23f09349d29567cb440d") ioctl$sock_x25_SIOCADDRT(r0, 0x89e7, &(0x7f00000002c0)={@remote={[], 0x2}, 0x0, 'nr0\x00'}) 05:32:16 executing program 5: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_x25_SIOCADDRT(r0, 0x89e5, &(0x7f0000000240)={@null=' \x00', 0x8, 'batadv_slave_1\x00'}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/bsg\x00', 0x200, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000600), 0x4) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:16 executing program 1: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:16 executing program 4: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:16 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c0003fffffff000000000000c0004"], 0x30}}, 0x0) 05:32:16 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c000300f0ffff00000000000c0004"], 0x30}}, 0x0) 05:32:16 executing program 1: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:16 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_x25_SIOCADDRT(r0, 0x89e7, &(0x7f00000002c0)={@remote={[], 0x2}, 0x0, 'nr0\x00'}) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r1, &(0x7f0000000180)=""/186, 0xba) ioctl$SIOCX25SCAUSEDIAG(r1, 0x89ec, &(0x7f0000000000)={0x4, 0x4}) pipe(&(0x7f00000016c0)={0xffffffffffffffff}) sendmsg$IPCTNL_MSG_CT_DELETE(r2, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)=ANY=[@ANYBLOB="c800000002010500000000000000000000000000280001800c00028005007c3bc9a60100880000000600034000000000060003400000000006000340000300000800084000000001100004800c000180060005000809000008001540000000020800034000001c00200004801c00038008000240000000000500010002000000080002400000003144000d8008000200ac141429080001006401010108000100f100010014000500ff02000000000000000000000000000114000500fe8800"/200], 0xc8}, 0x1, 0x0, 0x0, 0x804}, 0x40080) 05:32:16 executing program 5: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_x25_SIOCADDRT(r0, 0x89e5, &(0x7f0000000240)={@null=' \x00', 0x8, 'batadv_slave_1\x00'}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/bsg\x00', 0x200, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000600), 0x4) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:16 executing program 4: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:16 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_x25_SIOCADDRT(r0, 0x89e7, &(0x7f0000000000)={@null=' \x00', 0x0, 'nr0\x00'}) [ 3207.424855] validate_nla: 2 callbacks suppressed [ 3207.424865] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 05:32:17 executing program 5: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_x25_SIOCADDRT(r0, 0x89e5, &(0x7f0000000240)={@null=' \x00', 0x8, 'batadv_slave_1\x00'}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/bsg\x00', 0x200, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000600), 0x4) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:17 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00037fffffff00000000000c0004"], 0x30}}, 0x0) 05:32:17 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_x25_SIOCADDRT(r0, 0x89e7, &(0x7f00000002c0)={@remote={[], 0x2}, 0x0, 'nr0\x00'}) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r1, &(0x7f0000000180)=""/186, 0xba) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r4, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800070006"], 0x3c}}, 0x0) sendmsg$can_raw(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x1d, r4}, 0x10, &(0x7f0000000080)={&(0x7f0000000040)=@can={{0x0, 0x0, 0x0, 0x1}, 0x5, 0x3, 0x0, 0x0, "ce29fccbcddf3d0c"}, 0x10}, 0x1, 0x0, 0x0, 0x10000}, 0x8800) 05:32:17 executing program 4: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:17 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}, 0x1, 0x2a1b0}, 0x0) 05:32:17 executing program 1: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_x25_SIOCADDRT(r0, 0x89e5, &(0x7f0000000240)={@null=' \x00', 0x8, 'batadv_slave_1\x00'}) openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/bsg\x00', 0x200, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3207.535465] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 05:32:17 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00039effffff00000000000c0004"], 0x30}}, 0x0) 05:32:17 executing program 5: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_x25_SIOCADDRT(r0, 0x89e5, &(0x7f0000000240)={@null=' \x00', 0x8, 'batadv_slave_1\x00'}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/bsg\x00', 0x200, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000600), 0x4) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:17 executing program 1: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_x25_SIOCADDRT(r0, 0x89e5, &(0x7f0000000240)={@null=' \x00', 0x8, 'batadv_slave_1\x00'}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/bsg\x00', 0x200, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000600), 0x4) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) 05:32:17 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:17 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c0003f0ffffff00000000000c0004"], 0x30}}, 0x0) 05:32:17 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_x25_SIOCADDRT(r0, 0x89e7, &(0x7f00000002c0)={@null=' \x00', 0x0, 'team0\x00'}) 05:32:17 executing program 5: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_x25_SIOCADDRT(r0, 0x89e5, &(0x7f0000000240)={@null=' \x00', 0x8, 'batadv_slave_1\x00'}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/bsg\x00', 0x200, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000600), 0x4) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:17 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:17 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r1, &(0x7f0000000180)=""/186, 0xba) getsockopt$rose(r1, 0x104, 0x7, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$sock_x25_SIOCADDRT(r0, 0x89e7, &(0x7f00000002c0)={@remote={[], 0x2}, 0x0, 'nr0\x00'}) 05:32:17 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000000000034000000c0004"], 0x30}}, 0x0) [ 3208.007071] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 05:32:18 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}, 0x1, 0x2a1b1}, 0x0) 05:32:18 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}, 0x1, 0x2a1a9}, 0x0) 05:32:18 executing program 5: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_x25_SIOCADDRT(r0, 0x89e5, &(0x7f0000000240)={@null=' \x00', 0x8, 'batadv_slave_1\x00'}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/bsg\x00', 0x200, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000600), 0x4) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:18 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000b00)=[@rdma_args={0x48, 0x114, 0x1, {{}, {0x0}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}], 0xffffff1f}}, @rdma_args={0x48, 0x114, 0x1, {{}, {0x0}, 0x0}}], 0x90}, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r1, &(0x7f0000000180)=""/186, 0xba) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r2, &(0x7f0000000180)=""/186, 0xba) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={r1, r2, 0x11}, 0x10) r3 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_x25_SIOCADDRT(r3, 0x89e7, &(0x7f00000002c0)={@remote={[], 0x2}, 0x0, 'nr0\x00'}) 05:32:18 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:18 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c0003fffffffffffff000000c0004"], 0x30}}, 0x0) [ 3208.316290] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 05:32:18 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)={0x6, 0x81, 0x6, 0x4, 0x0, 0x102}) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r1, &(0x7f0000000180)=""/174, 0xae) ioctl$KDDELIO(r1, 0x4b35, 0x4d80) r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_x25_SIOCADDRT(r2, 0x89e7, &(0x7f00000002c0)={@remote={[], 0x2}, 0x0, 'nr0\x00'}) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) 05:32:18 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3208.390321] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 05:32:18 executing program 5: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_x25_SIOCADDRT(r0, 0x89e5, &(0x7f0000000240)={@null=' \x00', 0x8, 'batadv_slave_1\x00'}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/bsg\x00', 0x200, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000600), 0x4) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:18 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000000000000001000c0004"], 0x30}}, 0x0) 05:32:18 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:18 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'hsr0\x00', {0xfffeffff}, 0x1}) ioctl$sock_x25_SIOCADDRT(r0, 0x89e7, &(0x7f0000000000)={@remote={[], 0x2}, 0x1, 'ip6tnl0\x00'}) [ 3208.739361] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 05:32:18 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}, 0x1, 0x2a1b2}, 0x0) 05:32:18 executing program 5: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_x25_SIOCADDRT(r0, 0x89e5, &(0x7f0000000240)={@null=' \x00', 0x8, 'batadv_slave_1\x00'}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/bsg\x00', 0x200, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000600), 0x4) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:18 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000000000000002000c0004"], 0x30}}, 0x0) 05:32:18 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)={0x6, 0x81, 0x6, 0x4, 0x0, 0x102}) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r1, &(0x7f0000000180)=""/174, 0xae) ioctl$KDDELIO(r1, 0x4b35, 0x4d80) r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_x25_SIOCADDRT(r2, 0x89e7, &(0x7f00000002c0)={@remote={[], 0x2}, 0x0, 'nr0\x00'}) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) 05:32:18 executing program 1: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_x25_SIOCADDRT(r0, 0x89e5, &(0x7f0000000240)={@null=' \x00', 0x8, 'batadv_slave_1\x00'}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/bsg\x00', 0x200, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000600), 0x4) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:18 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3208.865109] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 05:32:18 executing program 2: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_x25_SIOCADDRT(r0, 0x89e5, &(0x7f0000000240)={@null=' \x00', 0x8, 'batadv_slave_1\x00'}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/bsg\x00', 0x200, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000600), 0x4) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) writev(r3, &(0x7f00000000c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) 05:32:18 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:18 executing program 1: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r0, &(0x7f0000000080)={0x9, @null=' \x00'}, 0x12) ioctl$sock_x25_SIOCADDRT(r0, 0x89e7, &(0x7f00000002c0)={@remote={[], 0x2}, 0x0, 'nr0\x00'}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) 05:32:18 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000000000000003000c0004"], 0x30}}, 0x0) [ 3209.002757] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 05:32:18 executing program 5: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_x25_SIOCADDRT(r0, 0x89e5, &(0x7f0000000240)={@null=' \x00', 0x8, 'batadv_slave_1\x00'}) openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/bsg\x00', 0x200, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:18 executing program 1: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_x25_SIOCADDRT(r0, 0x89e5, &(0x7f0000000240)={@null=' \x00', 0x8, 'batadv_slave_1\x00'}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/bsg\x00', 0x200, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000600), 0x4) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) writev(r3, &(0x7f00000000c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) write(0xffffffffffffffff, 0x0, 0x0) 05:32:19 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}, 0x1, 0x2a1b3}, 0x0) 05:32:19 executing program 2: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_x25_SIOCADDRT(r0, 0x89e5, &(0x7f0000000240)={@null=' \x00', 0x8, 'batadv_slave_1\x00'}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/bsg\x00', 0x200, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000600), 0x4) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) writev(r3, &(0x7f00000000c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) 05:32:19 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:19 executing program 5: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_x25_SIOCADDRT(r0, 0x89e5, &(0x7f0000000240)={@null=' \x00', 0x8, 'batadv_slave_1\x00'}) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:19 executing program 1: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_x25_SIOCADDRT(r0, 0x89e5, &(0x7f0000000240)={@null=' \x00', 0x8, 'batadv_slave_1\x00'}) openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/bsg\x00', 0x200, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:19 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c0003000000000000000f000c0004"], 0x30}}, 0x0) [ 3209.433786] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 05:32:19 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c0003000000000000542d000c0004"], 0x30}}, 0x0) 05:32:19 executing program 5: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_x25_SIOCADDRT(r0, 0x89e5, &(0x7f0000000240)={@null=' \x00', 0x8, 'batadv_slave_1\x00'}) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:19 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3209.634521] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 05:32:19 executing program 1: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_x25_SIOCADDRT(r0, 0x89e5, &(0x7f0000000240)={@null=' \x00', 0x8, 'batadv_slave_1\x00'}) openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/bsg\x00', 0x200, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:19 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x0, 'rose0\x00', {0x3}, 0x6}) ioctl$sock_x25_SIOCADDRT(r0, 0x89e1, &(0x7f0000000040)={@remote={[], 0x2}, 0x0, 'nr0\x00'}) 05:32:19 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:19 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}, 0x1, 0x2a1b4}, 0x0) 05:32:19 executing program 5: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_x25_SIOCADDRT(r0, 0x89e5, &(0x7f0000000240)={@null=' \x00', 0x8, 'batadv_slave_1\x00'}) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:19 executing program 1: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_x25_SIOCADDRT(r0, 0x89e5, &(0x7f0000000240)={@null=' \x00', 0x8, 'batadv_slave_1\x00'}) openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/bsg\x00', 0x200, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:19 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:19 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x0, 'rose0\x00', {0x3}, 0x6}) ioctl$sock_x25_SIOCADDRT(r0, 0x89e1, &(0x7f0000000040)={@remote={[], 0x2}, 0x0, 'nr0\x00'}) 05:32:19 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c0003000000000000003f000c0004"], 0x30}}, 0x0) 05:32:19 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x0, 'rose0\x00', {0x3}, 0x6}) ioctl$sock_x25_SIOCADDRT(r0, 0x89e1, &(0x7f0000000040)={@remote={[], 0x2}, 0x0, 'nr0\x00'}) 05:32:19 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c000300000000ffffff9e000c0004"], 0x30}}, 0x0) 05:32:19 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:19 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_x25_SIOCADDRT(r0, 0x89e1, &(0x7f0000000000)={@null=' \x00', 0x3, 'nr0\x00'}) syz_mount_image$minix(&(0x7f0000000100)='minix\x00', &(0x7f0000000140)='./file0\x00', 0xff, 0x4, &(0x7f0000000480)=[{&(0x7f0000000180)="9c8e6b83995721a68e69fe3be9e53cb8433d0f90c0412f25e5930ad5caf82c5ee85b1db9ddac66b755963ca4239dcc309f441af49de1bb8c238923f0fb1d22e6b7e4a97e7c868621fc0640dae8a84c190d849cc358f8cda87f8c0516c7156e1e856c9c7e33729b479b1f28810429ab5587b6136706686552abb02bf42fbcd293b8faa831ea48e67e177fb214f5", 0x8d, 0x4}, {&(0x7f0000000240)="d3776271c19e5f2e08d0c342a2220abbbbda6d0cf0dff8df6a1f597bffac46645e33d11ef62dddb7a3002b0c4b848735713d64b88114dcb30e01c646ee4a7e9b2b9ba2e99107de32bcb2c6588e214a96489fee02028459290c4f2acfb83b91d8dad2f648", 0x64}, {&(0x7f00000002c0)="b0e847f7b279be904139ad1e5a71decd139b51c416f47c0c4f93c1aff60c7acd1575cb9db786752c45e8e7913cb687c366f793d007e85e1ecdb097921951a2cef610a158b4d4876ca305f786761541692077b65ec407e9c86519fd2914b1be043a60fefe123c8849bd666ced4e69fd031350b24ea11b9498e29708dd7a70c23e1c5fb8c5247aafe92d8c4b28a8", 0x8d, 0x6}, {&(0x7f0000000380)="54e2fe5c214af04c1f5e4a197e320363145f82cb130374631a2c11a0dc44c4a67b3b73e7305e8c0696de757b9f08804388c226bd699a4df2a6408ea6bde97345de79a1a98ee7aa8ff79c1931277dda23b2a3bec9acc4012a57cf950ba32e5277537fbc1765bcc7ce6d9eb5d7dc3627b106438118e6928fe51123df0aec558ddc32f600add713cafc9ff43052f11021afd054b5c6bc9393398d1e324fbf0e0569b4f39f3db1fb975a0be3bf5963bd3db6da7e7791fa61ad1b90edfd0c88febee55ae621f3548b15d73cef68ce06afe239f71b299056cf17", 0xd7, 0x3}], 0x5000, 0x0) 05:32:19 executing program 5: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:20 executing program 1: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_x25_SIOCADDRT(r0, 0x89e5, &(0x7f0000000240)={@null=' \x00', 0x8, 'batadv_slave_1\x00'}) openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/bsg\x00', 0x200, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:20 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}, 0x1, 0x2a1b5}, 0x0) 05:32:20 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c000300000000fffffff0000c0004"], 0x30}}, 0x0) 05:32:20 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:20 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pivot_root(0x0, &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000040)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x6c00, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0x2}}}}}}, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000001c0)=@buf={0x0, &(0x7f00000003c0)}) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) getsockopt$TIPC_IMPORTANCE(r0, 0x10f, 0x7f, &(0x7f0000000040), &(0x7f0000000080)=0x4) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_x25_SIOCADDRT(r1, 0x89e0, &(0x7f00000002c0)={@remote={[], 0x2}, 0x0, 'nr0\x00'}) read$dsp(0xffffffffffffffff, &(0x7f0000000180)=""/186, 0xba) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000000)=0x1) 05:32:20 executing program 5: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:20 executing program 1: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_x25_SIOCADDRT(r0, 0x89e5, &(0x7f0000000240)={@null=' \x00', 0x8, 'batadv_slave_1\x00'}) openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/bsg\x00', 0x200, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:20 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c0003000000007fffffff000c0004"], 0x30}}, 0x0) 05:32:20 executing program 1: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_x25_SIOCADDRT(r0, 0x89e5, &(0x7f0000000240)={@null=' \x00', 0x8, 'batadv_slave_1\x00'}) openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/bsg\x00', 0x200, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:20 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c000300f0ffffffffffff000c0004"], 0x30}}, 0x0) 05:32:20 executing program 5: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:20 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pivot_root(0x0, &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000040)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x6c00, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0x2}}}}}}, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000001c0)=@buf={0x0, &(0x7f00000003c0)}) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) getsockopt$TIPC_IMPORTANCE(r0, 0x10f, 0x7f, &(0x7f0000000040), &(0x7f0000000080)=0x4) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_x25_SIOCADDRT(r1, 0x89e0, &(0x7f00000002c0)={@remote={[], 0x2}, 0x0, 'nr0\x00'}) read$dsp(0xffffffffffffffff, &(0x7f0000000180)=""/186, 0xba) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000000)=0x1) 05:32:20 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:20 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}, 0x1, 0x2a1b6}, 0x0) 05:32:20 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030002000000000000000c0004"], 0x30}}, 0x0) 05:32:20 executing program 1: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_x25_SIOCADDRT(r0, 0x89e5, &(0x7f0000000240)={@null=' \x00', 0x8, 'batadv_slave_1\x00'}) openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/bsg\x00', 0x200, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:20 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pivot_root(0x0, &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000040)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x6c00, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0x2}}}}}}, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000001c0)=@buf={0x0, &(0x7f00000003c0)}) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) getsockopt$TIPC_IMPORTANCE(r0, 0x10f, 0x7f, &(0x7f0000000040), &(0x7f0000000080)=0x4) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_x25_SIOCADDRT(r1, 0x89e0, &(0x7f00000002c0)={@remote={[], 0x2}, 0x0, 'nr0\x00'}) read$dsp(0xffffffffffffffff, &(0x7f0000000180)=""/186, 0xba) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000000)=0x1) 05:32:20 executing program 5: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:20 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:21 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030003000000000000000c0004"], 0x30}}, 0x0) 05:32:21 executing program 1: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_x25_SIOCADDRT(r0, 0x89e5, &(0x7f0000000240)={@null=' \x00', 0x8, 'batadv_slave_1\x00'}) openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/bsg\x00', 0x200, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:21 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:21 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_x25_SIOCADDRT(r0, 0x89e1, &(0x7f00000002c0)={@remote={[], 0x2}, 0x0, 'nr0\x00'}) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x4, 0x80000) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r2, &(0x7f0000000180)=""/186, 0xba) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r3, &(0x7f0000000180)=""/186, 0xba) ioctl$DRM_IOCTL_AGP_ALLOC(r3, 0xc0206434, &(0x7f00000000c0)={0xbf7b, 0x0, 0x2, 0x78}) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r5 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open_by_handle_at(r5, &(0x7f00000003c0)={0x9, 0x1, "14"}, 0x0) ioctl$DRM_IOCTL_AGP_BIND(r2, 0x40106436, &(0x7f0000000100)={r4, 0xdbe}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) setsockopt$CAN_RAW_JOIN_FILTERS(r3, 0x65, 0x6, &(0x7f0000000400), 0x4) ioctl$BLKBSZSET(r1, 0x40081271, &(0x7f0000000040)=0x6) openat$mice(0xffffffffffffff9c, &(0x7f0000000240)='/dev/input/mice\x00', 0x0) r6 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r6, &(0x7f0000000180)=""/186, 0xba) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r6, 0x8983, &(0x7f0000000280)) 05:32:21 executing program 5: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:21 executing program 1: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_x25_SIOCADDRT(r0, 0x89e5, &(0x7f0000000240)={@null=' \x00', 0x8, 'batadv_slave_1\x00'}) openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/bsg\x00', 0x200, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:21 executing program 5: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:21 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c0003000f000000000000000c0004"], 0x30}}, 0x0) 05:32:21 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:21 executing program 1: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_x25_SIOCADDRT(r0, 0x89e5, &(0x7f0000000240)={@null=' \x00', 0x8, 'batadv_slave_1\x00'}) openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/bsg\x00', 0x200, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:21 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}, 0x1, 0x2a1b7}, 0x0) 05:32:21 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = inotify_init() r2 = epoll_create(0x7ff) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f00007a8000)) r3 = inotify_add_watch(r1, &(0x7f0000000000)='./control\x00', 0x81000a40) inotify_rm_watch(r1, r3) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r4, &(0x7f0000000180)=""/186, 0xba) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r4, 0x84, 0x20, &(0x7f0000000040)=0xbb952d7, 0x4) inotify_rm_watch(r0, r3) ioctl$sock_x25_SIOCADDRT(r0, 0x89e7, &(0x7f00000002c0)={@remote={[], 0x2}, 0x0, 'nr0\x00'}) ioctl$LOOP_SET_BLOCK_SIZE(r4, 0x4c09, 0xb39) 05:32:21 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = inotify_init() r2 = epoll_create(0x7ff) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f00007a8000)) r3 = inotify_add_watch(r1, &(0x7f0000000000)='./control\x00', 0x81000a40) inotify_rm_watch(r1, r3) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r4, &(0x7f0000000180)=""/186, 0xba) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r4, 0x84, 0x20, &(0x7f0000000040)=0xbb952d7, 0x4) inotify_rm_watch(r0, r3) ioctl$sock_x25_SIOCADDRT(r0, 0x89e7, &(0x7f00000002c0)={@remote={[], 0x2}, 0x0, 'nr0\x00'}) ioctl$LOOP_SET_BLOCK_SIZE(r4, 0x4c09, 0xb39) 05:32:21 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c000300f0000000000000000c0004"], 0x30}}, 0x0) 05:32:21 executing program 5: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:21 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:21 executing program 1: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_x25_SIOCADDRT(r0, 0x89e5, &(0x7f0000000240)={@null=' \x00', 0x8, 'batadv_slave_1\x00'}) openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/bsg\x00', 0x200, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:21 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = inotify_init() r2 = epoll_create(0x7ff) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f00007a8000)) r3 = inotify_add_watch(r1, &(0x7f0000000000)='./control\x00', 0x81000a40) inotify_rm_watch(r1, r3) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r4, &(0x7f0000000180)=""/186, 0xba) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r4, 0x84, 0x20, &(0x7f0000000040)=0xbb952d7, 0x4) inotify_rm_watch(r0, r3) ioctl$sock_x25_SIOCADDRT(r0, 0x89e7, &(0x7f00000002c0)={@remote={[], 0x2}, 0x0, 'nr0\x00'}) ioctl$LOOP_SET_BLOCK_SIZE(r4, 0x4c09, 0xb39) 05:32:21 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000030000000000000c0004"], 0x30}}, 0x0) 05:32:21 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = inotify_init() r2 = epoll_create(0x7ff) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f00007a8000)) r3 = inotify_add_watch(r1, &(0x7f0000000000)='./control\x00', 0x81000a40) inotify_rm_watch(r1, r3) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r4, &(0x7f0000000180)=""/186, 0xba) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r4, 0x84, 0x20, &(0x7f0000000040)=0xbb952d7, 0x4) inotify_rm_watch(r0, r3) ioctl$sock_x25_SIOCADDRT(r0, 0x89e7, &(0x7f00000002c0)={@remote={[], 0x2}, 0x0, 'nr0\x00'}) 05:32:22 executing program 1: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_x25_SIOCADDRT(r0, 0x89e5, &(0x7f0000000240)={@null=' \x00', 0x8, 'batadv_slave_1\x00'}) openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/bsg\x00', 0x200, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:22 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:22 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}, 0x1, 0x2a1b8}, 0x0) 05:32:22 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:22 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c000300000f0000000000000c0004"], 0x30}}, 0x0) 05:32:22 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = inotify_init() r2 = epoll_create(0x7ff) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f00007a8000)) r3 = inotify_add_watch(r1, &(0x7f0000000000)='./control\x00', 0x81000a40) inotify_rm_watch(r1, r3) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r4, &(0x7f0000000180)=""/186, 0xba) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r4, 0x84, 0x20, &(0x7f0000000040)=0xbb952d7, 0x4) inotify_rm_watch(r0, r3) 05:32:22 executing program 1: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_x25_SIOCADDRT(r0, 0x89e5, &(0x7f0000000240)={@null=' \x00', 0x8, 'batadv_slave_1\x00'}) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:22 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3212.552790] validate_nla: 8 callbacks suppressed [ 3212.552809] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 05:32:22 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:22 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c000300542d0000000000000c0004"], 0x30}}, 0x0) 05:32:22 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:22 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:22 executing program 1: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:22 executing program 2: syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = inotify_init() r1 = epoll_create(0x7ff) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00007a8000)) r2 = inotify_add_watch(r0, &(0x7f0000000000)='./control\x00', 0x81000a40) inotify_rm_watch(r0, r2) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r3, &(0x7f0000000180)=""/186, 0xba) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r3, 0x84, 0x20, &(0x7f0000000040)=0xbb952d7, 0x4) [ 3212.908751] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 05:32:22 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:22 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c000300003f0000000000000c0004"], 0x30}}, 0x0) 05:32:22 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:22 executing program 2: syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = inotify_init() r1 = epoll_create(0x7ff) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00007a8000)) r2 = inotify_add_watch(r0, &(0x7f0000000000)='./control\x00', 0x81000a40) inotify_rm_watch(r0, r2) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r3, &(0x7f0000000180)=""/186, 0xba) 05:32:22 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}, 0x1, 0x2a1b9}, 0x0) 05:32:22 executing program 1: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3213.054169] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 05:32:22 executing program 5: perf_event_open(&(0x7f00000012c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:22 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c0003002d540000000000000c0004"], 0x30}}, 0x0) 05:32:22 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:23 executing program 2: syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = inotify_init() r1 = epoll_create(0x7ff) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00007a8000)) r2 = inotify_add_watch(r0, &(0x7f0000000000)='./control\x00', 0x81000a40) inotify_rm_watch(r0, r2) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) 05:32:23 executing program 1: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:23 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000f00000000000000c0004"], 0x30}}, 0x0) 05:32:23 executing program 2: syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = inotify_init() r1 = epoll_create(0x7ff) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00007a8000)) r2 = inotify_add_watch(r0, &(0x7f0000000000)='./control\x00', 0x81000a40) inotify_rm_watch(r0, r2) 05:32:23 executing program 5: perf_event_open(&(0x7f00000012c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:23 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:23 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000400300000000000c0004"], 0x30}}, 0x0) [ 3213.638848] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 05:32:23 executing program 2: syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = inotify_init() r1 = epoll_create(0x7ff) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00007a8000)) inotify_add_watch(r0, &(0x7f0000000000)='./control\x00', 0x81000a40) 05:32:23 executing program 1: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:23 executing program 5: perf_event_open(&(0x7f00000012c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:23 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000034000000000000c0004"], 0x30}}, 0x0) 05:32:23 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}, 0x1, 0x2a1ba}, 0x0) 05:32:23 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, 0x0, 0x0, 0xa51000, 0x0) [ 3213.742596] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 05:32:23 executing program 2: syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = inotify_init() r1 = epoll_create(0x7ff) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00007a8000)) 05:32:23 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, 0x0, 0x0, 0xa51000, 0x0) 05:32:23 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c000300fffff000000000000c0004"], 0x30}}, 0x0) 05:32:23 executing program 2: syz_init_net_socket$x25(0x9, 0x5, 0x0) inotify_init() epoll_create(0x7ff) 05:32:23 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, 0x0, 0x0, 0xa51000, 0x0) 05:32:23 executing program 2: syz_init_net_socket$x25(0x9, 0x5, 0x0) inotify_init() 05:32:23 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000000001000000000c0004"], 0x30}}, 0x0) 05:32:23 executing program 1: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:23 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0) 05:32:23 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3214.317681] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 05:32:24 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}, 0x1, 0x2a1bb}, 0x0) 05:32:24 executing program 2: inotify_init() 05:32:24 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000000002000000000c0004"], 0x30}}, 0x0) 05:32:24 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:24 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0) 05:32:24 executing program 1: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3214.414382] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 05:32:24 executing program 2: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:24 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000000003000000000c0004"], 0x30}}, 0x0) 05:32:24 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:24 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0) 05:32:24 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:24 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c0003000000000f000000000c0004"], 0x30}}, 0x0) [ 3214.737023] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 05:32:24 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}, 0x1, 0x2a1bc}, 0x0) 05:32:24 executing program 4: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:24 executing program 2: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:24 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:24 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:24 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c0003000000542d000000000c0004"], 0x30}}, 0x0) [ 3214.974635] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 05:32:24 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:24 executing program 4: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_x25_SIOCADDRT(r0, 0x89e5, &(0x7f0000000240)={@null=' \x00', 0x8, 'batadv_slave_1\x00'}) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:25 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c0003000000003f000000000c0004"], 0x30}}, 0x0) 05:32:25 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3215.231816] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 05:32:25 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) ioctl$SG_GET_ACCESS_COUNT(r1, 0x2289, &(0x7f0000000280)) ioctl$KVM_SET_GSI_ROUTING(r0, 0x4008ae6a, &(0x7f0000000000)={0x7, 0x0, [{0x5, 0x2, 0x0, 0x0, @msi={0x9, 0x7, 0xff, 0x7}}, {0x7, 0x3, 0x0, 0x0, @msi={0x5, 0x9, 0x101, 0x2}}, {0x8000, 0x4, 0x0, 0x0, @msi={0x7, 0x0, 0x80000000, 0x3f}}, {0xffff, 0x4, 0x0, 0x0, @sint={0x9985, 0x4}}, {0x400, 0x2, 0x0, 0x0, @adapter={0x2, 0x4, 0x20, 0x9, 0x2}}, {0x5, 0x4, 0x0, 0x0, @irqchip={0x1, 0x5}}, {0x6, 0x0, 0x0, 0x0, @sint={0x6, 0x80}}]}) r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_x25_SIOCADDRT(r2, 0x89e1, &(0x7f00000002c0)={@remote={[], 0x2}, 0x0, 'nr0\x00'}) 05:32:25 executing program 4 (fault-call:4 fault-nth:0): syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3215.493934] FAULT_INJECTION: forcing a failure. [ 3215.493934] name failslab, interval 1, probability 0, space 0, times 0 [ 3215.530021] CPU: 1 PID: 30872 Comm: syz-executor.4 Not tainted 4.19.131-syzkaller #0 [ 3215.537923] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3215.547274] Call Trace: [ 3215.549879] dump_stack+0x1fc/0x2fe [ 3215.553522] should_fail.cold+0xa/0x14 [ 3215.557419] ? setup_fault_attr+0x200/0x200 [ 3215.561752] __should_failslab+0x115/0x180 [ 3215.565990] should_failslab+0x5/0xf [ 3215.569707] __kmalloc_track_caller+0x2a6/0x3c0 [ 3215.574385] ? strndup_user+0x70/0x120 [ 3215.578303] memdup_user+0x22/0xb0 [ 3215.581848] strndup_user+0x70/0x120 [ 3215.585565] ksys_mount+0x6f/0x130 [ 3215.589112] __x64_sys_mount+0xba/0x150 [ 3215.593088] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3215.597673] do_syscall_64+0xf9/0x620 [ 3215.601484] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3215.606672] RIP: 0033:0x45cb29 [ 3215.609869] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3215.628768] RSP: 002b:00007fef3220ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3215.636870] RAX: ffffffffffffffda RBX: 00000000004f7560 RCX: 000000000045cb29 [ 3215.644134] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000000 [ 3215.651392] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3215.658643] R10: 0000000000a51000 R11: 0000000000000246 R12: 0000000000000005 [ 3215.665901] R13: 000000000000077b R14: 00000000004ca735 R15: 00007fef3220b6d4 05:32:25 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}, 0x1, 0x2a1bd}, 0x0) 05:32:25 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:25 executing program 2 (fault-call:0 fault-nth:0): inotify_init() 05:32:25 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:25 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c000300ffffff9e000000000c0004"], 0x30}}, 0x0) 05:32:25 executing program 4 (fault-call:4 fault-nth:1): syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:25 executing program 1: perf_event_open(&(0x7f00000012c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3215.786149] FAULT_INJECTION: forcing a failure. [ 3215.786149] name failslab, interval 1, probability 0, space 0, times 0 [ 3215.812364] FAULT_INJECTION: forcing a failure. [ 3215.812364] name failslab, interval 1, probability 0, space 0, times 0 [ 3215.873092] CPU: 0 PID: 30929 Comm: syz-executor.2 Not tainted 4.19.131-syzkaller #0 [ 3215.880992] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3215.890347] Call Trace: [ 3215.892945] dump_stack+0x1fc/0x2fe [ 3215.896589] should_fail.cold+0xa/0x14 [ 3215.900490] ? setup_fault_attr+0x200/0x200 [ 3215.904816] ? lock_acquire+0x170/0x3c0 [ 3215.908801] __should_failslab+0x115/0x180 [ 3215.913042] should_failslab+0x5/0xf [ 3215.916761] kmem_cache_alloc_trace+0x284/0x380 [ 3215.921439] fsnotify_alloc_group+0x41/0x300 [ 3215.925857] inotify_new_group+0x1d/0x500 [ 3215.930014] ? do_syscall_64+0x21/0x620 [ 3215.934428] __ia32_sys_inotify_init+0x12/0x90 [ 3215.939016] do_syscall_64+0xf9/0x620 [ 3215.942822] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3215.948015] RIP: 0033:0x45cb29 [ 3215.951210] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 05:32:25 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c000300fffffff0000000000c0004"], 0x30}}, 0x0) [ 3215.970128] RSP: 002b:00007fd8166d8c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fd [ 3215.977837] RAX: ffffffffffffffda RBX: 00000000004e1620 RCX: 000000000045cb29 [ 3215.985104] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 3215.992370] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3215.999640] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 3216.007045] R13: 00000000000001fe R14: 00000000004c45be R15: 00007fd8166d96d4 [ 3216.035983] CPU: 0 PID: 30927 Comm: syz-executor.4 Not tainted 4.19.131-syzkaller #0 [ 3216.043875] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3216.053234] Call Trace: [ 3216.055841] dump_stack+0x1fc/0x2fe [ 3216.059478] should_fail.cold+0xa/0x14 [ 3216.063377] ? setup_fault_attr+0x200/0x200 [ 3216.067707] ? lock_acquire+0x170/0x3c0 [ 3216.071691] __should_failslab+0x115/0x180 [ 3216.075924] should_failslab+0x5/0xf [ 3216.079640] kmem_cache_alloc+0x277/0x370 [ 3216.083794] getname_flags+0xce/0x590 [ 3216.087598] user_path_at_empty+0x2a/0x50 [ 3216.091747] do_mount+0x147/0x2f10 [ 3216.095307] ? lock_downgrade+0x720/0x720 [ 3216.099458] ? lock_acquire+0x170/0x3c0 [ 3216.103432] ? __might_fault+0xef/0x1d0 [ 3216.107407] ? copy_mount_string+0x40/0x40 [ 3216.111650] ? __might_fault+0x192/0x1d0 [ 3216.115717] ? _copy_from_user+0xd2/0x130 [ 3216.119870] ? copy_mount_options+0x26f/0x380 [ 3216.124369] ksys_mount+0xcf/0x130 [ 3216.127915] __x64_sys_mount+0xba/0x150 [ 3216.131891] ? do_syscall_64+0xe9/0x620 [ 3216.135867] do_syscall_64+0xf9/0x620 [ 3216.139674] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3216.144862] RIP: 0033:0x45cb29 [ 3216.148053] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3216.166949] RSP: 002b:00007fef3220ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3216.174656] RAX: ffffffffffffffda RBX: 00000000004f7560 RCX: 000000000045cb29 05:32:25 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3216.181922] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000000 [ 3216.189188] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3216.196465] R10: 0000000000a51000 R11: 0000000000000246 R12: 0000000000000005 [ 3216.203734] R13: 000000000000077b R14: 00000000004ca735 R15: 00007fef3220b6d4 05:32:26 executing program 2 (fault-call:0 fault-nth:1): inotify_init() 05:32:26 executing program 1: perf_event_open(&(0x7f00000012c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:26 executing program 4 (fault-call:4 fault-nth:2): syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3216.316456] FAULT_INJECTION: forcing a failure. [ 3216.316456] name failslab, interval 1, probability 0, space 0, times 0 [ 3216.384908] FAULT_INJECTION: forcing a failure. [ 3216.384908] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3216.396729] CPU: 0 PID: 30996 Comm: syz-executor.4 Not tainted 4.19.131-syzkaller #0 [ 3216.404607] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3216.413964] Call Trace: [ 3216.416571] dump_stack+0x1fc/0x2fe [ 3216.420218] should_fail.cold+0xa/0x14 [ 3216.424116] ? setup_fault_attr+0x200/0x200 [ 3216.428446] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3216.433305] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3216.437912] __alloc_pages_nodemask+0x239/0x2890 [ 3216.442687] ? retint_kernel+0x2d/0x2d [ 3216.446595] ? is_bpf_text_address+0xd5/0x1b0 [ 3216.451101] ? __lock_acquire+0x6de/0x3ff0 [ 3216.455344] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 3216.460198] ? is_bpf_text_address+0xfc/0x1b0 [ 3216.464706] ? unwind_get_return_address+0x51/0x90 [ 3216.469644] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3216.475016] ? __save_stack_trace+0xaf/0x190 [ 3216.479434] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3216.484206] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3216.488794] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3216.493570] ? rcu_nmi_exit+0xb3/0x180 [ 3216.497478] cache_grow_begin+0xa4/0x8a0 [ 3216.501549] ? setup_fault_attr+0x200/0x200 [ 3216.505879] ? cache_alloc_pfmemalloc+0x1e/0x140 [ 3216.510633] cache_alloc_refill+0x273/0x340 [ 3216.514957] kmem_cache_alloc+0x346/0x370 [ 3216.519110] getname_flags+0xce/0x590 [ 3216.522913] user_path_at_empty+0x2a/0x50 [ 3216.527057] do_mount+0x147/0x2f10 [ 3216.530589] ? lock_downgrade+0x720/0x720 [ 3216.534729] ? lock_acquire+0x170/0x3c0 [ 3216.538723] ? __might_fault+0xef/0x1d0 [ 3216.542699] ? copy_mount_string+0x40/0x40 [ 3216.546930] ? __might_fault+0x192/0x1d0 [ 3216.550979] ? _copy_from_user+0xd2/0x130 [ 3216.555114] ? copy_mount_options+0x26f/0x380 [ 3216.559597] ksys_mount+0xcf/0x130 [ 3216.563128] __x64_sys_mount+0xba/0x150 [ 3216.567092] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3216.571664] do_syscall_64+0xf9/0x620 [ 3216.575463] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3216.580654] RIP: 0033:0x45cb29 [ 3216.583848] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3216.602748] RSP: 002b:00007fef3220ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3216.610464] RAX: ffffffffffffffda RBX: 00000000004f7560 RCX: 000000000045cb29 [ 3216.617734] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000000 [ 3216.625005] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3216.632266] R10: 0000000000a51000 R11: 0000000000000246 R12: 0000000000000005 [ 3216.639537] R13: 000000000000077b R14: 00000000004ca735 R15: 00007fef3220b6d4 [ 3216.646811] CPU: 1 PID: 30993 Comm: syz-executor.2 Not tainted 4.19.131-syzkaller #0 [ 3216.654697] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3216.664046] Call Trace: [ 3216.666635] dump_stack+0x1fc/0x2fe [ 3216.670280] should_fail.cold+0xa/0x14 [ 3216.674171] ? setup_fault_attr+0x200/0x200 [ 3216.678476] ? lock_acquire+0x170/0x3c0 [ 3216.682446] __should_failslab+0x115/0x180 [ 3216.686663] should_failslab+0x5/0xf [ 3216.690358] kmem_cache_alloc_trace+0x284/0x380 [ 3216.695010] inotify_new_group+0x76/0x500 [ 3216.699179] ? do_syscall_64+0x21/0x620 [ 3216.703137] __ia32_sys_inotify_init+0x12/0x90 [ 3216.707698] do_syscall_64+0xf9/0x620 [ 3216.711518] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3216.716685] RIP: 0033:0x45cb29 [ 3216.719858] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3216.738745] RSP: 002b:00007fd8166d8c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fd [ 3216.746443] RAX: ffffffffffffffda RBX: 00000000004e1620 RCX: 000000000045cb29 [ 3216.753698] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 3216.760955] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3216.768205] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 3216.775461] R13: 00000000000001fe R14: 00000000004c45be R15: 00007fd8166d96d4 05:32:26 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}, 0x1, 0x2a1be}, 0x0) 05:32:26 executing program 1: perf_event_open(&(0x7f00000012c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:26 executing program 2 (fault-call:0 fault-nth:2): inotify_init() 05:32:26 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:26 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000f0ffff000000000c0004"], 0x30}}, 0x0) 05:32:26 executing program 4 (fault-call:4 fault-nth:3): syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3216.992635] FAULT_INJECTION: forcing a failure. [ 3216.992635] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3217.004453] CPU: 1 PID: 31017 Comm: syz-executor.4 Not tainted 4.19.131-syzkaller #0 [ 3217.012317] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3217.021655] Call Trace: [ 3217.024236] dump_stack+0x1fc/0x2fe [ 3217.027863] should_fail.cold+0xa/0x14 [ 3217.031735] ? check_preemption_disabled+0x41/0x280 [ 3217.037243] ? setup_fault_attr+0x200/0x200 [ 3217.041560] __alloc_pages_nodemask+0x239/0x2890 [ 3217.046300] ? __lock_acquire+0x6de/0x3ff0 [ 3217.050524] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 3217.055365] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 3217.060191] ? is_bpf_text_address+0xfc/0x1b0 [ 3217.064670] ? __save_stack_trace+0xaf/0x190 [ 3217.069065] ? ____cache_alloc_node+0x156/0x1d0 [ 3217.073728] cache_grow_begin+0xa4/0x8a0 [ 3217.077772] ? check_preemption_disabled+0x41/0x280 [ 3217.082772] ____cache_alloc_node+0x170/0x1d0 [ 3217.087248] ? check_preemption_disabled+0x41/0x280 [ 3217.092278] kmem_cache_alloc+0x1e4/0x370 [ 3217.096415] getname_flags+0xce/0x590 [ 3217.100206] user_path_at_empty+0x2a/0x50 [ 3217.104337] do_mount+0x147/0x2f10 [ 3217.107859] ? retint_kernel+0x2d/0x2d [ 3217.111731] ? copy_mount_string+0x40/0x40 [ 3217.115949] ? _copy_from_user+0xbe/0x130 [ 3217.120077] ? __sanitizer_cov_trace_pc+0x44/0x50 [ 3217.124914] ? _copy_from_user+0xd2/0x130 [ 3217.129049] ? copy_mount_options+0x26f/0x380 [ 3217.133527] ksys_mount+0xcf/0x130 [ 3217.137347] __x64_sys_mount+0xba/0x150 [ 3217.141303] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3217.145867] do_syscall_64+0xf9/0x620 [ 3217.149653] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3217.154932] RIP: 0033:0x45cb29 [ 3217.158124] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3217.177020] RSP: 002b:00007fef3220ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3217.184736] RAX: ffffffffffffffda RBX: 00000000004f7560 RCX: 000000000045cb29 05:32:26 executing program 2: inotify_init() 05:32:27 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c0003007fffffff000000000c0004"], 0x30}}, 0x0) [ 3217.191985] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000000 [ 3217.199234] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3217.206485] R10: 0000000000a51000 R11: 0000000000000246 R12: 0000000000000005 [ 3217.213735] R13: 000000000000077b R14: 00000000004ca735 R15: 00007fef3220b6d4 05:32:27 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:27 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:27 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x8000, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) ioctl$KVM_S390_VCPU_FAULT(r0, 0x4008ae52, &(0x7f0000000080)=0xfff) inotify_init() 05:32:27 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c0003009effffff000000000c0004"], 0x30}}, 0x0) 05:32:27 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}, 0x1, 0x2a1bf}, 0x0) 05:32:27 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:27 executing program 2: inotify_init() r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) ioctl$UI_SET_SNDBIT(r0, 0x4004556a, 0x6) 05:32:27 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:27 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c000300f0ffffff000000000c0004"], 0x30}}, 0x0) 05:32:27 executing program 4 (fault-call:4 fault-nth:4): syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3217.642738] validate_nla: 4 callbacks suppressed [ 3217.642744] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 05:32:27 executing program 2: inotify_init() r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) syz_open_procfs(r0, &(0x7f0000000000)='personality\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r1, &(0x7f0000000180)=""/186, 0xba) accept4$bt_l2cap(r1, 0x0, &(0x7f0000000040), 0x800) 05:32:27 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:27 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:27 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000000000000340000c0004"], 0x30}}, 0x0) [ 3217.755593] FAULT_INJECTION: forcing a failure. [ 3217.755593] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3217.826564] CPU: 0 PID: 31109 Comm: syz-executor.4 Not tainted 4.19.131-syzkaller #0 [ 3217.834583] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3217.835629] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 3217.843931] Call Trace: [ 3217.843957] dump_stack+0x1fc/0x2fe [ 3217.843980] should_fail.cold+0xa/0x14 [ 3217.843998] ? lock_acquire+0x170/0x3c0 [ 3217.844014] ? setup_fault_attr+0x200/0x200 [ 3217.844040] __alloc_pages_nodemask+0x239/0x2890 [ 3217.844057] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 3217.844081] ? __alloc_pages_nodemask+0x1b43/0x2890 [ 3217.844112] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 3217.844129] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3217.844144] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3217.844157] ? rcu_nmi_exit+0xb3/0x180 [ 3217.844173] ? retint_kernel+0x2d/0x2d [ 3217.906509] cache_grow_begin+0xa4/0x8a0 [ 3217.910583] fallback_alloc+0x213/0x2e0 [ 3217.914572] kmem_cache_alloc+0x1e4/0x370 [ 3217.918740] getname_flags+0xce/0x590 [ 3217.922544] ? retint_kernel+0x2d/0x2d [ 3217.926442] user_path_at_empty+0x2a/0x50 [ 3217.930604] do_mount+0x147/0x2f10 [ 3217.934165] ? lock_downgrade+0x720/0x720 [ 3217.938325] ? lock_acquire+0x170/0x3c0 [ 3217.942302] ? __might_fault+0xef/0x1d0 [ 3217.946284] ? copy_mount_string+0x40/0x40 [ 3217.950533] ? __might_fault+0x192/0x1d0 [ 3217.954596] ? _copy_from_user+0xd2/0x130 [ 3217.958745] ? copy_mount_options+0x26f/0x380 [ 3217.963247] ksys_mount+0xcf/0x130 [ 3217.966809] __x64_sys_mount+0xba/0x150 [ 3217.970797] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3217.975391] do_syscall_64+0xf9/0x620 [ 3217.979206] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3217.984405] RIP: 0033:0x45cb29 [ 3217.987606] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3218.006515] RSP: 002b:00007fef3220ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3218.014225] RAX: ffffffffffffffda RBX: 00000000004f7560 RCX: 000000000045cb29 05:32:27 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:27 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c000300fffffffffffff0000c0004"], 0x30}}, 0x0) [ 3218.021494] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000000 [ 3218.028766] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3218.036034] R10: 0000000000a51000 R11: 0000000000000246 R12: 0000000000000005 [ 3218.043308] R13: 000000000000077b R14: 00000000004ca735 R15: 00007fef3220b6d4 05:32:27 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}, 0x1, 0x2a1c0}, 0x0) 05:32:27 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:27 executing program 2: inotify_init() r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r1, &(0x7f0000000180)=""/186, 0xba) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0106426, &(0x7f0000000040)={0x0, &(0x7f00000000c0)}) ioctl$DRM_IOCTL_NEW_CTX(r0, 0x40086425, &(0x7f0000000080)={0x0, 0x2}) 05:32:27 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:27 executing program 4 (fault-call:4 fault-nth:5): syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:27 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000000000000000010c0004"], 0x30}}, 0x0) [ 3218.166958] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 05:32:28 executing program 2: inotify_init() r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000000)={0x3}) 05:32:28 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:28 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000000000000000020c0004"], 0x30}}, 0x0) [ 3218.255582] FAULT_INJECTION: forcing a failure. [ 3218.255582] name failslab, interval 1, probability 0, space 0, times 0 [ 3218.312876] CPU: 1 PID: 31201 Comm: syz-executor.4 Not tainted 4.19.131-syzkaller #0 [ 3218.320781] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3218.330149] Call Trace: [ 3218.330174] dump_stack+0x1fc/0x2fe 05:32:28 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3218.330194] should_fail.cold+0xa/0x14 05:32:28 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000000000000000030c0004"], 0x30}}, 0x0) 05:32:28 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3218.330213] ? setup_fault_attr+0x200/0x200 [ 3218.330230] ? lock_acquire+0x170/0x3c0 [ 3218.330252] __should_failslab+0x115/0x180 [ 3218.330269] should_failslab+0x5/0xf [ 3218.330283] kmem_cache_alloc+0x277/0x370 [ 3218.330300] getname_kernel+0x4e/0x370 [ 3218.330315] kern_path+0x1b/0x40 [ 3218.330328] do_mount+0xde9/0x2f10 [ 3218.330346] ? lock_downgrade+0x720/0x720 [ 3218.330359] ? lock_acquire+0x170/0x3c0 [ 3218.330373] ? __might_fault+0xef/0x1d0 [ 3218.330387] ? copy_mount_string+0x40/0x40 [ 3218.330404] ? __might_fault+0x192/0x1d0 [ 3218.330419] ? _copy_from_user+0xd2/0x130 [ 3218.330435] ? copy_mount_options+0x26f/0x380 [ 3218.330451] ksys_mount+0xcf/0x130 [ 3218.330467] __x64_sys_mount+0xba/0x150 [ 3218.330482] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3218.330497] do_syscall_64+0xf9/0x620 [ 3218.330515] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3218.330526] RIP: 0033:0x45cb29 [ 3218.330548] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3218.330556] RSP: 002b:00007fef3220ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3218.330571] RAX: ffffffffffffffda RBX: 00000000004f7560 RCX: 000000000045cb29 [ 3218.330579] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000000 [ 3218.330587] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3218.330594] R10: 0000000000a51000 R11: 0000000000000246 R12: 0000000000000005 [ 3218.330602] R13: 000000000000077b R14: 00000000004ca735 R15: 00007fef3220b6d4 [ 3218.516086] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 05:32:28 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, 0x0, 0x0, 0xa51000, 0x0) 05:32:28 executing program 4 (fault-call:4 fault-nth:6): syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:28 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:28 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c000300000000000000000f0c0004"], 0x30}}, 0x0) 05:32:28 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}, 0x1, 0x2a1c1}, 0x0) 05:32:28 executing program 2: r0 = inotify_init() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r1, &(0x7f0000000180)=""/186, 0xba) ioctl$int_in(r0, 0x5452, 0xfffffffffffffffe) 05:32:28 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, 0x0, 0x0, 0xa51000, 0x0) [ 3218.717512] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 3218.795243] FAULT_INJECTION: forcing a failure. [ 3218.795243] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3218.807185] CPU: 0 PID: 31290 Comm: syz-executor.4 Not tainted 4.19.131-syzkaller #0 [ 3218.815084] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3218.824439] Call Trace: [ 3218.827035] dump_stack+0x1fc/0x2fe [ 3218.830693] should_fail.cold+0xa/0x14 [ 3218.834590] ? setup_fault_attr+0x200/0x200 [ 3218.838934] ? do_syscall_64+0xf9/0x620 [ 3218.842916] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3218.848329] __alloc_pages_nodemask+0x239/0x2890 [ 3218.853095] ? debug_check_no_obj_freed+0x201/0x482 [ 3218.858123] ? avc_has_perm_noaudit+0x1c5/0x390 [ 3218.862806] ? __lock_acquire+0x6de/0x3ff0 [ 3218.867061] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 3218.871912] ? avc_has_perm_noaudit+0x1ec/0x390 [ 3218.876610] ? putname+0xe1/0x120 [ 3218.880089] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 3218.885112] ? kmem_cache_free+0x226/0x260 [ 3218.889357] ? putname+0xe1/0x120 [ 3218.892827] cache_grow_begin+0xa4/0x8a0 [ 3218.896893] ? setup_fault_attr+0x200/0x200 [ 3218.901223] ? cache_alloc_pfmemalloc+0x1e/0x140 [ 3218.905988] cache_alloc_refill+0x273/0x340 [ 3218.910324] kmem_cache_alloc+0x346/0x370 [ 3218.914487] getname_kernel+0x4e/0x370 [ 3218.918384] kern_path+0x1b/0x40 [ 3218.921760] do_mount+0xde9/0x2f10 [ 3218.925322] ? lock_downgrade+0x720/0x720 [ 3218.929482] ? lock_acquire+0x170/0x3c0 [ 3218.933465] ? __might_fault+0xef/0x1d0 [ 3218.937443] ? copy_mount_string+0x40/0x40 [ 3218.941683] ? __might_fault+0x192/0x1d0 [ 3218.945753] ? _copy_from_user+0xd2/0x130 [ 3218.949912] ? copy_mount_options+0x26f/0x380 [ 3218.954415] ksys_mount+0xcf/0x130 [ 3218.957966] __x64_sys_mount+0xba/0x150 [ 3218.961946] ? do_syscall_64+0x56/0x620 [ 3218.965931] do_syscall_64+0xf9/0x620 [ 3218.969741] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3218.974934] RIP: 0033:0x45cb29 05:32:28 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, 0x0, 0x0, 0xa51000, 0x0) 05:32:28 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0) 05:32:28 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0) 05:32:28 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0) 05:32:28 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c000300000000000000542d0c0004"], 0x30}}, 0x0) [ 3218.978129] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3218.997033] RSP: 002b:00007fef3220ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3219.004770] RAX: ffffffffffffffda RBX: 00000000004f7560 RCX: 000000000045cb29 [ 3219.012046] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000000 [ 3219.019312] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3219.026579] R10: 0000000000a51000 R11: 0000000000000246 R12: 0000000000000005 [ 3219.033848] R13: 000000000000077b R14: 00000000004ca735 R15: 00007fef3220b6d4 05:32:28 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) sendmsg$NFQNL_MSG_VERDICT_BATCH(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x3, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x6}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x48001}, 0x40004) inotify_init() 05:32:29 executing program 4 (fault-call:4 fault-nth:7): syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:29 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c000300000000000000003f0c0004"], 0x30}}, 0x0) 05:32:29 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3219.328360] FAULT_INJECTION: forcing a failure. [ 3219.328360] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3219.340195] CPU: 1 PID: 31329 Comm: syz-executor.4 Not tainted 4.19.131-syzkaller #0 [ 3219.348079] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3219.357436] Call Trace: [ 3219.360038] dump_stack+0x1fc/0x2fe [ 3219.363682] should_fail.cold+0xa/0x14 [ 3219.367583] ? check_preemption_disabled+0x41/0x280 [ 3219.372611] ? setup_fault_attr+0x200/0x200 [ 3219.376956] __alloc_pages_nodemask+0x239/0x2890 [ 3219.381728] ? __lock_acquire+0x6de/0x3ff0 [ 3219.385984] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 3219.386691] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 3219.390829] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 3219.390847] ? avc_has_perm_noaudit+0x1ec/0x390 [ 3219.390869] ? kmem_cache_free+0x226/0x260 [ 3219.390884] ? putname+0xe1/0x120 [ 3219.390901] ? ____cache_alloc_node+0x156/0x1d0 [ 3219.420052] cache_grow_begin+0xa4/0x8a0 [ 3219.424122] ? check_preemption_disabled+0x41/0x280 [ 3219.429151] ____cache_alloc_node+0x170/0x1d0 [ 3219.433657] ? check_preemption_disabled+0x41/0x280 [ 3219.438690] kmem_cache_alloc+0x1e4/0x370 [ 3219.442845] getname_kernel+0x4e/0x370 [ 3219.446734] kern_path+0x1b/0x40 [ 3219.450108] do_mount+0xde9/0x2f10 [ 3219.453657] ? lock_downgrade+0x720/0x720 [ 3219.457811] ? lock_acquire+0x170/0x3c0 [ 3219.461805] ? __might_fault+0xef/0x1d0 [ 3219.465815] ? copy_mount_string+0x40/0x40 [ 3219.470059] ? __might_fault+0x192/0x1d0 [ 3219.474128] ? _copy_from_user+0xd2/0x130 [ 3219.478421] ? copy_mount_options+0x26f/0x380 [ 3219.482919] ksys_mount+0xcf/0x130 [ 3219.486476] __x64_sys_mount+0xba/0x150 [ 3219.490459] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3219.495046] do_syscall_64+0xf9/0x620 [ 3219.498858] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3219.504053] RIP: 0033:0x45cb29 [ 3219.507252] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3219.526143] RSP: 002b:00007fef3220ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3219.533851] RAX: ffffffffffffffda RBX: 00000000004f7560 RCX: 000000000045cb29 [ 3219.541470] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000000 [ 3219.548751] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3219.556018] R10: 0000000000a51000 R11: 0000000000000246 R12: 0000000000000005 [ 3219.563284] R13: 000000000000077b R14: 00000000004ca735 R15: 00007fef3220b6d4 05:32:29 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}, 0x1, 0x2a1c2}, 0x0) 05:32:29 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:29 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:29 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000000000ffffff9e0c0004"], 0x30}}, 0x0) 05:32:29 executing program 4 (fault-call:4 fault-nth:8): syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3220.172997] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 05:32:30 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000000000fffffff00c0004"], 0x30}}, 0x0) [ 3220.272403] FAULT_INJECTION: forcing a failure. [ 3220.272403] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3220.312028] CPU: 0 PID: 31389 Comm: syz-executor.4 Not tainted 4.19.131-syzkaller #0 [ 3220.320058] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3220.329411] Call Trace: [ 3220.332005] dump_stack+0x1fc/0x2fe [ 3220.336137] should_fail.cold+0xa/0x14 [ 3220.340030] ? lock_acquire+0x170/0x3c0 [ 3220.344011] ? setup_fault_attr+0x200/0x200 [ 3220.348342] __alloc_pages_nodemask+0x239/0x2890 [ 3220.353101] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 3220.358124] ? __alloc_pages_nodemask+0x1b43/0x2890 [ 3220.363181] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 3220.368033] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3220.372623] ? rcu_nmi_exit+0xb3/0x180 [ 3220.376536] ? retint_kernel+0x2d/0x2d [ 3220.380447] cache_grow_begin+0xa4/0x8a0 [ 3220.384526] fallback_alloc+0x213/0x2e0 [ 3220.388527] kmem_cache_alloc+0x1e4/0x370 [ 3220.392683] getname_kernel+0x4e/0x370 [ 3220.396609] kern_path+0x1b/0x40 [ 3220.399995] do_mount+0xde9/0x2f10 [ 3220.403556] ? lock_downgrade+0x720/0x720 [ 3220.407706] ? lock_acquire+0x170/0x3c0 [ 3220.411687] ? __might_fault+0xef/0x1d0 [ 3220.415671] ? copy_mount_string+0x40/0x40 [ 3220.419919] ? __might_fault+0x192/0x1d0 [ 3220.423986] ? _copy_from_user+0xd2/0x130 [ 3220.428140] ? copy_mount_options+0x26f/0x380 [ 3220.432639] ksys_mount+0xcf/0x130 [ 3220.436633] __x64_sys_mount+0xba/0x150 [ 3220.440610] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3220.445194] do_syscall_64+0xf9/0x620 [ 3220.449004] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3220.454189] RIP: 0033:0x45cb29 05:32:30 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c000300000000007fffffff0c0004"], 0x30}}, 0x0) 05:32:30 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3220.457383] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3220.476388] RSP: 002b:00007fef3220ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3220.484092] RAX: ffffffffffffffda RBX: 00000000004f7560 RCX: 000000000045cb29 [ 3220.491364] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000000 [ 3220.498632] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3220.505926] R10: 0000000000a51000 R11: 0000000000000246 R12: 0000000000000005 [ 3220.513198] R13: 000000000000077b R14: 00000000004ca735 R15: 00007fef3220b6d4 05:32:30 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:30 executing program 4 (fault-call:4 fault-nth:9): syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3220.597967] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 05:32:30 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:30 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3220.756920] FAULT_INJECTION: forcing a failure. [ 3220.756920] name failslab, interval 1, probability 0, space 0, times 0 [ 3220.792426] CPU: 1 PID: 31420 Comm: syz-executor.4 Not tainted 4.19.131-syzkaller #0 [ 3220.800345] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3220.809704] Call Trace: [ 3220.812324] dump_stack+0x1fc/0x2fe [ 3220.815967] should_fail.cold+0xa/0x14 [ 3220.820085] ? setup_fault_attr+0x200/0x200 [ 3220.824418] ? lock_acquire+0x170/0x3c0 [ 3220.828407] __should_failslab+0x115/0x180 [ 3220.832655] should_failslab+0x5/0xf [ 3220.836373] kmem_cache_alloc_trace+0x284/0x380 [ 3220.841048] get_mountpoint+0x140/0x3c0 [ 3220.845025] lock_mount+0x131/0x4a0 [ 3220.848653] ? lookup_mnt+0x420/0x420 [ 3220.852473] ? memcpy+0x35/0x50 [ 3220.855758] ? getname_kernel+0x21e/0x370 [ 3220.859913] do_mount+0xe4d/0x2f10 [ 3220.863463] ? rcu_nmi_exit+0xb3/0x180 [ 3220.867353] ? copy_mount_string+0x40/0x40 [ 3220.871622] ? __sanitizer_cov_trace_pc+0x2e/0x50 [ 3220.876468] ? copy_mount_options+0x26f/0x380 [ 3220.880969] ksys_mount+0xcf/0x130 [ 3220.884511] __x64_sys_mount+0xba/0x150 [ 3220.888484] ? do_syscall_64+0x56/0x620 [ 3220.892462] do_syscall_64+0xf9/0x620 [ 3220.896276] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3220.901471] RIP: 0033:0x45cb29 [ 3220.904667] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3220.923568] RSP: 002b:00007fef321e9c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3220.931286] RAX: ffffffffffffffda RBX: 00000000004f7560 RCX: 000000000045cb29 [ 3220.938560] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000000 [ 3220.945845] RBP: 000000000078bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 3220.953115] R10: 0000000000a51000 R11: 0000000000000246 R12: 0000000000000004 [ 3220.960384] R13: 000000000000077b R14: 00000000004ca735 R15: 00007fef321ea6d4 05:32:30 executing program 4 (fault-call:4 fault-nth:10): syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:30 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:30 executing program 5 (fault-call:3 fault-nth:0): perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:30 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000f0ffffffffffff0c0004"], 0x30}}, 0x0) 05:32:30 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}, 0x1, 0x2a1c3}, 0x0) 05:32:30 executing program 2: inotify_init() r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) sendmsg$MPTCP_PM_CMD_GET_LIMITS(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x0, 0x100, 0x70bd27, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x2c050050}, 0x4000050) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) ioctl$DRM_IOCTL_MODE_GETENCODER(r0, 0xc01464a6, &(0x7f0000000000)={0x6000}) [ 3221.108094] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 3221.200613] FAULT_INJECTION: forcing a failure. [ 3221.200613] name failslab, interval 1, probability 0, space 0, times 0 [ 3221.207547] FAULT_INJECTION: forcing a failure. [ 3221.207547] name failslab, interval 1, probability 0, space 0, times 0 [ 3221.224078] CPU: 1 PID: 31491 Comm: syz-executor.4 Not tainted 4.19.131-syzkaller #0 [ 3221.224088] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3221.224093] Call Trace: [ 3221.224113] dump_stack+0x1fc/0x2fe [ 3221.224134] should_fail.cold+0xa/0x14 [ 3221.251424] ? setup_fault_attr+0x200/0x200 [ 3221.255745] ? lock_acquire+0x170/0x3c0 [ 3221.259728] __should_failslab+0x115/0x180 [ 3221.263961] should_failslab+0x5/0xf [ 3221.267808] kmem_cache_alloc+0x277/0x370 [ 3221.271958] alloc_vfsmnt+0x23/0x780 [ 3221.275674] clone_mnt+0x6c/0x11b0 [ 3221.279218] ? do_mount+0xe44/0x2f10 [ 3221.282937] do_mount+0x250f/0x2f10 [ 3221.286566] ? lock_downgrade+0x720/0x720 [ 3221.290736] ? lock_acquire+0x170/0x3c0 [ 3221.294708] ? __might_fault+0xef/0x1d0 [ 3221.298711] ? copy_mount_string+0x40/0x40 [ 3221.302948] ? __might_fault+0x192/0x1d0 [ 3221.307009] ? _copy_from_user+0xd2/0x130 [ 3221.311160] ? copy_mount_options+0x26f/0x380 [ 3221.315657] ksys_mount+0xcf/0x130 [ 3221.319194] __x64_sys_mount+0xba/0x150 [ 3221.323181] ? do_syscall_64+0x56/0x620 [ 3221.327149] do_syscall_64+0xf9/0x620 [ 3221.330947] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3221.336129] RIP: 0033:0x45cb29 [ 3221.339318] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3221.358214] RSP: 002b:00007fef3220ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3221.365913] RAX: ffffffffffffffda RBX: 00000000004f7560 RCX: 000000000045cb29 [ 3221.373184] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000000 [ 3221.380468] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3221.387725] R10: 0000000000a51000 R11: 0000000000000246 R12: 0000000000000005 [ 3221.394994] R13: 000000000000077b R14: 00000000004ca735 R15: 00007fef3220b6d4 [ 3221.402311] CPU: 0 PID: 31488 Comm: syz-executor.5 Not tainted 4.19.131-syzkaller #0 [ 3221.410195] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3221.419550] Call Trace: [ 3221.422163] dump_stack+0x1fc/0x2fe [ 3221.425805] should_fail.cold+0xa/0x14 [ 3221.429704] ? setup_fault_attr+0x200/0x200 [ 3221.434026] ? lock_acquire+0x170/0x3c0 [ 3221.438008] __should_failslab+0x115/0x180 [ 3221.442265] should_failslab+0x5/0xf [ 3221.445987] __kmalloc_track_caller+0x2a6/0x3c0 [ 3221.450667] ? strndup_user+0x70/0x120 [ 3221.454564] memdup_user+0x22/0xb0 [ 3221.458111] strndup_user+0x70/0x120 [ 3221.461836] ksys_mount+0x6f/0x130 [ 3221.465388] __x64_sys_mount+0xba/0x150 [ 3221.469372] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3221.474050] do_syscall_64+0xf9/0x620 [ 3221.477856] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3221.483174] RIP: 0033:0x45cb29 05:32:31 executing program 4 (fault-call:4 fault-nth:11): syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:31 executing program 2: inotify_init() r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x9a356800f6946399, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f00000000c0)=0x1) ioctl$SNDRV_PCM_IOCTL_STATUS64(r0, 0x80984120, &(0x7f0000000000)) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) sched_getscheduler(r1) [ 3221.486373] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3221.505287] RSP: 002b:00007fe38a84bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3221.512997] RAX: ffffffffffffffda RBX: 00000000004f7560 RCX: 000000000045cb29 [ 3221.520268] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000000 [ 3221.527540] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3221.535166] R10: 0000000000a51000 R11: 0000000000000246 R12: 0000000000000004 [ 3221.542435] R13: 000000000000077b R14: 00000000004ca735 R15: 00007fe38a84c6d4 05:32:31 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c0003000000000000000000030004"], 0x30}}, 0x0) 05:32:31 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3221.602038] FAULT_INJECTION: forcing a failure. [ 3221.602038] name failslab, interval 1, probability 0, space 0, times 0 05:32:31 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r3, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800070006"], 0x3c}}, 0x0) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r3, 0x1, 0x6, @broadcast}, 0x10) inotify_init() 05:32:31 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3221.647421] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3221.685277] CPU: 1 PID: 31506 Comm: syz-executor.4 Not tainted 4.19.131-syzkaller #0 [ 3221.693204] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3221.693209] Call Trace: [ 3221.693229] dump_stack+0x1fc/0x2fe [ 3221.693249] should_fail.cold+0xa/0x14 [ 3221.712676] ? setup_fault_attr+0x200/0x200 [ 3221.712690] ? lock_acquire+0x170/0x3c0 [ 3221.712706] __should_failslab+0x115/0x180 05:32:31 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, 0x0, 0x0, 0xa51000, 0x0) [ 3221.712718] should_failslab+0x5/0xf [ 3221.712729] __kmalloc_track_caller+0x2a6/0x3c0 [ 3221.712740] ? kstrdup_const+0x53/0x80 [ 3221.712752] kstrdup+0x36/0x70 [ 3221.712783] kstrdup_const+0x53/0x80 05:32:31 executing program 4 (fault-call:4 fault-nth:12): syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3221.712793] alloc_vfsmnt+0xb5/0x780 [ 3221.712803] clone_mnt+0x6c/0x11b0 [ 3221.712814] ? getname_kernel+0x21e/0x370 [ 3221.712827] do_mount+0x250f/0x2f10 [ 3221.712840] ? lock_downgrade+0x720/0x720 [ 3221.712849] ? lock_acquire+0x170/0x3c0 [ 3221.712859] ? __might_fault+0xef/0x1d0 [ 3221.712870] ? copy_mount_string+0x40/0x40 [ 3221.712882] ? __might_fault+0x192/0x1d0 [ 3221.712893] ? _copy_from_user+0xd2/0x130 [ 3221.712904] ? copy_mount_options+0x26f/0x380 [ 3221.712916] ksys_mount+0xcf/0x130 [ 3221.712927] __x64_sys_mount+0xba/0x150 [ 3221.712938] ? do_syscall_64+0x56/0x620 [ 3221.712949] do_syscall_64+0xf9/0x620 [ 3221.712963] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3221.712984] RIP: 0033:0x45cb29 [ 3221.712994] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3221.713000] RSP: 002b:00007fef3220ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3221.713009] RAX: ffffffffffffffda RBX: 00000000004f7560 RCX: 000000000045cb29 [ 3221.713015] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000000 [ 3221.713020] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3221.713025] R10: 0000000000a51000 R11: 0000000000000246 R12: 0000000000000005 [ 3221.713030] R13: 000000000000077b R14: 00000000004ca735 R15: 00007fef3220b6d4 [ 3221.722957] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 3221.880835] FAULT_INJECTION: forcing a failure. [ 3221.880835] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3221.999695] CPU: 1 PID: 31531 Comm: syz-executor.4 Not tainted 4.19.131-syzkaller #0 [ 3221.999706] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3222.016929] Call Trace: [ 3222.016948] dump_stack+0x1fc/0x2fe [ 3222.016968] should_fail.cold+0xa/0x14 [ 3222.027038] ? check_preemption_disabled+0x41/0x280 [ 3222.027055] ? setup_fault_attr+0x200/0x200 [ 3222.027080] __alloc_pages_nodemask+0x239/0x2890 [ 3222.027099] ? __lock_acquire+0x6de/0x3ff0 [ 3222.027121] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 3222.050225] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 3222.055074] ? rcu_nmi_exit+0xb3/0x180 [ 3222.058975] ? retint_kernel+0x2d/0x2d [ 3222.062971] ? ____cache_alloc_node+0x156/0x1d0 [ 3222.067651] cache_grow_begin+0xa4/0x8a0 [ 3222.071725] ? check_preemption_disabled+0x41/0x280 [ 3222.076754] ____cache_alloc_node+0x170/0x1d0 [ 3222.081253] ? check_preemption_disabled+0x41/0x280 [ 3222.086280] kmem_cache_alloc+0x1e4/0x370 [ 3222.090448] alloc_vfsmnt+0x23/0x780 [ 3222.094324] clone_mnt+0x6c/0x11b0 [ 3222.097867] ? getname_kernel+0x21e/0x370 [ 3222.102033] do_mount+0x250f/0x2f10 [ 3222.105671] ? lock_downgrade+0x720/0x720 [ 3222.109831] ? lock_acquire+0x170/0x3c0 [ 3222.113898] ? __might_fault+0xef/0x1d0 [ 3222.118060] ? copy_mount_string+0x40/0x40 [ 3222.122318] ? __might_fault+0x192/0x1d0 [ 3222.126427] ? _copy_from_user+0xd2/0x130 [ 3222.130577] ? copy_mount_options+0x26f/0x380 [ 3222.135086] ksys_mount+0xcf/0x130 [ 3222.138628] __x64_sys_mount+0xba/0x150 [ 3222.142585] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3222.147145] do_syscall_64+0xf9/0x620 [ 3222.150926] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3222.156092] RIP: 0033:0x45cb29 [ 3222.159315] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3222.178194] RSP: 002b:00007fef3220ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3222.185880] RAX: ffffffffffffffda RBX: 00000000004f7560 RCX: 000000000045cb29 [ 3222.193125] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000000 05:32:32 executing program 5 (fault-call:3 fault-nth:1): perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:32 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, 0x0, 0x0, 0xa51000, 0x0) 05:32:32 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000020000000000000c0004"], 0x30}}, 0x0) 05:32:32 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) connect$bt_sco(r0, &(0x7f0000000000)={0x1f, @fixed={[], 0x10}}, 0x8) inotify_init() 05:32:32 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}, 0x1, 0x2a1c4}, 0x0) [ 3222.200383] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3222.207633] R10: 0000000000a51000 R11: 0000000000000246 R12: 0000000000000005 [ 3222.214880] R13: 000000000000077b R14: 00000000004ca735 R15: 00007fef3220b6d4 [ 3222.290438] FAULT_INJECTION: forcing a failure. [ 3222.290438] name failslab, interval 1, probability 0, space 0, times 0 [ 3222.324605] CPU: 1 PID: 31657 Comm: syz-executor.5 Not tainted 4.19.131-syzkaller #0 [ 3222.332513] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3222.341858] Call Trace: [ 3222.344438] dump_stack+0x1fc/0x2fe [ 3222.348055] should_fail.cold+0xa/0x14 [ 3222.351931] ? setup_fault_attr+0x200/0x200 [ 3222.356244] ? lock_acquire+0x170/0x3c0 [ 3222.360210] __should_failslab+0x115/0x180 [ 3222.364430] should_failslab+0x5/0xf [ 3222.368130] kmem_cache_alloc+0x277/0x370 [ 3222.372261] getname_flags+0xce/0x590 [ 3222.376087] user_path_at_empty+0x2a/0x50 [ 3222.380224] do_mount+0x147/0x2f10 [ 3222.383759] ? lock_downgrade+0x720/0x720 [ 3222.387979] ? lock_acquire+0x170/0x3c0 [ 3222.391937] ? __might_fault+0xef/0x1d0 [ 3222.395894] ? copy_mount_string+0x40/0x40 [ 3222.400115] ? __might_fault+0x192/0x1d0 [ 3222.404162] ? _copy_from_user+0xd2/0x130 [ 3222.408313] ? copy_mount_options+0x26f/0x380 [ 3222.412806] ksys_mount+0xcf/0x130 [ 3222.416332] __x64_sys_mount+0xba/0x150 [ 3222.420319] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3222.424954] do_syscall_64+0xf9/0x620 [ 3222.428769] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3222.433971] RIP: 0033:0x45cb29 [ 3222.437152] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3222.456034] RSP: 002b:00007fe38a84bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3222.463729] RAX: ffffffffffffffda RBX: 00000000004f7560 RCX: 000000000045cb29 [ 3222.471014] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000000 [ 3222.478267] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 05:32:32 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000030000000000000c0004"], 0x30}}, 0x0) 05:32:32 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r0, 0x10f, 0x84, &(0x7f0000000000), &(0x7f0000000040)=0x4) 05:32:32 executing program 4 (fault-call:4 fault-nth:13): syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3222.485521] R10: 0000000000a51000 R11: 0000000000000246 R12: 0000000000000004 [ 3222.492784] R13: 000000000000077b R14: 00000000004ca735 R15: 00007fe38a84c6d4 05:32:32 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, 0x0, 0x0, 0xa51000, 0x0) 05:32:32 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c000300000f0000000000000c0004"], 0x30}}, 0x0) 05:32:32 executing program 5 (fault-call:3 fault-nth:2): perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3222.773111] validate_nla: 2 callbacks suppressed [ 3222.773121] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 05:32:32 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0) [ 3222.871213] FAULT_INJECTION: forcing a failure. [ 3222.871213] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3222.873132] FAULT_INJECTION: forcing a failure. [ 3222.873132] name failslab, interval 1, probability 0, space 0, times 0 [ 3222.883057] CPU: 0 PID: 31726 Comm: syz-executor.5 Not tainted 4.19.131-syzkaller #0 [ 3222.883067] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3222.883072] Call Trace: [ 3222.883094] dump_stack+0x1fc/0x2fe [ 3222.883118] should_fail.cold+0xa/0x14 [ 3222.883138] ? setup_fault_attr+0x200/0x200 [ 3222.883154] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3222.883178] __alloc_pages_nodemask+0x239/0x2890 [ 3222.883194] ? __read_once_size_nocheck.constprop.0+0x10/0x10 [ 3222.883213] ? is_bpf_text_address+0xd5/0x1b0 [ 3222.883232] ? __lock_acquire+0x6de/0x3ff0 [ 3222.883253] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 3222.883269] ? is_bpf_text_address+0xfc/0x1b0 [ 3222.883286] ? unwind_get_return_address+0x51/0x90 [ 3222.883301] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3222.883314] ? __save_stack_trace+0xaf/0x190 [ 3222.883342] cache_grow_begin+0xa4/0x8a0 [ 3222.883357] ? setup_fault_attr+0x200/0x200 [ 3222.883373] ? cache_alloc_pfmemalloc+0x1e/0x140 [ 3222.883392] cache_alloc_refill+0x273/0x340 [ 3222.883413] kmem_cache_alloc+0x346/0x370 [ 3222.883430] getname_flags+0xce/0x590 [ 3222.883452] user_path_at_empty+0x2a/0x50 [ 3223.003816] do_mount+0x147/0x2f10 [ 3223.003835] ? lock_downgrade+0x720/0x720 [ 3223.011581] ? lock_acquire+0x170/0x3c0 [ 3223.015560] ? __might_fault+0xef/0x1d0 [ 3223.019531] ? copy_mount_string+0x40/0x40 [ 3223.023758] ? __might_fault+0x192/0x1d0 [ 3223.027817] ? _copy_from_user+0xd2/0x130 [ 3223.031959] ? copy_mount_options+0x26f/0x380 [ 3223.036442] ksys_mount+0xcf/0x130 [ 3223.039982] __x64_sys_mount+0xba/0x150 [ 3223.043954] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3223.048532] do_syscall_64+0xf9/0x620 [ 3223.052346] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3223.057531] RIP: 0033:0x45cb29 [ 3223.060720] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3223.079615] RSP: 002b:00007fe38a84bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3223.087314] RAX: ffffffffffffffda RBX: 00000000004f7560 RCX: 000000000045cb29 [ 3223.094578] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000000 [ 3223.101847] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3223.109113] R10: 0000000000a51000 R11: 0000000000000246 R12: 0000000000000004 05:32:32 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0) [ 3223.116393] R13: 000000000000077b R14: 00000000004ca735 R15: 00007fe38a84c6d4 [ 3223.131652] CPU: 1 PID: 31732 Comm: syz-executor.4 Not tainted 4.19.131-syzkaller #0 [ 3223.139552] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3223.148905] Call Trace: [ 3223.151503] dump_stack+0x1fc/0x2fe [ 3223.155143] should_fail.cold+0xa/0x14 [ 3223.159041] ? setup_fault_attr+0x200/0x200 [ 3223.163358] ? lock_acquire+0x170/0x3c0 [ 3223.167334] __should_failslab+0x115/0x180 [ 3223.171566] should_failslab+0x5/0xf [ 3223.175282] __kmalloc_track_caller+0x2a6/0x3c0 [ 3223.179969] ? kstrdup_const+0x53/0x80 [ 3223.183869] kstrdup+0x36/0x70 [ 3223.187072] kstrdup_const+0x53/0x80 [ 3223.190790] alloc_vfsmnt+0xb5/0x780 [ 3223.194518] clone_mnt+0x6c/0x11b0 [ 3223.198068] ? getname_kernel+0x21e/0x370 [ 3223.202228] do_mount+0x250f/0x2f10 [ 3223.205867] ? lock_downgrade+0x720/0x720 [ 3223.210033] ? lock_acquire+0x170/0x3c0 [ 3223.214026] ? __might_fault+0xef/0x1d0 [ 3223.218013] ? copy_mount_string+0x40/0x40 05:32:33 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}, 0x1, 0x2a1c5}, 0x0) 05:32:33 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000f00000000000000c0004"], 0x30}}, 0x0) [ 3223.222259] ? __might_fault+0x192/0x1d0 [ 3223.226332] ? _copy_from_user+0xd2/0x130 [ 3223.230486] ? copy_mount_options+0x26f/0x380 [ 3223.234994] ksys_mount+0xcf/0x130 [ 3223.238546] __x64_sys_mount+0xba/0x150 [ 3223.242526] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3223.247113] do_syscall_64+0xf9/0x620 [ 3223.250922] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3223.256115] RIP: 0033:0x45cb29 05:32:33 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000000300000000000c0004"], 0x30}}, 0x0) 05:32:33 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000000f00000000000c0004"], 0x30}}, 0x0) 05:32:33 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0) [ 3223.259422] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3223.278319] RSP: 002b:00007fef321e9c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3223.286044] RAX: ffffffffffffffda RBX: 00000000004f7560 RCX: 000000000045cb29 [ 3223.293312] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000000 [ 3223.300585] RBP: 000000000078bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 3223.307874] R10: 0000000000a51000 R11: 0000000000000246 R12: 0000000000000005 [ 3223.315160] R13: 000000000000077b R14: 00000000004ca735 R15: 00007fef321ea6d4 05:32:33 executing program 2: inotify_init() r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x2, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={@map, r0, 0x16, 0x0, r1}, 0x14) 05:32:33 executing program 4 (fault-call:4 fault-nth:14): syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:33 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000542d00000000000c0004"], 0x30}}, 0x0) 05:32:33 executing program 1 (fault-call:3 fault-nth:0): perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:33 executing program 5 (fault-call:3 fault-nth:3): perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:33 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000003f00000000000c0004"], 0x30}}, 0x0) 05:32:33 executing program 2: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) inotify_init() [ 3223.540464] FAULT_INJECTION: forcing a failure. [ 3223.540464] name failslab, interval 1, probability 0, space 0, times 0 [ 3223.564440] FAULT_INJECTION: forcing a failure. [ 3223.564440] name failslab, interval 1, probability 0, space 0, times 0 [ 3223.564451] FAULT_INJECTION: forcing a failure. [ 3223.564451] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3223.564473] CPU: 0 PID: 31766 Comm: syz-executor.1 Not tainted 4.19.131-syzkaller #0 [ 3223.595295] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3223.604630] Call Trace: [ 3223.607219] dump_stack+0x1fc/0x2fe [ 3223.610845] should_fail.cold+0xa/0x14 [ 3223.614725] ? setup_fault_attr+0x200/0x200 [ 3223.619034] ? lock_acquire+0x1ec/0x3c0 [ 3223.623015] __should_failslab+0x115/0x180 [ 3223.627242] should_failslab+0x5/0xf [ 3223.630943] __kmalloc_track_caller+0x2a6/0x3c0 [ 3223.635606] ? strndup_user+0x70/0x120 [ 3223.639496] memdup_user+0x22/0xb0 [ 3223.643029] strndup_user+0x70/0x120 [ 3223.646732] ksys_mount+0x6f/0x130 [ 3223.650262] __x64_sys_mount+0xba/0x150 [ 3223.654225] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3223.658794] do_syscall_64+0xf9/0x620 [ 3223.662586] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3223.667775] RIP: 0033:0x45cb29 [ 3223.670957] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3223.689843] RSP: 002b:00007f8cfb4e5c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3223.697536] RAX: ffffffffffffffda RBX: 00000000004f7560 RCX: 000000000045cb29 [ 3223.704787] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000000 [ 3223.712053] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3223.719308] R10: 0000000000a51000 R11: 0000000000000246 R12: 0000000000000004 [ 3223.726560] R13: 000000000000077b R14: 00000000004ca735 R15: 00007f8cfb4e66d4 [ 3223.733843] CPU: 1 PID: 31769 Comm: syz-executor.5 Not tainted 4.19.131-syzkaller #0 [ 3223.741736] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3223.751094] Call Trace: [ 3223.753689] dump_stack+0x1fc/0x2fe [ 3223.757326] should_fail.cold+0xa/0x14 [ 3223.761216] ? check_preemption_disabled+0x41/0x280 [ 3223.766235] ? setup_fault_attr+0x200/0x200 [ 3223.770565] __alloc_pages_nodemask+0x239/0x2890 [ 3223.775330] ? __lock_acquire+0x6de/0x3ff0 [ 3223.779580] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 3223.784428] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 3223.789389] ? is_bpf_text_address+0xfc/0x1b0 [ 3223.793888] ? __save_stack_trace+0xaf/0x190 [ 3223.798320] ? ____cache_alloc_node+0x156/0x1d0 [ 3223.802999] cache_grow_begin+0xa4/0x8a0 [ 3223.807063] ? check_preemption_disabled+0x41/0x280 [ 3223.812094] ____cache_alloc_node+0x170/0x1d0 [ 3223.816623] ? check_preemption_disabled+0x41/0x280 [ 3223.821642] kmem_cache_alloc+0x1e4/0x370 [ 3223.825790] getname_flags+0xce/0x590 [ 3223.829597] user_path_at_empty+0x2a/0x50 [ 3223.833743] do_mount+0x147/0x2f10 [ 3223.837284] ? lock_downgrade+0x720/0x720 [ 3223.841428] ? lock_acquire+0x170/0x3c0 [ 3223.845398] ? __might_fault+0xef/0x1d0 [ 3223.849368] ? copy_mount_string+0x40/0x40 [ 3223.853600] ? __might_fault+0x192/0x1d0 [ 3223.857657] ? _copy_from_user+0xd2/0x130 [ 3223.861806] ? copy_mount_options+0x26f/0x380 [ 3223.866304] ksys_mount+0xcf/0x130 [ 3223.869855] __x64_sys_mount+0xba/0x150 [ 3223.873828] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3223.878409] do_syscall_64+0xf9/0x620 [ 3223.882215] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3223.887398] RIP: 0033:0x45cb29 [ 3223.890593] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3223.909488] RSP: 002b:00007fe38a84bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3223.917192] RAX: ffffffffffffffda RBX: 00000000004f7560 RCX: 000000000045cb29 [ 3223.924460] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000000 [ 3223.931730] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3223.938992] R10: 0000000000a51000 R11: 0000000000000246 R12: 0000000000000004 [ 3223.946253] R13: 000000000000077b R14: 00000000004ca735 R15: 00007fe38a84c6d4 [ 3223.953544] CPU: 0 PID: 31765 Comm: syz-executor.4 Not tainted 4.19.131-syzkaller #0 [ 3223.961453] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3223.970806] Call Trace: [ 3223.973402] dump_stack+0x1fc/0x2fe [ 3223.977043] should_fail.cold+0xa/0x14 [ 3223.980944] ? setup_fault_attr+0x200/0x200 [ 3223.985270] ? lock_acquire+0x170/0x3c0 [ 3223.989258] __should_failslab+0x115/0x180 [ 3223.993502] should_failslab+0x5/0xf [ 3223.997217] kmem_cache_alloc_trace+0x284/0x380 [ 3224.001908] get_mountpoint+0x140/0x3c0 [ 3224.005888] attach_recursive_mnt+0xc9/0xd80 [ 3224.010302] ? count_mounts+0x210/0x210 [ 3224.014281] ? clone_mnt+0x701/0x11b0 [ 3224.018173] graft_tree+0x187/0x210 [ 3224.021804] do_mount+0x217b/0x2f10 [ 3224.025442] ? rcu_nmi_exit+0xb3/0x180 [ 3224.029335] ? copy_mount_string+0x40/0x40 [ 3224.033583] ? copy_mount_options+0x16/0x380 [ 3224.037994] ? copy_mount_options+0x26f/0x380 [ 3224.042497] ksys_mount+0xcf/0x130 [ 3224.046046] __x64_sys_mount+0xba/0x150 [ 3224.050025] ? do_syscall_64+0x56/0x620 [ 3224.054004] do_syscall_64+0xf9/0x620 [ 3224.057815] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3224.063009] RIP: 0033:0x45cb29 [ 3224.066204] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3224.085098] RSP: 002b:00007fef3220ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3224.092805] RAX: ffffffffffffffda RBX: 00000000004f7560 RCX: 000000000045cb29 [ 3224.100075] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000000 [ 3224.107340] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3224.114601] R10: 0000000000a51000 R11: 0000000000000246 R12: 0000000000000005 [ 3224.121867] R13: 000000000000077b R14: 00000000004ca735 R15: 00007fef3220b6d4 [ 3224.267790] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 05:32:34 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}, 0x1, 0x2a1c6}, 0x0) 05:32:34 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c000300002d5400000000000c0004"], 0x30}}, 0x0) 05:32:34 executing program 1 (fault-call:3 fault-nth:1): perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:34 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:34 executing program 5 (fault-call:3 fault-nth:4): perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:34 executing program 2: inotify_init() r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) r4 = syz_genetlink_get_family_id$smc(&(0x7f0000000040)='SMC_PNETID\x00') sendmsg$SMC_PNETID_GET(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="14000000", @ANYRES16=r4, @ANYBLOB="010002ae00000000000000040000"], 0x14}}, 0x0) sendmsg$SMC_PNETID_GET(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x34, r4, 0x8, 0x70bd28, 0x25dfdbff, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'caif0\x00'}]}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x4000010) [ 3224.702422] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 3224.771178] FAULT_INJECTION: forcing a failure. [ 3224.771178] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3224.803600] CPU: 1 PID: 31847 Comm: syz-executor.5 Not tainted 4.19.131-syzkaller #0 [ 3224.811602] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3224.821045] Call Trace: [ 3224.823650] dump_stack+0x1fc/0x2fe [ 3224.827297] should_fail.cold+0xa/0x14 [ 3224.831213] ? lock_acquire+0x170/0x3c0 [ 3224.835199] ? setup_fault_attr+0x200/0x200 [ 3224.839537] __alloc_pages_nodemask+0x239/0x2890 [ 3224.841252] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 3224.844296] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 3224.844311] ? __alloc_pages_nodemask+0x1b43/0x2890 [ 3224.844336] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 3224.866496] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 3224.871346] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 3224.876190] ? is_bpf_text_address+0xfc/0x1b0 [ 3224.880701] ? __save_stack_trace+0xaf/0x190 [ 3224.885128] ? ____cache_alloc_node+0x156/0x1d0 [ 3224.889830] ? cache_grow_begin+0x64/0x8a0 [ 3224.894073] cache_grow_begin+0xa4/0x8a0 [ 3224.898136] fallback_alloc+0x213/0x2e0 [ 3224.902119] kmem_cache_alloc+0x1e4/0x370 [ 3224.906274] getname_flags+0xce/0x590 [ 3224.910082] user_path_at_empty+0x2a/0x50 [ 3224.911929] FAULT_INJECTION: forcing a failure. [ 3224.911929] name failslab, interval 1, probability 0, space 0, times 0 [ 3224.914229] do_mount+0x147/0x2f10 [ 3224.914248] ? lock_downgrade+0x720/0x720 [ 3224.914271] ? lock_acquire+0x170/0x3c0 [ 3224.937068] ? __might_fault+0xef/0x1d0 [ 3224.941050] ? copy_mount_string+0x40/0x40 [ 3224.945293] ? __might_fault+0x192/0x1d0 [ 3224.949358] ? _copy_from_user+0xd2/0x130 [ 3224.953511] ? copy_mount_options+0x26f/0x380 [ 3224.958013] ksys_mount+0xcf/0x130 [ 3224.961560] __x64_sys_mount+0xba/0x150 [ 3224.965539] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3224.970121] do_syscall_64+0xf9/0x620 [ 3224.973925] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3224.979109] RIP: 0033:0x45cb29 [ 3224.982301] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3225.001196] RSP: 002b:00007fe38a84bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3225.008901] RAX: ffffffffffffffda RBX: 00000000004f7560 RCX: 000000000045cb29 [ 3225.016163] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000000 [ 3225.023425] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3225.030723] R10: 0000000000a51000 R11: 0000000000000246 R12: 0000000000000004 [ 3225.037986] R13: 000000000000077b R14: 00000000004ca735 R15: 00007fe38a84c6d4 [ 3225.045278] CPU: 0 PID: 31845 Comm: syz-executor.1 Not tainted 4.19.131-syzkaller #0 [ 3225.053163] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3225.062521] Call Trace: [ 3225.065116] dump_stack+0x1fc/0x2fe [ 3225.068747] should_fail.cold+0xa/0x14 [ 3225.072651] ? setup_fault_attr+0x200/0x200 [ 3225.076989] ? lock_acquire+0x170/0x3c0 [ 3225.080990] __should_failslab+0x115/0x180 [ 3225.085232] should_failslab+0x5/0xf [ 3225.088969] kmem_cache_alloc+0x277/0x370 [ 3225.093127] getname_flags+0xce/0x590 [ 3225.096936] user_path_at_empty+0x2a/0x50 [ 3225.101090] do_mount+0x147/0x2f10 [ 3225.104643] ? retint_kernel+0x2d/0x2d [ 3225.108539] ? copy_mount_string+0x40/0x40 [ 3225.112782] ? _copy_from_user+0xc8/0x130 [ 3225.116937] ? _copy_from_user+0xd2/0x130 05:32:34 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x1000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:34 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) sendmsg$SOCK_DESTROY(r0, &(0x7f00000014c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000001480)={&(0x7f0000000040)=ANY=[@ANYBLOB="18140000150000032bbd7000fedbdf25291f230001007c218d165feb6aa7356db11b886c54e0f105e086011b9ecaf56184e4e5105b009200010091e64621ff464e8fd94ef67da765e68f2634c525f10f0d04a431dcd9f15055b9263573130988dc1b3a132dd50a5f3d5a6cbc1716c1abf232b948e59f709e092935278202e7b7bfe8804c6ddd3c8fb19d230d4e2f1b08be7fba8bfd5682a2eb96a3ec37915f3656c17f1577ce038e807331954525e0f77159c50cc304e4eb17f24bff88f2d7523a0a64308213efab0000dc000100488f61c110ed8e941388c4355086141d1eafc782da77d1ffb322dd1c80a3ab44158a01a63e392a4faf6775c214d8900bc5efc3ebd61b1e7df19095a99379416776d7168dfa853de102d4fc3fad3b9f61ef6e7c5ffe1e95db77399da4b2ab220ca1e616c86b9fbd564c23e516fa60febc50b00a17a159f6c5bd7769c948abb70f60d0ccb4adc4e4f1227206555ec8b7f6a75df9b79e1e763b25afd8c00255601272a3bd0f661a0ef8c79863fdd997da4bfaa9676eb6c10d0dfef0a5f1515cd183f0fb8f3ba0b5b9e3fc573a874773681921ff6cc87d376441ca000100d5a0833b7409cf6ede7a9b59d7cf21ad6db5af0b75f47d7496ea4605e0badef2cb240604e1df9aa7421c5071186758a988287ce4f34be0649ce87442c7ee911f41010739e57083e34d8d09a11dc4d2ae4484b60aa3ab0293d863fa47e642764d754485e45f63a9b4bb436cfabe94c8976cb066ef18e838412d9d9dbfe953d2f2c517001fb6d7d1adde466ea61dad37a8302d6f9dbcb0ee0cd097f97cda087b4d5b2a7f8a15bfb5ad7a148a3b7d5c74f3eeff72ac71b950e6691cb8bfa612dfa6d1c9d14a24ee0000400001000fc32aa98bcec48d2b2a64460b14d94e9a7e9ba48c3bd0de8e78cac07e8d65787f37d8987dd0c93e8a698996336148e2e660bc0d985a292e0310f95a04100100a284dadf296057ae1cfc44e8d9d8b4448b39c32f60a23d2f3c631306894f2e16e160f4b2dcc6ec612c07857eab010e3b74a7d9a4303a64add6ddba1e8a5fd96adac9b1a1375efa6585fab2501b89154f5918d4247b276468b8c697bd4f123a3242fe3f4d97c0eec4932cc8aaefbc43b30ea670b43fc7b029d5c6d5412562f53adae710e3c7c7a2904fa3ac92684cc39e50e2ec46b77044fbea195b80fe6e3feee10b5821194275ecdad42a6ba41fe511d5b65b65d789396b3e8ec86bf0b5ff544d7e07c0384da9220d459812d166e0c16f4db62cb4db5597c9219d5837be6594df9960ddecdaf62fd1c1853b04ce41c8e38fa7dda196f3382d6e8855d34e37442973033fb723e6a12e70963705691db57202974c82e76fbdc82bf40b813dd58edb6685bed8c711f4f1497112f72f418072b3e4e4ad6b018d17e5eb81d5e58956afddc1faa39d02e2e53a1ec11781cceb31b06a35dcab67cad364754daaf35937fcc7cd832ff01ce2dd4eb1ddc32fcd18240d23455279a0896bd548181c07249b5d97cfec993312918d72ae4984ec50875a1ce8181dac3825749c30b5338610954d9466a3505a1c478ec37d56c7e5b1b63c5650de0579a61fa09518966563b4ada94267c155ef7171ad6c2b652bda09d247129608e0ee257bcfeb8c07b9ef131769a07a25ca718b44a39ab997d511c7e0e23ac3e0670199acdd4cd50f76822bb6bbd18f198a124f431f968a40157a6117eafa3cd589db11965fc9085e73142d485ffdd15cdaae11d304d43fce5a1bbb713267a1559d673fdbb46fd7d68a76661a18f084ad2238d48b244b473463bc4646634737ea29a7aefc3cf78faf1eca9e6f700c8f9395345984c6184d4e265e37e470c0f62e256d205945f1553a2df146af7819c0ff0c3edacc90f054f41a2a429942373bff27fde1e96e489039a95d572b500bbd20761811be2026ec4c3f49d56aae21b9e2cbb5c3d40d2680cc690217f4b47ca4e79ef43d394b69400753a917c35419f6a7890619473882ae50c72114e4b957f65ecf827f741e7c7df5537c8d64fa56e632950f6d765dff1ab8051400a8eb3a5cdd22dced748007b77a2f5b93016d173766a3c37e8ed1e7027bf614cfae96f2bb752233fe1edbf8dbdac454d69d96152a86373045dbf5a22d768cbfb09b0a93458e2f9397119c3aabdba5cc3f49a9bfce2544167102f9aca01b839b016fb96787ee0d0f49dd6cd22f95193c7f10720859127a04f222afbb24ce8bfced124bf57ecef5376211a3b6044d6a6f71b8625cfd6e6b0dccf2b27c7229d9a481f1760331df9d29dfc6238c09a7ba764989dcba409accdee2e5229674973f9880d2317ba4e9d2e797a123bf0444fc361a3c02d8c2f6603e7da90f94815c0e7744755a23068fda9c97a7b9e7cc323d18a86e00a26f140b08a8f3104f32b17b6312dbf961fa378db156fc39da56e29db7ca3cff3b186156c9fb8e09999e1ddee3093d43d4d98c5614352bfbfc4c2d55ffe616c12cfb9b6347aece0967ff94c9d86c3f3d103af4f8c374e975ae390288539f92d5ce73ac8fc93f745d7149225dd082fb1b39d958379459909884edb695e4b3ec6af63d10ca1ea6a9a67431a2a94784de0e436433c18bd8f7f7ef897eea476d1f7aed4a1c35351216817a8c8fc4d1898aa9e60a20a64098f03dfab0d5e51feae539aeee5b864b261cbeb33c287158e5b9956b4ed6cf2663a8fd6fe49af6777df09227a9ca56f340dd9378fa313542e59255c2d8ce353b0b0e9a63899c87511087ac95232d8dbb8505ef492075909443f97abec2e62c1dc6c91afd9c71fa50cdc0fcb243c5ec50866422baa7bfe4b5ac7fb8a323b656940247f74aa0f1c6f5a65e56397c63926f5b6eada94d144e6ae3a06db88bca1ee3bccd4a875d5211573c66962343d0046539d2e98f673f1788fb8bcd32ac96897d3dc07b15ec787ef1d2ef12529f7c1cb6232a789a00e3ca659349de256b5f44c83d81a1824ef6f67fe41af338ca9b630766ce992565153d9be277b3c07b7aafcc47af502d55325b031b3349770c4f361842929cde153371e68fa44dc09dfb6bd02892efed485564f16858c1ee7ec9dbc1491363213e7096e38ac8e611f69f01b805e39397c664a1a7fb47ef523043db012ebe8a0c8c62400942878bdd75c0576c82a992f9f1daebd91d1fb4bb598ec50f02e85f8e94dc097b22fe3ca19b16ac84f2a92326fea3f5fef1af587a9984f5d33e12dc79a6af690b6a00815dc957ff2916145579db8a2cf7d9e442ddcc96d3c6d6cc1c7d38d8b6233336c8905bd0815a6173ac3f7104f6e2c5fbc7e593035f850b47591932ca5c882e15c4ecdff69052e11e27c5c856e3b17b5476d9c1cfa7f29747e9a11718ce62bf212b2e2dc25ed7f0dc7dd228ee68dc2eb846266c0a43ef40a5209a4fb303ddfe366c23d043e390a8db178994ab1824d2f99a8ad1671a1179ce062190f29ce9cf769c25213f55b3b84002eda029b7040205b5312d2bd514cf865e20268a352a31a42efa73d78374f16bb83ae272822bee7c357939fc0b7d89415dce216332d192b38b029128b428b8005843298a53876bb526e66cf20aed6185221d5834e5da9146723048cec000e2d87565152e007a921696a58a5613852f055d75ef6b1e6ff053a305c4f9b3998ff0c9b9ee332983e32fe80c56472008be842d53ff55b9a3627d9eeb9cea9762cd0391fa0bf9bf02e6854f404f7165ecc08fc874d916c0c752e90c01a4dfb263bfe1ce46f428700bc956456efe312798a9da6be41140776468fbeaf2bdf68881afbbba0c13cea4d5cd11890ca0edfa06bb2176176d5f10ab6db11e06ea153057921b51551887728104c3af66c18546bc8251666802ddc4997bb5c530abdcf81dc320b3b352818d515d7b1c3a49aaefc6078e4acd6e535912cf3c3cd275a4cc330f792ea52486549b2953a10acc6ce9fd3b1c2297b3c06dde4f52c61c856eab0fd1f51ce882fadce0228199a37324cfeebe6ce502c8563743011ef40c65e2c3952ec1fe4f4fdb443c8fa40efc938908b581ee7f5d95f8ae4c821fd0842203cb13b2e1ab2cf7f454ab52baf8386f91bed675a97c38a974042a0368e218984f9b7c001509a3fe050d99ab94c7d99777a58930dc5e071faa4ba34292e7a03f808b890b561adde808223c5f2fe17ef51d7b93c809d5edd66f56d2ea91fd6902313fdb25e2e63e6d50108b00e38bdfd59207c79e7cbd686ee6e932a230f2dc291f5c3798ff238e566bbaf252c1dc323befcc39c2e4bb0366565f8c87ca9fed7e2d3a98a11e18de7886782c0b6ac70e3a8fb54602169bbe98c1702411c578c3492120a23e3e09c2c06bc470e30483f3485b827b952f154272b7240d85517b0d7af798c15a76a7c7754b8126bf36972d08715f4dd78b9020b282add7ef1ba79f2548b1c1b6da32a8e8e97f1a01a9053d762df02d98d4ff0460ddcfe5f2c4ea41063092a0aeeb0f9266a9ee97409a0d6c6fabd4cb825e8bf80f1d75feed4e9a8bd24a113579f9954d3a482e2fd32a9e3de85f884a0d38aa1933a2ab85bafe1a7e688d7f49965a04e0e696713c573ad24ddb681d006aed56c0552e1762750de530bf87f5c7a96dc3b190dff2b388e79ff00d50b7061104e335ceced022ee3cb49a28c3707cf57df1ced10b2b2c9d11d740da7834f5ba1735853d8831e6dd2a70b1236ae74761536cb3450b4274e8c02c3a4890dda2f3a5a60c9f84054026a8352fd04078469b49e368c400088289a18cc5b76abea04fa443151bce5d5162fb090dd1d4a56fc60531b4a6071dd62a9025730c0e46edddd971e66855c7cf6cc7c58bab223cc222b4bd81fe3cbdf2668b675e65d61e500c93edd7e89eecefb535a6724e3241038c81addad4545905a3fb4b2e14db009223f8572b45e894b14ea4afc140b4723b2cb865a20e874efe3fb3368a0f2663f5f21392ad54eac075a539536a9c77e51e15739155c663c8c3f73ce67ca8641026a40774e25cdc8334456f88de7199dac35d2ce1cc3df10a3051cfbaa9b7a4573985ca6ac83d27dd16be9b7ad9711a5459d7a056a3d64e1431ca690a45442b3186c41fbcda9a2f3de5a5da9d5559a5c875a11733fd775977570203db701f9c793b2a564c4abe238c904d298e0af3f1035fbe6783bc9c94fa68bb2909439d861aa78561c4ca76172c2e9ca3546f952cb0852be79b31522dc6abd3f0bb0ee72e9dd2f238f73039224a4243e298e255fe9779c7b45b63226ac4ab264d62aee4ae7f188f1da1605d812b48204a9b7076c69cb66d56a13f15c503965a54e126ee31e10b0f2cbcc67fdd6c40c32af43dbaa2c611e002a5f9574381010fb2a6c2157142677ca16ca0723b61b51291c8b8c6b9998a1f3a55af2b8b0b565fe3ac703efae4e7fc0745146fe976c52e6c4d233637edee938aaa505eaf64355090e856428f1abf472e61abd1eeb1893faf99c9cd3af3daf488d04dba8ce3c6cd440700a611abda79854c02cb477c6694b69d03348f186eb81b241e55e95029a22469698327e6bd77f4edc144ce7ad8932bdb2dad84ce7cfbf1140ad5b98c14efc9dd9c0072cfa42ad2f33bb6576dec5409208b4f5f74381cd5a0bb3042a5d4e4cfa7504d139ee71d0bca77327fbb27a7305a3483891d461dc0d248677a5856d946bea77fbdb37a90de3d0995dd94705e1fe08d482af303bfcdadba033cd0d2cc2a885914d9f3d3a5cdd98d9743323736b625f5f45675cfe92a7c40f5cb4104b15dc0dc93c74cbd8377659b97c03c5afa0fa5ed24b13511a061aa539bbde7b67865f75d499a2ce0012637ff3b1e24096fa3fb85cd27ad3032d884270e99b1a9c6252c412ede6097e2686b2d293dc1293555233d4480d509065b5189f4d678ce354f6055a88bc99e3923e3624532000ec41dfeda83d781be5dcd97c30f580045429d712058df0b939bb8ccaf3a129e31ef8c1e3742c8e870bb5ed06a952eaf6fef2f7a3f28c99b9f8f681f5fdfbcd3f2fd72da9b4150735d4fa0c7660b2de87751b173f7bb9d31a3a7e28b485f93a9f5fa2db553d43043de612b108f375b886860192ec7bbe5fde53cb7fde7dd4d7f13b5640dde58ab52ba870131fcf85cef5984996409a3746e04ec8b8ad9c12114614f4cce36a3307eb91424b67a619b5696afdc35931e06bc453d5d27293108feaae06ca2b10010ab0ce2a6208e42bd2033bb156511f60f8f2ad19f79f6636f4ec43b8edef2fbc7697fd1371796b83493210ce2c661372968d1114b6fc0726b9ba73a8372968c95795c28e4734211aa68509fad73406a9e96c8edbf7969b2c1e23ff4db673f5a4cb9ff1b6c05863b1dd86b76bb37c549eda261f507619cb2119444258d33aecf413853bbb48675492fe6751666db5dc2280deb513c610b3486057ca22cdf217c891a2c95bcec6001eba898bed8cab5c6a3d46eb15467c7e6a448dd7281a57d27301e19bbdc732d29832264e35cb45af2f79370c65179637cb3839789decde792c1ba8cc5bed3f2531978eda80df44df456aa0e98512e4c58f50bb4b68f697ebe110a7c12ea182a6501dbcad568c6b68bf3e351dabc34b7d275f456e9e10a5a686bde78544de06ec2a4740021fb6b72ba4785ecf637d3af56f58f8e30b2cfeb136c3a0932bb9f0b7e5a21140c31e1bc30b9767b8360e3af6135b3d7f49b32406817cec9a171e68702646aa964201d951dbae39c68869a2ec4fd460ec199f87c451ef7a8bd479156722bdfca9385e2db3a98df71769e16cca8493eab93156f000100b9e900716434cb4819144d3800871db6e5626b2673a01d9725dd100c7dae148fcd81bffcf59613380cecc1ce46c3cfae81db3c52eafd751fd6bef7f6aa6654e2118db78490652ad448fdd58885c364626f50073386fc0e731b5d61c87d38350c39a9e065a8e05e6ccee45700370001000fd2f678e514902fe3461f62ddae6a530bb92c13c1ce79ef4eeaaeced770cb03df26a190d606c34cf0320ea238009911adb234006a00010045eef1cfb177665ae4d0137c050180afe3e1ccdcc55921a3ee266d81696fec5aac2950f842a0691a6849f65128a6374213185d873ab5d47f1d5363571f53f187fb2fa5aeef08f42c0804c10ed21a4e061c6f71b3f50855eae12776109add590755abfdcc0cd400004b00010073c0238153a784ba873923eae8a7444c0b93525ca259fa20100a972e1d720e8ada39c6409a900f7e178a6208508582d1728c85b21bba1fb751a61e7399ec0b96e1cd01271e5212000000"], 0x1418}, 0x1, 0x0, 0x0, 0x200000d4}, 0x20000004) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r2, &(0x7f0000000180)=""/186, 0xba) ioctl$PIO_SCRNMAP(r2, 0x4b41, &(0x7f0000001580)="9ef9348935bc9e244ef7c0660804e01a2b601e8dc959b3bfbd71f17aaa50c3f9f62704a133da958dc569ef85892e457aeef0a004809b2631d4897c033c0ebe8d5c622fe53e836b16c1b3ad1c7caa395419e865882299c5adb065a6ca80711d074a0439e182131731950fad721ab3310f0ab9fd0b49de8b5e435bd6a19dbcd5e93cf56f78e1bf5c05dce743566c96f0ec59f8a0dcf4411a19fdad858cb65f00b6a9fe9d79135b9713adbf54e60d86b4bf770881ae8dcc769ef13d4a773277c3de") ptrace$getsig(0x4202, r1, 0x1ff, &(0x7f0000001500)) inotify_init() 05:32:34 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c0003000000f000000000000c0004"], 0x30}}, 0x0) [ 3225.121091] ? __sanitizer_cov_trace_pc+0xd/0x50 [ 3225.125869] ? _copy_from_user+0xd2/0x130 [ 3225.130021] ? copy_mount_options+0x26f/0x380 [ 3225.134532] ksys_mount+0xcf/0x130 [ 3225.138077] __x64_sys_mount+0xba/0x150 [ 3225.142060] ? do_syscall_64+0x56/0x620 [ 3225.146047] do_syscall_64+0xf9/0x620 [ 3225.149864] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3225.155061] RIP: 0033:0x45cb29 05:32:34 executing program 5 (fault-call:3 fault-nth:5): perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3225.158308] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3225.177208] RSP: 002b:00007f8cfb4e5c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3225.184924] RAX: ffffffffffffffda RBX: 00000000004f7560 RCX: 000000000045cb29 [ 3225.192199] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000000 [ 3225.199469] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3225.206746] R10: 0000000000a51000 R11: 0000000000000246 R12: 0000000000000004 [ 3225.214017] R13: 000000000000077b R14: 00000000004ca735 R15: 00007f8cfb4e66d4 05:32:35 executing program 1 (fault-call:3 fault-nth:2): perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3225.302691] FAULT_INJECTION: forcing a failure. [ 3225.302691] name failslab, interval 1, probability 0, space 0, times 0 05:32:35 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000002, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3225.345008] CPU: 0 PID: 31902 Comm: syz-executor.5 Not tainted 4.19.131-syzkaller #0 [ 3225.352907] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3225.362261] Call Trace: [ 3225.364858] dump_stack+0x1fc/0x2fe [ 3225.368524] should_fail.cold+0xa/0x14 [ 3225.372419] ? setup_fault_attr+0x200/0x200 [ 3225.376748] ? lock_acquire+0x170/0x3c0 [ 3225.380768] __should_failslab+0x115/0x180 [ 3225.385007] should_failslab+0x5/0xf [ 3225.388736] kmem_cache_alloc+0x277/0x370 [ 3225.392892] getname_kernel+0x4e/0x370 [ 3225.396796] kern_path+0x1b/0x40 [ 3225.400189] do_mount+0xde9/0x2f10 [ 3225.403745] ? lock_downgrade+0x720/0x720 [ 3225.407897] ? lock_acquire+0x170/0x3c0 [ 3225.411874] ? __might_fault+0xef/0x1d0 [ 3225.415816] FAULT_INJECTION: forcing a failure. [ 3225.415816] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3225.415856] ? copy_mount_string+0x40/0x40 [ 3225.431931] ? __might_fault+0x192/0x1d0 [ 3225.436086] ? _copy_from_user+0xd2/0x130 [ 3225.440219] ? copy_mount_options+0x26f/0x380 [ 3225.444724] ksys_mount+0xcf/0x130 [ 3225.448251] __x64_sys_mount+0xba/0x150 [ 3225.452233] ? do_syscall_64+0x56/0x620 [ 3225.456197] do_syscall_64+0xf9/0x620 [ 3225.459994] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3225.465300] RIP: 0033:0x45cb29 [ 3225.468489] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3225.487574] RSP: 002b:00007fe38a84bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3225.495268] RAX: ffffffffffffffda RBX: 00000000004f7560 RCX: 000000000045cb29 [ 3225.502526] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000000 [ 3225.509867] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3225.517121] R10: 0000000000a51000 R11: 0000000000000246 R12: 0000000000000004 [ 3225.524393] R13: 000000000000077b R14: 00000000004ca735 R15: 00007fe38a84c6d4 [ 3225.531670] CPU: 1 PID: 31910 Comm: syz-executor.1 Not tainted 4.19.131-syzkaller #0 [ 3225.539554] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3225.548911] Call Trace: [ 3225.551510] dump_stack+0x1fc/0x2fe [ 3225.555156] should_fail.cold+0xa/0x14 [ 3225.559055] ? setup_fault_attr+0x200/0x200 [ 3225.563385] ? mark_held_locks+0xf0/0xf0 [ 3225.567476] ? lock_acquire+0x170/0x3c0 [ 3225.571467] __alloc_pages_nodemask+0x239/0x2890 [ 3225.576234] ? __read_once_size_nocheck.constprop.0+0x10/0x10 [ 3225.582150] ? is_bpf_text_address+0xd5/0x1b0 [ 3225.586655] ? __lock_acquire+0x6de/0x3ff0 [ 3225.590906] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 3225.595767] ? is_bpf_text_address+0xfc/0x1b0 [ 3225.600277] ? unwind_get_return_address+0x51/0x90 [ 3225.605220] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3225.610593] ? __save_stack_trace+0xaf/0x190 [ 3225.615054] cache_grow_begin+0xa4/0x8a0 [ 3225.619128] ? setup_fault_attr+0x200/0x200 [ 3225.623460] ? cache_alloc_pfmemalloc+0x1e/0x140 [ 3225.628227] cache_alloc_refill+0x273/0x340 [ 3225.632557] kmem_cache_alloc+0x346/0x370 [ 3225.636713] getname_flags+0xce/0x590 [ 3225.640663] user_path_at_empty+0x2a/0x50 [ 3225.644823] do_mount+0x147/0x2f10 [ 3225.648392] ? lock_downgrade+0x720/0x720 [ 3225.652545] ? lock_acquire+0x170/0x3c0 [ 3225.656527] ? __might_fault+0xef/0x1d0 [ 3225.660510] ? copy_mount_string+0x40/0x40 [ 3225.664770] ? __might_fault+0x192/0x1d0 [ 3225.668840] ? _copy_from_user+0xd2/0x130 [ 3225.673009] ? copy_mount_options+0x26f/0x380 [ 3225.677532] ksys_mount+0xcf/0x130 [ 3225.681081] __x64_sys_mount+0xba/0x150 [ 3225.685067] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3225.689659] do_syscall_64+0xf9/0x620 [ 3225.693575] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3225.698765] RIP: 0033:0x45cb29 [ 3225.701965] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3225.720866] RSP: 002b:00007f8cfb4e5c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3225.728565] RAX: ffffffffffffffda RBX: 00000000004f7560 RCX: 000000000045cb29 [ 3225.735838] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000000 [ 3225.743181] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3225.750447] R10: 0000000000a51000 R11: 0000000000000246 R12: 0000000000000004 [ 3225.757710] R13: 000000000000077b R14: 00000000004ca735 R15: 00007f8cfb4e66d4 [ 3225.800282] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 05:32:35 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}, 0x1, 0x2a1c7}, 0x0) 05:32:35 executing program 2: openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x20400, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') r2 = socket$inet(0x2, 0x3, 0x2) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000100)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_DAT_CACHE(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="83cccb55b6ffffae61412d770c838eca1c6beb6faa91d4dd5defa7c69466ec25299b9f6f0ade1ee5b9b3a63fdba116e5065fc24e290c7c0b12f496034219489238f475922dd7997fba578881f0dbb6f02a1501b05a4fcaaa6e3c1276796e684b07507c2d93c5917bbcbbb00137a2dc3a409fdd8663c0f1ef6d7c71c25d18c7fece2b266219f6d228eb5f82", @ANYRES16=r1, @ANYBLOB="b7230000000000000000060000f008000300", @ANYRES32=r3, @ANYBLOB], 0x1c}, 0x1, 0x50000}, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r4, &(0x7f0000000180)=""/186, 0xba) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000000c0)={&(0x7f0000000400)=ANY=[@ANYBLOB=',\x00\x00D', @ANYRESHEX=r4, @ANYRES32=r5, @ANYRESOCT, @ANYRESHEX=r4, @ANYRES16], 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x4) r6 = inotify_init() r7 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r7, &(0x7f0000000180)=""/186, 0xba) setsockopt$inet_dccp_int(r7, 0x21, 0x6, &(0x7f0000000140)=0x1, 0x4) lsetxattr$security_selinux(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='security.selinux\x00', &(0x7f0000000300)='system_u:object_r:hald_dccm_exec_t:s0\x00', 0x26, 0x4) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r8, &(0x7f0000000180)=""/186, 0xba) r9 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nvram\x00', 0x680080, 0x0) sendfile(r9, r6, 0x0, 0x6) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r8, 0x8982, &(0x7f0000000240)={0x1, 'wg0\x00', {}, 0x1000}) 05:32:35 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000004003000000000c0004"], 0x30}}, 0x0) 05:32:35 executing program 5 (fault-call:3 fault-nth:6): perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:35 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000004, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:35 executing program 1 (fault-call:3 fault-nth:3): perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3225.926395] FAULT_INJECTION: forcing a failure. [ 3225.926395] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3225.933879] FAULT_INJECTION: forcing a failure. [ 3225.933879] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3225.938229] CPU: 1 PID: 31929 Comm: syz-executor.1 Not tainted 4.19.131-syzkaller #0 [ 3225.957860] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3225.967199] Call Trace: [ 3225.969787] dump_stack+0x1fc/0x2fe [ 3225.973403] should_fail.cold+0xa/0x14 [ 3225.977278] ? check_preemption_disabled+0x41/0x280 [ 3225.982281] ? setup_fault_attr+0x200/0x200 [ 3225.986596] __alloc_pages_nodemask+0x239/0x2890 [ 3225.991342] ? __lock_acquire+0x6de/0x3ff0 [ 3225.995573] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 3226.000415] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 3226.005246] ? is_bpf_text_address+0xfc/0x1b0 [ 3226.009734] ? __save_stack_trace+0xaf/0x190 [ 3226.014137] ? ____cache_alloc_node+0x156/0x1d0 [ 3226.018800] cache_grow_begin+0xa4/0x8a0 [ 3226.022850] ? check_preemption_disabled+0x41/0x280 [ 3226.027860] ____cache_alloc_node+0x170/0x1d0 [ 3226.032343] ? check_preemption_disabled+0x41/0x280 [ 3226.037350] kmem_cache_alloc+0x1e4/0x370 [ 3226.041494] getname_flags+0xce/0x590 [ 3226.045298] user_path_at_empty+0x2a/0x50 [ 3226.049432] do_mount+0x147/0x2f10 [ 3226.052974] ? lock_downgrade+0x720/0x720 [ 3226.057108] ? lock_acquire+0x170/0x3c0 [ 3226.061069] ? __might_fault+0xef/0x1d0 [ 3226.065031] ? copy_mount_string+0x40/0x40 [ 3226.069253] ? __might_fault+0x192/0x1d0 [ 3226.073301] ? _copy_from_user+0xd2/0x130 [ 3226.077438] ? copy_mount_options+0x26f/0x380 [ 3226.081923] ksys_mount+0xcf/0x130 [ 3226.085453] __x64_sys_mount+0xba/0x150 [ 3226.089417] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3226.093987] do_syscall_64+0xf9/0x620 [ 3226.097790] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3226.102991] RIP: 0033:0x45cb29 [ 3226.106199] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3226.125097] RSP: 002b:00007f8cfb4e5c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3226.132786] RAX: ffffffffffffffda RBX: 00000000004f7560 RCX: 000000000045cb29 [ 3226.140038] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000000 [ 3226.147290] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3226.154543] R10: 0000000000a51000 R11: 0000000000000246 R12: 0000000000000004 [ 3226.161795] R13: 000000000000077b R14: 00000000004ca735 R15: 00007f8cfb4e66d4 [ 3226.169074] CPU: 0 PID: 31931 Comm: syz-executor.5 Not tainted 4.19.131-syzkaller #0 [ 3226.176960] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3226.186309] Call Trace: [ 3226.188905] dump_stack+0x1fc/0x2fe [ 3226.192562] should_fail.cold+0xa/0x14 [ 3226.201588] ? check_preemption_disabled+0x41/0x280 [ 3226.206623] ? setup_fault_attr+0x200/0x200 [ 3226.210966] __alloc_pages_nodemask+0x239/0x2890 [ 3226.215741] ? __lock_acquire+0x6de/0x3ff0 [ 3226.220014] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 3226.224905] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 3226.229768] ? avc_has_perm_noaudit+0x1ec/0x390 [ 3226.229791] ? kmem_cache_free+0x226/0x260 [ 3226.238704] ? putname+0xe1/0x120 [ 3226.238723] ? ____cache_alloc_node+0x156/0x1d0 [ 3226.246834] cache_grow_begin+0xa4/0x8a0 [ 3226.250909] ? check_preemption_disabled+0x41/0x280 [ 3226.250925] ____cache_alloc_node+0x170/0x1d0 [ 3226.250935] ? check_preemption_disabled+0x41/0x280 05:32:36 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000006, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:36 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000000340000000000c0004"], 0x30}}, 0x0) [ 3226.250949] kmem_cache_alloc+0x1e4/0x370 [ 3226.250962] getname_kernel+0x4e/0x370 [ 3226.250973] kern_path+0x1b/0x40 [ 3226.250984] do_mount+0xde9/0x2f10 [ 3226.250998] ? lock_downgrade+0x720/0x720 05:32:36 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000fffff0000000000c0004"], 0x30}}, 0x0) 05:32:36 executing program 5 (fault-call:3 fault-nth:7): perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3226.251010] ? lock_acquire+0x170/0x3c0 [ 3226.251023] ? __might_fault+0xef/0x1d0 [ 3226.251038] ? copy_mount_string+0x40/0x40 [ 3226.251055] ? __might_fault+0x192/0x1d0 [ 3226.251071] ? _copy_from_user+0xd2/0x130 [ 3226.251087] ? copy_mount_options+0x26f/0x380 [ 3226.251104] ksys_mount+0xcf/0x130 [ 3226.251119] __x64_sys_mount+0xba/0x150 [ 3226.251134] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3226.251149] do_syscall_64+0xf9/0x620 [ 3226.251167] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3226.251177] RIP: 0033:0x45cb29 [ 3226.251191] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3226.251199] RSP: 002b:00007fe38a84bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 05:32:36 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000008, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3226.251212] RAX: ffffffffffffffda RBX: 00000000004f7560 RCX: 000000000045cb29 [ 3226.251221] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000000 [ 3226.251229] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3226.251237] R10: 0000000000a51000 R11: 0000000000000246 R12: 0000000000000004 [ 3226.251245] R13: 000000000000077b R14: 00000000004ca735 R15: 00007fe38a84c6d4 [ 3226.467982] FAULT_INJECTION: forcing a failure. [ 3226.467982] name fail_page_alloc, interval 1, probability 0, space 0, times 0 05:32:36 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000000000010000000c0004"], 0x30}}, 0x0) [ 3226.577790] CPU: 0 PID: 31962 Comm: syz-executor.5 Not tainted 4.19.131-syzkaller #0 [ 3226.577798] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3226.577803] Call Trace: [ 3226.577826] dump_stack+0x1fc/0x2fe [ 3226.577846] should_fail.cold+0xa/0x14 [ 3226.577868] ? check_preemption_disabled+0x41/0x280 [ 3226.577885] ? setup_fault_attr+0x200/0x200 [ 3226.577910] __alloc_pages_nodemask+0x239/0x2890 [ 3226.577928] ? __lock_acquire+0x6de/0x3ff0 [ 3226.577951] ? _raw_spin_unlock_irq+0x50/0x80 [ 3226.577965] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 3226.577978] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 3226.577994] ? finish_task_switch+0x118/0x780 [ 3226.578008] ? switch_mm_irqs_off+0x764/0x1340 [ 3226.578031] ? io_schedule_timeout+0x140/0x140 [ 3226.578048] ? ____cache_alloc_node+0x156/0x1d0 [ 3226.578070] cache_grow_begin+0xa4/0x8a0 [ 3226.578085] ? check_preemption_disabled+0x41/0x280 [ 3226.578105] ____cache_alloc_node+0x170/0x1d0 [ 3226.578118] ? check_preemption_disabled+0x41/0x280 [ 3226.578136] kmem_cache_alloc+0x1e4/0x370 [ 3226.578154] getname_kernel+0x4e/0x370 [ 3226.578169] kern_path+0x1b/0x40 [ 3226.578183] do_mount+0xde9/0x2f10 [ 3226.578202] ? lock_downgrade+0x720/0x720 [ 3226.578215] ? lock_acquire+0x170/0x3c0 [ 3226.578229] ? __might_fault+0xef/0x1d0 [ 3226.578244] ? copy_mount_string+0x40/0x40 [ 3226.578261] ? __might_fault+0x192/0x1d0 [ 3226.578277] ? _copy_from_user+0xd2/0x130 [ 3226.578292] ? copy_mount_options+0x26f/0x380 [ 3226.578309] ksys_mount+0xcf/0x130 [ 3226.578324] __x64_sys_mount+0xba/0x150 [ 3226.578340] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3226.578355] do_syscall_64+0xf9/0x620 [ 3226.578373] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3226.578385] RIP: 0033:0x45cb29 [ 3226.578399] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3226.578406] RSP: 002b:00007fe38a84bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3226.578419] RAX: ffffffffffffffda RBX: 00000000004f7560 RCX: 000000000045cb29 [ 3226.578428] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000000 [ 3226.578435] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3226.578442] R10: 0000000000a51000 R11: 0000000000000246 R12: 0000000000000004 [ 3226.578450] R13: 000000000000077b R14: 00000000004ca735 R15: 00007fe38a84c6d4 [ 3226.753268] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 05:32:36 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}, 0x1, 0x2a1c8}, 0x0) 05:32:36 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x2000000a, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:36 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000000000020000000c0004"], 0x30}}, 0x0) 05:32:36 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:36 executing program 5 (fault-call:3 fault-nth:8): perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3227.025501] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 05:32:36 executing program 2: inotify_init() r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, &(0x7f0000000100)=0x9) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000000c0)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICLIST(r4, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9eec004688", @ANYRES16=r5, @ANYBLOB="000426bd7000fbdbdf25050000002f00070073797374656d5f753a6f626a6563745f723a7379736c6f67645f696e697472635f657865635f743a73300000080005000a01010108000500ffffffff14000200fe8000000000000000000000000000301400020000000000000000000000ffff0a01010214000200fe88000000000000000000000000010108000500e0000002140003ffb383c600000d"], 0xac}, 0x1, 0x0, 0x0, 0x20004000}, 0x80) sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(r1, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x4c, r5, 0x20, 0x70bd2c, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_SECCTX={0x2d, 0x7, 'system_u:object_r:systemd_unit_file_t:s0\x00'}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000081}, 0x20000000) read$dsp(r1, &(0x7f0000000040)=""/165, 0xa5) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000000)={r0, 0xffffffffffffffff, 0x0, r1}, 0x10) [ 3227.095586] FAULT_INJECTION: forcing a failure. [ 3227.095586] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3227.125655] CPU: 1 PID: 32037 Comm: syz-executor.5 Not tainted 4.19.131-syzkaller #0 [ 3227.133660] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3227.133669] Call Trace: [ 3227.145633] dump_stack+0x1fc/0x2fe [ 3227.145653] should_fail.cold+0xa/0x14 [ 3227.153164] ? lock_acquire+0x170/0x3c0 [ 3227.153183] ? setup_fault_attr+0x200/0x200 [ 3227.159594] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 3227.161468] __alloc_pages_nodemask+0x239/0x2890 [ 3227.161488] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 3227.178596] ? __alloc_pages_nodemask+0x1b43/0x2890 [ 3227.178642] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 3227.188469] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 3227.193312] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 3227.198166] ? avc_has_perm_noaudit+0x1ec/0x390 [ 3227.202861] ? kmem_cache_free+0x226/0x260 [ 3227.202877] ? putname+0xe1/0x120 [ 3227.202894] ? ____cache_alloc_node+0x156/0x1d0 [ 3227.202907] ? cache_grow_begin+0x64/0x8a0 [ 3227.202925] cache_grow_begin+0xa4/0x8a0 [ 3227.202946] fallback_alloc+0x213/0x2e0 [ 3227.202966] kmem_cache_alloc+0x1e4/0x370 [ 3227.202983] getname_kernel+0x4e/0x370 05:32:37 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x2000000c, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:37 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000000000030000000c0004"], 0x30}}, 0x0) [ 3227.235567] kern_path+0x1b/0x40 [ 3227.235584] do_mount+0xde9/0x2f10 [ 3227.235609] ? lock_downgrade+0x720/0x720 05:32:37 executing program 5 (fault-call:3 fault-nth:9): perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:37 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x1000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3227.235635] ? lock_acquire+0x170/0x3c0 05:32:37 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000027, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3227.235651] ? __might_fault+0xef/0x1d0 [ 3227.235665] ? copy_mount_string+0x40/0x40 05:32:37 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c000300000000000f0000000c0004"], 0x30}}, 0x0) [ 3227.235683] ? __might_fault+0x192/0x1d0 [ 3227.235699] ? _copy_from_user+0xd2/0x130 [ 3227.235714] ? copy_mount_options+0x26f/0x380 [ 3227.235730] ksys_mount+0xcf/0x130 [ 3227.235746] __x64_sys_mount+0xba/0x150 [ 3227.235760] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3227.235776] do_syscall_64+0xf9/0x620 [ 3227.235800] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3227.235812] RIP: 0033:0x45cb29 [ 3227.235826] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3227.235833] RSP: 002b:00007fe38a84bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3227.235846] RAX: ffffffffffffffda RBX: 00000000004f7560 RCX: 000000000045cb29 [ 3227.235854] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000000 [ 3227.235861] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3227.235869] R10: 0000000000a51000 R11: 0000000000000246 R12: 0000000000000004 [ 3227.235878] R13: 000000000000077b R14: 00000000004ca735 R15: 00007fe38a84c6d4 05:32:37 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}, 0x1, 0x2a1c9}, 0x0) 05:32:37 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000002, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:37 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x2000004f, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:37 executing program 5 (fault-call:3 fault-nth:10): perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:37 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c000300000000542d0000000c0004"], 0x30}}, 0x0) [ 3227.432751] FAULT_INJECTION: forcing a failure. [ 3227.432751] name failslab, interval 1, probability 0, space 0, times 0 [ 3227.432798] CPU: 0 PID: 32099 Comm: syz-executor.5 Not tainted 4.19.131-syzkaller #0 [ 3227.432806] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3227.432810] Call Trace: [ 3227.432837] dump_stack+0x1fc/0x2fe [ 3227.432857] should_fail.cold+0xa/0x14 [ 3227.432874] ? setup_fault_attr+0x200/0x200 [ 3227.432889] ? lock_acquire+0x170/0x3c0 [ 3227.432908] __should_failslab+0x115/0x180 [ 3227.432922] should_failslab+0x5/0xf [ 3227.432936] kmem_cache_alloc_trace+0x284/0x380 [ 3227.432951] get_mountpoint+0x140/0x3c0 [ 3227.432964] lock_mount+0x131/0x4a0 [ 3227.432978] ? lookup_mnt+0x420/0x420 [ 3227.432988] ? memcpy+0x35/0x50 [ 3227.433002] ? getname_kernel+0x21e/0x370 [ 3227.433018] do_mount+0xe4d/0x2f10 [ 3227.433035] ? lock_downgrade+0x720/0x720 [ 3227.433047] ? lock_acquire+0x170/0x3c0 [ 3227.433059] ? __might_fault+0xef/0x1d0 [ 3227.433072] ? copy_mount_string+0x40/0x40 [ 3227.433087] ? __might_fault+0x192/0x1d0 [ 3227.433101] ? _copy_from_user+0xd2/0x130 [ 3227.433116] ? copy_mount_options+0x26f/0x380 [ 3227.433132] ksys_mount+0xcf/0x130 [ 3227.433146] __x64_sys_mount+0xba/0x150 [ 3227.433161] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3227.433176] do_syscall_64+0xf9/0x620 [ 3227.433194] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3227.433204] RIP: 0033:0x45cb29 [ 3227.433217] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3227.433224] RSP: 002b:00007fe38a84bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3227.433236] RAX: ffffffffffffffda RBX: 00000000004f7560 RCX: 000000000045cb29 [ 3227.433245] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000000 [ 3227.433251] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3227.433259] R10: 0000000000a51000 R11: 0000000000000246 R12: 0000000000000004 [ 3227.433267] R13: 000000000000077b R14: 00000000004ca735 R15: 00007fe38a84c6d4 [ 3227.625128] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 3227.732143] FAULT_INJECTION: forcing a failure. [ 3227.732143] name failslab, interval 1, probability 0, space 0, times 0 [ 3227.732159] CPU: 1 PID: 32128 Comm: syz-executor.5 Not tainted 4.19.131-syzkaller #0 [ 3227.732167] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3227.732172] Call Trace: [ 3227.732191] dump_stack+0x1fc/0x2fe [ 3227.732212] should_fail.cold+0xa/0x14 [ 3227.732229] ? setup_fault_attr+0x200/0x200 [ 3227.732244] ? lock_acquire+0x170/0x3c0 [ 3227.732266] __should_failslab+0x115/0x180 [ 3227.732282] should_failslab+0x5/0xf [ 3227.732299] kmem_cache_alloc+0x277/0x370 [ 3227.732316] alloc_vfsmnt+0x23/0x780 [ 3227.732335] clone_mnt+0x6c/0x11b0 [ 3227.732350] ? getname_kernel+0x21e/0x370 [ 3227.732369] do_mount+0x250f/0x2f10 [ 3227.732387] ? lock_downgrade+0x720/0x720 [ 3227.732400] ? lock_acquire+0x170/0x3c0 [ 3227.732413] ? __might_fault+0xef/0x1d0 [ 3227.732427] ? copy_mount_string+0x40/0x40 [ 3227.732443] ? __might_fault+0x192/0x1d0 [ 3227.732458] ? _copy_from_user+0xd2/0x130 [ 3227.732480] ? copy_mount_options+0x26f/0x380 [ 3227.732497] ksys_mount+0xcf/0x130 [ 3227.732512] __x64_sys_mount+0xba/0x150 [ 3227.732528] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3227.732543] do_syscall_64+0xf9/0x620 [ 3227.732561] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3227.732572] RIP: 0033:0x45cb29 [ 3227.732585] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3227.732593] RSP: 002b:00007fe38a84bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3227.732605] RAX: ffffffffffffffda RBX: 00000000004f7560 RCX: 000000000045cb29 [ 3227.732613] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000000 [ 3227.732621] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3227.732628] R10: 0000000000a51000 R11: 0000000000000246 R12: 0000000000000004 [ 3227.732636] R13: 000000000000077b R14: 00000000004ca735 R15: 00007fe38a84c6d4 [ 3227.935881] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 05:32:38 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c000300000000003f0000000c0004"], 0x30}}, 0x0) 05:32:38 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000050, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:38 executing program 5 (fault-call:3 fault-nth:11): perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:38 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000000)={{0xa, 0x4e24, 0x5, @private1={0xfc, 0x1, [], 0x1}, 0x3}, {0xa, 0x4e22, 0x2, @ipv4={[], [], @local}, 0x1000}, 0x0, [0x0, 0x1, 0xcb38, 0xf9d5, 0x8, 0x2, 0x2, 0x9]}, 0x5c) eventfd(0x5) 05:32:38 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000004, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:38 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000ffffff9e0000000c0004"], 0x30}}, 0x0) [ 3228.363773] FAULT_INJECTION: forcing a failure. [ 3228.363773] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3228.368673] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 3228.375708] CPU: 0 PID: 32194 Comm: syz-executor.5 Not tainted 4.19.131-syzkaller #0 [ 3228.375718] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3228.375722] Call Trace: [ 3228.375748] dump_stack+0x1fc/0x2fe [ 3228.406526] should_fail.cold+0xa/0x14 [ 3228.410419] ? mark_held_locks+0xf0/0xf0 [ 3228.414481] ? setup_fault_attr+0x200/0x200 [ 3228.418800] ? lock_acquire+0x170/0x3c0 [ 3228.422781] ? __perf_event_task_sched_in+0x525/0x9b0 [ 3228.427984] __alloc_pages_nodemask+0x239/0x2890 [ 3228.432747] ? finish_task_switch+0x146/0x780 [ 3228.437253] ? __lock_acquire+0x6de/0x3ff0 [ 3228.441507] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 3228.446363] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3228.451126] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3228.455725] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3228.460493] ? rcu_nmi_exit+0xb3/0x180 05:32:38 executing program 2: inotify_init() r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f0000000000)={[0xfe5, 0x4, 0x800, 0xfffffff9, 0x1ff, 0x5, 0xffff, 0x3, 0x7fff, 0x0, 0x3, 0x1f3, 0x3, 0x8, 0x5, 0x408, 0x0, 0x2, 0x3f, 0x9, 0x800, 0x18000000, 0x7f, 0x6, 0x7, 0x100, 0x80000001, 0x6, 0x7, 0x9ce, 0x9, 0x7, 0xef8, 0x3ff, 0xc92, 0x40, 0x20, 0x8, 0xffffffff, 0x9, 0x3, 0x2, 0x3f, 0x3, 0x1ff, 0x1, 0x4, 0x3ff, 0x8, 0x1, 0x5, 0x5, 0x5, 0x1, 0x6, 0x2, 0x800, 0x5, 0x7, 0x77, 0x8, 0x4, 0x5, 0x8, 0x3, 0x4, 0xc52, 0x4, 0x40, 0x599, 0x5, 0x3, 0x3, 0x2, 0x81, 0x6, 0xd12, 0x10000, 0x9, 0xff, 0xab9, 0x101, 0xfffffff7, 0x20, 0x73, 0x7, 0x80000000, 0x3, 0x3f, 0x6, 0x9, 0x7, 0x6, 0x100, 0x4, 0x6, 0x2, 0x1, 0x8000, 0x800, 0x1, 0x3, 0x7fffffff, 0x51, 0x10000, 0xb8, 0x1, 0xff, 0x7f, 0x7, 0x44, 0x9, 0x2, 0x8000, 0x7, 0x1000, 0x9, 0xfffe0000, 0x1, 0x4, 0x0, 0x1, 0x10001, 0x3ff, 0x80000001, 0x4, 0x352, 0x401, 0x7, 0x1, 0x9, 0x8, 0x0, 0x324, 0x40, 0x5, 0x7ff, 0x3f, 0x21f, 0x3, 0x5, 0x4, 0xa9, 0xffffffff, 0x4, 0x3, 0x5, 0x6, 0x6, 0x7ff, 0x37, 0xe8f0, 0xc, 0x3, 0x7, 0x401, 0x10000, 0x7ff, 0x0, 0x1, 0x1000, 0x2, 0xffffffff, 0x2, 0x4, 0x0, 0x57dc23bb, 0xd3, 0x1cb, 0xffff8000, 0x3, 0x20, 0xfffffffe, 0x401, 0x3, 0x0, 0x4, 0x80000000, 0x3, 0x4c0bf488, 0x9, 0x1, 0x400, 0xffffff1a, 0x3, 0x80000001, 0x2, 0x84, 0x7ff, 0x4, 0x6, 0x7, 0x0, 0x800, 0x30000, 0x100, 0xfff, 0x7, 0x7f, 0x9, 0x401, 0x5, 0x10001, 0x0, 0x400, 0x5, 0x9, 0xe0c, 0x401, 0xe926, 0x80000001, 0x4, 0x1f, 0x1, 0x3, 0x81, 0x2, 0x556f, 0xd84d, 0x5b7, 0x0, 0x4, 0x0, 0x7fffffff, 0x7, 0x4, 0x9, 0x4b4, 0x6, 0xfff, 0x80000000, 0x7ad456de, 0x400, 0x8, 0x0, 0xbd8, 0xca, 0x0, 0x6, 0x2c5, 0x8000, 0x8, 0x200, 0x8, 0x95b, 0x1, 0x20, 0x4, 0x2, 0x100, 0x31, 0x1d, 0xc147, 0x1, 0x6, 0x9, 0x3, 0x8, 0x3, 0x1, 0x9, 0x1, 0x7ff, 0x517, 0x20, 0x8001, 0x2, 0x3, 0x3, 0x6, 0x400, 0x1, 0x59255da8, 0x4, 0x3, 0x10001, 0x8, 0x9, 0x8, 0xffffffff, 0x200, 0x25d, 0x8, 0x9, 0x100, 0x9, 0x5, 0x32e, 0x8001, 0x7, 0x3, 0x3, 0x9, 0x4, 0x200, 0xfff, 0x6, 0xffffbac4, 0x0, 0xffffffff, 0x9, 0x13, 0x800, 0x0, 0xfff, 0x1f, 0x4, 0x8001, 0x8001, 0x6, 0x7, 0xffff, 0x6, 0x1, 0x7, 0x108, 0x2, 0x10000, 0x7f, 0x2, 0x1, 0x6, 0x4, 0x4, 0x3fff80, 0xc3, 0x64, 0x3, 0x0, 0x80000001, 0x401, 0x9, 0x3, 0x80000000, 0x4, 0xfff, 0x10000, 0x3, 0x0, 0x30, 0x7, 0x1000, 0x3, 0x543, 0x1000, 0x800, 0xfffffff7, 0xffffff00, 0x9, 0x9, 0x972c, 0x1ff, 0x19e, 0x6, 0x5, 0x6, 0x0, 0x8, 0x9, 0x1f, 0x5b56, 0x3, 0x4, 0x0, 0x0, 0x3f, 0x3, 0x4, 0x10001, 0x3, 0x6, 0x2, 0x6, 0x20000000, 0x7fff, 0x7, 0x100, 0x7, 0x12, 0x7, 0x1df14340, 0xcca8, 0xa466, 0x40000000, 0x9, 0x56b, 0x806, 0x7f, 0xc4, 0xd455, 0x7, 0xffffffff, 0x7fffffff, 0x1ff, 0x9, 0x1, 0x1028569e, 0x20, 0xfd0, 0x17, 0x0, 0x7348d978, 0x2, 0x101, 0x0, 0x1000, 0x8000, 0x0, 0x8, 0x40, 0x8, 0x3, 0x6, 0x9, 0x0, 0x80000001, 0x1, 0x7, 0x80, 0xffffffff, 0x6, 0x5, 0xfff, 0x7fffffff, 0xffff, 0x7, 0x2, 0x57, 0x1, 0x8000, 0xffff, 0x5b, 0x10001, 0x520, 0x0, 0x2, 0xe168, 0x2, 0xd1e, 0x6ccdc026, 0x1, 0xffff7fff, 0x8, 0x80000001, 0x8, 0x0, 0x5, 0x3, 0x3, 0x9, 0x4, 0x4, 0x0, 0x9, 0x7fffffff, 0xffff, 0x40ad, 0x1, 0x0, 0x6, 0x8, 0x6, 0x8000, 0x4, 0x50080, 0x8, 0x1, 0x3, 0x8, 0xff, 0x8000, 0x37, 0x27da, 0x100, 0x80000000, 0x9, 0x887, 0xc13, 0x2, 0x1ff, 0x81, 0xffffffff, 0x65000000, 0x7, 0x0, 0x9c26, 0xb22, 0x7ff, 0x2, 0x0, 0x80000000, 0x6b7, 0x11e, 0x1, 0x1, 0xa0, 0xffffffff, 0x200, 0x1, 0xfffffffe, 0x9, 0x0, 0x400, 0x7, 0x5dfa, 0x40, 0x1, 0x3366, 0x1, 0x5, 0xfffffffe, 0x200, 0x5, 0xbb, 0x9, 0x7, 0x5, 0x9, 0x6, 0x7, 0xb4, 0x3, 0x7, 0x76, 0xffff, 0x6, 0x8, 0x400, 0x8, 0x6, 0x0, 0x1, 0x74, 0x200, 0x1, 0x1e6, 0x4, 0x5, 0x3, 0x1, 0x6, 0x6, 0x40, 0x80000000, 0x200, 0x7, 0xd033, 0x1, 0x7, 0xfff, 0xff, 0x1, 0x81, 0x8, 0x3, 0x6, 0x1, 0x6, 0x7, 0x4, 0x9, 0x6, 0x0, 0xe44e, 0x10001, 0x10001, 0x3, 0x80000001, 0x1000, 0x9, 0xff, 0x6f6, 0x8, 0x0, 0x5, 0xfffffff7, 0x8f65, 0xa7f1, 0x800, 0x9, 0x4, 0xfffffffd, 0x7, 0xffffffe0, 0x4, 0x2, 0x5, 0x8ae, 0x3, 0x1000, 0xfff, 0x8, 0x1ff, 0x9, 0xcdc, 0x5, 0x6, 0xc5d, 0x5, 0x80, 0x3, 0x5, 0xc97, 0xb5, 0x7, 0x9, 0x9, 0x4, 0x9ce, 0xa751, 0x9, 0x9, 0x0, 0x8, 0x6, 0x100, 0x3, 0x7f, 0x4, 0x401, 0x3, 0x8001, 0x7, 0x1, 0x7, 0x3ff, 0xa7a, 0x9, 0x9, 0xfffffffc, 0x7, 0x502, 0x9, 0x9, 0x800, 0xc29, 0x40, 0x2, 0x400, 0x8, 0x10000, 0x2, 0x7, 0x56, 0x5, 0xffffffff, 0xae88, 0x3, 0x3, 0x400, 0x3, 0x5, 0xff, 0x49b, 0xb9, 0x40, 0x3411bde5, 0x1, 0xfffffffe, 0x29, 0x3, 0x7, 0x80, 0x6, 0xffff7fff, 0x3, 0x80000000, 0x2, 0x8, 0x7ff, 0xe71, 0x1, 0x5ebf, 0x3ff, 0x5, 0x9a, 0x4, 0xecf, 0x7f, 0x1, 0x800, 0x5, 0x81, 0x12000000, 0x800, 0xfffff2a5, 0x3ff, 0x10001, 0x4, 0x0, 0xf9, 0x6, 0x81, 0x1, 0x2, 0xfffffffb, 0x5, 0x0, 0xfffffffb, 0x6eec, 0x0, 0x7, 0x3f, 0x1, 0x0, 0x200, 0x1000, 0x9, 0x200, 0x101, 0x800, 0x800, 0xb124, 0x2, 0x12da, 0xffff, 0x3, 0x1, 0x2, 0xfffffff9, 0xfffff800, 0x3ff, 0x10001, 0xde8, 0x8, 0xff, 0x5, 0xfffff800, 0x9, 0x4, 0xa54, 0xbf, 0x8a3f, 0xfff, 0x5, 0xe9, 0x8001, 0xfffffffc, 0x200, 0xd2b5, 0x8, 0xfffffffc, 0x5, 0xd3cc, 0x1, 0x7, 0x2, 0x81, 0x8001, 0x0, 0x8, 0x3, 0x3, 0x9, 0x7f, 0x1, 0xec62, 0xffff, 0x0, 0x10000, 0x2, 0xec35, 0x5, 0x7f, 0x6b, 0x9, 0x8, 0x8000, 0x9b, 0x6, 0xecf, 0x5, 0x5, 0x1f, 0x97, 0x1, 0x0, 0x1ff, 0x4b7b, 0x5, 0x1f, 0x81, 0x0, 0x8001, 0x42dd, 0x2, 0x6, 0x8, 0x388, 0x101, 0x5, 0x512, 0x200, 0x9, 0x0, 0x100, 0x1, 0x1, 0x3, 0x9, 0x15, 0x9, 0x4f2a, 0xfffffffc, 0x644, 0x1f, 0x9, 0x7fffffff, 0x2, 0x401, 0x400, 0x4800, 0xffff7fff, 0xa070, 0x8, 0x7f, 0x7, 0x8, 0x81, 0x6, 0x1, 0xe1, 0x5, 0x0, 0x5, 0x400, 0xffffffff, 0x0, 0xdf, 0x100, 0x9, 0x8, 0x9, 0x37, 0xd86, 0x1ff, 0x3, 0x8, 0x5, 0x3, 0x72, 0x7, 0x3f, 0x0, 0x0, 0x5, 0x1ff, 0x7fff, 0x2, 0x9d0, 0x800, 0x81, 0x5, 0x1f79, 0x10, 0x0, 0x1, 0x2, 0x9, 0x400, 0x0, 0x7, 0xffffffff, 0x8, 0x0, 0x6, 0x40, 0x1ff, 0x7, 0x7d, 0x401, 0x8, 0x80000000, 0xfffffffe, 0x1, 0xed91, 0x6, 0xffff9c35, 0x2, 0x7, 0x3, 0x1, 0x3, 0x6, 0x7fff, 0xbd8f, 0x80, 0x7, 0x1, 0xaae71554, 0xfffffff9, 0x8, 0x3ff, 0x8, 0x6, 0x7, 0x80000000, 0x1, 0xc841, 0x2, 0x8000, 0x0, 0x6, 0x7fff, 0x7f, 0x7fff, 0x80, 0x9, 0x8, 0x7, 0x1ff, 0x80000000, 0x7, 0x4, 0x98f, 0x8000, 0x10, 0x4, 0x636, 0xffff9135, 0x80000001, 0x12493fd2, 0x7903, 0xffff, 0x3, 0x5, 0x400, 0x72e0, 0x2, 0x7fff, 0x800, 0xffffffff, 0x7ff, 0x7, 0x60a6, 0x4, 0x8, 0x7, 0x2, 0x3, 0xda3, 0x3, 0x9, 0x6, 0x959, 0x6, 0x7, 0x0, 0x1, 0x9, 0x440af8ec, 0xff, 0x401, 0x4cb, 0x10000, 0x20, 0x2, 0x8, 0x800, 0x1, 0x5, 0xa6, 0x7, 0x7, 0x6, 0x2d, 0x800, 0x8, 0x26f7, 0x1, 0xa6, 0x4, 0x3, 0x2, 0x3a85, 0x4, 0x0, 0x3, 0x648, 0x8, 0x8, 0x0, 0x0, 0x1, 0x8, 0xffffb512, 0x4, 0xffffff8b, 0x3ff, 0xaef5, 0xa917, 0x2, 0x5f38, 0x6, 0x2, 0x0, 0x0, 0x8, 0xfffffffb, 0x1, 0x6, 0x3, 0x1000, 0xffffffff, 0x200, 0x0, 0x8, 0x24, 0x4, 0x1, 0x7, 0x101, 0x20, 0x6, 0x6a67, 0x7f, 0x5, 0x0, 0x4, 0x8, 0x72124e65, 0x2, 0x80000001, 0x81]}) 05:32:38 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}, 0x1, 0x2a1ca}, 0x0) [ 3228.464387] ? retint_kernel+0x2d/0x2d [ 3228.468281] cache_grow_begin+0xa4/0x8a0 [ 3228.472347] ? cache_alloc_pfmemalloc+0x1e/0x140 [ 3228.477110] cache_alloc_refill+0x273/0x340 [ 3228.481540] kmem_cache_alloc+0x346/0x370 [ 3228.485693] alloc_vfsmnt+0x23/0x780 [ 3228.489405] clone_mnt+0x6c/0x11b0 [ 3228.492951] ? do_mount+0xe44/0x2f10 [ 3228.496670] do_mount+0x250f/0x2f10 [ 3228.500305] ? lock_downgrade+0x720/0x720 [ 3228.504454] ? lock_acquire+0x1ec/0x3c0 [ 3228.508441] ? copy_mount_string+0x40/0x40 [ 3228.512683] ? __might_fault+0x192/0x1d0 [ 3228.516754] ? _copy_from_user+0xd2/0x130 [ 3228.520912] ? copy_mount_options+0x26f/0x380 [ 3228.525414] ksys_mount+0xcf/0x130 [ 3228.528967] __x64_sys_mount+0xba/0x150 [ 3228.532958] ? do_syscall_64+0x56/0x620 [ 3228.536941] do_syscall_64+0xf9/0x620 [ 3228.540761] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3228.545951] RIP: 0033:0x45cb29 [ 3228.549153] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3228.553488] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 3228.568050] RSP: 002b:00007fe38a84bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3228.568064] RAX: ffffffffffffffda RBX: 00000000004f7560 RCX: 000000000045cb29 [ 3228.568073] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000000 [ 3228.568082] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3228.568091] R10: 0000000000a51000 R11: 0000000000000246 R12: 0000000000000004 05:32:38 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000052, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:38 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000006, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:38 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000fffffff00000000c0004"], 0x30}}, 0x0) [ 3228.568099] R13: 000000000000077b R14: 00000000004ca735 R15: 00007fe38a84c6d4 05:32:38 executing program 5 (fault-call:3 fault-nth:12): perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:38 executing program 2: inotify_init() creat(&(0x7f0000000000)='./file0\x00', 0xa8) 05:32:38 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000054, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:38 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000008, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3228.763390] FAULT_INJECTION: forcing a failure. [ 3228.763390] name failslab, interval 1, probability 0, space 0, times 0 [ 3228.799620] CPU: 1 PID: 32231 Comm: syz-executor.5 Not tainted 4.19.131-syzkaller #0 [ 3228.807520] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3228.816969] Call Trace: [ 3228.819568] dump_stack+0x1fc/0x2fe [ 3228.823214] should_fail.cold+0xa/0x14 [ 3228.827111] ? setup_fault_attr+0x200/0x200 [ 3228.831444] ? lock_acquire+0x170/0x3c0 [ 3228.835429] __should_failslab+0x115/0x180 [ 3228.839672] should_failslab+0x5/0xf [ 3228.843396] kmem_cache_alloc_trace+0x284/0x380 [ 3228.848073] get_mountpoint+0x140/0x3c0 [ 3228.852054] attach_recursive_mnt+0xc9/0xd80 [ 3228.856468] ? count_mounts+0x210/0x210 05:32:38 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000064, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3228.860450] ? clone_mnt+0x701/0x11b0 [ 3228.864270] graft_tree+0x187/0x210 [ 3228.867900] do_mount+0x217b/0x2f10 [ 3228.871536] ? lock_downgrade+0x720/0x720 [ 3228.875698] ? lock_acquire+0x170/0x3c0 [ 3228.879683] ? __might_fault+0xef/0x1d0 [ 3228.883683] ? copy_mount_string+0x40/0x40 [ 3228.887927] ? __might_fault+0x192/0x1d0 [ 3228.891993] ? _copy_from_user+0xd2/0x130 [ 3228.896149] ? copy_mount_options+0x26f/0x380 [ 3228.900654] ksys_mount+0xcf/0x130 [ 3228.904206] __x64_sys_mount+0xba/0x150 [ 3228.908186] ? lockdep_hardirqs_on+0x3a8/0x5c0 05:32:38 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x200000de, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3228.912776] do_syscall_64+0xf9/0x620 [ 3228.916591] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3228.921784] RIP: 0033:0x45cb29 [ 3228.924982] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3228.943880] RSP: 002b:00007fe38a84bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3228.951586] RAX: ffffffffffffffda RBX: 00000000004f7560 RCX: 000000000045cb29 05:32:38 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x2000000a, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:38 executing program 2: inotify_init() r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x9, 0x200842) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000080)='/dev/input/mice\x00', 0x0) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f00000000c0)=""/129) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'ip6erspan0\x00', 0x20}) [ 3228.958856] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000000 [ 3228.966126] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3228.973395] R10: 0000000000a51000 R11: 0000000000000246 R12: 0000000000000004 [ 3228.980671] R13: 000000000000077b R14: 00000000004ca735 R15: 00007fe38a84c6d4 05:32:39 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}, 0x1, 0x2a1cb}, 0x0) 05:32:39 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x200000f0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:39 executing program 5 (fault-call:3 fault-nth:13): perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:39 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x2000000c, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:39 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c0003000000f0ffff0000000c0004"], 0x30}}, 0x0) 05:32:39 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x10200, 0x0) read$dsp(r0, &(0x7f0000000040)=""/186, 0xba) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000000)=0x3) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) setsockopt$TIPC_MCAST_REPLICAST(r1, 0x10f, 0x86) inotify_init() [ 3229.286220] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 3229.351654] FAULT_INJECTION: forcing a failure. [ 3229.351654] name failslab, interval 1, probability 0, space 0, times 0 [ 3229.381493] CPU: 0 PID: 32314 Comm: syz-executor.5 Not tainted 4.19.131-syzkaller #0 [ 3229.389390] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3229.398741] Call Trace: [ 3229.401373] dump_stack+0x1fc/0x2fe [ 3229.405012] should_fail.cold+0xa/0x14 [ 3229.408910] ? setup_fault_attr+0x200/0x200 [ 3229.413239] ? lock_acquire+0x170/0x3c0 [ 3229.417211] __should_failslab+0x115/0x180 [ 3229.421447] should_failslab+0x5/0xf [ 3229.425248] __kmalloc_track_caller+0x2a6/0x3c0 [ 3229.429917] ? kstrdup_const+0x53/0x80 [ 3229.433816] kstrdup+0x36/0x70 [ 3229.437016] kstrdup_const+0x53/0x80 [ 3229.440736] alloc_vfsmnt+0xb5/0x780 [ 3229.444459] clone_mnt+0x6c/0x11b0 [ 3229.448005] ? getname_kernel+0x21e/0x370 05:32:39 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000027, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3229.452162] do_mount+0x250f/0x2f10 [ 3229.455796] ? rcu_nmi_exit+0xb3/0x180 [ 3229.459691] ? copy_mount_string+0x40/0x40 [ 3229.463935] ? copy_mount_options+0x16/0x380 [ 3229.468350] ? copy_mount_options+0x26f/0x380 [ 3229.472851] ksys_mount+0xcf/0x130 [ 3229.476395] __x64_sys_mount+0xba/0x150 [ 3229.480377] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3229.484963] do_syscall_64+0xf9/0x620 [ 3229.488776] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3229.493963] RIP: 0033:0x45cb29 [ 3229.497156] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3229.516059] RSP: 002b:00007fe38a84bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3229.523768] RAX: ffffffffffffffda RBX: 00000000004f7560 RCX: 000000000045cb29 [ 3229.529439] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 3229.531031] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000000 05:32:39 executing program 2: sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x5020200}, 0xc, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3400000001060104000000000000000001000700010007000000000000000000000000000000013d741eba61d3674c917fed56a71ef656c88ea1d596b2ddb395eb0cba5adeb16ea4e1a18c1803ba7f5926f742cdda064bb22da09322b383a9ea612fc49a71f72839daec97e4a0a901c0b0120190e17e00e7180ce19c11507d961785c6db899853e0820a8b805c8a93ff1e6a9697391df150aae9fe9063813f070a6f7c5c21b60ede6e012c4dfa2cef777c77e5e63adc1502f8fc0b46aa380cbac75df81091115b3b2d6006c151ea4de10852df8d41c3a05d5bc8fa14533c9c72af3ac2a432bc5373eb773b1a23e37ff907612e25eef1674ab002d59267cc958a16b5f1c65e3f521b10d1dc147cac3ca45a02bd7751b055e9d39946a69c868f5c3f0bc50e6d7c88fbd23f270ecc8f443e67c3747a89980adfaae3f4d62619ebe51671a8754011105f1aa02b57c3d9e22431f01cfce0142f1359bb26a8d540dd4f39095fb03a95af968abbd0058f3330429d2ef9d8ebd4da6e7f8f3156fa67"], 0x34}, 0x1, 0x0, 0x0, 0x8000}, 0x816) inotify_init() r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) setsockopt$packet_buf(r0, 0x107, 0x16, &(0x7f0000000040)="e15b60e996957554835eda2f9b91b6dc", 0x10) 05:32:39 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x200003aa, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:39 executing program 5 (fault-call:3 fault-nth:14): perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3229.531040] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3229.531049] R10: 0000000000a51000 R11: 0000000000000246 R12: 0000000000000004 [ 3229.531058] R13: 000000000000077b R14: 00000000004ca735 R15: 00007fe38a84c6d4 05:32:39 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x2000004f, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3229.679501] FAULT_INJECTION: forcing a failure. [ 3229.679501] name failslab, interval 1, probability 0, space 0, times 0 [ 3229.710562] CPU: 0 PID: 32339 Comm: syz-executor.5 Not tainted 4.19.131-syzkaller #0 [ 3229.718459] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3229.727806] Call Trace: [ 3229.730398] dump_stack+0x1fc/0x2fe [ 3229.734060] should_fail.cold+0xa/0x14 [ 3229.737957] ? setup_fault_attr+0x200/0x200 [ 3229.742302] __should_failslab+0x115/0x180 [ 3229.746548] should_failslab+0x5/0xf [ 3229.750269] kmem_cache_alloc_trace+0x284/0x380 [ 3229.754949] get_mountpoint+0x140/0x3c0 [ 3229.758936] attach_recursive_mnt+0xc9/0xd80 [ 3229.763347] ? count_mounts+0x210/0x210 [ 3229.767326] ? clone_mnt+0x701/0x11b0 [ 3229.771130] graft_tree+0x187/0x210 [ 3229.774764] do_mount+0x217b/0x2f10 [ 3229.778400] ? lock_downgrade+0x720/0x720 [ 3229.782556] ? lock_acquire+0x170/0x3c0 [ 3229.786539] ? __might_fault+0xef/0x1d0 [ 3229.790518] ? copy_mount_string+0x40/0x40 [ 3229.794761] ? __might_fault+0x192/0x1d0 [ 3229.798830] ? _copy_from_user+0xd2/0x130 [ 3229.802985] ? copy_mount_options+0x26f/0x380 [ 3229.807487] ksys_mount+0xcf/0x130 [ 3229.811047] __x64_sys_mount+0xba/0x150 [ 3229.815024] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3229.819625] do_syscall_64+0xf9/0x620 [ 3229.823441] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3229.828637] RIP: 0033:0x45cb29 [ 3229.831858] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3229.850758] RSP: 002b:00007fe38a84bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3229.858467] RAX: ffffffffffffffda RBX: 00000000004f7560 RCX: 000000000045cb29 [ 3229.865736] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000000 [ 3229.873003] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 05:32:39 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$RDMA_NLDEV_CMD_DELLINK(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x18, 0x1404, 0x10, 0x70bd29, 0x25dfdbff, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}]}, 0x18}, 0x1, 0x0, 0x0, 0x880}, 0x40080) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000080)={0x0, @aes128}) inotify_init() openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x100, 0x0) ioctl$TIOCL_UNBLANKSCREEN(0xffffffffffffffff, 0x541c, &(0x7f0000000000)) [ 3229.880272] R10: 0000000000a51000 R11: 0000000000000246 R12: 0000000000000004 [ 3229.887540] R13: 000000000000077b R14: 00000000004ca735 R15: 00007fe38a84c6d4 05:32:39 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}, 0x1, 0x2a1cc}, 0x0) 05:32:39 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x200003ac, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:39 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000064, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:39 executing program 5 (fault-call:3 fault-nth:15): perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:39 executing program 2: inotify_init() r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000080)={0x0, 0x100, 0x1ff, 0x40, 0x6, 0x7, 0x7}, 0xc) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000040)=r0, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'ipvlan1\x00'}) 05:32:39 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c000300007fffffff0000000c0004"], 0x30}}, 0x0) [ 3230.151345] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 05:32:40 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x200000f0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3230.219049] FAULT_INJECTION: forcing a failure. [ 3230.219049] name failslab, interval 1, probability 0, space 0, times 0 05:32:40 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c000300009effffff0000000c0004"], 0x30}}, 0x0) 05:32:40 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r1, &(0x7f0000000180)=""/186, 0xba) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x80002, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/meminfo\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r5, &(0x7f0000000180)=""/186, 0xba) r6 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r6, &(0x7f0000000180)=""/186, 0xba) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r7, &(0x7f0000000180)=""/186, 0xba) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r8, &(0x7f0000000180)=""/186, 0xba) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000005c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8bec0aadf5156441}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x9c, 0x0, 0x8, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x26}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x2}, @NBD_ATTR_SOCKETS={0x3c, 0x7, 0x0, 0x1, [{0x8, 0x1, r2}, {0x8, 0x1, r3}, {0x8, 0x1, r0}, {0x8, 0x1, r4}, {0x8, 0x1, r5}, {0x8, 0x1, r0}, {0x8, 0x1, r6}]}, @NBD_ATTR_SOCKETS={0x14, 0x7, 0x0, 0x1, [{0x8, 0x1, r7}, {0x8, 0x1, r8}]}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x7}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x100}]}, 0x9c}, 0x1, 0x0, 0x0, 0x1}, 0x90) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000000)=0x1f, 0x4) [ 3230.281472] CPU: 0 PID: 32417 Comm: syz-executor.5 Not tainted 4.19.131-syzkaller #0 [ 3230.289389] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3230.298743] Call Trace: [ 3230.301341] dump_stack+0x1fc/0x2fe [ 3230.304983] should_fail.cold+0xa/0x14 [ 3230.308883] ? setup_fault_attr+0x200/0x200 [ 3230.313222] ? lock_acquire+0x170/0x3c0 [ 3230.317206] __should_failslab+0x115/0x180 [ 3230.321449] should_failslab+0x5/0xf [ 3230.325168] kmem_cache_alloc+0x277/0x370 [ 3230.329320] alloc_vfsmnt+0x23/0x780 [ 3230.333155] clone_mnt+0x6c/0x11b0 [ 3230.333172] ? rcu_nmi_exit+0xb3/0x180 [ 3230.340614] copy_tree+0x100/0xaf0 [ 3230.344182] ? propagate_one.part.0+0x93/0x710 [ 3230.348801] propagate_one.part.0+0x3a8/0x710 [ 3230.348821] propagate_mnt+0x201/0x530 [ 3230.348835] ? invent_group_ids+0x152/0x210 [ 3230.348853] attach_recursive_mnt+0x697/0xd80 [ 3230.348869] ? count_mounts+0x210/0x210 [ 3230.348886] ? clone_mnt+0x701/0x11b0 [ 3230.348902] graft_tree+0x187/0x210 [ 3230.348917] do_mount+0x217b/0x2f10 [ 3230.348935] ? lock_downgrade+0x720/0x720 [ 3230.348948] ? lock_acquire+0x170/0x3c0 [ 3230.348962] ? __might_fault+0xef/0x1d0 [ 3230.348977] ? copy_mount_string+0x40/0x40 [ 3230.348994] ? __might_fault+0x192/0x1d0 [ 3230.349010] ? _copy_from_user+0xd2/0x130 [ 3230.349027] ? copy_mount_options+0x26f/0x380 [ 3230.349043] ksys_mount+0xcf/0x130 [ 3230.349066] __x64_sys_mount+0xba/0x150 [ 3230.349081] ? do_syscall_64+0x56/0x620 [ 3230.349098] do_syscall_64+0xf9/0x620 [ 3230.425495] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3230.425511] RIP: 0033:0x45cb29 [ 3230.433885] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3230.433897] RSP: 002b:00007fe38a84bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3230.460515] RAX: ffffffffffffffda RBX: 00000000004f7560 RCX: 000000000045cb29 [ 3230.460528] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000000 [ 3230.475045] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 05:32:40 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x200003ae, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3230.482314] R10: 0000000000a51000 R11: 0000000000000246 R12: 0000000000000004 [ 3230.489611] R13: 000000000000077b R14: 00000000004ca735 R15: 00007fe38a84c6d4 05:32:40 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000600, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:40 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x200003f8, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3230.717804] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 05:32:40 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}, 0x1, 0x2a1cd}, 0x0) 05:32:40 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000f0ffffff0000000c0004"], 0x30}}, 0x0) 05:32:40 executing program 2: syz_mount_image$ceph(&(0x7f0000000000)='ceph\x00', &(0x7f0000000040)='./file0\x00', 0x2, 0x5, &(0x7f0000001300)=[{&(0x7f0000000080)="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", 0x1000, 0x8000}, {&(0x7f0000001080)="94c3bcb71aa6faf9515786d046431345445136da6a1e52b04961d3a8e7ba7c65980d7431d5c0711b6ab2c6b109d0d75904c1fe1218fd27d8bd2774fc6322bf4c03b60234d7aee824bcb64fc0ec9215a142667d9e4bf4177cf06024107451203e581ee167caee7889d2194ec6ca3f56773b1dcc32db8c4b5f683afba37bc9bee2944ee04116704b98c9a97fce43ade2ab9fea32370c9e7111036834ae1553285a01d5c2e8dc71014b4d11f0e649cb90e335521047db24b08744c0ea21d939c2a9f5a396700a89d22b746cf696fc722e6300fb9a79e75771582ecaffb5363d88a304b0181cdef6313027dff98deceda02ce9e91cd819c4bc2766", 0xf9, 0x6}, {&(0x7f0000001180)="898b473b6fc414bb33149d2cfedb1b391c845155b0cbf66f27bdff00d3aba7d87f9b5e1c470905b7b5c88caba7c07a5b273cebd9c15035bf84c7b85e408dfeb4d7e42a1b1623df3265947872debc6d3c1df5b3ed9f7f3acc9107cdf5a2107d980fe457db0fe8909df0721550346f8c09493410fd0591986d0be25cdf28668ff5930c13730798d098edbd9f7862055609375890fe22084ba63bb21613d62bd937caf8b4e75ba460f6faf838d2e465e2079d0ecb4d99d0cee4ff7bb5ee6990ed772989a0caaf0a9a4dd7143f944d500c6bda", 0xd1, 0x1f}, {&(0x7f0000001280)="5bd840e95058cbc287b7af6e1695f1232c430637f74492574b8d1ee495ae31302e9192ddb8f287dd61521c7d7216005d44a5258b44880a2c061efb59d3d4ab", 0x3f, 0x2}, {&(0x7f00000012c0)="f672be195b1af21212d4b3cd2ca19bd7f8f0", 0x12, 0x1}], 0x1000064, &(0x7f0000001380)='\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_GET_STATION(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x14, r1, 0x400, 0x0, 0x0, {0x32}}, 0x14}, 0x1, 0x0, 0x0, 0x404c040}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r4, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800070006"], 0x3c}}, 0x0) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r5, &(0x7f0000000180)=""/186, 0xba) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0xa, 0x0, 0x0, r8}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000001400)={'vlan0\x00', r8}) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_SET_MPATH(0xffffffffffffffff, &(0x7f0000001500)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x78, r1, 0x400, 0x70bd28, 0x25dfdbff, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x0, 0x2}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r4}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r9}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @multicast}, @NL80211_ATTR_WDEV={0xc, 0x99, {0xfff, 0x1}}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @dev={[], 0x3b}}, @NL80211_ATTR_IFINDEX={0x8}]}, 0x78}}, 0x48000) inotify_init() 05:32:40 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000a00, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:40 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x200003fa, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:40 executing program 5 (fault-call:3 fault-nth:16): perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3230.914010] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 3230.968726] FAULT_INJECTION: forcing a failure. [ 3230.968726] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3230.980560] CPU: 0 PID: 32507 Comm: syz-executor.5 Not tainted 4.19.131-syzkaller #0 [ 3230.987689] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 3230.988437] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3230.988442] Call Trace: [ 3230.988465] dump_stack+0x1fc/0x2fe [ 3230.988488] should_fail.cold+0xa/0x14 [ 3230.988508] ? setup_fault_attr+0x200/0x200 [ 3230.988528] ? mark_held_locks+0xa6/0xf0 [ 3230.988555] __alloc_pages_nodemask+0x239/0x2890 [ 3230.988570] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3230.988594] ? __lock_acquire+0x6de/0x3ff0 [ 3230.988617] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 3230.988634] ? is_bpf_text_address+0xfc/0x1b0 [ 3230.988651] ? __kernel_text_address+0x9/0x30 [ 3230.988665] ? unwind_get_return_address+0x51/0x90 [ 3230.988680] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3230.988691] ? __save_stack_trace+0xaf/0x190 [ 3230.988718] cache_grow_begin+0xa4/0x8a0 [ 3231.070242] ? setup_fault_attr+0x200/0x200 [ 3231.074574] ? cache_alloc_pfmemalloc+0x1e/0x140 [ 3231.079343] cache_alloc_refill+0x273/0x340 [ 3231.083676] kmem_cache_alloc+0x346/0x370 [ 3231.087934] alloc_vfsmnt+0x23/0x780 [ 3231.091652] clone_mnt+0x6c/0x11b0 [ 3231.095196] ? is_subdir+0x246/0x410 [ 3231.098917] copy_tree+0x100/0xaf0 [ 3231.102479] ? lock_acquire+0x1ec/0x3c0 [ 3231.102504] propagate_one.part.0+0x3a8/0x710 [ 3231.102522] propagate_mnt+0x201/0x530 [ 3231.102535] ? invent_group_ids+0x152/0x210 [ 3231.102551] attach_recursive_mnt+0x697/0xd80 [ 3231.102567] ? count_mounts+0x210/0x210 [ 3231.127757] ? clone_mnt+0x701/0x11b0 [ 3231.127778] graft_tree+0x187/0x210 [ 3231.135186] do_mount+0x217b/0x2f10 [ 3231.135205] ? lock_downgrade+0x720/0x720 [ 3231.142946] ? lock_acquire+0x1ec/0x3c0 [ 3231.146925] ? copy_mount_string+0x40/0x40 [ 3231.151168] ? __might_fault+0x192/0x1d0 [ 3231.155232] ? _copy_from_user+0xd2/0x130 [ 3231.159385] ? copy_mount_options+0x26f/0x380 [ 3231.163887] ksys_mount+0xcf/0x130 [ 3231.167427] __x64_sys_mount+0xba/0x150 [ 3231.171402] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3231.175989] do_syscall_64+0xf9/0x620 [ 3231.179799] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3231.184991] RIP: 0033:0x45cb29 [ 3231.188187] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3231.207085] RSP: 002b:00007fe38a84bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 05:32:41 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x200003fc, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:41 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000c00, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3231.214790] RAX: ffffffffffffffda RBX: 00000000004f7560 RCX: 000000000045cb29 [ 3231.222048] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000000 [ 3231.229304] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3231.236561] R10: 0000000000a51000 R11: 0000000000000246 R12: 0000000000000004 [ 3231.243804] R13: 000000000000077b R14: 00000000004ca735 R15: 00007fe38a84c6d4 05:32:41 executing program 5 (fault-call:3 fault-nth:17): perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:41 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x200003fe, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:41 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000600, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3231.455285] FAULT_INJECTION: forcing a failure. [ 3231.455285] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3231.467122] CPU: 1 PID: 32605 Comm: syz-executor.5 Not tainted 4.19.131-syzkaller #0 [ 3231.475001] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3231.484352] Call Trace: [ 3231.486960] dump_stack+0x1fc/0x2fe [ 3231.490610] should_fail.cold+0xa/0x14 [ 3231.494506] ? check_preemption_disabled+0x41/0x280 [ 3231.499528] ? setup_fault_attr+0x200/0x200 [ 3231.503861] __alloc_pages_nodemask+0x239/0x2890 [ 3231.508639] ? __lock_acquire+0x6de/0x3ff0 [ 3231.512891] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 3231.517737] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 3231.522580] ? is_bpf_text_address+0xfc/0x1b0 [ 3231.527075] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3231.532438] ? __save_stack_trace+0xaf/0x190 [ 3231.536829] ? unwind_get_return_address+0x51/0x90 [ 3231.541748] ? ____cache_alloc_node+0x156/0x1d0 [ 3231.546401] cache_grow_begin+0xa4/0x8a0 [ 3231.550444] ? check_preemption_disabled+0x41/0x280 [ 3231.555488] ____cache_alloc_node+0x170/0x1d0 [ 3231.559997] ? check_preemption_disabled+0x41/0x280 [ 3231.565069] kmem_cache_alloc+0x1e4/0x370 [ 3231.569221] alloc_vfsmnt+0x23/0x780 [ 3231.572938] clone_mnt+0x6c/0x11b0 [ 3231.576480] ? is_subdir+0x246/0x410 [ 3231.580199] copy_tree+0x100/0xaf0 [ 3231.583743] ? lock_acquire+0x170/0x3c0 [ 3231.587717] ? is_subdir+0x164/0x410 [ 3231.591441] propagate_one.part.0+0x3a8/0x710 [ 3231.595964] propagate_mnt+0x201/0x530 [ 3231.599853] ? invent_group_ids+0x152/0x210 [ 3231.604178] attach_recursive_mnt+0x697/0xd80 [ 3231.608677] ? count_mounts+0x210/0x210 [ 3231.612652] ? clone_mnt+0x701/0x11b0 [ 3231.616454] graft_tree+0x187/0x210 [ 3231.620089] do_mount+0x217b/0x2f10 [ 3231.623747] ? lock_downgrade+0x720/0x720 [ 3231.627903] ? lock_acquire+0x170/0x3c0 [ 3231.631882] ? __might_fault+0xef/0x1d0 [ 3231.635862] ? copy_mount_string+0x40/0x40 [ 3231.640106] ? __might_fault+0x192/0x1d0 [ 3231.644179] ? _copy_from_user+0xd2/0x130 [ 3231.648332] ? copy_mount_options+0x26f/0x380 [ 3231.652835] ksys_mount+0xcf/0x130 05:32:41 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20002700, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3231.656391] __x64_sys_mount+0xba/0x150 [ 3231.660374] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3231.664959] do_syscall_64+0xf9/0x620 [ 3231.668771] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3231.673956] RIP: 0033:0x45cb29 [ 3231.677153] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3231.696062] RSP: 002b:00007fe38a84bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3231.703773] RAX: ffffffffffffffda RBX: 00000000004f7560 RCX: 000000000045cb29 [ 3231.711052] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000000 [ 3231.718321] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3231.725592] R10: 0000000000a51000 R11: 0000000000000246 R12: 0000000000000004 [ 3231.732860] R13: 000000000000077b R14: 00000000004ca735 R15: 00007fe38a84c6d4 05:32:41 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}, 0x1, 0x2a1ce}, 0x0) 05:32:41 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000a00, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3231.772927] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 05:32:41 executing program 2: inotify_init() r0 = socket$xdp(0x2c, 0x3, 0x0) recvmmsg(r0, &(0x7f0000004c80)=[{{&(0x7f0000000000)=@phonet, 0x80, &(0x7f0000001080)=[{&(0x7f0000000080)=""/4096, 0x1000}], 0x1, &(0x7f00000010c0)=""/104, 0x68}, 0x7}, {{0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000001140)=""/55, 0x37}, {&(0x7f0000001180)=""/158, 0x9e}, {&(0x7f0000001240)=""/205, 0xcd}, {&(0x7f0000001340)=""/12, 0xc}, {&(0x7f0000001380)=""/116, 0x74}], 0x5, &(0x7f0000001480)=""/48, 0x30}, 0x800}, {{&(0x7f00000014c0)=@in6={0xa, 0x0, 0x0, @local}, 0x80, &(0x7f0000002880)=[{&(0x7f0000001540)=""/62, 0x3e}, {&(0x7f0000001580)=""/104, 0x68}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/129, 0x81}, {&(0x7f00000026c0)=""/195, 0xc3}, {&(0x7f00000027c0)=""/162, 0xa2}], 0x6}, 0x9}, {{&(0x7f0000002900)=@pppoe={0x18, 0x0, {0x0, @broadcast}}, 0x80, &(0x7f0000004bc0)=[{&(0x7f0000002980)=""/4096, 0x1000}, {&(0x7f0000003980)=""/238, 0xee}, {&(0x7f0000003a80)=""/53, 0x35}, {&(0x7f0000003ac0)=""/62, 0x3e}, {&(0x7f0000003b00)=""/61, 0x3d}, {&(0x7f0000003b40)=""/34, 0x22}, {&(0x7f0000003b80)=""/37, 0x25}, {&(0x7f0000003bc0)=""/4096, 0x1000}], 0x8, &(0x7f0000004c40)=""/30, 0x1e}, 0xf25e}], 0x4, 0x0, &(0x7f0000004d80)={0x77359400}) 05:32:41 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20003f00, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:41 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000000000000000000f0004"], 0x30}}, 0x0) 05:32:41 executing program 5 (fault-call:3 fault-nth:18): perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:41 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000c00, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:41 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20004000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:41 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20002700, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3232.039901] FAULT_INJECTION: forcing a failure. [ 3232.039901] name failslab, interval 1, probability 0, space 0, times 0 [ 3232.102922] CPU: 0 PID: 32695 Comm: syz-executor.5 Not tainted 4.19.131-syzkaller #0 [ 3232.110951] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3232.120304] Call Trace: [ 3232.122906] dump_stack+0x1fc/0x2fe [ 3232.126547] should_fail.cold+0xa/0x14 [ 3232.130457] ? setup_fault_attr+0x200/0x200 [ 3232.134785] ? lock_is_held_type+0x17a/0x210 [ 3232.139198] __should_failslab+0x115/0x180 [ 3232.143451] should_failslab+0x5/0xf [ 3232.147181] __kmalloc_track_caller+0x2a6/0x3c0 [ 3232.151857] ? kstrdup_const+0x53/0x80 [ 3232.155747] kstrdup+0x36/0x70 [ 3232.158940] kstrdup_const+0x53/0x80 [ 3232.162650] alloc_vfsmnt+0xb5/0x780 [ 3232.166366] clone_mnt+0x6c/0x11b0 [ 3232.169905] ? is_subdir+0x246/0x410 [ 3232.173624] copy_tree+0x100/0xaf0 [ 3232.177165] ? lock_acquire+0x170/0x3c0 [ 3232.181137] ? is_subdir+0x164/0x410 [ 3232.184862] propagate_one.part.0+0x3a8/0x710 [ 3232.189366] propagate_mnt+0x201/0x530 [ 3232.193265] ? invent_group_ids+0x152/0x210 [ 3232.197594] attach_recursive_mnt+0x697/0xd80 [ 3232.202096] ? count_mounts+0x210/0x210 [ 3232.206072] ? clone_mnt+0x701/0x11b0 [ 3232.209876] graft_tree+0x187/0x210 [ 3232.213505] do_mount+0x217b/0x2f10 [ 3232.217143] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3232.221734] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3232.226498] ? copy_mount_string+0x40/0x40 [ 3232.230737] ? rcu_nmi_exit+0xb3/0x180 [ 3232.234642] ? copy_mount_options+0x26f/0x380 [ 3232.239144] ksys_mount+0xcf/0x130 [ 3232.242694] __x64_sys_mount+0xba/0x150 [ 3232.246678] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3232.251270] do_syscall_64+0xf9/0x620 [ 3232.255081] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3232.260270] RIP: 0033:0x45cb29 [ 3232.263458] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3232.282358] RSP: 002b:00007fe38a84bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3232.290067] RAX: ffffffffffffffda RBX: 00000000004f7560 RCX: 000000000045cb29 05:32:41 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20003f00, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:42 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20004000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:42 executing program 2: inotify_init() r0 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x80000, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000080)={0xc, 0x8, 0xfa00, {&(0x7f0000000240)}}, 0x10) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r1, &(0x7f0000000180)=""/186, 0xba) ioctl$DRM_IOCTL_AGP_BIND(r1, 0x40106436, &(0x7f0000000000)={0x0, 0x3}) [ 3232.297331] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000000 [ 3232.304598] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3232.311868] R10: 0000000000a51000 R11: 0000000000000246 R12: 0000000000000004 [ 3232.319143] R13: 000000000000077b R14: 00000000004ca735 R15: 00007fe38a84c6d4 [ 3232.454848] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 05:32:42 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}, 0x1, 0x2a1cf}, 0x0) 05:32:42 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20004f00, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:42 executing program 5 (fault-call:3 fault-nth:19): perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:42 executing program 2: inotify_init() r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) ioctl$TIOCGICOUNT(r0, 0x545d, 0x0) 05:32:42 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20004f00, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:42 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c0003000000000000000000150004"], 0x30}}, 0x0) [ 3232.575218] FAULT_INJECTION: forcing a failure. [ 3232.575218] name failslab, interval 1, probability 0, space 0, times 0 [ 3232.575933] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3232.592397] CPU: 1 PID: 32750 Comm: syz-executor.5 Not tainted 4.19.131-syzkaller #0 [ 3232.603154] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 05:32:42 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c0003000000000000000000180004"], 0x30}}, 0x0) [ 3232.603160] Call Trace: 05:32:42 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20005000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3232.603185] dump_stack+0x1fc/0x2fe [ 3232.603208] should_fail.cold+0xa/0x14 05:32:42 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000000200000000000c0004"], 0x30}}, 0x0) 05:32:42 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20006400, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3232.603227] ? setup_fault_attr+0x200/0x200 05:32:42 executing program 5 (fault-call:3 fault-nth:20): perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:42 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20005200, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3232.603243] ? lock_acquire+0x170/0x3c0 [ 3232.603265] __should_failslab+0x115/0x180 [ 3232.603282] should_failslab+0x5/0xf [ 3232.603296] kmem_cache_alloc+0x277/0x370 [ 3232.603311] alloc_vfsmnt+0x23/0x780 [ 3232.603326] clone_mnt+0x6c/0x11b0 [ 3232.603340] ? is_subdir+0x246/0x410 [ 3232.603357] copy_tree+0x100/0xaf0 [ 3232.603370] ? lock_acquire+0x170/0x3c0 [ 3232.603382] ? is_subdir+0x164/0x410 [ 3232.603404] propagate_one.part.0+0x3a8/0x710 [ 3232.603422] propagate_mnt+0x201/0x530 [ 3232.603434] ? invent_group_ids+0x152/0x210 [ 3232.603451] attach_recursive_mnt+0x697/0xd80 [ 3232.603466] ? count_mounts+0x210/0x210 [ 3232.603500] ? clone_mnt+0x701/0x11b0 [ 3232.603516] graft_tree+0x187/0x210 [ 3232.603531] do_mount+0x217b/0x2f10 [ 3232.603550] ? lock_downgrade+0x720/0x720 [ 3232.603564] ? lock_acquire+0x170/0x3c0 [ 3232.603577] ? __might_fault+0xef/0x1d0 [ 3232.603592] ? copy_mount_string+0x40/0x40 [ 3232.603609] ? __might_fault+0x192/0x1d0 [ 3232.603625] ? _copy_from_user+0xd2/0x130 [ 3232.603642] ? copy_mount_options+0x26f/0x380 [ 3232.603658] ksys_mount+0xcf/0x130 [ 3232.603674] __x64_sys_mount+0xba/0x150 [ 3232.603690] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3232.603705] do_syscall_64+0xf9/0x620 [ 3232.603724] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3232.603735] RIP: 0033:0x45cb29 [ 3232.603750] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3232.603758] RSP: 002b:00007fe38a84bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3232.603772] RAX: ffffffffffffffda RBX: 00000000004f7560 RCX: 000000000045cb29 [ 3232.603781] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000000 [ 3232.603790] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3232.603798] R10: 0000000000a51000 R11: 0000000000000246 R12: 0000000000000004 [ 3232.603807] R13: 000000000000077b R14: 00000000004ca735 R15: 00007fe38a84c6d4 [ 3232.666453] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3232.845161] FAULT_INJECTION: forcing a failure. [ 3232.845161] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3232.845179] CPU: 1 PID: 309 Comm: syz-executor.5 Not tainted 4.19.131-syzkaller #0 [ 3232.845187] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3232.845192] Call Trace: [ 3232.845213] dump_stack+0x1fc/0x2fe [ 3232.845234] should_fail.cold+0xa/0x14 [ 3232.845249] ? kernel_text_address+0xbd/0xf0 [ 3232.845266] ? setup_fault_attr+0x200/0x200 [ 3232.845281] ? unwind_get_return_address+0x51/0x90 [ 3232.845298] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3232.845311] ? __save_stack_trace+0xaf/0x190 [ 3232.845330] __alloc_pages_nodemask+0x239/0x2890 [ 3232.845347] ? __lock_acquire+0x6de/0x3ff0 [ 3232.845372] ? __lock_acquire+0x6de/0x3ff0 [ 3232.845393] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 3232.845415] ? __lock_acquire+0x6de/0x3ff0 [ 3232.845435] ? lock_downgrade+0x720/0x720 [ 3232.845456] ? __lock_acquire+0x6de/0x3ff0 [ 3232.845480] cache_grow_begin+0xa4/0x8a0 [ 3232.845496] ? setup_fault_attr+0x200/0x200 [ 3232.845510] ? cache_alloc_pfmemalloc+0x1e/0x140 [ 3232.845527] cache_alloc_refill+0x273/0x340 [ 3232.845545] kmem_cache_alloc+0x346/0x370 [ 3232.845559] alloc_vfsmnt+0x23/0x780 [ 3232.845573] clone_mnt+0x6c/0x11b0 [ 3232.845593] ? is_subdir+0x246/0x410 [ 3232.845610] copy_tree+0x100/0xaf0 [ 3232.845624] ? lock_acquire+0x170/0x3c0 [ 3232.845637] ? is_subdir+0x164/0x410 [ 3232.845658] propagate_one.part.0+0x3a8/0x710 [ 3232.845676] propagate_mnt+0x201/0x530 [ 3232.845688] ? invent_group_ids+0x152/0x210 [ 3232.845705] attach_recursive_mnt+0x697/0xd80 [ 3232.845720] ? count_mounts+0x210/0x210 [ 3232.845736] ? clone_mnt+0x701/0x11b0 [ 3232.845752] graft_tree+0x187/0x210 [ 3232.845768] do_mount+0x217b/0x2f10 [ 3232.845790] ? lock_downgrade+0x720/0x720 [ 3232.845803] ? lock_acquire+0x170/0x3c0 [ 3232.845817] ? __might_fault+0xef/0x1d0 [ 3232.845832] ? copy_mount_string+0x40/0x40 [ 3232.845849] ? __might_fault+0x192/0x1d0 [ 3232.845865] ? _copy_from_user+0xd2/0x130 [ 3232.845881] ? copy_mount_options+0x26f/0x380 [ 3232.845897] ksys_mount+0xcf/0x130 [ 3232.845912] __x64_sys_mount+0xba/0x150 [ 3232.845929] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3232.845943] do_syscall_64+0xf9/0x620 [ 3232.845962] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3232.845973] RIP: 0033:0x45cb29 [ 3232.845988] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3232.845996] RSP: 002b:00007fe38a84bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3232.846010] RAX: ffffffffffffffda RBX: 00000000004f7560 RCX: 000000000045cb29 [ 3232.846019] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000000 [ 3232.846028] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3232.846036] R10: 0000000000a51000 R11: 0000000000000246 R12: 0000000000000004 [ 3232.846045] R13: 000000000000077b R14: 00000000004ca735 R15: 00007fe38a84c6d4 [ 3233.040715] validate_nla: 2 callbacks suppressed [ 3233.040723] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 05:32:43 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}, 0x1, 0x2a1d0}, 0x0) 05:32:43 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000000300000000000c0004"], 0x30}}, 0x0) 05:32:43 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x2000f000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:43 executing program 5 (fault-call:3 fault-nth:21): perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:43 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20005400, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:43 executing program 2: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/psched\x00') inotify_init() [ 3233.502338] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 3233.547331] FAULT_INJECTION: forcing a failure. [ 3233.547331] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3233.559253] CPU: 1 PID: 377 Comm: syz-executor.5 Not tainted 4.19.131-syzkaller #0 [ 3233.566965] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3233.576324] Call Trace: [ 3233.578934] dump_stack+0x1fc/0x2fe [ 3233.582583] should_fail.cold+0xa/0x14 [ 3233.586489] ? check_preemption_disabled+0x41/0x280 [ 3233.591527] ? setup_fault_attr+0x200/0x200 05:32:43 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x7ffffffff000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3233.595875] __alloc_pages_nodemask+0x239/0x2890 [ 3233.600651] ? __lock_acquire+0x6de/0x3ff0 [ 3233.604915] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 3233.609779] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 3233.614640] ? __lock_acquire+0x6de/0x3ff0 [ 3233.618902] ? __lock_acquire+0x6de/0x3ff0 [ 3233.623152] ? ____cache_alloc_node+0x156/0x1d0 [ 3233.627843] cache_grow_begin+0xa4/0x8a0 [ 3233.631921] ? check_preemption_disabled+0x41/0x280 [ 3233.637077] ____cache_alloc_node+0x170/0x1d0 [ 3233.641590] ? check_preemption_disabled+0x41/0x280 05:32:43 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$iso9660(&(0x7f0000000100)='iso9660\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000026c0)={[{@check_strict='check=strict'}, {@gid={'gid', 0x3d, r0}}]}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r2) setfsuid(r2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000300)=0xc) setfsuid(r4) setfsuid(r4) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r6) setfsuid(r6) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r8) setfsuid(r8) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000040)='./file0\x00', 0x2, 0x1, &(0x7f0000000140)=[{&(0x7f0000000080)="4c8f8641c09c6a4b1bd093b699655bfdfb52c605393587b3407f0a46067a76eebe3a94f24dd07b3017f42c1032b139f06636cae54ade0949a946ed7fbd849e4c0ba4a8a49ab628fea8d229615f91e68ca4ca220538f9786a900234553b8e0fa4c1eaccc2c10939ef01677e275f912b71ccd277f42839ac1a413c99bbe7522019ebc8d8608e90806d0aca291b14128a0144e2b463b114b13a77aee2fb109d87949df3626692b22d1026374e649b0369cbfdeae6fcaf4d5dbfaece0e", 0xbb, 0x9}], 0x18a0, &(0x7f0000000180)={[{@session={'session', 0x3d, 0x3}}, {@nobarrier='nobarrier'}, {@nodecompose='nodecompose'}, {@barrier='barrier'}, {@uid={'uid'}}, {@umask={'umask', 0x3d, 0x3}}, {@nodecompose='nodecompose'}, {@part={'part', 0x3d, 0xfffffffffffff0dc}}, {@gid={'gid', 0x3d, r0}}], [{@pcr={'pcr', 0x3d, 0x2a}}, {@permit_directio='permit_directio'}, {@euid_gt={'euid>', r2}}, {@uid_eq={'uid', 0x3d, r4}}, {@euid_lt={'euid<', r6}}, {@fowner_gt={'fowner>', r8}}, {@smackfshat={'smackfshat', 0x3d, '.%.(\xe4(\'\\)%+-#-(//\'%/),-}'}}, {@appraise='appraise'}]}) inotify_init() [ 3233.646708] kmem_cache_alloc+0x1e4/0x370 [ 3233.650959] alloc_vfsmnt+0x23/0x780 [ 3233.654693] clone_mnt+0x6c/0x11b0 [ 3233.658251] ? is_subdir+0x246/0x410 [ 3233.661985] copy_tree+0x100/0xaf0 [ 3233.665543] ? lock_acquire+0x170/0x3c0 [ 3233.669534] ? is_subdir+0x164/0x410 [ 3233.673266] propagate_one.part.0+0x3a8/0x710 [ 3233.677901] propagate_mnt+0x201/0x530 [ 3233.681802] ? invent_group_ids+0x152/0x210 [ 3233.686328] attach_recursive_mnt+0x697/0xd80 [ 3233.690856] ? count_mounts+0x210/0x210 [ 3233.694846] ? clone_mnt+0x701/0x11b0 [ 3233.698668] graft_tree+0x187/0x210 [ 3233.702317] do_mount+0x217b/0x2f10 [ 3233.705970] ? lock_downgrade+0x720/0x720 [ 3233.710134] ? lock_acquire+0x170/0x3c0 [ 3233.714122] ? __might_fault+0xef/0x1d0 [ 3233.718111] ? copy_mount_string+0x40/0x40 [ 3233.722369] ? __might_fault+0x192/0x1d0 [ 3233.726452] ? _copy_from_user+0xd2/0x130 [ 3233.730629] ? copy_mount_options+0x26f/0x380 [ 3233.735136] ksys_mount+0xcf/0x130 [ 3233.738697] __x64_sys_mount+0xba/0x150 [ 3233.742691] ? lockdep_hardirqs_on+0x3a8/0x5c0 05:32:43 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa50008, 0x0) [ 3233.747284] do_syscall_64+0xf9/0x620 [ 3233.751196] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3233.756610] RIP: 0033:0x45cb29 [ 3233.759856] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3233.778766] RSP: 002b:00007fe38a84bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3233.786499] RAX: ffffffffffffffda RBX: 00000000004f7560 RCX: 000000000045cb29 05:32:43 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20006400, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3233.793779] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000000 [ 3233.801057] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3233.808336] R10: 0000000000a51000 R11: 0000000000000246 R12: 0000000000000004 [ 3233.813655] ISOFS: Unable to identify CD-ROM format. [ 3233.816154] R13: 000000000000077b R14: 00000000004ca735 R15: 00007fe38a84c6d4 05:32:43 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000000f00000000000c0004"], 0x30}}, 0x0) 05:32:43 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa5000e, 0x0) [ 3234.065475] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 05:32:43 executing program 5 (fault-call:3 fault-nth:22): perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:43 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x2000aa03, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:43 executing program 2: inotify_init() r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, &(0x7f0000000000)={0x9, 0x1, 'client1\x00', 0xffffffff80000004, '\x00', "691256dd1e3f840b92f1ac4bfacbadb91f111f7b8f4f7b5a352c7af16832698b", 0x7, 0x9}) 05:32:43 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c0003000000f000000000000c0004"], 0x30}}, 0x0) 05:32:43 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}, 0x1, 0x2a1d1}, 0x0) 05:32:43 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa50500, 0x0) [ 3234.201754] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 05:32:44 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x2000ac03, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:44 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000000003000000000c0004"], 0x30}}, 0x0) [ 3234.330969] FAULT_INJECTION: forcing a failure. [ 3234.330969] name failslab, interval 1, probability 0, space 0, times 0 [ 3234.349387] CPU: 0 PID: 487 Comm: syz-executor.5 Not tainted 4.19.131-syzkaller #0 [ 3234.357337] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3234.366717] Call Trace: [ 3234.369329] dump_stack+0x1fc/0x2fe [ 3234.372984] should_fail.cold+0xa/0x14 [ 3234.376977] ? setup_fault_attr+0x200/0x200 [ 3234.381317] ? lock_acquire+0x170/0x3c0 [ 3234.385319] __should_failslab+0x115/0x180 [ 3234.389572] should_failslab+0x5/0xf [ 3234.393304] __kmalloc_track_caller+0x2a6/0x3c0 [ 3234.398000] ? kstrdup_const+0x53/0x80 [ 3234.401908] kstrdup+0x36/0x70 [ 3234.405127] kstrdup_const+0x53/0x80 [ 3234.408993] alloc_vfsmnt+0xb5/0x780 [ 3234.412724] clone_mnt+0x6c/0x11b0 [ 3234.416284] ? is_subdir+0x246/0x410 [ 3234.420022] copy_tree+0x100/0xaf0 [ 3234.423575] ? lock_acquire+0x170/0x3c0 [ 3234.427559] ? is_subdir+0x164/0x410 [ 3234.431300] propagate_one.part.0+0x3a8/0x710 [ 3234.435824] propagate_mnt+0x201/0x530 [ 3234.439728] ? invent_group_ids+0x152/0x210 [ 3234.444100] attach_recursive_mnt+0x697/0xd80 [ 3234.448610] ? count_mounts+0x210/0x210 [ 3234.452607] graft_tree+0x187/0x210 [ 3234.456336] do_mount+0x217b/0x2f10 [ 3234.460074] ? lock_downgrade+0x720/0x720 [ 3234.464236] ? lock_acquire+0x170/0x3c0 [ 3234.468224] ? __might_fault+0xef/0x1d0 [ 3234.472415] ? copy_mount_string+0x40/0x40 [ 3234.476683] ? __might_fault+0x192/0x1d0 [ 3234.480762] ? _copy_from_user+0xd2/0x130 [ 3234.484926] ? copy_mount_options+0x26f/0x380 [ 3234.489442] ksys_mount+0xcf/0x130 [ 3234.493104] __x64_sys_mount+0xba/0x150 [ 3234.497107] ? ksys_mount+0x130/0x130 [ 3234.501013] do_syscall_64+0xf9/0x620 [ 3234.504861] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3234.510060] RIP: 0033:0x45cb29 05:32:44 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51002, 0x0) [ 3234.513268] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3234.532195] RSP: 002b:00007fe38a84bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3234.539925] RAX: ffffffffffffffda RBX: 00000000004f7560 RCX: 000000000045cb29 [ 3234.547199] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000000 [ 3234.554637] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3234.562072] R10: 0000000000a51000 R11: 0000000000000246 R12: 0000000000000004 [ 3234.569357] R13: 000000000000077b R14: 00000000004ca735 R15: 00007fe38a84c6d4 05:32:44 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x2000ae03, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:44 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c0003000000000f000000000c0004"], 0x30}}, 0x0) 05:32:44 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c0003000000542d000000000c0004"], 0x30}}, 0x0) 05:32:44 executing program 5 (fault-call:3 fault-nth:23): perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:44 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x2000de00, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:44 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c0003000000003f000000000c0004"], 0x30}}, 0x0) 05:32:44 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51004, 0x0) [ 3234.840838] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 3235.000361] FAULT_INJECTION: forcing a failure. [ 3235.000361] name failslab, interval 1, probability 0, space 0, times 0 [ 3235.032759] CPU: 0 PID: 549 Comm: syz-executor.5 Not tainted 4.19.131-syzkaller #0 [ 3235.040578] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3235.049942] Call Trace: [ 3235.052662] dump_stack+0x1fc/0x2fe [ 3235.056319] should_fail.cold+0xa/0x14 [ 3235.060230] ? setup_fault_attr+0x200/0x200 [ 3235.064571] ? lock_acquire+0x170/0x3c0 [ 3235.068572] __should_failslab+0x115/0x180 [ 3235.072836] should_failslab+0x5/0xf [ 3235.076567] __kmalloc_track_caller+0x2a6/0x3c0 [ 3235.081254] ? kstrdup_const+0x53/0x80 [ 3235.085166] kstrdup+0x36/0x70 [ 3235.088381] kstrdup_const+0x53/0x80 [ 3235.092114] alloc_vfsmnt+0xb5/0x780 [ 3235.095846] clone_mnt+0x6c/0x11b0 [ 3235.099409] ? is_subdir+0x246/0x410 [ 3235.103146] copy_tree+0x100/0xaf0 [ 3235.106734] propagate_one.part.0+0x3a8/0x710 [ 3235.111249] propagate_mnt+0x201/0x530 [ 3235.115149] ? invent_group_ids+0x152/0x210 [ 3235.119492] attach_recursive_mnt+0x697/0xd80 [ 3235.124012] ? count_mounts+0x210/0x210 [ 3235.128003] ? clone_mnt+0x701/0x11b0 [ 3235.131820] graft_tree+0x187/0x210 [ 3235.135461] do_mount+0x217b/0x2f10 [ 3235.139107] ? lock_downgrade+0x720/0x720 [ 3235.143270] ? lock_acquire+0x170/0x3c0 [ 3235.147261] ? __might_fault+0xef/0x1d0 [ 3235.151256] ? copy_mount_string+0x40/0x40 [ 3235.155509] ? __might_fault+0x192/0x1d0 [ 3235.159587] ? _copy_from_user+0xd2/0x130 [ 3235.163759] ? copy_mount_options+0x26f/0x380 [ 3235.168298] ksys_mount+0xcf/0x130 [ 3235.171867] __x64_sys_mount+0xba/0x150 [ 3235.175854] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3235.180583] do_syscall_64+0xf9/0x620 [ 3235.184399] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3235.189704] RIP: 0033:0x45cb29 [ 3235.192905] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3235.211950] RSP: 002b:00007fe38a84bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3235.219720] RAX: ffffffffffffffda RBX: 00000000004f7560 RCX: 000000000045cb29 [ 3235.227004] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000000 [ 3235.234287] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3235.241676] R10: 0000000000a51000 R11: 0000000000000246 R12: 0000000000000004 [ 3235.248957] R13: 000000000000077b R14: 00000000004ca735 R15: 00007fe38a84c6d4 [ 3235.787876] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 05:32:45 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}, 0x1, 0x2a1d2}, 0x0) 05:32:45 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x2000f000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:45 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51006, 0x0) 05:32:45 executing program 5 (fault-call:3 fault-nth:24): perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:45 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000002d54000000000c0004"], 0x30}}, 0x0) [ 3235.903070] FAULT_INJECTION: forcing a failure. [ 3235.903070] name failslab, interval 1, probability 0, space 0, times 0 [ 3235.903085] CPU: 1 PID: 604 Comm: syz-executor.5 Not tainted 4.19.131-syzkaller #0 [ 3235.903091] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3235.903095] Call Trace: [ 3235.903115] dump_stack+0x1fc/0x2fe [ 3235.903142] should_fail.cold+0xa/0x14 [ 3235.903158] ? setup_fault_attr+0x200/0x200 [ 3235.903172] ? lock_acquire+0x170/0x3c0 [ 3235.903216] __should_failslab+0x115/0x180 [ 3235.950065] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 3235.950704] should_failslab+0x5/0xf [ 3235.950722] kmem_cache_alloc+0x277/0x370 [ 3235.970187] alloc_vfsmnt+0x23/0x780 [ 3235.973922] clone_mnt+0x6c/0x11b0 [ 3235.977626] ? is_subdir+0x246/0x410 [ 3235.981360] copy_tree+0x100/0xaf0 [ 3235.984917] ? lock_acquire+0x170/0x3c0 [ 3235.988913] ? is_subdir+0x164/0x410 [ 3235.992652] propagate_one.part.0+0x3a8/0x710 [ 3235.997169] propagate_mnt+0x201/0x530 [ 3236.001073] ? invent_group_ids+0x152/0x210 [ 3236.005413] attach_recursive_mnt+0x697/0xd80 [ 3236.010052] ? count_mounts+0x210/0x210 [ 3236.014045] ? clone_mnt+0x701/0x11b0 [ 3236.017863] graft_tree+0x187/0x210 [ 3236.021507] do_mount+0x217b/0x2f10 [ 3236.025155] ? lock_downgrade+0x720/0x720 [ 3236.029319] ? lock_acquire+0x170/0x3c0 [ 3236.033307] ? __might_fault+0xef/0x1d0 [ 3236.037294] ? copy_mount_string+0x40/0x40 [ 3236.041550] ? __might_fault+0x192/0x1d0 [ 3236.045623] ? _copy_from_user+0xd2/0x130 [ 3236.049792] ? copy_mount_options+0x26f/0x380 [ 3236.054304] ksys_mount+0xcf/0x130 [ 3236.057867] __x64_sys_mount+0xba/0x150 [ 3236.061863] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3236.066460] do_syscall_64+0xf9/0x620 [ 3236.070289] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3236.075495] RIP: 0033:0x45cb29 [ 3236.078699] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 05:32:45 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c000300000000f0000000000c0004"], 0x30}}, 0x0) 05:32:45 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x2000f803, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3236.097721] RSP: 002b:00007fe38a84bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3236.105443] RAX: ffffffffffffffda RBX: 00000000004f7560 RCX: 000000000045cb29 [ 3236.112723] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000000 [ 3236.120089] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3236.127373] R10: 0000000000a51000 R11: 0000000000000246 R12: 0000000000000004 [ 3236.134741] R13: 000000000000077b R14: 00000000004ca735 R15: 00007fe38a84c6d4 05:32:46 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x2000fa03, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:46 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000000040030000000c0004"], 0x30}}, 0x0) 05:32:46 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x2000fc03, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:46 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000000003400000000c0004"], 0x30}}, 0x0) 05:32:46 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c0003000000fffff00000000c0004"], 0x30}}, 0x0) [ 3236.465667] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 05:32:46 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}, 0x1, 0x2a1d3}, 0x0) 05:32:46 executing program 2: inotify_init() prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000100)={0x6, &(0x7f00000000c0)=[{0x7, 0x3, 0x0, 0x3}, {0x9, 0x7f, 0x2, 0x10001}, {0x7, 0x7, 0x6, 0x6}, {0x2, 0x5, 0x2, 0x7}, {0x9cb7, 0x3, 0x4, 0x9}, {0x6, 0x5, 0xbd}]}) r1 = accept4$unix(r0, &(0x7f0000000000)=@abs, &(0x7f0000000080)=0x6e, 0x800) r2 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x7, 0x400000) r3 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000280)='mptcp_pm\x00') sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r2, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x9c, r3, 0x100, 0x70bd26, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_ADDR={0x48, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @private=0xa010100}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @private2={0xfc, 0x2, [], 0x1}}, @MPTCP_PM_ADDR_ATTR_ID={0x5}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x5}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_ADDR={0x14, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x4}]}]}, 0x9c}, 0x1, 0x0, 0x0, 0x800}, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r4, &(0x7f0000000180)=""/186, 0xba) r5 = socket$nl_generic(0x10, 0x3, 0x10) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x2) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) fcntl$setownex(r1, 0xf, &(0x7f0000000440)) r6 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140)='devlink\x00') sendmsg$DEVLINK_CMD_GET(r5, &(0x7f00000003c0)={0x0, 0xfffff000, &(0x7f0000000380)={&(0x7f0000000180)={0x14, r6, 0xc91add0bf88807dd, 0x0, 0x0, {0xf}}, 0x14}}, 0x0) sendmsg$DEVLINK_CMD_TRAP_GROUP_SET(r4, &(0x7f0000000600)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000005c0)={&(0x7f0000000640)={0x158, r6, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0xd, 0x87, 'l2_drops\x00'}, {0x5, 0x83, 0x1}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd, 0x87, 'l2_drops\x00'}, {0x5, 0x83, 0x1}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0xd, 0x87, 'l2_drops\x00'}, {0x5}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd, 0x87, 'l2_drops\x00'}, {0x5}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0xd, 0x87, 'l2_drops\x00'}, {0x5}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd, 0x87, 'l2_drops\x00'}, {0x5}}]}, 0x158}, 0x1, 0x0, 0x0, 0x20080010}, 0x8400) 05:32:46 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51008, 0x0) 05:32:46 executing program 5 (fault-call:3 fault-nth:25): perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:46 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x2000fe03, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:46 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000000000000100000c0004"], 0x30}}, 0x0) 05:32:46 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000000000000200000c0004"], 0x30}}, 0x0) 05:32:46 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa5100a, 0x0) 05:32:46 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x7ffffffff000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:46 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000000000000300000c0004"], 0x30}}, 0x0) [ 3236.663465] FAULT_INJECTION: forcing a failure. [ 3236.663465] name failslab, interval 1, probability 0, space 0, times 0 05:32:46 executing program 2: r0 = inotify_init() ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000300)=ANY=[@ANYBLOB="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"]) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r1, &(0x7f0000000180)=""/186, 0xba) ioctl$VIDIOC_G_PARM(r1, 0xc0cc5615, &(0x7f0000000600)={0x4, @capture={0x0, 0x1, {0x5, 0xfffffff8}, 0x8c, 0x3}}) inotify_add_watch(r1, &(0x7f0000000280)='./file0\x00', 0x200004c9) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r3) setfsuid(r3) r4 = getgid() write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000000700)={0xa0, 0x0, 0x4, {{0x4, 0x0, 0x3, 0x8, 0x8, 0x1, {0x4, 0x0, 0x7f, 0xfffffffffffff801, 0x66, 0x6, 0x1000, 0xdbe, 0x15f851e5, 0x4, 0x6, r3, r4, 0xcc03, 0x991}}, {0x0, 0x1}}}, 0xa0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x0, 0x0, 0x0, 0x1, 0xba}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28, &(0x7f0000000080)}, 0x10) socket$bt_hidp(0x1f, 0x3, 0x6) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x22000800) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r5, &(0x7f0000000180)=""/186, 0xba) ioctl$BLKPBSZGET(r5, 0x127b, &(0x7f0000000140)) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video36\x00', 0x2, 0x0) [ 3236.756337] CPU: 1 PID: 710 Comm: syz-executor.5 Not tainted 4.19.131-syzkaller #0 [ 3236.764089] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3236.773630] Call Trace: [ 3236.776328] dump_stack+0x1fc/0x2fe [ 3236.780101] should_fail.cold+0xa/0x14 [ 3236.784003] ? setup_fault_attr+0x200/0x200 [ 3236.788344] ? lock_acquire+0x170/0x3c0 [ 3236.792344] __should_failslab+0x115/0x180 [ 3236.796601] should_failslab+0x5/0xf [ 3236.800473] __kmalloc_track_caller+0x2a6/0x3c0 [ 3236.805160] ? kstrdup_const+0x53/0x80 [ 3236.809071] kstrdup+0x36/0x70 [ 3236.812273] kstrdup_const+0x53/0x80 [ 3236.815997] alloc_vfsmnt+0xb5/0x780 [ 3236.819735] clone_mnt+0x6c/0x11b0 [ 3236.823292] ? is_subdir+0x246/0x410 [ 3236.827112] copy_tree+0x100/0xaf0 [ 3236.830669] ? lock_acquire+0x170/0x3c0 [ 3236.834658] ? is_subdir+0x164/0x410 [ 3236.838521] propagate_one.part.0+0x3a8/0x710 [ 3236.843051] propagate_mnt+0x201/0x530 [ 3236.846956] ? invent_group_ids+0x152/0x210 [ 3236.851296] attach_recursive_mnt+0x697/0xd80 [ 3236.855807] ? count_mounts+0x210/0x210 [ 3236.859803] ? clone_mnt+0x701/0x11b0 [ 3236.863617] graft_tree+0x187/0x210 [ 3236.867280] do_mount+0x217b/0x2f10 [ 3236.870930] ? lock_downgrade+0x720/0x720 [ 3236.875089] ? lock_acquire+0x1ec/0x3c0 [ 3236.879082] ? copy_mount_string+0x40/0x40 [ 3236.883481] ? __might_fault+0x192/0x1d0 [ 3236.885079] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 3236.887557] ? _copy_from_user+0xd2/0x130 [ 3236.887580] ? copy_mount_options+0x26f/0x380 [ 3236.887597] ksys_mount+0xcf/0x130 [ 3236.887611] __x64_sys_mount+0xba/0x150 [ 3236.887627] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3236.916000] do_syscall_64+0xf9/0x620 [ 3236.919825] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3236.925026] RIP: 0033:0x45cb29 [ 3236.928233] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3236.947148] RSP: 002b:00007fe38a84bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 05:32:46 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa50008, 0x0) [ 3236.954957] RAX: ffffffffffffffda RBX: 00000000004f7560 RCX: 000000000045cb29 [ 3236.962238] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000000 [ 3236.969515] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3236.976796] R10: 0000000000a51000 R11: 0000000000000246 R12: 0000000000000004 [ 3236.984090] R13: 000000000000077b R14: 00000000004ca735 R15: 00007fe38a84c6d4 05:32:46 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}, 0x1, 0x2a1d4}, 0x0) 05:32:46 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000000000000f00000c0004"], 0x30}}, 0x0) 05:32:46 executing program 2: inotify_init() r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000000)={0x6, 0x4, 0x4, 0xc004, 0x400, {0x77359400}, {0x2, 0x1, 0x1, 0x1, 0x6, 0x3, "14695c09"}, 0x6b48, 0x2, @userptr=0x7ff, 0x6, 0x0, r0}) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r1, &(0x7f0000000180)=""/186, 0xba) setsockopt$nfc_llcp_NFC_LLCP_RW(r1, 0x118, 0x0, &(0x7f0000000080)=0xfff, 0x4) 05:32:46 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa5100c, 0x0) 05:32:46 executing program 5 (fault-call:3 fault-nth:26): perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:46 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa5000e, 0x0) [ 3237.132889] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 05:32:47 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) connect(r0, &(0x7f0000000080)=@ethernet={0x306}, 0x80) r1 = syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0x5, 0x10000) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r1, 0x4010ae68, &(0x7f0000000040)={0x8000, 0x66b3c6255c4cc59c}) 05:32:47 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa50500, 0x0) [ 3237.228342] FAULT_INJECTION: forcing a failure. [ 3237.228342] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3237.263866] CPU: 1 PID: 806 Comm: syz-executor.5 Not tainted 4.19.131-syzkaller #0 [ 3237.271769] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3237.281135] Call Trace: [ 3237.283793] dump_stack+0x1fc/0x2fe [ 3237.287453] should_fail.cold+0xa/0x14 [ 3237.291374] ? lock_acquire+0x170/0x3c0 [ 3237.291391] ? setup_fault_attr+0x200/0x200 [ 3237.291417] __alloc_pages_nodemask+0x239/0x2890 [ 3237.291433] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 3237.291445] ? __alloc_pages_nodemask+0x1b43/0x2890 [ 3237.291469] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 3237.319583] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 3237.319601] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 3237.329292] ? __lock_acquire+0x6de/0x3ff0 [ 3237.329318] ? mark_held_locks+0xa6/0xf0 [ 3237.337621] ? ____cache_alloc_node+0x156/0x1d0 [ 3237.337638] ? cache_grow_begin+0x64/0x8a0 [ 3237.346844] cache_grow_begin+0xa4/0x8a0 [ 3237.346867] fallback_alloc+0x213/0x2e0 [ 3237.346888] kmem_cache_alloc+0x1e4/0x370 [ 3237.346904] alloc_vfsmnt+0x23/0x780 [ 3237.346930] clone_mnt+0x6c/0x11b0 [ 3237.346944] ? is_subdir+0x246/0x410 [ 3237.346960] copy_tree+0x100/0xaf0 [ 3237.346974] ? lock_acquire+0x170/0x3c0 05:32:47 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51002, 0x0) [ 3237.346985] ? is_subdir+0x164/0x410 [ 3237.347005] propagate_one.part.0+0x3a8/0x710 [ 3237.347022] propagate_mnt+0x201/0x530 [ 3237.347033] ? invent_group_ids+0x152/0x210 [ 3237.347048] attach_recursive_mnt+0x697/0xd80 [ 3237.347063] ? count_mounts+0x210/0x210 [ 3237.347076] ? clone_mnt+0x701/0x11b0 [ 3237.347090] graft_tree+0x187/0x210 [ 3237.347104] do_mount+0x217b/0x2f10 [ 3237.347120] ? lock_downgrade+0x720/0x720 [ 3237.347132] ? lock_acquire+0x170/0x3c0 [ 3237.347145] ? __might_fault+0xef/0x1d0 [ 3237.347158] ? copy_mount_string+0x40/0x40 [ 3237.347193] ? __might_fault+0x192/0x1d0 [ 3237.347209] ? _copy_from_user+0xd2/0x130 [ 3237.347225] ? copy_mount_options+0x26f/0x380 [ 3237.347241] ksys_mount+0xcf/0x130 [ 3237.347257] __x64_sys_mount+0xba/0x150 [ 3237.347272] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3237.347284] do_syscall_64+0xf9/0x620 [ 3237.347303] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3237.464612] RIP: 0033:0x45cb29 05:32:47 executing program 2: inotify_init() r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r1, &(0x7f0000000180)=""/186, 0xba) dup3(r0, r1, 0x80000) [ 3237.464628] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3237.486891] RSP: 002b:00007fe38a84bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3237.494611] RAX: ffffffffffffffda RBX: 00000000004f7560 RCX: 000000000045cb29 [ 3237.501898] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000000 [ 3237.509181] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3237.516465] R10: 0000000000a51000 R11: 0000000000000246 R12: 0000000000000004 05:32:47 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000000000542d00000c0004"], 0x30}}, 0x0) [ 3237.523857] R13: 000000000000077b R14: 00000000004ca735 R15: 00007fe38a84c6d4 05:32:47 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51027, 0x0) 05:32:47 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}, 0x1, 0x2a1d5}, 0x0) 05:32:47 executing program 2: sigaltstack(&(0x7f0000ffb000/0x2000)=nil, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000fef000/0x11000)=nil, 0x11000}, &(0x7f0000000040)=0x10) inotify_init() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000280)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x43, 0x57}}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfc76, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffe77}, 0x48) read$dsp(r1, &(0x7f0000000180)=""/186, 0xba) ioctl$SOUND_MIXER_WRITE_VOLUME(r1, 0xc0044d01, &(0x7f0000000080)=0x40) 05:32:47 executing program 5 (fault-call:3 fault-nth:27): perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:47 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51004, 0x0) 05:32:47 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa5104f, 0x0) 05:32:47 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000000000003f00000c0004"], 0x30}}, 0x0) [ 3237.921890] FAULT_INJECTION: forcing a failure. [ 3237.921890] name failslab, interval 1, probability 0, space 0, times 0 [ 3237.945370] CPU: 1 PID: 907 Comm: syz-executor.5 Not tainted 4.19.131-syzkaller #0 [ 3237.953337] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3237.953342] Call Trace: [ 3237.953370] dump_stack+0x1fc/0x2fe [ 3237.969098] should_fail.cold+0xa/0x14 [ 3237.973190] ? setup_fault_attr+0x200/0x200 [ 3237.977525] ? lock_acquire+0x170/0x3c0 [ 3237.981533] __should_failslab+0x115/0x180 [ 3237.985799] should_failslab+0x5/0xf [ 3237.989532] kmem_cache_alloc+0x277/0x370 [ 3237.993700] alloc_vfsmnt+0x23/0x780 [ 3237.997548] clone_mnt+0x6c/0x11b0 [ 3238.001109] ? is_subdir+0x246/0x410 [ 3238.004840] copy_tree+0x100/0xaf0 [ 3238.008440] ? lock_acquire+0x170/0x3c0 [ 3238.012426] ? is_subdir+0x164/0x410 [ 3238.016267] propagate_one.part.0+0x3a8/0x710 05:32:47 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) ioctl$KDSKBMETA(r0, 0x4b63, &(0x7f0000000080)=0x3) inotify_init() get_mempolicy(&(0x7f0000000000), &(0x7f0000000040), 0x6, &(0x7f0000ffb000/0x2000)=nil, 0x0) [ 3238.020788] propagate_mnt+0x201/0x530 [ 3238.024691] ? invent_group_ids+0x152/0x210 [ 3238.029032] attach_recursive_mnt+0x697/0xd80 [ 3238.033544] ? count_mounts+0x210/0x210 [ 3238.037529] ? clone_mnt+0x701/0x11b0 [ 3238.041341] graft_tree+0x187/0x210 [ 3238.044988] do_mount+0x217b/0x2f10 [ 3238.048759] ? lock_downgrade+0x720/0x720 [ 3238.052925] ? lock_acquire+0x170/0x3c0 [ 3238.056917] ? __might_fault+0xef/0x1d0 [ 3238.061003] ? copy_mount_string+0x40/0x40 [ 3238.065261] ? __might_fault+0x192/0x1d0 [ 3238.069342] ? _copy_from_user+0xd2/0x130 [ 3238.073512] ? copy_mount_options+0x26f/0x380 [ 3238.078027] ksys_mount+0xcf/0x130 [ 3238.081585] __x64_sys_mount+0xba/0x150 [ 3238.085583] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3238.090185] do_syscall_64+0xf9/0x620 [ 3238.094012] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3238.099217] RIP: 0033:0x45cb29 [ 3238.102423] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 05:32:47 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c0003000000ffffff9e00000c0004"], 0x30}}, 0x0) [ 3238.121339] RSP: 002b:00007fe38a84bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3238.129055] RAX: ffffffffffffffda RBX: 00000000004f7560 RCX: 000000000045cb29 [ 3238.136440] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000000 [ 3238.143707] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3238.150984] R10: 0000000000a51000 R11: 0000000000000246 R12: 0000000000000004 [ 3238.158243] R13: 000000000000077b R14: 00000000004ca735 R15: 00007fe38a84c6d4 05:32:48 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c0003000000fffffff000000c0004"], 0x30}}, 0x0) 05:32:48 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) setsockopt$PNPIPE_INITSTATE(r0, 0x113, 0x4, &(0x7f0000000100), 0x4) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r1, &(0x7f0000000180)=""/186, 0xba) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000000c0)={r1, &(0x7f0000000000)="ed2023ce2359263e43f79f85b3b3", &(0x7f0000000080)=""/22}, 0x20) inotify_init() ioctl$VIDIOC_S_OUTPUT(0xffffffffffffffff, 0xc004562f, &(0x7f0000000040)=0x80) 05:32:48 executing program 5 (fault-call:3 fault-nth:28): perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:48 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51064, 0x0) [ 3238.358658] FAULT_INJECTION: forcing a failure. [ 3238.358658] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3238.370582] CPU: 0 PID: 979 Comm: syz-executor.5 Not tainted 4.19.131-syzkaller #0 [ 3238.375321] validate_nla: 3 callbacks suppressed [ 3238.375327] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 3238.378288] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3238.378293] Call Trace: [ 3238.378315] dump_stack+0x1fc/0x2fe [ 3238.378335] should_fail.cold+0xa/0x14 [ 3238.378349] ? kernel_text_address+0xbd/0xf0 [ 3238.378365] ? setup_fault_attr+0x200/0x200 [ 3238.378381] ? unwind_get_return_address+0x51/0x90 [ 3238.378397] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3238.378408] ? __save_stack_trace+0xaf/0x190 [ 3238.378427] __alloc_pages_nodemask+0x239/0x2890 [ 3238.378445] ? __lock_acquire+0x6de/0x3ff0 [ 3238.378479] ? __lock_acquire+0x6de/0x3ff0 [ 3238.378499] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 3238.378513] ? __lock_acquire+0x6de/0x3ff0 [ 3238.378532] ? lock_downgrade+0x720/0x720 [ 3238.378547] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3238.378564] ? __lock_acquire+0x6de/0x3ff0 [ 3238.378584] cache_grow_begin+0xa4/0x8a0 [ 3238.378597] ? setup_fault_attr+0x200/0x200 [ 3238.378610] ? cache_alloc_pfmemalloc+0x1e/0x140 [ 3238.378624] cache_alloc_refill+0x273/0x340 [ 3238.487210] kmem_cache_alloc+0x346/0x370 [ 3238.491383] alloc_vfsmnt+0x23/0x780 [ 3238.495119] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3238.499891] clone_mnt+0x6c/0x11b0 [ 3238.503446] ? rcu_nmi_exit+0xb3/0x180 [ 3238.507356] ? is_subdir+0x246/0x410 [ 3238.511094] copy_tree+0x100/0xaf0 [ 3238.514649] ? is_subdir+0x24b/0x410 [ 3238.518494] propagate_one.part.0+0x3a8/0x710 [ 3238.523008] propagate_mnt+0x201/0x530 [ 3238.526919] attach_recursive_mnt+0x697/0xd80 [ 3238.531436] ? count_mounts+0x210/0x210 [ 3238.535425] ? clone_mnt+0x701/0x11b0 [ 3238.539244] graft_tree+0x187/0x210 [ 3238.542888] do_mount+0x217b/0x2f10 [ 3238.546670] ? rcu_nmi_exit+0xb3/0x180 [ 3238.550575] ? copy_mount_string+0x40/0x40 [ 3238.554849] ? __sanitizer_cov_trace_pc+0x2e/0x50 [ 3238.559878] ? copy_mount_options+0x26f/0x380 [ 3238.564532] ksys_mount+0xcf/0x130 [ 3238.568113] __x64_sys_mount+0xba/0x150 [ 3238.572107] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3238.576704] do_syscall_64+0xf9/0x620 [ 3238.580528] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3238.585732] RIP: 0033:0x45cb29 [ 3238.588938] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 05:32:48 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}, 0x1, 0x2a1d6}, 0x0) 05:32:48 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51006, 0x0) 05:32:48 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c000300000000f0ffff00000c0004"], 0x30}}, 0x0) 05:32:48 executing program 2: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x200800, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r1, &(0x7f0000000180)=""/186, 0xba) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r2, &(0x7f0000000180)=""/186, 0xba) getsockopt$PNPIPE_IFINDEX(r2, 0x113, 0x2, &(0x7f0000000080), &(0x7f00000000c0)=0x4b) ioctl$IMCLEAR_L2(0xffffffffffffffff, 0x80044946, &(0x7f0000000000)=0x7fffffff) inotify_init() 05:32:48 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x2801c0, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000180)={@host}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x280002, 0x0) prctl$PR_SET_FPEXC(0xc, 0x20000) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000080)}}, 0x18) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:48 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000007fffffff00000c0004"], 0x30}}, 0x0) [ 3238.607848] RSP: 002b:00007fe38a84bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3238.615732] RAX: ffffffffffffffda RBX: 00000000004f7560 RCX: 000000000045cb29 [ 3238.623010] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000000 [ 3238.630400] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3238.637706] R10: 0000000000a51000 R11: 0000000000000246 R12: 0000000000000004 [ 3238.644989] R13: 000000000000077b R14: 00000000004ca735 R15: 00007fe38a84c6d4 05:32:48 executing program 5 (fault-call:3 fault-nth:29): perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:48 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000080)=""/170, 0xaa) ioctl$KIOCSOUND(r0, 0x4b2f, 0xfff) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r1, &(0x7f0000000180)=""/186, 0xba) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r2, &(0x7f0000000180)=""/186, 0xba) ioctl$PIO_SCRNMAP(r2, 0x4b41, &(0x7f00000005c0)="dbff509a2f63760e80312b66609b4760d417a7d4ad70bedf59e99c8f1f60c790ec657eef04a2c39e1d84acd38d4c77f349fdf23d41ade53f3ee3d6ccc1d79ed5ea4b4958ba3a6be31a48bac2bc081077cc6c09b6b985a47d67d8284ff288cfb36527effba8e294e4dede742f16ee953c59d9a5485d398cf2e83db4811e72d0fb1fab46422b926b1702f3a65f9e953829a039263b9f39338b") connect$phonet_pipe(r1, &(0x7f0000000580)={0x23, 0x1, 0x0, 0x9}, 0x10) inotify_init() r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r3, &(0x7f0000000180)=""/186, 0xba) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer2\x00', 0x80800, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_GET_STATION(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x1c, r6, 0xf2b, 0x0, 0x0, {0x32}, [@NL80211_ATTR_STA_PLINK_ACTION={0x4}]}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_STOP_AP(r4, &(0x7f0000000480)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000c40)={0xac4, r6, 0x200, 0x70bd2c, 0x25dfdbff, {}, [@NL80211_ATTR_HIDDEN_SSID={0x8, 0x7e, 0x2}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, 0x4}, @NL80211_ATTR_BEACON_HEAD={0x179, 0xe, "98331c09e98cd0a38aca96fadedbf0bc7e7bb4b1f34d8425c81d79a14c8e760d0072041ee8f9f43c95135434c033a723c254018fcbb9b1047503ad207a81c25c1a0601115daafea6e7a3c639d15cb565d5b8297f5df2e8f212c50b77709f79dc0329a8a770f3717d3b0ed797e28ef870cac4998fbe1f269fefa5de9627e5a66f9e5dd33392e78670f1de9d0ef755f9c0a9bacaf968dba9c89ffaf074c8731b012279f8d10b414b36a8cef6b4967a7f05646ce7cb9284f85eddbdf5cb7a7733dee52b3c708150947d3ed65a24fb62005198940e8a47062a06732dc17f1b4bb980af37fb964c7c5497ead2d6182fce5d62d646221ac04521dcdcf16f464a203893517d803c98c2c54a64624668deb2a5416b495b8d8b0f595bed30a2be80c43e666dd7188eac3b06369c9e83de8f93c20377a46b2260ad53fecbae28c313bb95240339452c02a29256fc517c638105a3615c60cefc53c4491a319ef2a90940efec899e05554000fe3a72d1a71be30cd1c58f77444752"}, @NL80211_ATTR_BEACON_TAIL={0x725, 0xf, "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"}, @NL80211_ATTR_PBSS={0x4}, @NL80211_ATTR_DTIM_PERIOD={0x8, 0xd, 0x6}, @NL80211_ATTR_BEACON_HEAD={0x1e7, 0xe, "27318040982730c8dc217b1fe9a1cd911e617437eb37ca3e607f5574e267d5d1297d9ad9892b89d9a1227bbb35c3023817b9a5900a8d329690ed68237635ca2b37151de8c4d4b0cc45f782ab92c002473517fede60385e71bb39a4d290828abc78c86d327aceaa9c5cfd5840947ea01c916a62cef0ed09196c909e6c59e61db421ef3527ec8e2b929d0c06a341ae89b64042d930ad67970d4064d6fc86e31382c242c2c6b3afbc8c103f0374132b30f73eecb52c121908fc3e8857e7a30de816bf9247a561caf5c99421a6e0d823bbe43a48c42be93bbc16883c968478c606a814e3071e2716f080630c2fa36f78ace805ac6105a421b0138401129be51d084f8e625365f852d55cc6ef3b70411826f382edcf9731109ff1fff9280369d341fb3011089458e9c8afab47829280d3bb9e70776b217d01058e92912790bdf52a51eff47908080347a0cad4917b5253dd6ba078fb5ef584e75947a6895053ea978ebb6ce472cc1af2bae6096527d108f0d44145a477ce5cf0172e9ff286a0a72fa4f0c2c824432bc322d341a66e0c15a12657fd7f9aa2f9e5f59da5ef32bdce978a6f963814b5b9b364389b7310da3f8fde7c2da2a0e2b4f116bac86ea8671391438f08ff7dbd1f1450078957f6ee6ec02482659e82802a19da66b6485429f3937f56c732"}, @NL80211_ATTR_AUTH_TYPE={0x8, 0x35, 0x1}]}, 0xac4}, 0x1, 0x0, 0x0, 0x24000010}, 0x1) sendmsg$OSF_MSG_REMOVE(r3, &(0x7f0000000540)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000500)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x4bc}, 0x1, 0x0, 0x0, 0x20000000}, 0x40004) 05:32:48 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000009effffff00000c0004"], 0x30}}, 0x0) 05:32:48 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51008, 0x0) 05:32:48 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.origin\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x2) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3238.858296] netlink: 'syz-executor.2': attribute type 25 has an invalid length. [ 3238.866026] FAULT_INJECTION: forcing a failure. [ 3238.866026] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3238.877862] CPU: 1 PID: 1018 Comm: syz-executor.5 Not tainted 4.19.131-syzkaller #0 [ 3238.885691] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3238.885696] Call Trace: [ 3238.885719] dump_stack+0x1fc/0x2fe [ 3238.901304] should_fail.cold+0xa/0x14 [ 3238.905376] ? check_preemption_disabled+0x41/0x280 [ 3238.910425] ? setup_fault_attr+0x200/0x200 [ 3238.910451] __alloc_pages_nodemask+0x239/0x2890 [ 3238.910471] ? __lock_acquire+0x6de/0x3ff0 [ 3238.910497] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 3238.910512] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 3238.910526] ? __lock_acquire+0x6de/0x3ff0 [ 3238.910554] ? __lock_acquire+0x6de/0x3ff0 [ 3238.910572] ? ____cache_alloc_node+0x156/0x1d0 [ 3238.910594] cache_grow_begin+0xa4/0x8a0 [ 3238.910611] ? check_preemption_disabled+0x41/0x280 [ 3238.910628] ____cache_alloc_node+0x170/0x1d0 [ 3238.910641] ? check_preemption_disabled+0x41/0x280 [ 3238.910658] kmem_cache_alloc+0x1e4/0x370 [ 3238.969927] alloc_vfsmnt+0x23/0x780 [ 3238.969943] clone_mnt+0x6c/0x11b0 [ 3238.977222] ? is_subdir+0x246/0x410 [ 3238.977239] copy_tree+0x100/0xaf0 [ 3238.984512] ? lock_acquire+0x170/0x3c0 [ 3238.984528] ? is_subdir+0x164/0x410 [ 3238.984553] propagate_one.part.0+0x3a8/0x710 [ 3238.984569] propagate_mnt+0x201/0x530 [ 3238.984583] ? invent_group_ids+0x152/0x210 05:32:48 executing program 2: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self\x00', 0x0, 0x0) inotify_init() [ 3239.004984] attach_recursive_mnt+0x697/0xd80 [ 3239.005001] ? count_mounts+0x210/0x210 [ 3239.013634] ? clone_mnt+0x701/0x11b0 [ 3239.017565] graft_tree+0x187/0x210 [ 3239.021215] do_mount+0x217b/0x2f10 [ 3239.024864] ? lock_downgrade+0x720/0x720 [ 3239.029145] ? lock_acquire+0x170/0x3c0 [ 3239.033142] ? __might_fault+0xef/0x1d0 [ 3239.037137] ? copy_mount_string+0x40/0x40 [ 3239.041398] ? __might_fault+0x192/0x1d0 [ 3239.045479] ? _copy_from_user+0xd2/0x130 [ 3239.049647] ? copy_mount_options+0x26f/0x380 [ 3239.054290] ksys_mount+0xcf/0x130 [ 3239.057852] __x64_sys_mount+0xba/0x150 [ 3239.061850] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3239.066453] do_syscall_64+0xf9/0x620 [ 3239.070279] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3239.075484] RIP: 0033:0x45cb29 [ 3239.078699] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3239.097705] RSP: 002b:00007fe38a84bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3239.105436] RAX: ffffffffffffffda RBX: 00000000004f7560 RCX: 000000000045cb29 [ 3239.112725] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000000 [ 3239.120006] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3239.127287] R10: 0000000000a51000 R11: 0000000000000246 R12: 0000000000000004 [ 3239.134569] R13: 000000000000077b R14: 00000000004ca735 R15: 00007fe38a84c6d4 [ 3239.220448] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 05:32:49 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}, 0x1, 0x2a1d7}, 0x0) 05:32:49 executing program 2: inotify_init() r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x18002, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r1, &(0x7f0000000180)=""/186, 0xba) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x14) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r2, &(0x7f0000000180)=""/186, 0xba) write$P9_RLERRORu(r2, &(0x7f0000000100)={0x16, 0x7, 0x2, {{0x9, '/dev/vcs\x00'}, 0x7fffffff}}, 0x16) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000000)={'NETMAP\x00'}, &(0x7f0000000040)=0x1e) 05:32:49 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c0003000000f0ffffff00000c0004"], 0x30}}, 0x0) 05:32:49 executing program 5 (fault-call:3 fault-nth:30): perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:49 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) getsockopt$TIPC_IMPORTANCE(r0, 0x10f, 0x7f, &(0x7f0000000040), &(0x7f0000000080)=0x4) prctl$PR_SET_FPEMU(0xa, 0x2) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:49 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa5100a, 0x0) [ 3239.378675] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 05:32:49 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000000002000000000c0004"], 0x30}}, 0x0) [ 3239.442954] FAULT_INJECTION: forcing a failure. [ 3239.442954] name failslab, interval 1, probability 0, space 0, times 0 05:32:49 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f00000002c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="1a00000056e7c3a07b7cce82097c2d18262c003207d9372525ed4150a0f1"], &(0x7f0000000300)=0x22) inotify_init() sendmsg$inet_sctp(r0, &(0x7f00000007c0)={&(0x7f0000000340)=@in6={0xa, 0x4e20, 0x5, @loopback, 0x4}, 0x1c, &(0x7f0000000700)=[{&(0x7f0000000380)}, {&(0x7f00000008c0)="29390c06eb6fbb90abed63040301200f0ad5b021d3f24e1cd37c9b106a3b7e16a44140663c1007fbf902f1d8a01d6329597f2b8365c999143ddcf18959b8e9936512976e3cdadeb24af268e15ecbad655168d4a45253c683254d89fd77a7746432f8e361d9871effc3c18c87468dd4c692aad311ec2235bc1ee33972d83d8c82436f5d1e3d2386877820c585c07769bad5ba5128c756d0daa4dafbddf883a14835a6000003e1b9a26b7cc7a83ee53a376a7514164e419cae5f9499d07ac01e301742976a23d260dc56289dd0323b8503bd29d6ba008c356c9970d27a929759c748c0fd677c6c76229b0490e851b22669ae718076f475574c92255a0aad4535bef1b2a5a65b11cdbacf6057bd51ad7d1c5bd9ede5c8d36ca72379af82cc32faeac2b39e8d1743eb9e563f90568520b9a78b27b56ae6027094556cf01e998fad03b960b9bccd1aa4087a8a7c49f2c33d4242390a8300cc3d9b6f0ecef40e6bb0700e93e37b8113ba299cecb7698e7d05bddc1603571cf430164254d4203077eb87f2b7b12fe517edb142f9df9bf69e5000cca0e436cf31", 0x196}, {&(0x7f0000000480)="247d6c047133384eed53a1872d1c5c10634579cef6fa86e9839082eda4edc8ca914cf410ee1b3f3e4db64f9d7a5a33bcf9b85ec7b3f6941601244645a74806a233ca831470378204213931c6f63150dbed77654e06c0dff9a274744c7c2bcefccaef34937475486463363b5fe99c567523595a0138f3c36cb7d4cb0494642585d0711f5ad7dcef00d9e90e41719c8ffa3e8984f75ec77e6926be259c632e8a8f8b8589a93af70423d47bdfc5da42c1fe5e498f33dff5b6cd53abcd7df3da0d9f6a25264995c9b6220ff69dbb3280724a44f945471ef61d37fe3a2e85649523770e6a472bd2aba814751b6886fef6d4", 0xef}, {&(0x7f0000000580)="5fca5948c32e1a8d9dcd9f1575def2b626ce0ed0e0d7e85317086dad222e513e99c05a0ea9df0dd7b867197b19cf6ad01f0e43b8c4943706c66da6cd59c51185565ee54df09ea7c7e3c2", 0x4a}, {&(0x7f0000000600)="51c7d67352220a507ab670ce74b3f0dbd61452c8c21db78d0844e098d546b29c7c3c11f06189b54dd74f58b5ee29960c2192075c2d06086e63bb4bfadcda666ad87e9f87732864f3f574900bf12981a57626c103ef1b8d86a70bbeb25040b459135be9f0779cb0893eb0443257e9eb", 0x6f}, {&(0x7f0000000680)="ccd7634df53ea94d0d88e5b14afd51aa4cad9437e115c6d8285cee50e5292973e6c137b3d048ccc6513604ed44bc835140f24738f6963b9a2894adb1e7fbed1123a7241d5c0560fd09807a1d6d33afb65d9551323aa68edb80df06a14368c8a576dc73570b47874b4d8610ebce86a94d5101", 0x72}], 0x6, &(0x7f0000000780), 0x0, 0x1}, 0x20004000) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r1, &(0x7f0000000800)=""/186, 0xba) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f0000000380)={0x1000, 0x8000, 0xffffffff}, 0xc) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x441000, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r3, &(0x7f0000000180)=""/186, 0xba) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000280)={&(0x7f0000000240)='./file0\x00', 0x1}, 0x10) ioctl$DRM_IOCTL_MODE_GETGAMMA(r3, 0xc02064a4, &(0x7f0000000180)={0x1, 0x6, &(0x7f00000000c0)=[0x401, 0x2, 0x7fff, 0x5, 0x2, 0x4], &(0x7f0000000100)=[0x7fff], &(0x7f0000000140)=[0x5f1e]}) getsockopt$MISDN_TIME_STAMP(r2, 0x0, 0x1, &(0x7f0000000040), &(0x7f0000000080)=0x4) [ 3239.485712] CPU: 1 PID: 1122 Comm: syz-executor.5 Not tainted 4.19.131-syzkaller #0 [ 3239.493546] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3239.502912] Call Trace: [ 3239.505651] dump_stack+0x1fc/0x2fe [ 3239.509400] should_fail.cold+0xa/0x14 [ 3239.513313] ? setup_fault_attr+0x200/0x200 [ 3239.517789] ? lock_acquire+0x170/0x3c0 [ 3239.521792] __should_failslab+0x115/0x180 [ 3239.526046] should_failslab+0x5/0xf [ 3239.529782] __kmalloc_track_caller+0x2a6/0x3c0 [ 3239.534466] ? kstrdup_const+0x53/0x80 [ 3239.538373] kstrdup+0x36/0x70 [ 3239.541585] kstrdup_const+0x53/0x80 [ 3239.545332] alloc_vfsmnt+0xb5/0x780 [ 3239.549062] clone_mnt+0x6c/0x11b0 [ 3239.552623] ? is_subdir+0x246/0x410 [ 3239.554506] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 3239.556374] copy_tree+0x100/0xaf0 [ 3239.556397] ? lock_acquire+0x170/0x3c0 [ 3239.556407] ? is_subdir+0x164/0x410 [ 3239.556428] propagate_one.part.0+0x3a8/0x710 [ 3239.579910] propagate_mnt+0x201/0x530 [ 3239.579925] ? invent_group_ids+0x152/0x210 [ 3239.588144] attach_recursive_mnt+0x697/0xd80 [ 3239.588159] ? count_mounts+0x210/0x210 [ 3239.596743] ? clone_mnt+0x701/0x11b0 [ 3239.596760] graft_tree+0x187/0x210 [ 3239.604262] do_mount+0x217b/0x2f10 [ 3239.604283] ? lock_downgrade+0x720/0x720 [ 3239.604299] ? lock_acquire+0x170/0x3c0 [ 3239.616481] ? __might_fault+0xef/0x1d0 [ 3239.616497] ? copy_mount_string+0x40/0x40 [ 3239.624980] ? __might_fault+0x192/0x1d0 [ 3239.624996] ? _copy_from_user+0xd2/0x130 [ 3239.625011] ? copy_mount_options+0x26f/0x380 [ 3239.625027] ksys_mount+0xcf/0x130 [ 3239.625047] __x64_sys_mount+0xba/0x150 [ 3239.645289] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3239.649888] do_syscall_64+0xf9/0x620 [ 3239.653793] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3239.659187] RIP: 0033:0x45cb29 [ 3239.662389] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 05:32:49 executing program 2: inotify_init() r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) ioctl$TIOCEXCL(r0, 0x540c) [ 3239.681307] RSP: 002b:00007fe38a84bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3239.681321] RAX: ffffffffffffffda RBX: 00000000004f7560 RCX: 000000000045cb29 [ 3239.681335] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000000 [ 3239.681343] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3239.681355] R10: 0000000000a51000 R11: 0000000000000246 R12: 0000000000000004 [ 3239.718273] R13: 000000000000077b R14: 00000000004ca735 R15: 00007fe38a84c6d4 05:32:49 executing program 2: r0 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvme-fabrics\x00', 0x400080, 0x0) getsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000040)=0x17, &(0x7f0000000080)=0x4) inotify_init() ioctl$TIOCL_UNBLANKSCREEN(r0, 0x541c, &(0x7f00000000c0)) 05:32:49 executing program 5 (fault-call:3 fault-nth:31): perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:49 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0xfff}, 0x10000, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3239.902799] FAULT_INJECTION: forcing a failure. [ 3239.902799] name failslab, interval 1, probability 0, space 0, times 0 [ 3239.925454] CPU: 1 PID: 1200 Comm: syz-executor.5 Not tainted 4.19.131-syzkaller #0 [ 3239.933285] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3239.942772] Call Trace: [ 3239.945415] dump_stack+0x1fc/0x2fe [ 3239.949069] should_fail.cold+0xa/0x14 [ 3239.952977] ? setup_fault_attr+0x200/0x200 [ 3239.957329] ? lock_acquire+0x170/0x3c0 [ 3239.961347] __should_failslab+0x115/0x180 [ 3239.965601] should_failslab+0x5/0xf [ 3239.969340] kmem_cache_alloc+0x277/0x370 [ 3239.973514] alloc_vfsmnt+0x23/0x780 [ 3239.977251] clone_mnt+0x6c/0x11b0 [ 3239.980808] ? is_subdir+0x246/0x410 [ 3239.984545] copy_tree+0x100/0xaf0 [ 3239.988103] ? lock_acquire+0x170/0x3c0 [ 3239.992362] ? is_subdir+0x164/0x410 [ 3239.996103] propagate_one.part.0+0x3a8/0x710 [ 3240.000711] propagate_mnt+0x201/0x530 [ 3240.004615] ? invent_group_ids+0x152/0x210 [ 3240.008958] attach_recursive_mnt+0x697/0xd80 [ 3240.013461] ? count_mounts+0x210/0x210 [ 3240.017442] ? clone_mnt+0x701/0x11b0 [ 3240.021267] graft_tree+0x187/0x210 [ 3240.024916] do_mount+0x217b/0x2f10 [ 3240.028566] ? lock_downgrade+0x720/0x720 [ 3240.032815] ? lock_acquire+0x170/0x3c0 [ 3240.036803] ? __might_fault+0xef/0x1d0 [ 3240.040796] ? copy_mount_string+0x40/0x40 [ 3240.043071] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 3240.045046] ? __might_fault+0x192/0x1d0 [ 3240.045064] ? _copy_from_user+0xd2/0x130 [ 3240.045083] ? copy_mount_options+0x26f/0x380 [ 3240.065331] ksys_mount+0xcf/0x130 [ 3240.068901] __x64_sys_mount+0xba/0x150 [ 3240.072893] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3240.077492] do_syscall_64+0xf9/0x620 [ 3240.081314] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3240.086609] RIP: 0033:0x45cb29 05:32:49 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}, 0x1, 0x2a1d8}, 0x0) 05:32:49 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000000003000000000c0004"], 0x30}}, 0x0) 05:32:49 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa5100c, 0x0) 05:32:49 executing program 2: inotify_init() arch_prctl$ARCH_GET_CPUID(0x1011) [ 3240.089906] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3240.108975] RSP: 002b:00007fe38a84bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3240.116676] RAX: ffffffffffffffda RBX: 00000000004f7560 RCX: 000000000045cb29 [ 3240.123951] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000000 [ 3240.131214] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3240.138606] R10: 0000000000a51000 R11: 0000000000000246 R12: 0000000000000004 [ 3240.146129] R13: 000000000000077b R14: 00000000004ca735 R15: 00007fe38a84c6d4 05:32:49 executing program 2: sysfs$2(0x2, 0x1, &(0x7f0000000000)=""/201) setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x2) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) ioctl$SNDCTL_DSP_POST(r0, 0x5008, 0x0) inotify_init() 05:32:50 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080)='devlink\x00') sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x80, r1, 0x800, 0x70bd2d, 0x25dfdbfc, {}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8}, {0x6, 0x11, 0x3}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x1000}, {0x6, 0x11, 0x3}}]}, 0x80}}, 0x11) 05:32:50 executing program 5 (fault-call:3 fault-nth:32): perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:50 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c0003000000000f000000000c0004"], 0x30}}, 0x0) 05:32:50 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51027, 0x0) [ 3240.315292] FAULT_INJECTION: forcing a failure. [ 3240.315292] name failslab, interval 1, probability 0, space 0, times 0 [ 3240.342376] CPU: 1 PID: 1246 Comm: syz-executor.5 Not tainted 4.19.131-syzkaller #0 [ 3240.350300] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3240.359666] Call Trace: [ 3240.362273] dump_stack+0x1fc/0x2fe [ 3240.365926] should_fail.cold+0xa/0x14 [ 3240.369856] ? setup_fault_attr+0x200/0x200 [ 3240.374194] ? lock_acquire+0x170/0x3c0 [ 3240.378200] __should_failslab+0x115/0x180 [ 3240.382453] should_failslab+0x5/0xf [ 3240.386188] kmem_cache_alloc+0x277/0x370 [ 3240.390355] alloc_vfsmnt+0x23/0x780 [ 3240.394199] clone_mnt+0x6c/0x11b0 [ 3240.397758] ? is_subdir+0x246/0x410 [ 3240.401498] copy_tree+0x100/0xaf0 [ 3240.405059] ? lock_acquire+0x170/0x3c0 [ 3240.409049] ? is_subdir+0x164/0x410 [ 3240.412790] propagate_one.part.0+0x3a8/0x710 [ 3240.417311] propagate_mnt+0x201/0x530 [ 3240.421216] ? invent_group_ids+0x152/0x210 [ 3240.425556] attach_recursive_mnt+0x697/0xd80 [ 3240.430068] ? count_mounts+0x210/0x210 [ 3240.434061] ? clone_mnt+0x701/0x11b0 [ 3240.437880] graft_tree+0x187/0x210 [ 3240.441523] do_mount+0x217b/0x2f10 [ 3240.445168] ? lock_downgrade+0x720/0x720 [ 3240.449458] ? lock_acquire+0x170/0x3c0 [ 3240.453450] ? __might_fault+0xef/0x1d0 [ 3240.457457] ? copy_mount_string+0x40/0x40 [ 3240.457476] ? __might_fault+0x192/0x1d0 05:32:50 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000380)={0x0, 0x1f}, 0x2) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r1, &(0x7f0000000180)=""/186, 0xba) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000000)={'nat\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(0xffffffffffffffff, 0xc01064bd, &(0x7f0000000140)={&(0x7f0000000100)="f1562bdb4f1c55bb360a209c40bfcaa01a81b260d2c48f3aa6eb54d1db3956424061df5a834911c3c18604af75627cfb706f8971b4eee8a257beea30850f6032", 0x40, 0x0}) ioctl$DRM_IOCTL_MODE_GETPROPBLOB(r1, 0xc01064ac, &(0x7f0000000340)={r2, 0xd4, &(0x7f0000000240)=""/212}) inotify_init() r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r3, &(0x7f0000000180)=""/186, 0xba) getsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 05:32:50 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c000300000000f0000000000c0004"], 0x30}}, 0x0) [ 3240.465786] ? _copy_from_user+0xd2/0x130 [ 3240.465799] ? copy_mount_options+0x26f/0x380 [ 3240.465811] ksys_mount+0xcf/0x130 05:32:50 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa5104f, 0x0) [ 3240.465823] __x64_sys_mount+0xba/0x150 [ 3240.465836] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3240.465848] do_syscall_64+0xf9/0x620 [ 3240.465863] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3240.465871] RIP: 0033:0x45cb29 [ 3240.465882] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3240.465888] RSP: 002b:00007fe38a84bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3240.465898] RAX: ffffffffffffffda RBX: 00000000004f7560 RCX: 000000000045cb29 [ 3240.465904] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000000 [ 3240.465910] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3240.465916] R10: 0000000000a51000 R11: 0000000000000246 R12: 0000000000000004 [ 3240.465922] R13: 000000000000077b R14: 00000000004ca735 R15: 00007fe38a84c6d4 [ 3240.662313] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 05:32:50 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}, 0x1, 0x2a1d9}, 0x0) 05:32:50 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000000000030000000c0004"], 0x30}}, 0x0) 05:32:50 executing program 5 (fault-call:3 fault-nth:33): perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:50 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xde6aad37e5517fb6}, 0x2, 0x0, 0x0, 0x0, 0x3f, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:50 executing program 2: inotify_init() setsockopt$CAN_RAW_JOIN_FILTERS(0xffffffffffffffff, 0x65, 0x6, &(0x7f0000000000)=0x1, 0x4) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r0, 0x8982, &(0x7f0000000040)={0x7, 'syzkaller1\x00', {0x61}, 0x9}) r1 = syz_open_dev$vcsu(&(0x7f00000000c0)='/dev/vcsu#\x00', 0x2, 0x20240) sendmsg$IPSET_CMD_TEST(r1, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000380)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x80}, 0x1, 0x0, 0x0, 0x4}, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r2, &(0x7f0000000180)=""/186, 0xba) connect$vsock_stream(r2, &(0x7f0000000240)={0x28, 0x0, 0x2710, @host}, 0x10) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r3, &(0x7f0000000180)=""/186, 0xba) sendmsg$RDMA_NLDEV_CMD_RES_CQ_GET(r3, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x14}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000000c14100026bd7000fcdb3e151615b905dc9609bbe8ba52421fdf2508000100000000000800010002000000080003000100000008003d000500000008003d000100000008", @ANYRESHEX, @ANYBLOB="916d1dbb08ba6e"], 0x48}, 0x1, 0x0, 0x0, 0x4004}, 0x4000) 05:32:50 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51050, 0x0) [ 3240.874562] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 3240.930082] FAULT_INJECTION: forcing a failure. [ 3240.930082] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3240.942081] CPU: 1 PID: 1338 Comm: syz-executor.5 Not tainted 4.19.131-syzkaller #0 [ 3240.949887] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3240.959278] Call Trace: [ 3240.961893] dump_stack+0x1fc/0x2fe [ 3240.965547] should_fail.cold+0xa/0x14 [ 3240.967179] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 3240.969452] ? kernel_text_address+0xbd/0xf0 [ 3240.969471] ? setup_fault_attr+0x200/0x200 [ 3240.969488] ? unwind_get_return_address+0x51/0x90 [ 3240.990493] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3240.995974] ? __save_stack_trace+0xaf/0x190 [ 3241.000403] __alloc_pages_nodemask+0x239/0x2890 [ 3241.005178] ? __lock_acquire+0x6de/0x3ff0 [ 3241.009440] ? __lock_acquire+0x6de/0x3ff0 [ 3241.013696] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 3241.018793] ? __lock_acquire+0x6de/0x3ff0 [ 3241.023051] ? lock_downgrade+0x720/0x720 [ 3241.027224] ? __lock_acquire+0x6de/0x3ff0 [ 3241.031494] cache_grow_begin+0xa4/0x8a0 [ 3241.035570] ? setup_fault_attr+0x200/0x200 [ 3241.039907] ? cache_alloc_pfmemalloc+0x1e/0x140 [ 3241.044698] cache_alloc_refill+0x273/0x340 [ 3241.049048] kmem_cache_alloc+0x346/0x370 [ 3241.053203] alloc_vfsmnt+0x23/0x780 [ 3241.057001] clone_mnt+0x6c/0x11b0 [ 3241.060543] ? is_subdir+0x246/0x410 [ 3241.064265] copy_tree+0x100/0xaf0 [ 3241.067800] ? lock_acquire+0x170/0x3c0 [ 3241.071777] ? is_subdir+0x164/0x410 [ 3241.075504] propagate_one.part.0+0x3a8/0x710 [ 3241.079999] propagate_mnt+0x201/0x530 [ 3241.083888] ? invent_group_ids+0x152/0x210 [ 3241.088215] attach_recursive_mnt+0x697/0xd80 [ 3241.092703] ? count_mounts+0x210/0x210 [ 3241.096672] ? clone_mnt+0x701/0x11b0 [ 3241.100483] graft_tree+0x187/0x210 [ 3241.104130] do_mount+0x217b/0x2f10 [ 3241.107761] ? lock_downgrade+0x720/0x720 [ 3241.111900] ? lock_acquire+0x170/0x3c0 [ 3241.115876] ? __might_fault+0xef/0x1d0 [ 3241.119856] ? copy_mount_string+0x40/0x40 [ 3241.124098] ? __might_fault+0x192/0x1d0 [ 3241.128162] ? _copy_from_user+0xd2/0x130 [ 3241.132302] ? copy_mount_options+0x26f/0x380 [ 3241.136792] ksys_mount+0xcf/0x130 [ 3241.140327] __x64_sys_mount+0xba/0x150 [ 3241.144310] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3241.148897] do_syscall_64+0xf9/0x620 [ 3241.152708] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3241.157913] RIP: 0033:0x45cb29 [ 3241.161101] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 05:32:51 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x20000, 0x0) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, &(0x7f0000000280)) 05:32:51 executing program 2: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x80, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r1, &(0x7f0000000180)=""/186, 0xba) ioctl$SNDRV_PCM_IOCTL_STATUS64(r1, 0x80984120, &(0x7f00000002c0)) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(r0, 0x80184153, &(0x7f0000000280)={0x0, &(0x7f0000000240)=[&(0x7f0000000040)="97f5d079474f0ac5d50e7c0d025e278e30b8dcb41c1626061390a0057669b784ca72f00cf3f23d69a2890913b915352d2fcc4e0a08041b8984ffaeced4d7811ec8cf50229f2434fad56650da6396272d3d50bd187575349fb098fb8f6a0d06480155bc2d8312d6263bccca1c28011d4e84d6ad8d6e4e16a0663514aea323829ba90f62835b07196c3608883eaaefcb96e8f7c8bae00c770a6ba5f755f3ce335737b2eaef183bdb80df57b2625b69b852caa354dc8e4f98046829e59b8eb01ebdd63e024396542252", &(0x7f0000000140)="3924f7081881e5dc1d65570d0852d111a42f752c9136368ac725fc305338345fe1693b3bdb249b037888bd08cd7a2a41b8ea1cbf2e855db34629e84061db42d982ac4f71ab26ad9c46baa3d9cc00b9ef716e9a675d141169840ccd164a6de16b7a370ef8b6cd0082b5e49626d96a1f33bd1ae74c1100d58e41c778b75767d6bc8b383c2e73148a43f09674920143f03b6427da2da1bf837af0a728b8c74e87402e98656e38971286e4eebf40658da46e0ce9ea597f3904dd21469a89d66170723a7f71152d6b5a5ac9046ca1165edd964a406068bb763d3d6798423ab9a172b0c93858e17ff39cb32cfdf921842cf3fe2e965b5e129f"]}) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000380)={0x0, 0x1f, 0x1}) fcntl$addseals(r1, 0x409, 0x0) [ 3241.180342] RSP: 002b:00007fe38a84bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3241.188041] RAX: ffffffffffffffda RBX: 00000000004f7560 RCX: 000000000045cb29 [ 3241.195477] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000000 [ 3241.202738] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3241.210001] R10: 0000000000a51000 R11: 0000000000000246 R12: 0000000000000004 [ 3241.217265] R13: 000000000000077b R14: 00000000004ca735 R15: 00007fe38a84c6d4 05:32:51 executing program 2: inotify_init() sched_yield() r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x8400, 0x0) io_setup(0x8ac, &(0x7f00000000c0)) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) setsockopt$TIPC_DEST_DROPPABLE(0xffffffffffffffff, 0x10f, 0x81, &(0x7f0000000100)=0x8001, 0x4) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000140)=ANY=[@ANYBLOB="0a63154ecab6db8e080063009efeffffffffffffff002200a101ff03ff1e6aafcec6190b1b1880dc1aeb206201dff90002ec00"], &(0x7f0000000040)=0x18) 05:32:51 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c000300000000000f0000000c0004"], 0x30}}, 0x0) 05:32:51 executing program 5 (fault-call:3 fault-nth:34): perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:51 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51052, 0x0) [ 3241.547721] FAULT_INJECTION: forcing a failure. [ 3241.547721] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3241.559723] CPU: 0 PID: 1421 Comm: syz-executor.5 Not tainted 4.19.131-syzkaller #0 [ 3241.566808] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 3241.567661] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3241.567667] Call Trace: [ 3241.567691] dump_stack+0x1fc/0x2fe [ 3241.567713] should_fail.cold+0xa/0x14 [ 3241.567730] ? check_preemption_disabled+0x41/0x280 [ 3241.567746] ? setup_fault_attr+0x200/0x200 [ 3241.567773] __alloc_pages_nodemask+0x239/0x2890 [ 3241.567794] ? __lock_acquire+0x6de/0x3ff0 [ 3241.567827] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 3241.567843] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 3241.567858] ? __lock_acquire+0x6de/0x3ff0 [ 3241.567881] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3241.567900] ? __lock_acquire+0x6de/0x3ff0 [ 3241.567916] ? ____cache_alloc_node+0x156/0x1d0 [ 3241.567937] cache_grow_begin+0xa4/0x8a0 [ 3241.567950] ? check_preemption_disabled+0x41/0x280 [ 3241.567969] ____cache_alloc_node+0x170/0x1d0 [ 3241.567982] ? check_preemption_disabled+0x41/0x280 [ 3241.567997] kmem_cache_alloc+0x1e4/0x370 [ 3241.568012] alloc_vfsmnt+0x23/0x780 [ 3241.568025] clone_mnt+0x6c/0x11b0 [ 3241.568042] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3241.676135] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3241.676153] copy_tree+0x100/0xaf0 [ 3241.684458] propagate_one.part.0+0x3a8/0x710 [ 3241.688988] propagate_mnt+0x201/0x530 [ 3241.689004] ? invent_group_ids+0x152/0x210 [ 3241.689024] attach_recursive_mnt+0x697/0xd80 [ 3241.689040] ? count_mounts+0x210/0x210 [ 3241.689056] ? clone_mnt+0x701/0x11b0 [ 3241.689073] graft_tree+0x187/0x210 [ 3241.689089] do_mount+0x217b/0x2f10 [ 3241.689109] ? lock_downgrade+0x720/0x720 [ 3241.689123] ? lock_acquire+0x170/0x3c0 [ 3241.689138] ? __might_fault+0xef/0x1d0 [ 3241.689154] ? copy_mount_string+0x40/0x40 [ 3241.689172] ? __might_fault+0x192/0x1d0 [ 3241.689189] ? _copy_from_user+0xd2/0x130 [ 3241.689206] ? copy_mount_options+0x26f/0x380 05:32:51 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}, 0x1, 0x2a1da}, 0x0) 05:32:51 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) ioctl$SOUND_MIXER_READ_CAPS(0xffffffffffffffff, 0x80044dfc, &(0x7f0000000100)) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) r1 = accept$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, &(0x7f0000000040)=0x10) getsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000080), &(0x7f00000000c0)=0x4) inotify_init() 05:32:51 executing program 1: r0 = perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x40, 0x0, 0x0, 0x6, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x19) sendfile(r0, r0, &(0x7f0000000040)=0x6, 0x1) mkdir(&(0x7f0000000080)='./file0\x00', 0x177) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:51 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c000300000000542d0000000c0004"], 0x30}}, 0x0) [ 3241.689224] ksys_mount+0xcf/0x130 [ 3241.689239] __x64_sys_mount+0xba/0x150 [ 3241.689253] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3241.689270] do_syscall_64+0xf9/0x620 [ 3241.762339] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3241.762350] RIP: 0033:0x45cb29 [ 3241.762362] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3241.762374] RSP: 002b:00007fe38a84bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3241.797686] RAX: ffffffffffffffda RBX: 00000000004f7560 RCX: 000000000045cb29 05:32:51 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c000300000000003f0000000c0004"], 0x30}}, 0x0) [ 3241.797695] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000000 [ 3241.797703] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3241.797712] R10: 0000000000a51000 R11: 0000000000000246 R12: 0000000000000004 05:32:51 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) setsockopt$inet_int(r0, 0x0, 0x22, &(0x7f0000000000)=0x7fffffff, 0x4) inotify_init() 05:32:51 executing program 5 (fault-call:3 fault-nth:35): perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3241.797720] R13: 000000000000077b R14: 00000000004ca735 R15: 00007fe38a84c6d4 05:32:51 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51054, 0x0) 05:32:51 executing program 2: inotify_init() syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x100000001, 0x7, &(0x7f0000001440)=[{&(0x7f0000000080)="55f87378da7cdabac3e5981985b1db899cd427f23815e44b5d7c21d55d483d40006c5517ef95eb986e66a9387d7f90314578ef27a5b4662cd33f57005428c5c55751eecd100e2ba40b92884258ccbf2d836d34a89f8e95a5da3f450131b36bec59689848fd6b0f0c198acf11953244d9e32a6da74f4047fd3df838de3e2cd6614abddcf08d2965327b3eb922981dad42c7bd798ddba77fdb39832a6282b103d91f2ba0737dea4ca79d30aac28bec8857ea8de686e430abb74bc8c00f198dbad82bb42e2a7f86a9dbf3d99f702b5c11238b4e893cb33b444a006a", 0xda, 0x6}, {&(0x7f0000000180)="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", 0x1000, 0x6}, {&(0x7f0000001180)="f9fa76b3f3b35479015f3daf935ccd1dc8822f2ae2c8e8a15aec1699bf42da70a1ab66d2226a9d4116ee94d75748c555b5339041a27c16c3241507cffa72b28e40cf1392ba5acd4b825cc93ccfefb0761ce02141f09d6ca3c1e3cf80cd55c30192a7148c8293e78d5c0afc5682347b56e944dcb5088ac6ef553a2abb78ac4c014a6a3bc274ce5b1601436c7881dfb8fe9fa1e7cb262f0f090e119bed61638e43b2269b7640436c7e2e5b41bfcae050f32bcd7a1d64ae6eb3f16092500f98020dc762893bc942c7f99368cfbdc303", 0xce, 0x6}, {&(0x7f0000001280)="ab28", 0x2, 0x101}, {&(0x7f00000012c0)="5a1680e7ec8f10fd50e4849a9f364fc7317e7e8de8cc10b3ba2ac9f8f49162abf3117abfdd4a3d472c02c7bac3afcc7043e89b1136820d96e65e74146d88cf505afdfeeca7bd5970fd9c7d5694068e109c4ae96c0d4f342be7b58c030ae528db5b77beb4a5508c1c6b8ebd1489e1a3d876f6f24db3e453978fb142cd11837d9b7121e55e143cb188ade34129b850fa1d042ca03835c0d71ebeeff4fb04a3986580fca5c495bcf82cb5c3dc8c7a6e701742bb11dc184065f805e551da276a01e775a8ddb701200e61", 0xc8, 0x4}, {&(0x7f00000013c0)="5b53e1d4", 0x4, 0xaa}, {&(0x7f0000001400)="a3e12ca5bab73be0517794093a0149aef493755a5dd1a591a2c420e4e9b97e6d3fb7c3fead351ec29456e1", 0x2b, 0x1ff}], 0x80000, &(0x7f0000001500)={[{@numtail='nonumtail=0'}, {@rodir='rodir'}, {@utf8no='utf8=0'}], [{@obj_user={'obj_user', 0x3d, '$]+][%(\\.'}}]}) [ 3242.004656] FAULT_INJECTION: forcing a failure. [ 3242.004656] name failslab, interval 1, probability 0, space 0, times 0 [ 3242.055477] CPU: 1 PID: 1462 Comm: syz-executor.5 Not tainted 4.19.131-syzkaller #0 [ 3242.063307] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3242.072676] Call Trace: [ 3242.075289] dump_stack+0x1fc/0x2fe [ 3242.078949] should_fail.cold+0xa/0x14 [ 3242.082859] ? setup_fault_attr+0x200/0x200 [ 3242.087200] ? lock_acquire+0x170/0x3c0 [ 3242.091198] __should_failslab+0x115/0x180 [ 3242.095451] should_failslab+0x5/0xf [ 3242.099219] __kmalloc_track_caller+0x2a6/0x3c0 [ 3242.103903] ? kstrdup_const+0x53/0x80 [ 3242.107809] kstrdup+0x36/0x70 [ 3242.111021] kstrdup_const+0x53/0x80 [ 3242.114751] alloc_vfsmnt+0xb5/0x780 [ 3242.118482] clone_mnt+0x6c/0x11b0 [ 3242.122037] ? is_subdir+0x246/0x410 [ 3242.125769] copy_tree+0x100/0xaf0 [ 3242.129333] ? lock_acquire+0x170/0x3c0 [ 3242.133326] ? is_subdir+0x164/0x410 [ 3242.137062] propagate_one.part.0+0x3a8/0x710 [ 3242.141586] propagate_mnt+0x201/0x530 [ 3242.145488] ? invent_group_ids+0x152/0x210 [ 3242.149829] attach_recursive_mnt+0x697/0xd80 [ 3242.154430] ? count_mounts+0x210/0x210 [ 3242.158423] ? clone_mnt+0x701/0x11b0 [ 3242.162245] graft_tree+0x187/0x210 [ 3242.166100] do_mount+0x217b/0x2f10 [ 3242.169752] ? lock_downgrade+0x720/0x720 [ 3242.174123] ? lock_acquire+0x170/0x3c0 [ 3242.178110] ? __might_fault+0xef/0x1d0 [ 3242.182110] ? copy_mount_string+0x40/0x40 [ 3242.186363] ? __might_fault+0x192/0x1d0 [ 3242.190563] ? _copy_from_user+0xd2/0x130 [ 3242.194725] ? copy_mount_options+0x26f/0x380 [ 3242.199238] ksys_mount+0xcf/0x130 [ 3242.202795] __x64_sys_mount+0xba/0x150 [ 3242.206948] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3242.211548] do_syscall_64+0xf9/0x620 [ 3242.215365] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3242.220562] RIP: 0033:0x45cb29 [ 3242.223768] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3242.242834] RSP: 002b:00007fe38a84bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 05:32:51 executing program 2: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x503100, 0x0) inotify_init() r0 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x40, 0x0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, &(0x7f0000000100)=""/107, &(0x7f0000000180)=0x6b) [ 3242.250551] RAX: ffffffffffffffda RBX: 00000000004f7560 RCX: 000000000045cb29 [ 3242.257934] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000000 [ 3242.265222] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3242.272495] R10: 0000000000a51000 R11: 0000000000000246 R12: 0000000000000004 [ 3242.279785] R13: 000000000000077b R14: 00000000004ca735 R15: 00007fe38a84c6d4 05:32:52 executing program 2: inotify_init() r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f00000000c0)=""/180, 0xb4) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r1, &(0x7f0000000280)=""/178, 0xb2) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r2, &(0x7f0000000180)=""/186, 0xba) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r3, &(0x7f0000000180)=""/186, 0xba) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r4, &(0x7f0000000180)=""/186, 0xba) pipe(&(0x7f0000000040)) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r6, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800070006"], 0x3c}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'batadv0\x00', r6}) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r7, &(0x7f0000000180)=""/186, 0xba) ioctl$RTC_ALM_READ(r7, 0x80247008, &(0x7f0000000080)) 05:32:52 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(r0, 0xc01064c7, &(0x7f0000000080)) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r1, &(0x7f0000000180)=""/186, 0xba) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000040)={0x1, 'veth0_macvtap\x00', {}, 0x5}) inotify_init() 05:32:52 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}, 0x1, 0x2a1db}, 0x0) 05:32:52 executing program 5 (fault-call:3 fault-nth:36): perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:52 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51064, 0x0) 05:32:52 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$sock_ax25_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x6, [@null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}) tkill(r1, 0x2) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000240)={0x1ff, 0x3f, 0x3f, 0x20, 0xe, "77cd843fbc8ed7e4c92b7f67b2531067f4bd6f"}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r2, &(0x7f0000000180)=""/186, 0xba) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000003c0)=@buf={0x0, &(0x7f0000000380)}) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r3, &(0x7f0000000180)=""/186, 0xba) ioctl$DRM_IOCTL_MODE_SETGAMMA(r3, 0xc02064a5, &(0x7f0000000340)={0x8001, 0x4, &(0x7f0000000280)=[0xfff, 0x3ff, 0x6, 0x100], &(0x7f00000002c0), &(0x7f0000000300)=[0x5, 0x0]}) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000000)=r1) inotify_init() r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r4, &(0x7f0000000180)=""/186, 0xba) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r4, 0xc0945662, &(0x7f00000000c0)={0x4adc, 0x0, [], {0x0, @bt={0x801f, 0xfffffffb, 0x0, 0x1, 0x0, 0x10001, 0x3e875779, 0x5, 0x62e, 0x0, 0x9, 0x1, 0x1193d22d, 0x2, 0x6, 0x2, {0x8, 0x9}, 0x9, 0x81}}}) 05:32:52 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c0003000000002d540000000c0004"], 0x30}}, 0x0) 05:32:52 executing program 2: inotify_init() pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) ioctl$vim2m_VIDIOC_G_FMT(r1, 0xc0d05604, &(0x7f00000002c0)={0x2, @win={{0xe4, 0x1, 0x5, 0x8}, 0x6, 0x2769, &(0x7f0000000140)={{0x9, 0x7f, 0x81, 0x7fff}, &(0x7f0000000100)={{0x7f, 0xff, 0x10000, 0x3}, &(0x7f00000000c0)={{0x9, 0x8001, 0x1000, 0xfffff801}}}}, 0x182, &(0x7f0000000240)="c901efe24756c424d84a1fb8eb52bee31a88eee29446c6759af051a8e6146b9d21a5d1a496d423dcda22ecb8bb17ac3a3774ab855334c5da0095cb54d0a96af1a37726b97d436a2ae40bb7cd8bba2bf38ad254e019eb55bad234343fb2e3d360eecd549966647b5e", 0x7c}}) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r3, &(0x7f0000000180)=""/186, 0xba) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000003c0)={0x0, 0x7, 0x5, [0x1, 0x6, 0x0, 0x7, 0x40]}, &(0x7f0000000400)=0x12) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r3, 0x84, 0x17, &(0x7f0000000440)=ANY=[@ANYRES32=r4, @ANYBLOB="0400493216c90e5ee1bcfd2001d904c626a60ca4fab74ed3518f6f51d7180223a7520219a3b507d9b995f472c7f3880e6e378808de1c5b88030c1373dfc16caecfee0fb5cfe1e0a14225c91512"], 0x51) read$dsp(r2, &(0x7f0000000180)=""/186, 0xba) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r5, &(0x7f0000000180)=""/186, 0xba) ioctl$SCSI_IOCTL_GET_PCI(r5, 0x5387, &(0x7f0000000040)) 05:32:52 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa510de, 0x0) 05:32:53 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000000000f00000000c0004"], 0x30}}, 0x0) [ 3243.210202] FAULT_INJECTION: forcing a failure. [ 3243.210202] name failslab, interval 1, probability 0, space 0, times 0 [ 3243.281811] QAT: Invalid ioctl [ 3243.291668] CPU: 1 PID: 1575 Comm: syz-executor.5 Not tainted 4.19.131-syzkaller #0 [ 3243.299597] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3243.299602] Call Trace: [ 3243.299627] dump_stack+0x1fc/0x2fe [ 3243.299649] should_fail.cold+0xa/0x14 [ 3243.299669] ? setup_fault_attr+0x200/0x200 [ 3243.299686] ? lock_acquire+0x170/0x3c0 [ 3243.299710] __should_failslab+0x115/0x180 [ 3243.299730] should_failslab+0x5/0xf [ 3243.299747] kmem_cache_alloc+0x277/0x370 [ 3243.299765] alloc_vfsmnt+0x23/0x780 [ 3243.299784] clone_mnt+0x6c/0x11b0 [ 3243.347006] ? is_subdir+0x246/0x410 [ 3243.347023] copy_tree+0x100/0xaf0 [ 3243.354272] ? lock_acquire+0x170/0x3c0 [ 3243.354288] ? is_subdir+0x164/0x410 [ 3243.354311] propagate_one.part.0+0x3a8/0x710 [ 3243.354331] propagate_mnt+0x201/0x530 [ 3243.370386] ? invent_group_ids+0x152/0x210 [ 3243.370405] attach_recursive_mnt+0x697/0xd80 05:32:53 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000000000400300000c0004"], 0x30}}, 0x0) 05:32:53 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000000000034000000c0004"], 0x30}}, 0x0) [ 3243.370420] ? count_mounts+0x210/0x210 [ 3243.370436] ? clone_mnt+0x701/0x11b0 [ 3243.370451] graft_tree+0x187/0x210 [ 3243.370468] do_mount+0x217b/0x2f10 [ 3243.394229] ? rcu_nmi_exit+0xb3/0x180 [ 3243.394247] ? retint_kernel+0x2d/0x2d [ 3243.402010] ? copy_mount_string+0x40/0x40 [ 3243.402029] ? memdup_user+0x57/0xb0 [ 3243.409978] ? memdup_user+0x61/0xb0 [ 3243.409993] ? __sanitizer_cov_trace_pc+0x1c/0x50 05:32:53 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c000300000000fffff000000c0004"], 0x30}}, 0x0) [ 3243.410010] ? copy_mount_options+0x26f/0x380 [ 3243.410025] ksys_mount+0xcf/0x130 [ 3243.410040] __x64_sys_mount+0xba/0x150 [ 3243.410057] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3243.410075] do_syscall_64+0xf9/0x620 [ 3243.410094] entry_SYSCALL_64_after_hwframe+0x49/0xbe 05:32:53 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000000000000001000c0004"], 0x30}}, 0x0) [ 3243.410104] RIP: 0033:0x45cb29 [ 3243.410119] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3243.410126] RSP: 002b:00007fe38a84bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3243.410138] RAX: ffffffffffffffda RBX: 00000000004f7560 RCX: 000000000045cb29 [ 3243.410146] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000000 [ 3243.410154] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3243.410161] R10: 0000000000a51000 R11: 0000000000000246 R12: 0000000000000004 [ 3243.410169] R13: 000000000000077b R14: 00000000004ca735 R15: 00007fe38a84c6d4 [ 3243.648701] QAT: Invalid ioctl [ 3243.695710] validate_nla: 2 callbacks suppressed [ 3243.695719] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 05:32:53 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}, 0x1, 0x2a1dc}, 0x0) 05:32:53 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) 05:32:53 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000000000000002000c0004"], 0x30}}, 0x0) 05:32:53 executing program 5 (fault-call:3 fault-nth:37): perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:53 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xe, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r3, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800070006"], 0x3c}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r0, &(0x7f0000002340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000002300)={&(0x7f0000002180)={0x148, 0x0, 0x400, 0x70bd29, 0x25dfdbfb, {}, [@ETHTOOL_A_LINKSTATE_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}]}, @ETHTOOL_A_LINKSTATE_HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKSTATE_HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @ETHTOOL_A_LINKSTATE_HEADER={0x4}, @ETHTOOL_A_LINKSTATE_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @ETHTOOL_A_LINKSTATE_HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x4000081}, 0x1) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) mmap$snddsp(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x151, r0, 0x1000) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r4, &(0x7f0000000180)=""/186, 0xba) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r5, &(0x7f0000000180)=""/186, 0xba) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r5, 0x80045301, &(0x7f0000000040)) ioctl$EVIOCGMTSLOTS(r4, 0x8040450a, &(0x7f0000000280)=""/4096) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3243.982128] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 05:32:53 executing program 2: inotify_init() mount$9p_tcp(&(0x7f0000000000)='127.0.0.1\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x44040, &(0x7f00000000c0)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@loose='loose'}, {@loose='loose'}], [{@obj_role={'obj_role', 0x3d, '$:'}}]}}) [ 3244.066203] FAULT_INJECTION: forcing a failure. [ 3244.066203] name failslab, interval 1, probability 0, space 0, times 0 [ 3244.109684] CPU: 1 PID: 1675 Comm: syz-executor.5 Not tainted 4.19.131-syzkaller #0 [ 3244.117510] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3244.126862] Call Trace: [ 3244.129457] dump_stack+0x1fc/0x2fe [ 3244.133096] should_fail.cold+0xa/0x14 [ 3244.136988] ? setup_fault_attr+0x200/0x200 [ 3244.141320] ? lock_acquire+0x170/0x3c0 [ 3244.145320] __should_failslab+0x115/0x180 [ 3244.149562] should_failslab+0x5/0xf [ 3244.153289] kmem_cache_alloc+0x277/0x370 05:32:53 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000000000000003000c0004"], 0x30}}, 0x0) [ 3244.157440] alloc_vfsmnt+0x23/0x780 [ 3244.161163] clone_mnt+0x6c/0x11b0 [ 3244.164723] ? is_subdir+0x246/0x410 [ 3244.164742] copy_tree+0x100/0xaf0 [ 3244.171982] ? lock_acquire+0x170/0x3c0 [ 3244.172002] ? is_subdir+0x164/0x410 [ 3244.179803] propagate_one.part.0+0x3a8/0x710 [ 3244.179821] propagate_mnt+0x201/0x530 05:32:54 executing program 2: readv(0xffffffffffffffff, &(0x7f0000001600)=[{&(0x7f0000000080)=""/146, 0x92}, {&(0x7f00000016c0)=""/171, 0xab}, {&(0x7f0000000200)=""/67, 0x43}, {&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/207, 0xcf}, {&(0x7f0000000180)=""/67, 0x3c}, {&(0x7f0000001380)=""/206, 0xfffffffffffffdf8}, {&(0x7f0000001480)=""/132, 0x8e}, {&(0x7f0000001540)=""/181, 0xb5}], 0x9) socketpair(0x3, 0x3, 0x6, &(0x7f0000000040)) inotify_init() 05:32:54 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c0003000000000000000f000c0004"], 0x30}}, 0x0) [ 3244.179834] ? invent_group_ids+0x152/0x210 [ 3244.179850] attach_recursive_mnt+0x697/0xd80 05:32:54 executing program 5 (fault-call:3 fault-nth:38): perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3244.179865] ? count_mounts+0x210/0x210 [ 3244.179880] ? clone_mnt+0x701/0x11b0 [ 3244.179895] graft_tree+0x187/0x210 [ 3244.179911] do_mount+0x217b/0x2f10 [ 3244.179929] ? lock_downgrade+0x720/0x720 [ 3244.179943] ? lock_acquire+0x170/0x3c0 [ 3244.179957] ? __might_fault+0xef/0x1d0 [ 3244.179972] ? copy_mount_string+0x40/0x40 [ 3244.179990] ? __might_fault+0x192/0x1d0 [ 3244.180012] ? _copy_from_user+0xd2/0x130 [ 3244.180027] ? copy_mount_options+0x26f/0x380 [ 3244.180045] ksys_mount+0xcf/0x130 [ 3244.180061] __x64_sys_mount+0xba/0x150 [ 3244.180078] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3244.180094] do_syscall_64+0xf9/0x620 [ 3244.180113] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3244.180124] RIP: 0033:0x45cb29 05:32:54 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c0003000000000000542d000c0004"], 0x30}}, 0x0) 05:32:54 executing program 2: inotify_init() r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) tkill(r1, 0x2a) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000000)={'mangle\x00', 0x4, [{}, {}, {}, {}]}, 0x68) [ 3244.180138] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3244.180144] RSP: 002b:00007fe38a84bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3244.180157] RAX: ffffffffffffffda RBX: 00000000004f7560 RCX: 000000000045cb29 [ 3244.180165] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000000 [ 3244.180173] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3244.180181] R10: 0000000000a51000 R11: 0000000000000246 R12: 0000000000000004 [ 3244.180189] R13: 000000000000077b R14: 00000000004ca735 R15: 00007fe38a84c6d4 [ 3244.416015] FAULT_INJECTION: forcing a failure. [ 3244.416015] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3244.416031] CPU: 1 PID: 1742 Comm: syz-executor.5 Not tainted 4.19.131-syzkaller #0 [ 3244.416038] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3244.416043] Call Trace: [ 3244.416065] dump_stack+0x1fc/0x2fe [ 3244.416086] should_fail.cold+0xa/0x14 [ 3244.416100] ? check_preemption_disabled+0x41/0x280 [ 3244.416115] ? setup_fault_attr+0x200/0x200 [ 3244.416139] __alloc_pages_nodemask+0x239/0x2890 [ 3244.416157] ? __lock_acquire+0x6de/0x3ff0 [ 3244.416181] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 3244.416195] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 3244.416213] ? __lock_acquire+0x6de/0x3ff0 [ 3244.416240] ? __lock_acquire+0x6de/0x3ff0 [ 3244.416256] ? ____cache_alloc_node+0x156/0x1d0 [ 3244.416276] cache_grow_begin+0xa4/0x8a0 [ 3244.416289] ? check_preemption_disabled+0x41/0x280 [ 3244.416308] ____cache_alloc_node+0x170/0x1d0 [ 3244.416319] ? check_preemption_disabled+0x41/0x280 [ 3244.416335] kmem_cache_alloc+0x1e4/0x370 [ 3244.416348] alloc_vfsmnt+0x23/0x780 [ 3244.416360] clone_mnt+0x6c/0x11b0 [ 3244.416372] ? is_subdir+0x246/0x410 [ 3244.416386] copy_tree+0x100/0xaf0 [ 3244.416399] ? lock_acquire+0x170/0x3c0 [ 3244.416408] ? is_subdir+0x164/0x410 [ 3244.416429] propagate_one.part.0+0x3a8/0x710 [ 3244.416445] propagate_mnt+0x201/0x530 [ 3244.416456] ? invent_group_ids+0x152/0x210 [ 3244.416471] attach_recursive_mnt+0x697/0xd80 [ 3244.416485] ? count_mounts+0x210/0x210 [ 3244.416499] ? clone_mnt+0x701/0x11b0 [ 3244.416513] graft_tree+0x187/0x210 [ 3244.416527] do_mount+0x217b/0x2f10 [ 3244.416543] ? lock_downgrade+0x720/0x720 [ 3244.416555] ? lock_acquire+0x170/0x3c0 [ 3244.416568] ? __might_fault+0xef/0x1d0 [ 3244.416581] ? copy_mount_string+0x40/0x40 [ 3244.416597] ? __might_fault+0x192/0x1d0 [ 3244.416611] ? _copy_from_user+0xd2/0x130 [ 3244.416626] ? copy_mount_options+0x26f/0x380 [ 3244.416641] ksys_mount+0xcf/0x130 [ 3244.416656] __x64_sys_mount+0xba/0x150 [ 3244.416670] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3244.416684] do_syscall_64+0xf9/0x620 [ 3244.416702] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3244.416711] RIP: 0033:0x45cb29 [ 3244.416724] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3244.416749] RSP: 002b:00007fe38a84bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3244.416762] RAX: ffffffffffffffda RBX: 00000000004f7560 RCX: 000000000045cb29 [ 3244.416770] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000000 [ 3244.416778] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3244.416785] R10: 0000000000a51000 R11: 0000000000000246 R12: 0000000000000004 [ 3244.416793] R13: 000000000000077b R14: 00000000004ca735 R15: 00007fe38a84c6d4 [ 3245.001540] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 05:32:55 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}, 0x1, 0x2a1dd}, 0x0) 05:32:55 executing program 5 (fault-call:3 fault-nth:39): perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:55 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c0003000000000000003f000c0004"], 0x30}}, 0x0) 05:32:55 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) r1 = openat(r0, &(0x7f0000000040)='./file0\x00', 0x10000, 0x9) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x8, 0x0, 0x3, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x4, @perf_config_ext={0x2, 0x7ff}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x9, r1, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r3, &(0x7f0000000180)=""/186, 0xba) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r3, 0x84, 0x7, &(0x7f0000000080)={0x8}, 0x4) lseek(r2, 0x6, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:55 executing program 2: read$dsp(0xffffffffffffffff, &(0x7f0000000180)=""/186, 0xba) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x38, 0x3e9, 0x10, 0x70bd26, 0x25dfdbff, {0x75, 0x0, 0x3, r0, 0x74, 0x8001, 0x3, 0x1, 0x0, 0xffffff48}}, 0x38}, 0x1, 0x0, 0x0, 0x4040040}, 0x80) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r1, &(0x7f0000000180)=""/186, 0xba) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r1, 0x80047437, &(0x7f0000000140)) read$dsp(r2, &(0x7f0000000180)=""/186, 0xba) r3 = dup2(r1, r2) ioctl$VIDIOC_S_HW_FREQ_SEEK(r3, 0x40305652, &(0x7f0000000000)={0x2, 0x5, 0x0, 0x80000001, 0x2, 0x1, 0x8}) inotify_init() [ 3245.324892] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 3245.387388] FAULT_INJECTION: forcing a failure. [ 3245.387388] name failslab, interval 1, probability 0, space 0, times 0 [ 3245.416251] CPU: 1 PID: 1809 Comm: syz-executor.5 Not tainted 4.19.131-syzkaller #0 [ 3245.424078] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3245.433431] Call Trace: [ 3245.436032] dump_stack+0x1fc/0x2fe [ 3245.439688] should_fail.cold+0xa/0x14 [ 3245.440253] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 3245.443599] ? setup_fault_attr+0x200/0x200 [ 3245.443614] ? lock_acquire+0x170/0x3c0 [ 3245.443635] __should_failslab+0x115/0x180 [ 3245.463473] should_failslab+0x5/0xf [ 3245.467189] kmem_cache_alloc+0x277/0x370 [ 3245.471342] alloc_vfsmnt+0x23/0x780 [ 3245.475062] clone_mnt+0x6c/0x11b0 [ 3245.478610] ? is_subdir+0x246/0x410 [ 3245.482334] copy_tree+0x100/0xaf0 [ 3245.485884] ? lock_acquire+0x170/0x3c0 [ 3245.489871] ? is_subdir+0x164/0x410 [ 3245.493591] propagate_one.part.0+0x3a8/0x710 [ 3245.498089] propagate_mnt+0x201/0x530 [ 3245.501992] ? invent_group_ids+0x152/0x210 [ 3245.506325] attach_recursive_mnt+0x697/0xd80 [ 3245.510823] ? count_mounts+0x210/0x210 [ 3245.514799] ? clone_mnt+0x701/0x11b0 [ 3245.518603] graft_tree+0x187/0x210 [ 3245.522237] do_mount+0x217b/0x2f10 [ 3245.525880] ? lock_downgrade+0x720/0x720 [ 3245.530029] ? lock_acquire+0x170/0x3c0 [ 3245.534003] ? __might_fault+0xef/0x1d0 [ 3245.537981] ? copy_mount_string+0x40/0x40 [ 3245.542226] ? __might_fault+0x192/0x1d0 [ 3245.546309] ? _copy_from_user+0xd2/0x130 [ 3245.550460] ? copy_mount_options+0x26f/0x380 [ 3245.554958] ksys_mount+0xcf/0x130 [ 3245.558512] __x64_sys_mount+0xba/0x150 [ 3245.562487] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3245.567072] do_syscall_64+0xf9/0x620 [ 3245.570880] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3245.576069] RIP: 0033:0x45cb29 [ 3245.579262] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3245.598271] RSP: 002b:00007fe38a84bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3245.605979] RAX: ffffffffffffffda RBX: 00000000004f7560 RCX: 000000000045cb29 [ 3245.613245] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000000 [ 3245.620509] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3245.627796] R10: 0000000000a51000 R11: 0000000000000246 R12: 0000000000000004 05:32:55 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c000300000000ffffff9e000c0004"], 0x30}}, 0x0) 05:32:55 executing program 2: inotify_init() sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x10, 0xa, 0x801, 0x0, 0x0, {0x6, 0x0, 0x6}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x40845}, 0x80) 05:32:55 executing program 2: shmctl$SHM_INFO(0xffffffffffffffff, 0xe, &(0x7f0000000040)=""/150) inotify_init() r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x5, 0x684181) ioctl$VIDIOC_ENUMINPUT(r0, 0xc050561a, &(0x7f0000000240)={0x400, "2a47c38def85662ba0075471b16482d686fd936c9229a978f361c0db0cdd247a", 0x1, 0x8, 0x5, 0xc00000, 0x2, 0x8}) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r1, &(0x7f0000000180)=""/186, 0xba) ioctl$VIDIOC_G_SLICED_VBI_CAP(r1, 0xc0745645, &(0x7f0000000100)={0x3, [0x9, 0x7ff, 0x9540, 0x0, 0x584b, 0x2, 0x6, 0x7f, 0x9, 0xff, 0x20, 0x65, 0x800, 0x0, 0x1, 0x81, 0xffff, 0x5, 0x8, 0x2, 0x4, 0xff3e, 0x1, 0x7, 0xfff, 0x4, 0xfff7, 0xc0f, 0x401, 0x0, 0x20, 0x0, 0x1, 0x0, 0x1ff, 0x8000, 0x8, 0x2, 0x8000, 0x5, 0x1, 0x400, 0x101, 0x4, 0x3, 0x0, 0x4, 0x3ff], 0x1}) bind$rose(r1, &(0x7f00000002c0)=@short={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}}, 0x1c) [ 3245.635064] R13: 000000000000077b R14: 00000000004ca735 R15: 00007fe38a84c6d4 05:32:55 executing program 5 (fault-call:3 fault-nth:40): perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:55 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r1, &(0x7f0000000180)=""/186, 0xba) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000100)='trusted.overlay.redirect\x00', &(0x7f0000000200)='./file0\x00', 0x8, 0x2) ptrace$cont(0x7, r0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x119100, 0x202) r2 = gettid() rt_sigqueueinfo(r2, 0x27, &(0x7f0000000280)={0xb, 0x4, 0x7}) [ 3245.863747] FAULT_INJECTION: forcing a failure. [ 3245.863747] name failslab, interval 1, probability 0, space 0, times 0 [ 3245.895818] CPU: 0 PID: 1874 Comm: syz-executor.5 Not tainted 4.19.131-syzkaller #0 [ 3245.903635] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 05:32:55 executing program 2: inotify_init() r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x0, 0x0) msgrcv(r0, 0x0, 0xda, 0x0, 0x0) msgsnd(r0, &(0x7f0000000000)={0x2}, 0x8, 0x0) msgctl$MSG_INFO(r0, 0xc, &(0x7f0000000000)=""/205) msgsnd(r0, &(0x7f0000000100)={0x2, "27a5f9a16e50bbdcfd6e72185c8f27e378fac5184f7174d5f31c00b7066dbb5d8de270768506dba4f5f3ee7ef1a85b6bd3f252a272193e3cadbe6a9cd9d56a87472402820bb9b532e473001adc33edf6dcf779753fbc93ca6d7f800f878e7e731efaaa59608f2a11f07794f41b6a877a1827bdd31ae31b85ff557af78555236619ed03b5ff7c09534c0c1aa0a197d1eca12acbeb0c333d523b6bda557a27d3e3fe813c66f971dfa8eb8e9e78f9d61c8df8e81d57d35ffe383390452ea25fa354c4917b9d8bab49099b80f38d3d531d949599188570383e4a088534c4"}, 0xe4, 0x800) [ 3245.912987] Call Trace: [ 3245.915586] dump_stack+0x1fc/0x2fe [ 3245.919229] should_fail.cold+0xa/0x14 [ 3245.923125] ? setup_fault_attr+0x200/0x200 [ 3245.927452] ? lock_acquire+0x170/0x3c0 [ 3245.931438] __should_failslab+0x115/0x180 [ 3245.935676] should_failslab+0x5/0xf [ 3245.939394] kmem_cache_alloc+0x277/0x370 [ 3245.943560] alloc_vfsmnt+0x23/0x780 [ 3245.947280] clone_mnt+0x6c/0x11b0 [ 3245.950826] ? is_subdir+0x246/0x410 [ 3245.954555] copy_tree+0x100/0xaf0 [ 3245.958112] propagate_one.part.0+0x3a8/0x710 [ 3245.962618] propagate_mnt+0x201/0x530 [ 3245.966508] ? invent_group_ids+0x152/0x210 [ 3245.970848] attach_recursive_mnt+0x697/0xd80 [ 3245.975351] ? count_mounts+0x210/0x210 [ 3245.979332] ? clone_mnt+0x701/0x11b0 [ 3245.983140] graft_tree+0x187/0x210 [ 3245.986774] do_mount+0x217b/0x2f10 [ 3245.990411] ? rcu_nmi_exit+0xb3/0x180 [ 3245.994310] ? copy_mount_string+0x40/0x40 [ 3245.998554] ? copy_mount_options+0x16/0x380 [ 3246.002972] ? copy_mount_options+0x26f/0x380 [ 3246.007478] ksys_mount+0xcf/0x130 [ 3246.011025] __x64_sys_mount+0xba/0x150 [ 3246.015010] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3246.019603] do_syscall_64+0xf9/0x620 [ 3246.023424] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3246.028735] RIP: 0033:0x45cb29 [ 3246.031946] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3246.050854] RSP: 002b:00007fe38a84bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3246.058559] RAX: ffffffffffffffda RBX: 00000000004f7560 RCX: 000000000045cb29 [ 3246.065835] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000000 [ 3246.073102] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3246.080368] R10: 0000000000a51000 R11: 0000000000000246 R12: 0000000000000004 [ 3246.087635] R13: 000000000000077b R14: 00000000004ca735 R15: 00007fe38a84c6d4 05:32:55 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000000)={r2, 0xffff, 0x8001}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000040)={r2, 0x20, "432a1a5278ae5a684566d2dc510ba8498ba2a7f517dc1bdd3b17733c84a1fbff"}, &(0x7f0000000080)=0x28) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3246.436887] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 05:32:56 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}, 0x1, 0x2a1de}, 0x0) 05:32:56 executing program 5 (fault-call:3 fault-nth:41): perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:56 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c000300000000fffffff0000c0004"], 0x30}}, 0x0) 05:32:56 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0xa, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r4, &(0x7f0000000180)=""/186, 0xba) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r7, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800070006"], 0x3c}}, 0x0) sendmmsg$sock(r0, &(0x7f00000053c0)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="c453a26c6d2d7569c0cb56", 0xb}], 0x1}}, {{&(0x7f0000000080)=@ax25={{0x3, @bcast, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast]}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000100)="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", 0xfd}, {&(0x7f0000000200)="b882da2add62e6d0050d20b9c055d1ebaff4851295463d101d8827bfaa6bd8277d6b6e8dd892c143720a1edd7db72d4a930b05ab05f4fbca571fd11e5a31d6290de4fa1302fde56169be7ee0a4394298b74323c5e0eb4f5b665f973181f55a8f11755a69f7d46a444b2f54b67ee43ed31a74ed0ed0797fae0aa08bba7db3da22d7374ab729bc42fcbe62e8bc15ea2cc4abc6af00045dc4ac694e131275d8c3d7473da7bffaf6b8baeb5dc9b686a163ed16faf49b4da27420346ef7a3be57782879e6c5a06d21dd572a534d", 0xcb}, {&(0x7f0000000300)="691036902a7490a2a32e1fe6c756c0abc2678551c69888e773fd32abece54ef2ac86032ffa833d7025ecebf719096d5fdd63227edf59df7adeabae20d6f7e0da0d8840cb7c44f361e9329287ca3b41500c68080a9bbad087402537787157e575e12cf62ee5c507e35614e5de774b53e777f9a081008dc474102a0dbb0219b8df918af8d53c2793c605b3c5be610e9326376abf4ac273794ffb5b456af588dbc620f73ffe4c38379d5cab3d1ca98d20836972987f865f8a", 0xb7}, {&(0x7f00000003c0)="a3adaf691f0a1eb22c4f9f8315990e670f707fdd20d78dac90177b3551c328e17b2c1a201afbf8ac407ed7c8c0b96f808e61ed1801bca4c87367b60b8ba56a60ca36df38edbd22d100e9e5db68fb52f092fd3b1a4317d69b19c69659b22671d63414da7eb1a59f4b85e417", 0x6b}, {&(0x7f0000000440)="d05a7484b44112ffe27b9c7556df9ba87fa6171f517880249d0e75e54483cbea0e8e6bb79988d2ab8a65451ac2cea43c6bac23a45241776c552bbc0980e468f856f5a862e73de66a1a0adf2a935ee2dfb5bd8237cdf0fde71b", 0x59}, {&(0x7f00000004c0)="02f41afa324dba71e276cb0caa4a0dd2ff198979970ac0e57822636412e65e445d57bab76019e36c2a9ff4b4ee9e62ad8c25caf8e1ceb65cfa27454dcefd7d9e2a8b5485b7fc8b74cc0a9bf5332b972662a181fafb78268e502417637044efb4dc5b21a11e8f41125d9b15758a09219be8cf9c2afebaafe2186bfc408fbf3c60768684", 0x83}, {&(0x7f0000000580)="0156f15decc7dffa094aa00f98aaf810527bba50056fdb8261c9c79ab676d2db2548264f56747ce6882ca311916f13bbb73d3a3be276ecf9769111a4810fc8b4140ec210d0f94d16f43a86b1a4a84138e2b9c354403cbbc0f5708e5270486a8b92ebfa13ec3ad4db7c83a208cbdcf589a1954835", 0x74}], 0x7, &(0x7f0000000680)}}, {{&(0x7f00000006c0)=@ll={0x11, 0xd, r3, 0x1, 0x8, 0x6, @remote}, 0x80, &(0x7f00000019c0)=[{&(0x7f0000000740)="822cdcb09c6d800c5b263a269853d944cbdbc424f8c439e012855c4372e35b5c432c787af3c27cf9adeacac6dbdc74afce6c78199841f4b266725b054ab2ea173dd856528c19c7", 0x47}, {&(0x7f00000007c0)="3f236e6e25655e4997ad5e9db4e2e600653e4b1fb177b83b7fe9c3c69b18a4dd7fcd59b20a5660ca71253d812fe9ba2a9eb61e1d669d32aa923a0a60be45983c627a7ef03c9cabb94100de759967af72e32bb0ac4bed5e3d0a", 0x59}, {&(0x7f0000000840)="043e88e842036258057488e428fd38bd13ce450cb1c135be4690b29f7f34be2d94424ddd2c239b490ecd7c9c0166f050e69354d8059e75f71e59bdb2c9ac16dab6c7be3fca31", 0x46}, {&(0x7f00000008c0)="2e08ffafc9f3fc75f2fa3212b8beb029e3541a44a71b8a58811ab5c02f20135aaa933c4ef2973d5d7618e3d984d429aa5726332ceb5152af12372d41a75fc7b199060db412e64e8459da04b09faec183e4b822ac426b3f82618ca4c7272908d2801cde68fd9d835dca4cc53763fcc6a4ae73fbc548d2ac5708077404e01b445190ad1b977d907c7b6358af1b6be09adc480daff7d7934dab5544833c2ee2e144446228a3c3139d048e382316410487c1a583b1194d7f63587ec797a6030bd92d9e6c3cf7d973614fc57ec73cd769bd89de6df36f3525f5cb2f605d", 0xdb}, {&(0x7f00000009c0)="95d88daaffbbfa9da2e554354be3452aace579a550cefa96dcbba5708e5baa22ef2b17ba45a6faba9008739031e71a1314f61a877f7b853d710cb192f881979a12d0740f90a871b41899ca1883db7debef9e59a53ef7c659f6ecba92ef73b712f6e0fab99fc1f4c228f370efd93ce4c29afc403a4e0042ae709c14a8c7ae98fc7fbe5b72aa09d2ed239c8cf74388ff54385054adf88e046a1d8fb9f186eccfb6d60b7089381fbe0c0c8c698e63b877c377a095bc26968a400c76294d2376f648554aabb486c99018880011c8a08886e1cdf9811cb97a2fddda886ae8784785b029ec20ee1b5e77eb33463e7f2cd5f222bc51e6d9eb25ba9f0e7af4a3fe9496897413eaa8df19adb754de8659ff13084f9c320b383c39c55b5be87d9098c5613667499032e650ac7030436a1854b90c566ddc8a55c4d76740bfce915bd334497318897ffeb07db342513f51be44b9b755e1a382138ec4669f485ae7a745a677c6fabd1bf5a6a5e71640894093978de9af304f9eac834bd8cf79f0b2b0ba0a6c749dc90540ea17f43f24629647ba7f6d4825631375b651245c45a5b641b773a912aee3e390fceb2541c894a89dca0ac0f8612e32a3b6237110bb1fc497d00b173e7411a7a371397dd9c566502dfec324b8cb3902ce61c934d09ae98cb690c8b28fb34d155f84b617b23aa4d4301fdc434c54d7601bb4643123423b4db3840df136744dff027169b6361b71d2a3bf69753066bc219aa0b6acfb62aa230a962ef6e993e19433db004c635fea20a1a7d9c9e8f80ccc424c34d010c8ae0b01be58c5e5840b48c74c9d4ac890854c5997aa9e07fcf6f6736de6a2a90e80a0aea776ef4c2e6e4d82ce896209849c8f328a8bd123ac73626bc4a13bc3d1e6faceee41afd8da4809e3527d0668d8ec81e398d51e806bb75185bb7055654bd6f58ec9511a80199a72a31e28063df610bd3a1d345f99b007882187c2451c2d83279710821cb6d95be7d164abe69a042c0e9dd4b4cdb23bb54bf5a4b4e8ed75da0f17dc96bfa47726abacd733b6586c26e0cf3f8f1debdf08fb0eee89213542f3965a1cee931a58c461983a72703db0accab16bfbd068d70a0a2599fba9c2ad44bff61ab5b1cb7a1171a76331ce35fb7472c4931d0fc3e214fe4eae0add26ebcad299e82d8af3d518fbe8a1c31f0356072e38d7b17b82366be534ec073d594284284aee2d34121ae79fd58d1b9ef68794da9fc2afc58c7f39a78abb94e4bdf1022d28f8ebc1386c3da649bc70116b073cfe4e88fb981db4659dcebbbabec63669475418e2483609ebb502026eb3a7a49d94394780a7fb239cae016885c74f97ddb802e194fa5956cbfd2ec76fd985a56e16be25f9314c0677076b1d3d7a5f8ab6ddc8a740296b7c41f5360c98f30c4f0b21c99749dfe5078a9c62fefc8ffcfd22689742e9a1cbcec399f7f914cbe9caea916064dde7f4488a6818bcac832c5c74439abd833a45797ead7b5f16d46e29fd72beb93e6d7d047ddfd2719801681e872b028c46acc311f8748305c6bd18cbbffbf2752c7adeca3633b04cd2e7613fa4bab245c8e7efcf356d569da33e58cb1528e7b4635e9acf3c813f8c3a1601a1ab9e70cdb899596d136c838a07f744a812a3d402c2d4b945397ff27e8c80d91a133ebda74de11c29fc2cea6b06834e4b83c3dfffb7e9452c005e23e9a417c127454c3bb037cdd56a711e7c8bca8e4cec2710428db3b8a7cdb937c1cf0233aa6ca03d0500d5d10b95105b5ae824a5524c0b9a759dc5c19422cec6b0a762fe3ee24599ea1bb1caf97f7a2eba8b0539860dba5d86cca28252d356e521ba3f30f86df182a1e28194c14f305ccdc3a34687596b11174f8b3676fbc573512f48044a4838154f5478e2e4a3b02ab60527f06d8fff576a91a9318ccb0d06620c26fbff0c611918e10846d2a32cce6e23bd10970e0a5525ad1631bef9da5b07524765eb9d8a0c429d652ed9ac40e3e5705a6f1175136f318edc7c7c6e6b621a8e672ee20e7bac8c018cb5aad1402221b69d90d7e0484b156e22cf18870e3018f1a95fc6d374cdb10d33c9042cccd6eb3e879b9f5602e40feb76c34c0f11fbda116f88804e194f092e4eeb25e47302f332e16d3be76aeec60098f2867132de1615a6eadcbc9460b357e5fcca80d8d0c81f5a09a3dc767fe16bc3aced952d7b973f5354d164c5bd3e1bc7fbd81ed185ac9093c4d66783afa79a14cd9a38579b790a3e03d03e3633b95778f6b2b7f1fc80ea235453556a02ac99345de96f401328b39524ee90f8979a533375005064040076d710c6ea9dc27ef5c9fc8e5d0b458b1aa6e96d0c51a412a9e85bab3da755bb1e27b68fe91049c5810be333568c12557d71c38e98a016fc773ba08d74e2ee67e04b7ff9a2096d21b87b6a80e005f16ef39dffd07b9afa90de56129f4ef565cebb30012adcfc5c82156bce9840ae0b622554883c4af572b1c884cf31607b9485e208b43193f2ee51cb0308305f64668080b3ba884e25289614e2b41b829d1c4a1d98f5355f7f735f6a402a29cbdefcb96c371c31e828b22f183899175fb4aa0662cda041f974074af1d36ec892559255aec43e3176a588af7c6c2062ab94b1839daf904fdcd9abd17f180d18807da2a3e3e8613798ef551e5e632ddd639efa9f2eec1b31a8ed7e633cd68549573585bf3fa6d07db76d3ea5ff898a4cbfb9d8092e612e43d81e68f49ddf5e5670b0f985032271ffc8fe5f9e3e63f086e48143187d6edf538df00ba8a6a9c86b9a7a44fb8edc4b8c5bbc214e2afe4e0eacaf74142c04350ddad1c0a8a610150c79a9fcb715211b9fb5e83ef9e844457bd924937bbd9566fe4fba27018e44003d9cc29623ed10ebc2ac3f7ef0de80adda7181851c1e108a9ad0993b96b8e4fa3c2ab3b60ef37c5ec8a92d308093334457f5a2ca3a4107d67333cc379da5db85a8285a8ebb76eb4eee5b487e3699ddf9523c9549c4361cff259b656c89486ff2919589abc62a888b4ce33c8c02b77be38df15145c1fdec8c3eae18d0c0e10b51c30bdf3639f283bd7ff6652c9a2a37afa41adce11652047c38016714d9b9cd24c3a35a33e24732326d790cd7c06d939216486c30e3a85875c769caaaf8d29c4d60c7f8aaf6aea15c6f4b248a5fdb1ca918cf9f7abad29fa236291d3a1718268dab1af23a8fba1671425f7fe3699002bb52b3cf651adfcbb104b0feaebf05cb789b07ec7911ed8023fe9f65b79f3c2fd274208b29766e6c0a8ecc1960366c48018ddf62f079ba1ee10635ca2a1aecca8348319081723ef5a73ac406af45ec61cc85050004f08fca442168a67e0022750de524bddf70c42a1ce1e1499a493aa10e58b7a216ca78f1a44d4bc4fb806bfc8b752eb2d3c85f1fbeeacc579cf643e2a4af6ced0bb2f8191e74666047e8f97a22b077b5e6980792c4b6f4feb01d6d98ff41faad3290da9035f2dd89179146d930cf5755ded192d8810e4625dd56d97bac1293ea1013cc0a8f0eb6bee9095bff79b0ffc197d8e3cad3055cca87c6356165004d555eba61a31c59a368c23aa0a2734c65f3fb69f0e9594a60c8738148ef592c02ad55683c50ca79020f9cec23f6525c1c4a04f67fccd4b0eeaa0e5d48049a6def6487b753baf9654aee688b35ba57ae3d53771c7ef02cbbd7f573d02b01d6fcf22e47969459945c230300978a31dda5a9997cc285f5c993db8fa80d4422b3aaa8bae0cc81b0edc8215f3a78cae77b80da3cbf35db028c75e7865ab3646538b528e4c0c744bee76818fcd82f2a8839995136284dbace8c52419efdedc47f234b0a06715c83568120ff723549fb67eb3bd6437269add9b6d05749135f00386bc558021c08591d25654bd32895d1bd099d64d9ab0d0058483d26867fca14acc3859035fb8a5ba04ac96a8864b1fee4057fdd2f6bb1bedddb1dc1b7417c08c46517a699d5429b2256d3563788e115db05a1993390fec0b2173444ad086e8970561955c641b397dc3b20d4790ae97af21d6a0c6a1f5a56f5f02283850580b1c26671a077e23232ef328b3abb5f03d3e6548acc57482662455e455bd1c3056302cde49122aa6a43a8f468f9932fe43c1697d335d1314f398b3eb9e28296a6c1cb755be3cab67953bc08c14011a1477ee7ae6a45aa56febcebf9ac6ec742c491f70d3f9a5626b717fef0f5f9bf9e1f63d1644709ea773687a038626a9abc6fea09bfa2deed0dea5a5227019452ca7e5c8bae99782cca7c271708f1bce8c96b77766c758b6f8ba4271fccaf9e6e6e7945365d3a3a76ce031d20573fc81aa6d24afd26ff2c10c04542f3d0b9a7d84988563894bc6c856a681a1d319df8348e625cc2ee988ba9465d0950c1cdf32db6646e032155dbec9f247d6be198eb5b3f3f4bdff36abf6b2480fd734f938a46c0a623250ecc649be1d31b8c3a9254ae3ca8f22c13563721c085772dbf6154f7bee7fbb55eea2f96182a361758e31307f077e9d7838738bc89840932f189a84b0dcb611979b3af5ae7346a8077e0b7b3e2cc4955e4a0988d41eb5851481cb06e5fccf66e9cb6d81718acade192cc85a1cde342167b0c01eab7f8e6746859c2a4138657668a9adf9d22e8ece6c70e88ef062ee49541d77e38f30f3a0f7f20ee9517f4f4b110beacb3bd4573b4720e4e9c5c33f868826741acd352599f4057b2fe64a1393539fd439e796d1ff8c42803ba3849c0c1feecbf898dc4863f827c7021ca5f1f6560527137b747b5518ee85472f8cb113188b28bd677fac5c8354c204f0d3d24505fd19a2b1ce35dd991104bccc2c86a883cb5653ade7df5725f91c9dc8f5283f8cead89c82081388f61040f5d66475752cfb4b1704ab00672372d5c1df16a6a064190f25717e07af955740fadccbf8dc88a1a2a928c1a249c0cb29b16b6b5b39ddfb0f8e1b4a330b796a3ee7473c3cec4532ed983815c54a1498c5fb4860afadaeab1de3339f184252e4adb584bd552cdc16d65951775a5f5a807202a37841592ff8781d537b0fb33bceee8305aa8eb01f0aa15d36ad44363aa6bcdedbcbf045daf8b51b8e25af29102aaf26e6d4fabf9d718ea5189d4bf47fa597bcd3994d56f5a76198905b5dc8e313f643a8c41d68cdbebc2fcdbde6782012c57c2ec3d016e6cc32859da951a1c07fd67c622573b4a508ce15a715ed62e9339e994541801ff45a93acfa2f99a260f58c6573fec1471905956d02529d1fa5d5431c5c1d54b79a8aaa15095c71ce80a22899c5d3c4a5d7101fb17d71454c98de0bacf53efe49b94efb60c65a8a65f2e6060d8bfa9e2c7f417d2b8672cd1f018eb9bac5b6f782dae82c5f2adb873ad845d94502c6fe17e61226e67b7432475afd695e823aceecc8071c74dca81f51cd65fba02f681d9fa339715c3c08f0143506d5c48fd501688b8c9c22e7f18b5d62f2f0d9bd1fed5806ab17608b0c9cf5aebc44e05f5c5b53594b7b50c3a75bb8756824981fb1e291646d9af0d993fc55caf1fd47c2f81f2e64b889e7f424f93d99050c9b3f6e5a584d5ad6ffcab33345b74b9fccb685c8d7548932a5bc891579a5696f421de15daffeb0532c89429391da3807990b75f5175c302910d18db7b60e3b1c72a90d207d32b3381184b5a8f51352b7297d9828da92f0b2d18fa35eee5dad9ad7d98be782150f92a94895a1a06f0f83cf02a42a2b0747edff239a0bb32f4274802f4b3c248e15ff30fa3b42baadae17b85bb9676230e53798548323d79e9be8462a7b07479e6ab035467ef1e01cf717671b8aa1eb9ab2c", 0x1000}], 0x5, &(0x7f0000001a40)=[@mark={{0x14, 0x1, 0x24, 0x5}}], 0x18}}, {{&(0x7f0000001a80)=@nl=@unspec, 0x80, &(0x7f0000002e00)=[{&(0x7f0000001b00)="438ad4b9ff628fe393a5cbd9c03148e4b0fa34eefda5c61c99db489377a2f94dcd82df6b638e76ac800611b1289ec8aee6be9473814a984f2e241a82e391615c095486b23d445e3e8572fa42", 0x4c}, {&(0x7f0000001b80)="6551569dc536056627691b1356658d32e5b33087d851f4d1642db5b3853476058e387d70b86a5c", 0x27}, {&(0x7f0000001bc0)="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", 0x1000}, {&(0x7f0000002bc0)="8527f905c7466f965b74ad2e03e1dc86e91ec2e75247223500e2320b10e8d148c981b8406efbbae4a1801991cf4f5285906ca0f4b6c7e3a5397d199050752a08eb0155050f3ca1611d5c8730c8ba8c73a1cefbf414d90b8bb0e9f4fb3f3234bddd418b86277080e16dd4a15788ab2bc4b679b95490afa64b8c98fb147847835bf2a025ff0c4370b8460e4eb0466b8521888a44f73ef41db9525100216693d83e8a0435c9233860bca56a76f1a9d9261b939f691f1bd817afe48a439cff37303977b192fa560ec212295150015bf385ef8f0cc4decbc07a97de0ee5445db83fd488bb9db398d45bfd1f6150e5f64bfce5cbb89cb236fc77", 0xf7}, {&(0x7f0000002cc0)="a76b1d97", 0x4}, {&(0x7f0000002d00)="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", 0xfe}], 0x6, &(0x7f0000002e80)}}, {{0x0, 0x0, &(0x7f0000003080)=[{&(0x7f0000002ec0)="19369bd8323098bd1e7175afb954bf1d225d433b8efd491cd1da9072320d59101ab83e7e9f171466159f0dd2fddb80a89b93453f03d327d3b98c74a556bfa515517049f968118b9c50ce19802a514228b63dac1a0e4c515533e233ca26cb5408704232cda38098ee148f27057c319d5796e97dadbeaedf36ca9e4f07e8b6fa51ced02ba582a4c0e1ef2174bf7da2622d689f732533985166ccf707502e099ca2d9f5b8d9db785b67a362fe5d7cad2e4e29e8c4f0212027f783e2a893912769d2d6aff5f4c47856235a021be5267af2101236a0", 0xd3}, {&(0x7f0000002fc0)="9fd70f071dae0dd325352708ea307505c1bb544527435f7c55901943de85770b3f7f29ef1eb7ccdcf0ce10fada746d272e20a26224deda67e0305e5dd29b1063690f6eb06ccbbd7c66e86f725f9e2f14ecd82896b95c32ada5371efffd9b37dfec9d22b252a5a658d89f09ec783b8b00b8f38b553faaa2ce06761af9db67918c4b8a7c66accaa97eac8e1e3e33df", 0x8e}], 0x2}}, {{&(0x7f00000030c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, r4, 0x3, 0x0, 0x1, 0x2, {0xa, 0x4e21, 0x14, @empty, 0x8b}}}, 0x80, &(0x7f0000003440)=[{&(0x7f0000003140)="2387fe3d288c600e67e85fe87e1959c1ad513b7da45ac6793f730d339b22ad8ab2a3fbacfbac7a2648c2eb2634ff73587cfe556384faa927341f5792ff2970f14185c83812511b6bf4f8f9bd52815f2d92bc29627f982970b3129e", 0x5b}, {&(0x7f00000031c0)="bdc5907b9c8023a9cf7591f23aef9b33968f8190bc6574ed80ab07f6dca6ebef952662e779e5821054902d118076d7ed85c673690e1953485a2aabf1b20a1d371641a8c0921e8a157d677bd89bfe9442aa9568db30978bc911c4eabd1a3c79a3d3f312fac86bd78c80b347fdf99e92d644aa626d00587bcd83d138e2b9dfa900358d895a3ccc264cc7ee7193de9b416e0a1a19ec6849617edb109480a409dc9cdd9a56285d594cd034f780f1bbdc3839e093fc447695fee901bfc546118f9029eacccc79150f6844f2", 0xc9}, {&(0x7f00000032c0)="2b905bcbfda5c143cf0550773693e30cc0ca66fdd456586d3f77e9504713f1dbe5dbf53de5d70366ae2d7587bfbdf30924c9e3bfdddd97624a719989123136fa057fc8c6b520500aa8b69a90add05b39fd036b670e6537efc90368fe27e4896b5e8d2dde744e541c5d3d2940c236c168e326a8740854df97e681bc44859137b882", 0x81}, {&(0x7f0000003380)="a09f3401720b91a72028808424e78f7a629f4b0a31eaabf0a9cda84f8c9157b7def643fa99d5ba6f1576bb4997973e171cb0207de4353ebaec39f542fdcc28b2e36e00a3219248e22bc1db9229e2c9227ab110fbcefbfe6d1e27778e0b31649384df8749f9239c743448b1786231ade8b8bb24ba197046307c3bbf75a896a73cd5935d3701a1b1471f5773a66b487d12e714ed7781731dd402059a354c114a033fa81f", 0xa3}], 0x4, &(0x7f0000003480)=[@timestamping={{0x14, 0x1, 0x25, 0x1000}}], 0x18}}, {{&(0x7f00000034c0)=@nl=@proc={0x10, 0x0, 0x25dfdbfc, 0x4000}, 0x80, &(0x7f0000003ac0)=[{&(0x7f0000003540)="818b2fd3e0eecc600252a5432da0a2755067c34bb7a46315b7f59247603103debf8a638c524dfd11255b04e1fe5db69dd0b5d31d556f8f44abb62ebb", 0x3c}, {&(0x7f0000003580)="07a29a1009f96519e6b539a3d6286c051468311ad18195b5611db21abb73c01a250ae42f0870a5d72c9bb1c385f57881ecdd40ddbde01be60fff43873cc06e85c4dd8f192e96377d99e5982ba74c1a033ff48c2e93c2aba7c64aa7997691bd2574b7e28c409259c50f3209e591ca84d4388696d950b4d0b01d287c46ab16f408f1921a282513953dca01b41e79555296ddca5fed990428ee793691eb5142acb6872d000156c1e3", 0xa7}, {&(0x7f0000003640)="97853f3f28ae279d96d07dd2e939487b5e8db1da2bddfbaa954dd597a2c0bc955b6cb7e181cccd094e0544e34933be7837d3d0d4896c9f1b12ab9351081c99a89a025311c62fd73418f7a3043c9e45241637e9bcf39b9b74d31c824bcaf74e029ebf538409f585e539fd5a7a93ee2b18eb34a856f132bb34b93cc3881c26633179eb17bede27288a41d3f90bd8a3ff10251c22122256f53a325d3bfb095ba845c0ac6b6268e28d18bc2600b0537c032a1d51ade4a3bea4de298ea19f5453c8eecb2bbe5e2037871303ecbd2a3e4a6edcda587223213cb32eca9172266f3fc694e3c5dd4355", 0xe5}, {&(0x7f0000003740)="b3970d5a514f2a03f6f71b467d057a4bca030f2c4d0a1a3a112314340ccf30383dfccf51bf5010215c259170a3bc320725dfc9a06f5e6d912dd6f0e3871495b6cf506645ded23cf855d1154e89bda261668506e594905216ebde3e19519b53b4088a2d076fdd1f9e43d04f645bca6e7f5491950c18bf7ce21b142a8ed70a35a4d2d5c05906a18d75a8f1b1f767467610140ddd4947f3f17dbe2f6248f8668323f805", 0xa2}, {&(0x7f0000003800)="32de58c4c04b49c1bce7b3eece264609eac85b14061b80c9c026ab0e50b3aa8a4e075e747cd2a10970852829c52065ca39313dcdf47a1aeab727d5f9fa103754b5717a09869e7e7845426c430b5d63026ae51fa0604eeaa40e19f40b88728d0c7e3e0a1b1f864cc81ae9b4bce22e44d8ea35c32e9e44364abcfa067a5ec6bbd31355c1d488b4d159808613c57e8f2916ce831a06edf01545db42c9e176939a518d86ead7d8ede5eb78a7b0dff463fb83a8d4f116ce2668e56687014f008a2fd40ec6e3013d21eacfd9c953b55f4b11f968c2b624820f78138367054fd1637f46613ada6fccee566cd3b4ca", 0xeb}, {&(0x7f0000003900)="6319c236e9e260d333c33550c41559f0267c056c29508e04ebb4988196cf8c56fb8585da785b17d2127898f1ffaa91d262e54f0fde92fec30e1b6534fac7919b7ea2d951a51ec800dc978e56be258440b354f5521d71764a6b4da5ebe111bd832d5eb7e7eb6621457ca6a1d083", 0x6d}, {&(0x7f0000003980)="3507017b0b3cc27370409a494c5147837ce9b4c4ffb6", 0x16}, {&(0x7f00000039c0)="2e5632a5dbbc9281c1dc145215dc82e8f5ee9b24941bfd1a0f9c0220ec93e7d409e094890083a9cd7385ab5e7278101251f9090d5a549d02da17216ab0b41c42f1101b5a47ec4fb54badaccae93114a36e60b252055e2cd839ee49d80716712db90012074f84b00a620a891edcb5f3b234458b8de41972d3deb3f268b060af756a0189841b58ed4b3656ba8bbaf8af5df06596b74a1c3f85b6cf1c57088fa85586074c8a20fd93c6d9a4241e49aa7c2edce7184691409dea2262312af3bd8d9b18510a07cf88eaa11f304ef997cfbf68220d9f6acc03ce87a64673104cd3be42d2d0c9e4e605266f5f3c10acacb26a", 0xef}], 0x8}}, {{&(0x7f0000003b40)=@xdp={0x2c, 0x3, r7, 0x5}, 0x80, &(0x7f0000003e80)=[{&(0x7f0000003bc0)="f9", 0x1}, {&(0x7f0000003c00)="19afddb513b453dcdb15bbcdb13d49b5d81622b5cb112d70c8a205a5ab24f18f95467fd4eb6ee0bd938618ab16fbb456d3cb728082fe1eac05edf898bfc545dc79997fd85a36e5d1c7267f3e1a0b940cf9337bd630924994a9ddfaa490c3c0cdc35525576cd3f038404aeb88e877d03401a55574f0550621a39780a608769bd5ba56154335d28d009d8f933fabdf6704d52856342573172a2c465eeb84c9122606522d6b", 0xa4}, {&(0x7f0000003cc0)="0a464433e093e85afc7ee8ca71648ec074177a5e287046825501e835bec7fcaa475388d99e1101a657dcc5736216ef35b86b0ab3c3a6875b29ac82a1e749d162907e6e068c60df2a2eb6c2a26ff11835e0d11ef7ecf85141a269321c2b3c79e501c9b3b01ccfbbed35d0ac77c861e4d5cc7867f3df64d54e8b589164025d6176e08ca6bac494950d1eed778c169add1378f86d2834959004057712de510fa3ffa097e10085ec7cc70f6ed14f1c2cdc2fcb46e1b703880a5d6a54b4737733356d3cb6e1defedf06dfc241f6cb0668db34adf77777cdb2c8cb58265893a7f00adfdf5dfff06b22844fe44df5e2174e25518c86f845", 0xf4}, {&(0x7f0000003dc0)="120e4625ec2120841de3cb49db1af51d62bd3871c66d1565a57f958b57333b899dcb4c0aed402bdf095190aef24920b7c752b8b0c57749c20529d6549677ebb0ba773626ce8ded78715021b9064e7d5970eeaac036aacb8c08e0c9ba7745ae237267571db718aac8ed600c36b0969e2a3abaa24c1b50778f08afe60f4a7fc4c6f1bb8776cd32cceb0deb5a350cef56a21b5a19cbd988c0df", 0x98}], 0x4, &(0x7f0000003ec0)=[@mark={{0x14, 0x1, 0x24, 0x13e}}, @mark={{0x14, 0x1, 0x24, 0x7fff}}, @txtime={{0x18, 0x1, 0x3d, 0x40}}], 0x48}}, {{0x0, 0x0, &(0x7f0000005300)=[{&(0x7f0000003f40)="3e8264ebcee3fa679321e1bf4b8663d080b80ae101ae6840d1bf358077693e8860a636dfbb878a22d0967409c1cbb7754899c83410238dc8661f9f2499d815", 0x3f}, {&(0x7f0000003f80)="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", 0x1000}, {&(0x7f0000004f80)="97a942b17e818d93c4966a535be6ee920b12fd822c634744251932e734b8ab68539b772ebaa5cf8aec95e73ff1d2c32034f32d0a6bce24b658231fe2a74ef5e1f902cc69cd630ec27994dfee5cfa305231089ee5b4cead616d9ce0ed1c42cbfb62ca1ca111c72bc767721192ed8cb20064bdd976223fb57dd41bb181be9b75c0e49e73353643a3b7c9de4f", 0x8b}, {&(0x7f0000005040)="fa829bc5ac17712f552a3316bd61cd2c79f0c35693e150f8bf54af14151ccdd7ba1ff48a870c4a9d4e18340e7514063f71c924eda86feed7169dc341cfd5d7485282580f3e809c19e7d9", 0x4a}, {&(0x7f00000050c0)="bb1121a187d9e5606db057056672ae730376e251bd831e2bb8ec50ea98b63a9066fb8fd6a2be7529b2f36e0acbec068f5feb0261400203b23aa7234913a3dfd2be9515dacd2ece554125af6a51173c606ff79f42f5c99b5ac9caa0258281551dd5340135c643bef2e479736db56296ca6ef6a9b408debb91ed3c4b75c61596eb35ca595a2b4bafc192cbb6043eafb3d85fa8be82a3ac1ab3d4d5af81fc8fdc3f8170773c3fe86952e4e69cdbb2ec85ad46d98496bded2f670021a7e1ff612ad14f82a4b5f8101852bc08068b83395cdc628f9ac37599da1c6683d51ea465aa29499e11f865a1672859", 0xe9}, {&(0x7f00000051c0)="9e4548a4d887028d313ed4be8faf71f9828e9a2de3eff9a55e8f9ce3ed9c5be5116b3101441b41927001eb1294f4cb437bb6818d49b8db158021a1914214d6154709bf42b72c2e85f764c7d363c1693f82105502e0668b71cc50b1499f794c29f26702fc6afe6e45ff1a2a8d40376a7ec1fe77240800d892", 0x78}, {&(0x7f0000005240)="a5c8a44e58b9804551eddbff663987ce13147fe123680d0e2142a3b1354cb2206d106fc9df3a5d7fe9461cb8ec663d4831eef612fb2958e19a0c175327d63e23496d79a43a6d91771b3054349870331674bdb30a5234d50c675594ce658fc0ba9834642f695b9440182e49b3f6e600aefd078ab668f9201a4af8a55a962640b57c2e2daf9d8617763d17d650115d237bde4a98b3a54cb9f7ca6373fdc372d0b10af4d35328c361de63", 0xa9}], 0x7, &(0x7f0000005380)=[@timestamping={{0x14, 0x1, 0x25, 0x7}}, @mark={{0x14, 0x1, 0x24, 0x9}}], 0x30}}], 0x9, 0x1) inotify_init() 05:32:56 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x101800, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x8) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r1, &(0x7f0000000180)=""/186, 0xba) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f0000000280)={0x4, 0x8, 0xfa00, {r2, 0x3}}, 0x10) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3246.848292] FAULT_INJECTION: forcing a failure. [ 3246.848292] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3246.860230] CPU: 1 PID: 1909 Comm: syz-executor.5 Not tainted 4.19.131-syzkaller #0 [ 3246.860242] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3246.877407] Call Trace: [ 3246.880006] dump_stack+0x1fc/0x2fe [ 3246.883653] should_fail.cold+0xa/0x14 [ 3246.883668] ? kernel_text_address+0xbd/0xf0 [ 3246.883682] ? setup_fault_attr+0x200/0x200 [ 3246.883696] ? unwind_get_return_address+0x51/0x90 [ 3246.883711] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3246.883723] ? __save_stack_trace+0xaf/0x190 [ 3246.883743] __alloc_pages_nodemask+0x239/0x2890 [ 3246.883760] ? __lock_acquire+0x6de/0x3ff0 [ 3246.883784] ? __lock_acquire+0x6de/0x3ff0 [ 3246.883805] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 3246.883819] ? __lock_acquire+0x6de/0x3ff0 [ 3246.883837] ? lock_downgrade+0x720/0x720 [ 3246.883857] ? __lock_acquire+0x6de/0x3ff0 [ 3246.883879] cache_grow_begin+0xa4/0x8a0 [ 3246.883894] ? setup_fault_attr+0x200/0x200 [ 3246.883907] ? cache_alloc_pfmemalloc+0x1e/0x140 [ 3246.883924] cache_alloc_refill+0x273/0x340 [ 3246.883942] kmem_cache_alloc+0x346/0x370 [ 3246.883957] alloc_vfsmnt+0x23/0x780 [ 3246.883970] clone_mnt+0x6c/0x11b0 [ 3246.883984] ? is_subdir+0x246/0x410 [ 3246.884002] copy_tree+0x100/0xaf0 [ 3246.884016] ? lock_acquire+0x170/0x3c0 [ 3246.884030] ? is_subdir+0x164/0x410 [ 3246.884054] propagate_one.part.0+0x3a8/0x710 [ 3246.884071] propagate_mnt+0x201/0x530 [ 3246.884083] ? invent_group_ids+0x152/0x210 [ 3246.884099] attach_recursive_mnt+0x697/0xd80 [ 3246.884115] ? count_mounts+0x210/0x210 [ 3247.006795] ? clone_mnt+0x701/0x11b0 [ 3247.010608] graft_tree+0x187/0x210 [ 3247.014246] do_mount+0x217b/0x2f10 [ 3247.017881] ? lock_downgrade+0x720/0x720 [ 3247.022037] ? lock_acquire+0x170/0x3c0 [ 3247.026016] ? __might_fault+0xef/0x1d0 [ 3247.029994] ? copy_mount_string+0x40/0x40 [ 3247.034253] ? __might_fault+0x192/0x1d0 [ 3247.038328] ? _copy_from_user+0xd2/0x130 [ 3247.042497] ? copy_mount_options+0x26f/0x380 [ 3247.046998] ksys_mount+0xcf/0x130 [ 3247.050547] __x64_sys_mount+0xba/0x150 [ 3247.054543] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3247.059135] do_syscall_64+0xf9/0x620 [ 3247.062944] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3247.068128] RIP: 0033:0x45cb29 [ 3247.071317] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3247.090216] RSP: 002b:00007fe38a84bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 05:32:56 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x4f}, 0x0, 0x10, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000640)={&(0x7f0000000580)={0x88, 0x0, 0x8, 0x70bd2a, 0x25dfdbfe, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x4}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x1}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_FD={0x8}}]}, 0x88}, 0x1, 0x0, 0x0, 0x4000804}, 0x48800) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x80182, 0x0) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f0000000100)='y\x00', 0x2, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r2, &(0x7f0000000180)=""/186, 0xba) ioctl$SIOCAX25OPTRT(r2, 0x89e7, &(0x7f0000000280)={@bcast, @null, 0x2, 0x20}) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000040)={0x4, 0x6, 0x8001, 0x1}, 0x8) write$P9_RMKNOD(r0, &(0x7f00000003c0)={0x14, 0x13, 0x2, {0x0, 0x4, 0x8}}, 0x14) connect$caif(r1, &(0x7f0000000500)=@dbg={0x25, 0x8}, 0x2) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) bind$bt_l2cap(r1, &(0x7f0000000480)={0x1f, 0x7fff, @any, 0x8, 0x2}, 0xe) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) r3 = socket$key(0xf, 0x3, 0x2) getsockopt$IP_VS_SO_GET_SERVICES(r3, 0x0, 0x482, &(0x7f0000000400)=""/45, &(0x7f0000000440)=0x2d) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f00000002c0)={0x7}, 0x8) [ 3247.097923] RAX: ffffffffffffffda RBX: 00000000004f7560 RCX: 000000000045cb29 [ 3247.105191] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000000 [ 3247.112461] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3247.119731] R10: 0000000000a51000 R11: 0000000000000246 R12: 0000000000000004 [ 3247.126997] R13: 000000000000077b R14: 00000000004ca735 R15: 00007fe38a84c6d4 05:32:57 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000000000f0ffff000c0004"], 0x30}}, 0x0) [ 3247.212710] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 05:32:57 executing program 5 (fault-call:3 fault-nth:42): perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:57 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:57 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsu\x00', 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) write$rfkill(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x8, 0x3, 0x0, 0x1}, 0x8) read$dsp(r1, &(0x7f0000000180)=""/186, 0xba) ioctl$KVM_GET_REGS(r1, 0x8090ae81, &(0x7f0000000180)) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000080)={{0x7f, 0xad}, {0xfb, 0x1}, 0x6953, 0x4, 0x9}) [ 3247.396101] FAULT_INJECTION: forcing a failure. [ 3247.396101] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3247.408012] CPU: 0 PID: 1970 Comm: syz-executor.5 Not tainted 4.19.131-syzkaller #0 [ 3247.415803] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3247.425207] Call Trace: [ 3247.427818] dump_stack+0x1fc/0x2fe [ 3247.431459] should_fail.cold+0xa/0x14 [ 3247.435357] ? check_preemption_disabled+0x41/0x280 [ 3247.440401] ? setup_fault_attr+0x200/0x200 [ 3247.444741] __alloc_pages_nodemask+0x239/0x2890 [ 3247.449521] ? __lock_acquire+0x6de/0x3ff0 [ 3247.453771] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 3247.458629] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 3247.463522] ? __lock_acquire+0x6de/0x3ff0 [ 3247.467783] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3247.472565] ? __lock_acquire+0x6de/0x3ff0 [ 3247.476847] ? ____cache_alloc_node+0x156/0x1d0 [ 3247.481531] cache_grow_begin+0xa4/0x8a0 [ 3247.485597] ? check_preemption_disabled+0x41/0x280 [ 3247.490621] ____cache_alloc_node+0x170/0x1d0 [ 3247.495123] ? check_preemption_disabled+0x41/0x280 [ 3247.500158] kmem_cache_alloc+0x1e4/0x370 [ 3247.504311] alloc_vfsmnt+0x23/0x780 [ 3247.508030] clone_mnt+0x6c/0x11b0 [ 3247.511580] ? is_subdir+0x246/0x410 [ 3247.515393] copy_tree+0x100/0xaf0 [ 3247.518937] ? lock_acquire+0x170/0x3c0 [ 3247.522925] ? is_subdir+0x164/0x410 [ 3247.522944] propagate_one.part.0+0x3a8/0x710 [ 3247.531156] propagate_mnt+0x201/0x530 [ 3247.531171] ? invent_group_ids+0x152/0x210 [ 3247.539397] attach_recursive_mnt+0x697/0xd80 05:32:57 executing program 1: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5435, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x9, 0x101}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=""/186) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000040)={0x5, 0x7, 0x2990}, 0xc) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3247.539415] ? count_mounts+0x210/0x210 [ 3247.547876] graft_tree+0x187/0x210 [ 3247.551523] do_mount+0x217b/0x2f10 [ 3247.551542] ? lock_downgrade+0x720/0x720 [ 3247.559300] ? lock_acquire+0x170/0x3c0 [ 3247.559315] ? __might_fault+0xef/0x1d0 [ 3247.559332] ? copy_mount_string+0x40/0x40 [ 3247.571491] ? __might_fault+0x192/0x1d0 [ 3247.575568] ? _copy_from_user+0xd2/0x130 [ 3247.579724] ? copy_mount_options+0x26f/0x380 [ 3247.584234] ksys_mount+0xcf/0x130 [ 3247.587784] __x64_sys_mount+0xba/0x150 [ 3247.591754] ? ksys_mount+0x130/0x130 [ 3247.595575] do_syscall_64+0xf9/0x620 [ 3247.599389] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3247.604583] RIP: 0033:0x45cb29 [ 3247.607781] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3247.626682] RSP: 002b:00007fe38a84bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 05:32:57 executing program 4: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vga_arbiter\x00', 0x10000, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000400)='/dev/audio#\x00', 0x8b8, 0x80) bind$x25(r0, &(0x7f0000000440)={0x9, @null=' \x00'}, 0x12) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r1, &(0x7f0000000180)=""/186, 0xba) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r2, &(0x7f0000000180)=""/186, 0xba) ioctl$FS_IOC_FSGETXATTR(r2, 0x801c581f, &(0x7f00000003c0)={0xffb, 0xfffffcfb, 0x6, 0x9, 0x7}) ioctl$VIDIOC_DV_TIMINGS_CAP(r1, 0xc0905664, &(0x7f0000000040)={0x0, 0x0, [], @bt={0x5, 0x9, 0x1c, 0x1eec, 0x81, 0xb0, 0xb, 0xb}}) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000000100)={0x1, 0xab2, &(0x7f0000000280)="f968a923e907b67f234c4efaecf340367dd91105c13de994f0062b04badc4c26949ecbd077f357d5b30025694ca2655af78982666c24bf2fe669d4de55fdd98ead5fad8d7a8fdde81616d7d27fbcd343078416b511e097467cbcca95edb4a6f45760c7e5b681a0a7aa8d767f795835986df10ab22d37fc5139f1996eea4653eeb8716c1385c33b4ddd7620963960bbc23b6692e02b1124934da6c2728df35a02cfee1eea3a8cc8ae67a62a90a49a9abb630dfd010707e2", &(0x7f0000000340)="c45ca5d15c294fa67e6ecf5a704795c313cd9ac6e6cb852e46a8468ad031aebb568e3c705963f508f551e194c20f9157ce550185be646d53da109d4eec8baa3e32049b2b243ddaf2f5", 0xb7, 0x49}) [ 3247.634405] RAX: ffffffffffffffda RBX: 00000000004f7560 RCX: 000000000045cb29 [ 3247.634414] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000000 [ 3247.634423] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3247.634431] R10: 0000000000a51000 R11: 0000000000000246 R12: 0000000000000004 [ 3247.634440] R13: 000000000000077b R14: 00000000004ca735 R15: 00007fe38a84c6d4 05:32:57 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}, 0x1, 0x2a1df}, 0x0) 05:32:57 executing program 5 (fault-call:3 fault-nth:43): perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:57 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsu\x00', 0x2004, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000080)={0x87, @broadcast, 0x4e24, 0x1, 'none\x00', 0x5, 0x7, 0x68}, 0x2c) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:57 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c0003000000007fffffff000c0004"], 0x30}}, 0x0) 05:32:57 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0xb) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) ioctl$VIDIOC_G_CTRL(r0, 0xc008561b, &(0x7f0000000040)={0x4}) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:57 executing program 2: inotify_init() r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) r1 = fcntl$getown(r0, 0x9) get_robust_list(r1, &(0x7f0000000100)=&(0x7f00000000c0)={&(0x7f0000000000), 0x0, &(0x7f0000000080)={&(0x7f0000000040)}}, &(0x7f0000000140)=0x18) [ 3247.959175] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 05:32:57 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c0003000000009effffff000c0004"], 0x30}}, 0x0) [ 3248.048394] FAULT_INJECTION: forcing a failure. [ 3248.048394] name failslab, interval 1, probability 0, space 0, times 0 [ 3248.073836] CPU: 0 PID: 2056 Comm: syz-executor.5 Not tainted 4.19.131-syzkaller #0 [ 3248.081662] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3248.081669] Call Trace: [ 3248.081693] dump_stack+0x1fc/0x2fe [ 3248.081716] should_fail.cold+0xa/0x14 [ 3248.081733] ? setup_fault_attr+0x200/0x200 [ 3248.081749] ? lock_acquire+0x170/0x3c0 [ 3248.081771] __should_failslab+0x115/0x180 [ 3248.081792] should_failslab+0x5/0xf [ 3248.117503] kmem_cache_alloc+0x277/0x370 [ 3248.117520] alloc_vfsmnt+0x23/0x780 [ 3248.117536] clone_mnt+0x6c/0x11b0 [ 3248.117551] ? is_subdir+0x246/0x410 [ 3248.117568] copy_tree+0x100/0xaf0 [ 3248.117584] ? lock_acquire+0x170/0x3c0 [ 3248.117597] ? is_subdir+0x164/0x410 [ 3248.117619] propagate_one.part.0+0x3a8/0x710 05:32:57 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c000300000000f0ffffff000c0004"], 0x30}}, 0x0) [ 3248.117638] propagate_mnt+0x201/0x530 [ 3248.131953] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 3248.132693] ? invent_group_ids+0x152/0x210 [ 3248.132710] attach_recursive_mnt+0x697/0xd80 [ 3248.132726] ? count_mounts+0x210/0x210 [ 3248.132739] ? clone_mnt+0x701/0x11b0 [ 3248.132754] graft_tree+0x187/0x210 [ 3248.179823] do_mount+0x217b/0x2f10 [ 3248.179842] ? lock_downgrade+0x720/0x720 [ 3248.179856] ? lock_acquire+0x170/0x3c0 [ 3248.179870] ? __might_fault+0xef/0x1d0 [ 3248.179886] ? copy_mount_string+0x40/0x40 [ 3248.199791] ? __might_fault+0x192/0x1d0 [ 3248.199808] ? _copy_from_user+0xd2/0x130 [ 3248.199826] ? copy_mount_options+0x26f/0x380 [ 3248.212517] ksys_mount+0xcf/0x130 [ 3248.212533] __x64_sys_mount+0xba/0x150 [ 3248.220047] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3248.220066] do_syscall_64+0xf9/0x620 [ 3248.228443] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3248.228454] RIP: 0033:0x45cb29 [ 3248.228470] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3248.228478] RSP: 002b:00007fe38a84bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3248.228493] RAX: ffffffffffffffda RBX: 00000000004f7560 RCX: 000000000045cb29 [ 3248.228502] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000000 05:32:58 executing program 5 (fault-call:3 fault-nth:44): perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3248.228510] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3248.228518] R10: 0000000000a51000 R11: 0000000000000246 R12: 0000000000000004 [ 3248.228527] R13: 000000000000077b R14: 00000000004ca735 R15: 00007fe38a84c6d4 05:32:58 executing program 1: perf_event_open(&(0x7f00000012c0)={0x4, 0x70, 0x0, 0x9, 0x2, 0x0, 0x0, 0xc96, 0x520, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5cc1, 0x0, @perf_config_ext={0x6, 0x5}, 0x9, 0xfffffffffffffffc, 0x0, 0x0, 0x100000000}, 0x0, 0x9, 0xffffffffffffffff, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000040)) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:58 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x10000, 0x80) 05:32:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r1) setfsuid(r1) ioprio_set$uid(0x3, r1, 0x8001) inotify_init() [ 3248.415369] FAULT_INJECTION: forcing a failure. [ 3248.415369] name failslab, interval 1, probability 0, space 0, times 0 [ 3248.434918] CPU: 1 PID: 2125 Comm: syz-executor.5 Not tainted 4.19.131-syzkaller #0 [ 3248.442825] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3248.452173] Call Trace: [ 3248.454775] dump_stack+0x1fc/0x2fe [ 3248.458417] should_fail.cold+0xa/0x14 [ 3248.462317] ? setup_fault_attr+0x200/0x200 [ 3248.466646] ? lock_acquire+0x170/0x3c0 [ 3248.470744] __should_failslab+0x115/0x180 [ 3248.475074] should_failslab+0x5/0xf [ 3248.478796] kmem_cache_alloc+0x277/0x370 [ 3248.482956] alloc_vfsmnt+0x23/0x780 [ 3248.486676] clone_mnt+0x6c/0x11b0 [ 3248.490221] ? is_subdir+0x246/0x410 [ 3248.493951] copy_tree+0x100/0xaf0 [ 3248.497501] ? lock_acquire+0x170/0x3c0 [ 3248.501494] ? is_subdir+0x164/0x410 [ 3248.505223] propagate_one.part.0+0x3a8/0x710 [ 3248.509750] propagate_mnt+0x201/0x530 [ 3248.513643] ? invent_group_ids+0x152/0x210 [ 3248.517970] attach_recursive_mnt+0x697/0xd80 [ 3248.522478] ? count_mounts+0x210/0x210 [ 3248.526463] ? clone_mnt+0x701/0x11b0 [ 3248.530269] graft_tree+0x187/0x210 [ 3248.533909] do_mount+0x217b/0x2f10 [ 3248.537544] ? lock_downgrade+0x720/0x720 [ 3248.541692] ? lock_acquire+0x170/0x3c0 [ 3248.545678] ? __might_fault+0xef/0x1d0 [ 3248.549635] ? copy_mount_string+0x40/0x40 [ 3248.553854] ? __might_fault+0x192/0x1d0 [ 3248.557896] ? _copy_from_user+0xd2/0x130 [ 3248.562033] ? copy_mount_options+0x26f/0x380 [ 3248.566518] ksys_mount+0xcf/0x130 [ 3248.570042] __x64_sys_mount+0xba/0x150 [ 3248.574004] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3248.578705] do_syscall_64+0xf9/0x620 [ 3248.582498] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3248.587672] RIP: 0033:0x45cb29 [ 3248.590844] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3248.609727] RSP: 002b:00007fe38a84bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3248.617416] RAX: ffffffffffffffda RBX: 00000000004f7560 RCX: 000000000045cb29 [ 3248.624684] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000000 [ 3248.631934] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3248.639189] R10: 0000000000a51000 R11: 0000000000000246 R12: 0000000000000004 [ 3248.646449] R13: 000000000000077b R14: 00000000004ca735 R15: 00007fe38a84c6d4 05:32:58 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}, 0x1, 0x2a1e0}, 0x0) 05:32:58 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x616101, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x131000, 0x0) ioctl$KVM_GET_LAPIC(r1, 0x8400ae8e, &(0x7f0000000240)={"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"}) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000000), 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r2, &(0x7f0000000180)=""/186, 0xba) setsockopt$inet6_dccp_int(r2, 0x21, 0x6, &(0x7f0000000080)=0x6, 0x4) inotify_init() 05:32:58 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x1d9680, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r2, &(0x7f0000000180)=""/186, 0xba) write$P9_RLERROR(r2, &(0x7f00000002c0)={0x9, 0x7, 0x1}, 0x9) sendmsg$NL80211_CMD_DEL_KEY(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x48, r1, 0x8, 0x70bd2d, 0x25dfdbfd, {}, [@NL80211_ATTR_KEY_DEFAULT={0x4}, @NL80211_ATTR_KEY_DEFAULT_MGMT={0x4}, @NL80211_ATTR_KEY={0x10, 0x50, 0x0, 0x1, [@NL80211_KEY_DEFAULT_MGMT={0x4}, @NL80211_KEY_TYPE={0x8, 0x7, 0x2}]}, @NL80211_ATTR_KEY={0xc, 0x50, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPES={0x8, 0x8, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}]}, @NL80211_ATTR_MAC={0xa, 0x6, @random="819d762cf6c2"}, @NL80211_ATTR_KEY_DEFAULT={0x4}]}, 0x48}, 0x1, 0x0, 0x0, 0x11}, 0x0) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) r3 = socket$pptp(0x18, 0x1, 0x2) ioctl$sock_TIOCOUTQ(r3, 0x5411, &(0x7f0000000040)) 05:32:58 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000000000020000000c0004"], 0x30}}, 0x0) 05:32:58 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x850, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3248.714340] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 05:32:58 executing program 5 (fault-call:3 fault-nth:45): perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:58 executing program 2: inotify_init() r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x48000, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) ioctl$RTC_PIE_OFF(r0, 0x7006) syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r1, 0x2, 0x70bd25, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4040051}, 0x20048011) [ 3248.821347] FAULT_INJECTION: forcing a failure. [ 3248.821347] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3248.833287] CPU: 0 PID: 2159 Comm: syz-executor.5 Not tainted 4.19.131-syzkaller #0 [ 3248.841125] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3248.850486] Call Trace: [ 3248.853086] dump_stack+0x1fc/0x2fe [ 3248.856732] should_fail.cold+0xa/0x14 [ 3248.860629] ? kernel_text_address+0xbd/0xf0 [ 3248.865164] ? setup_fault_attr+0x200/0x200 [ 3248.869495] ? unwind_get_return_address+0x51/0x90 [ 3248.874436] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3248.879809] ? __save_stack_trace+0xaf/0x190 [ 3248.884235] __alloc_pages_nodemask+0x239/0x2890 [ 3248.889051] ? __lock_acquire+0x6de/0x3ff0 [ 3248.893298] ? __lock_acquire+0x6de/0x3ff0 [ 3248.897551] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 3248.902492] ? mark_held_locks+0xa6/0xf0 [ 3248.906586] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3248.911193] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3248.915961] ? rcu_nmi_exit+0xb3/0x180 [ 3248.919871] ? retint_kernel+0x2d/0x2d [ 3248.923836] cache_grow_begin+0xa4/0x8a0 [ 3248.927931] ? setup_fault_attr+0x200/0x200 [ 3248.932264] ? cache_alloc_pfmemalloc+0x1e/0x140 [ 3248.937030] cache_alloc_refill+0x273/0x340 [ 3248.941360] kmem_cache_alloc+0x346/0x370 [ 3248.945521] alloc_vfsmnt+0x23/0x780 [ 3248.949239] clone_mnt+0x6c/0x11b0 [ 3248.952783] ? is_subdir+0x246/0x410 [ 3248.956508] copy_tree+0x100/0xaf0 [ 3248.960058] ? lock_acquire+0x170/0x3c0 [ 3248.964040] ? is_subdir+0x164/0x410 [ 3248.967771] propagate_one.part.0+0x3a8/0x710 05:32:58 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000000000030000000c0004"], 0x30}}, 0x0) [ 3248.972286] propagate_mnt+0x201/0x530 [ 3248.976177] ? invent_group_ids+0x152/0x210 [ 3248.980513] attach_recursive_mnt+0x697/0xd80 [ 3248.985015] ? count_mounts+0x210/0x210 [ 3248.989002] ? clone_mnt+0x701/0x11b0 [ 3248.992813] graft_tree+0x187/0x210 [ 3248.996536] do_mount+0x217b/0x2f10 [ 3249.000170] ? rcu_nmi_exit+0xb3/0x180 [ 3249.004064] ? retint_kernel+0x2d/0x2d [ 3249.007954] ? copy_mount_string+0x40/0x40 [ 3249.012195] ? copy_mount_options+0x16/0x380 [ 3249.016618] ? audit_add_tree_rule.cold+0x2f/0x2f [ 3249.021477] ? copy_mount_options+0x26f/0x380 [ 3249.025984] ksys_mount+0xcf/0x130 [ 3249.029531] __x64_sys_mount+0xba/0x150 [ 3249.033519] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3249.038120] do_syscall_64+0xf9/0x620 [ 3249.038140] entry_SYSCALL_64_after_hwframe+0x49/0xbe 05:32:58 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c000300000000000f0000000c0004"], 0x30}}, 0x0) [ 3249.038152] RIP: 0033:0x45cb29 [ 3249.038166] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3249.038174] RSP: 002b:00007fe38a84bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3249.038188] RAX: ffffffffffffffda RBX: 00000000004f7560 RCX: 000000000045cb29 05:32:58 executing program 5 (fault-call:3 fault-nth:46): perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3249.038196] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000000 [ 3249.038204] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3249.038212] R10: 0000000000a51000 R11: 0000000000000246 R12: 0000000000000004 [ 3249.038220] R13: 000000000000077b R14: 00000000004ca735 R15: 00007fe38a84c6d4 [ 3249.089882] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 05:32:59 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0xfe, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x800, 0xf4, 0x0, 0x0, 0x0, 0xfffffd, 0x401}, 0x0, 0x4004, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="280000001000250800000000000000000a000000", @ANYRES32=r4, @ANYBLOB="00000000000000000001000000000000"], 0x28}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'veth1_to_bond\x00', r4}) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) accept$ax25(r0, &(0x7f0000000180)={{0x3, @null}, [@rose, @rose, @rose, @default, @remote, @default, @netrom]}, &(0x7f0000000080)=0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) syz_open_dev$ptys(0xc, 0x3, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f00000000c0)={0x4, 0x1b, 0x1f}) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sysvipc/shm\x00', 0x0, 0x0) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000280)={@loopback, 0x21, r5}) 05:32:59 executing program 2: inotify_init() r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000000)={0x0, 0x1, 0x80000000}) [ 3249.276903] FAULT_INJECTION: forcing a failure. [ 3249.276903] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3249.288739] CPU: 1 PID: 2229 Comm: syz-executor.5 Not tainted 4.19.131-syzkaller #0 [ 3249.296545] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3249.296552] Call Trace: [ 3249.296577] dump_stack+0x1fc/0x2fe [ 3249.296602] should_fail.cold+0xa/0x14 [ 3249.296616] ? check_preemption_disabled+0x41/0x280 [ 3249.296632] ? setup_fault_attr+0x200/0x200 [ 3249.325365] __alloc_pages_nodemask+0x239/0x2890 [ 3249.330137] ? __lock_acquire+0x6de/0x3ff0 [ 3249.334385] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 3249.339237] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 3249.344083] ? __lock_acquire+0x6de/0x3ff0 [ 3249.348338] ? __lock_acquire+0x6de/0x3ff0 [ 3249.352581] ? ____cache_alloc_node+0x156/0x1d0 [ 3249.357277] cache_grow_begin+0xa4/0x8a0 [ 3249.357295] ? check_preemption_disabled+0x41/0x280 [ 3249.357316] ____cache_alloc_node+0x170/0x1d0 [ 3249.357330] ? check_preemption_disabled+0x41/0x280 [ 3249.357347] kmem_cache_alloc+0x1e4/0x370 [ 3249.357362] alloc_vfsmnt+0x23/0x780 [ 3249.357377] clone_mnt+0x6c/0x11b0 [ 3249.357391] ? is_subdir+0x246/0x410 [ 3249.357407] copy_tree+0x100/0xaf0 [ 3249.357421] ? lock_acquire+0x170/0x3c0 [ 3249.357433] ? is_subdir+0x164/0x410 [ 3249.357456] propagate_one.part.0+0x3a8/0x710 [ 3249.357473] propagate_mnt+0x201/0x530 [ 3249.357485] ? invent_group_ids+0x152/0x210 [ 3249.357502] attach_recursive_mnt+0x697/0xd80 [ 3249.357517] ? count_mounts+0x210/0x210 [ 3249.357532] ? clone_mnt+0x701/0x11b0 [ 3249.357548] graft_tree+0x187/0x210 [ 3249.357563] do_mount+0x217b/0x2f10 [ 3249.357581] ? lock_downgrade+0x720/0x720 [ 3249.357595] ? lock_acquire+0x170/0x3c0 [ 3249.357609] ? __might_fault+0xef/0x1d0 [ 3249.357623] ? copy_mount_string+0x40/0x40 [ 3249.357640] ? __might_fault+0x192/0x1d0 [ 3249.357656] ? _copy_from_user+0xd2/0x130 [ 3249.357671] ? copy_mount_options+0x26f/0x380 [ 3249.357687] ksys_mount+0xcf/0x130 [ 3249.357703] __x64_sys_mount+0xba/0x150 [ 3249.357719] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3249.357734] do_syscall_64+0xf9/0x620 [ 3249.357753] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3249.357765] RIP: 0033:0x45cb29 [ 3249.357778] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3249.357805] RSP: 002b:00007fe38a84bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3249.357818] RAX: ffffffffffffffda RBX: 00000000004f7560 RCX: 000000000045cb29 [ 3249.357827] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000000 [ 3249.357836] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3249.357844] R10: 0000000000a51000 R11: 0000000000000246 R12: 0000000000000004 [ 3249.357852] R13: 000000000000077b R14: 00000000004ca735 R15: 00007fe38a84c6d4 05:32:59 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}, 0x1, 0x2a1e1}, 0x0) 05:32:59 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000001540)={0x18, 0xd, 0x1, {{0x4, 0x0, 0x6}, 0x8d1d}}, 0x18) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001480)=ANY=[@ANYBLOB="2800000010f79768fb2d035da0c217b60025080000005190063fac9c63454c1d9e48143ecf396e8d92885cb515ee955e2b2a77603a9d7b49f60c615960ff2691", @ANYRES32=0x0, @ANYBLOB="c5f10006000000"], 0x28}}, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000001340)=0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001380)={{{@in6=@private0={0xfc, 0x0, [], 0x1}, @in6=@loopback, 0x4e22, 0x3ff, 0x4e24, 0x2, 0x2, 0xf0, 0x20, 0x21, 0x0, r0}, {0x101, 0x8, 0x3f, 0x1, 0x5, 0x2, 0x7, 0x9}, {0xe4b, 0x40, 0x2, 0xf49}, 0x4, 0x6e6bbf, 0x0, 0x1, 0x1, 0x2}, {{@in6=@private1={0xfc, 0x1, [], 0x1}, 0x4d5, 0x2b}, 0x0, @in6=@loopback, 0x3500, 0x0, 0x2, 0x54, 0xffff2030, 0x9, 0x401}}, 0xe8) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r1, &(0x7f0000000180)=""/186, 0xba) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @empty, @remote}, &(0x7f0000001280)=0xc) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r3, &(0x7f0000000180)=""/186, 0xba) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x3}, {0xa, 0x0, 0x0, @mcast1}, r5}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r3, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x4, @empty, 0x1000}, r5}}, 0x30) read$dsp(0xffffffffffffffff, &(0x7f0000000180)=""/186, 0xba) sendto$netrom(r2, &(0x7f0000000280)="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", 0x1000, 0x10, &(0x7f0000000040)={{0x3, @bcast, 0x4}, [@bcast, @null, @bcast, @bcast, @bcast, @default, @bcast, @null]}, 0x48) 05:32:59 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000000000f00000000c0004"], 0x30}}, 0x0) 05:32:59 executing program 5 (fault-call:3 fault-nth:47): perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:59 executing program 2: inotify_init() r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x84601, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) setsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000000)=0x4, 0x4) r1 = open(&(0x7f0000000140)='./file0\x00', 0x20000, 0x111) accept4$inet(r1, &(0x7f0000000240)={0x2, 0x0, @multicast1}, &(0x7f0000000280)=0x10, 0x0) [ 3249.442011] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3249.564247] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 3249.718570] FAULT_INJECTION: forcing a failure. [ 3249.718570] name failslab, interval 1, probability 0, space 0, times 0 [ 3249.731540] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3249.742626] CPU: 1 PID: 2258 Comm: syz-executor.5 Not tainted 4.19.131-syzkaller #0 [ 3249.750432] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3249.759787] Call Trace: [ 3249.762389] dump_stack+0x1fc/0x2fe [ 3249.766028] should_fail.cold+0xa/0x14 [ 3249.769928] ? setup_fault_attr+0x200/0x200 [ 3249.774253] ? lock_acquire+0x170/0x3c0 [ 3249.778240] __should_failslab+0x115/0x180 [ 3249.782482] should_failslab+0x5/0xf [ 3249.785037] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 3249.786196] __kmalloc_track_caller+0x2a6/0x3c0 [ 3249.786212] ? kstrdup_const+0x53/0x80 [ 3249.786229] kstrdup+0x36/0x70 [ 3249.786241] kstrdup_const+0x53/0x80 [ 3249.786255] alloc_vfsmnt+0xb5/0x780 [ 3249.812946] clone_mnt+0x6c/0x11b0 [ 3249.816496] ? is_subdir+0x246/0x410 [ 3249.820246] copy_tree+0x100/0xaf0 [ 3249.820262] ? lock_acquire+0x170/0x3c0 [ 3249.820275] ? is_subdir+0x164/0x410 [ 3249.820301] propagate_one.part.0+0x3a8/0x710 [ 3249.835991] propagate_mnt+0x201/0x530 [ 3249.836008] ? invent_group_ids+0x152/0x210 [ 3249.836024] attach_recursive_mnt+0x697/0xd80 [ 3249.836040] ? count_mounts+0x210/0x210 [ 3249.836054] ? clone_mnt+0x701/0x11b0 [ 3249.836070] graft_tree+0x187/0x210 [ 3249.836086] do_mount+0x217b/0x2f10 [ 3249.836104] ? lock_downgrade+0x720/0x720 05:32:59 executing program 2: inotify_init() r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) r4 = syz_genetlink_get_family_id$smc(&(0x7f0000000040)='SMC_PNETID\x00') sendmsg$SMC_PNETID_GET(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000500)={0x14, r4, 0x1, 0x0, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x40000}, 0x0) sendmsg$SMC_PNETID_DEL(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbfe, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x1}, 0x20000805) 05:32:59 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000000000000300000c0004"], 0x30}}, 0x0) [ 3249.836118] ? lock_acquire+0x170/0x3c0 [ 3249.836133] ? __might_fault+0xef/0x1d0 [ 3249.836147] ? copy_mount_string+0x40/0x40 [ 3249.836162] ? __might_fault+0x192/0x1d0 [ 3249.836190] ? _copy_from_user+0xd2/0x130 [ 3249.888289] ? copy_mount_options+0x26f/0x380 [ 3249.888308] ksys_mount+0xcf/0x130 [ 3249.888325] __x64_sys_mount+0xba/0x150 [ 3249.888345] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3249.904892] do_syscall_64+0xf9/0x620 [ 3249.904915] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3249.904926] RIP: 0033:0x45cb29 [ 3249.904940] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 05:32:59 executing program 5 (fault-call:3 fault-nth:48): perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:32:59 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) syz_mount_image$ceph(&(0x7f0000000040)='ceph\x00', &(0x7f0000000080)='./file1\x00', 0x7, 0x9, &(0x7f0000000740)=[{&(0x7f00000000c0)="ed10a83026c319e6150fce3ac5bec7a12a9989f5e3223612e663f0f9d7f437772d", 0x21, 0x8908}, {&(0x7f0000000280)="6e36a9b7da4ce1168c259091801d550aceb29e066839fde50095fce2a7439ea6718964eebf1ed28cc1039cd5164e73fb81cf3e1490423ec0b91472771b5fb83d9295bd68b16cb87b35d0f2aa4fd1b97fb5417ec8617d6fced0d0de95aa345527658b3d2c7ba8c527eff42d4088c4efdc0680c387093b7f6e0a1b1d4c62ce0a70f1b3d068b36bcf9fce90ef84e01e758769f19d32bd0975538c143f67e466a2c5e8e99eb03c9b22ae495148efdf0d874be0ad897f47cbfaf1bd5821ad0c2d6dd68279c4", 0xc3}, {&(0x7f0000000180)="fdb80cfd254531bd46a0b9cbb5415f0ffa298e90e435c57e02ee18004bc64ea9a3e40417848bb405a4db1f27ba9b996a1c58f5e8d33af305d2d23ca7c0e600616f08e3f5", 0x44, 0x2}, {&(0x7f0000000100)="baee815346af3eebef3154114d7cd59272d4ef82a9a5ef2e024e8d72dafa6e08dca1d47e4069", 0x26, 0x5}, {&(0x7f0000000380)="bef775e4732e645a58cde2712cc8c8b87d16ab5c886c1330a611137af43ab609d2f7dd1cb65e5efd404f07cfc8fcfc0e3780e0f160034979a027bfa35479712f90786c5513affb2faec41f2169b8a1ce", 0x50, 0x7fffffff}, {&(0x7f0000000400)="1a9f223b3fb60516afd1480297d5834b5a11ed0052af9dd98e52bed8a5dcbb18f0fa16ca795b9292cea4f1523e911b11cefd5d876d5f7d859d41eac2f8c17289c8aee18f9f3d88a2d0ee8fce4a96d29e50541eee5bbf95b8d5aad3017e4ed51c9955dff64c65734884bab2a3403d3d6a7dd87423559f2fcd6686bf03518cbf7031ba9a1283378c904c8c5e6134e12a2fc6bd5b32fb26176f69e6", 0x9a}, {&(0x7f00000004c0)="fefd3c134c3a7b250891d284f6b5524ffa3f56416c66c7ece6fd09cf850c5ff4b8b4349bff727058638c721492a4c1262f6985c3ec550f3b30db01b6f35adfe893a5763a8560fdf69fb27e2207e64fb776329fd549af4420baaa15ccc36ea6ca24d75efc4e5e37ae57ba37c3f9072fe9eb58a2f18035ce772c4017d368b319f68e671465deecc9553617e6c7990afca0b5eaf2d1fa1e199b0a24605c5aae68749d07ce792030e63908118a9088b1f66ae62469f991dbba60da64e3", 0xbb, 0x6}, {&(0x7f0000000580)="e3d7455e45f470cc814acf96c4fba6dc2ad7f9eff38f50b5a461995eea76ab464ba5cf64f9bbc0ed78bc968a787d2edfe043407d2c4a17429fc044dc54bd57a191f77a2806886a3101f1a3568093d28389f119f1159b4cc22c6cef120e4838cd7a49473f380493a7e40930f51442ea8f503a1283d69712510ec65b41e3ac1660be9611692aa2ad05ca836099490eeae133e91480cf05d34087fd62717d9f14e0aacd2607a7ba052ed979271c3b893b50a026b5cb74e20bdf274bf39f194363e09358fa532cab94e39f75d0a80320c657631174156daa47971b30413a32bb44096363008a9786f11dd35c8b0973889506c06f481d1be8f5", 0xf7, 0x2}, {&(0x7f0000000680)="8c22631fffa78a8ca8dcfcb9deaa304b71b74a93751eec97b349725e06e887be117056856a8cbd9781a2f3357daa2de8d433b3ab2355013aa582e53a2e1f52265fbe7e1dcbe34d1bdae58c3692e32ca8dc45fd518d32fdb05b6caf50c6bfefd573c8cfee656175d04df0036aa95a90e7bd5c22197914a5bec497f871c9a126cfddfc1387c6a3cf62f57386f0f18a07a008495ce4ad", 0x95, 0xffffffffffffffff}], 0x810000, &(0x7f0000000200)='(\x00') mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3249.904948] RSP: 002b:00007fe38a84bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3249.904960] RAX: ffffffffffffffda RBX: 00000000004f7560 RCX: 000000000045cb29 [ 3249.904968] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000000 [ 3249.904976] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3249.904983] R10: 0000000000a51000 R11: 0000000000000246 R12: 0000000000000004 [ 3249.904991] R13: 000000000000077b R14: 00000000004ca735 R15: 00007fe38a84c6d4 [ 3250.083258] ceph: device name is missing path (no : separator in /dev/loop1) [ 3250.125134] FAULT_INJECTION: forcing a failure. [ 3250.125134] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3250.136974] CPU: 0 PID: 2313 Comm: syz-executor.5 Not tainted 4.19.131-syzkaller #0 [ 3250.136983] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3250.136988] Call Trace: [ 3250.137009] dump_stack+0x1fc/0x2fe [ 3250.137037] should_fail.cold+0xa/0x14 [ 3250.137054] ? kernel_text_address+0xbd/0xf0 [ 3250.137070] ? setup_fault_attr+0x200/0x200 [ 3250.137085] ? unwind_get_return_address+0x51/0x90 [ 3250.137100] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3250.137113] ? __save_stack_trace+0xaf/0x190 [ 3250.137130] __alloc_pages_nodemask+0x239/0x2890 [ 3250.137149] ? __lock_acquire+0x6de/0x3ff0 [ 3250.164941] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 3250.168720] ? __lock_acquire+0x6de/0x3ff0 [ 3250.168743] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 3250.168760] ? __lock_acquire+0x6de/0x3ff0 [ 3250.168783] ? mark_held_locks+0xa6/0xf0 05:32:59 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}, 0x1, 0x2a1e2}, 0x0) [ 3250.168800] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3250.168818] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3250.168833] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3250.168855] cache_grow_begin+0xa4/0x8a0 [ 3250.168872] ? setup_fault_attr+0x200/0x200 [ 3250.168886] ? cache_alloc_pfmemalloc+0x1e/0x140 [ 3250.168907] cache_alloc_refill+0x273/0x340 [ 3250.168928] kmem_cache_alloc+0x346/0x370 [ 3250.168944] alloc_vfsmnt+0x23/0x780 [ 3250.168958] clone_mnt+0x6c/0x11b0 [ 3250.168972] ? is_subdir+0x246/0x410 [ 3250.168989] copy_tree+0x100/0xaf0 [ 3250.169003] ? lock_acquire+0x170/0x3c0 [ 3250.169014] ? is_subdir+0x164/0x410 [ 3250.169045] propagate_one.part.0+0x3a8/0x710 [ 3250.284058] propagate_mnt+0x201/0x530 [ 3250.287936] ? invent_group_ids+0x152/0x210 [ 3250.292238] attach_recursive_mnt+0x697/0xd80 [ 3250.296816] ? count_mounts+0x210/0x210 [ 3250.300801] graft_tree+0x187/0x210 [ 3250.304421] do_mount+0x217b/0x2f10 [ 3250.308037] ? lock_downgrade+0x720/0x720 [ 3250.312163] ? lock_acquire+0x170/0x3c0 [ 3250.316143] ? __might_fault+0xef/0x1d0 [ 3250.320134] ? copy_mount_string+0x40/0x40 [ 3250.324358] ? __might_fault+0x192/0x1d0 [ 3250.328401] ? _copy_from_user+0xd2/0x130 [ 3250.332534] ? copy_mount_options+0x26f/0x380 [ 3250.337037] ksys_mount+0xcf/0x130 [ 3250.340579] __x64_sys_mount+0xba/0x150 [ 3250.344544] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3250.349109] do_syscall_64+0xf9/0x620 [ 3250.352896] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3250.358073] RIP: 0033:0x45cb29 05:33:00 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000000000000f00000c0004"], 0x30}}, 0x0) 05:33:00 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_GET_STATION(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x1c, r2, 0xf2b, 0x0, 0x0, {0x32}, [@NL80211_ATTR_STA_PLINK_ACTION={0x4}]}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_NEW_MPATH(r0, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4400250}, 0xc, &(0x7f0000000280)={&(0x7f00000000c0)={0x74, r2, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x9}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x2}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1000007f, 0xffffffffffffffff}}, @NL80211_ATTR_WIPHY={0x8}, @NL80211_ATTR_WIPHY={0x0, 0x1, 0x4}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}, @NL80211_ATTR_WDEV={0x2, 0x99, {0x6, 0x2}}, @NL80211_ATTR_WIPHY={0x0, 0x1, 0x1}, @NL80211_ATTR_MAC={0xa, 0x6, @multicast}]}, 0x74}, 0x1, 0x0, 0x0, 0x24000000}, 0xc000) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) ioctl$UI_SET_MSCBIT(r0, 0x40045568, 0x2f) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r3, &(0x7f0000000180)=""/186, 0xba) setsockopt$inet_udp_int(r3, 0x11, 0x67, &(0x7f0000000040)=0x982, 0x4) 05:33:00 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) setsockopt$RXRPC_SECURITY_KEYRING(r0, 0x110, 0x2, &(0x7f0000000000)='-\x00', 0x2) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r1, &(0x7f0000000180)=""/186, 0xba) socket$nl_crypto(0x10, 0x3, 0x15) ioctl$RNDCLEARPOOL(r1, 0x5206, &(0x7f0000000040)=0x2) inotify_init() [ 3250.361257] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3250.380148] RSP: 002b:00007fe38a84bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3250.387860] RAX: ffffffffffffffda RBX: 00000000004f7560 RCX: 000000000045cb29 [ 3250.395325] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000000 [ 3250.402578] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3250.409833] R10: 0000000000a51000 R11: 0000000000000246 R12: 0000000000000004 [ 3250.417105] R13: 000000000000077b R14: 00000000004ca735 R15: 00007fe38a84c6d4 05:33:00 executing program 5 (fault-call:3 fault-nth:49): perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3250.489962] ceph: device name is missing path (no : separator in /dev/loop1) [ 3250.518654] netlink: 'syz-executor.4': attribute type 25 has an invalid length. 05:33:00 executing program 2: inotify_init() r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x1f, 0x80000) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000040)={0x5, @sliced={0x6, [0x55, 0xfff, 0x81, 0xeae, 0x0, 0xb546, 0x2, 0x5, 0x9, 0x3, 0xff, 0xe9d6, 0x7fff, 0x3ff, 0xffff, 0x6, 0x101, 0x101, 0x9, 0x0, 0x7, 0x8, 0x9, 0x8001, 0x8, 0x2, 0x0, 0x1ff, 0xffff, 0x3ff, 0x0, 0x8, 0x9, 0x101, 0xf78, 0x2, 0x40, 0xfffd, 0x9, 0x2, 0x8, 0x6, 0x5, 0x9, 0x800, 0x100, 0xffc0, 0x8], 0x7}}) 05:33:00 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000000000542d00000c0004"], 0x30}}, 0x0) [ 3250.621827] netlink: 'syz-executor.4': attribute type 25 has an invalid length. [ 3250.640203] FAULT_INJECTION: forcing a failure. [ 3250.640203] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3250.652022] CPU: 0 PID: 2355 Comm: syz-executor.5 Not tainted 4.19.131-syzkaller #0 [ 3250.659815] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3250.669165] Call Trace: [ 3250.671768] dump_stack+0x1fc/0x2fe [ 3250.675412] should_fail.cold+0xa/0x14 [ 3250.679309] ? setup_fault_attr+0x200/0x200 [ 3250.683637] ? check_preemption_disabled+0x41/0x280 [ 3250.688685] __alloc_pages_nodemask+0x239/0x2890 [ 3250.693467] ? __lock_acquire+0x6de/0x3ff0 [ 3250.697718] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 3250.702587] ? __lock_acquire+0x6de/0x3ff0 [ 3250.702606] ? lock_downgrade+0x720/0x720 [ 3250.711004] ? __lock_acquire+0x6de/0x3ff0 [ 3250.715254] cache_grow_begin+0xa4/0x8a0 [ 3250.719351] ? setup_fault_attr+0x200/0x200 [ 3250.723699] ? cache_alloc_pfmemalloc+0x1e/0x140 [ 3250.728471] cache_alloc_refill+0x273/0x340 [ 3250.732822] kmem_cache_alloc+0x346/0x370 [ 3250.736968] alloc_vfsmnt+0x23/0x780 [ 3250.740688] clone_mnt+0x6c/0x11b0 [ 3250.744247] ? lock_release+0x429/0x8b0 [ 3250.748230] copy_tree+0x100/0xaf0 [ 3250.751771] ? lock_acquire+0x170/0x3c0 [ 3250.755749] ? is_subdir+0x164/0x410 [ 3250.759564] propagate_one.part.0+0x3a8/0x710 [ 3250.764074] propagate_mnt+0x201/0x530 [ 3250.767964] ? invent_group_ids+0x152/0x210 [ 3250.772290] attach_recursive_mnt+0x697/0xd80 [ 3250.776790] ? count_mounts+0x210/0x210 [ 3250.780767] ? clone_mnt+0x701/0x11b0 [ 3250.784582] graft_tree+0x187/0x210 [ 3250.788218] do_mount+0x217b/0x2f10 [ 3250.791856] ? lock_downgrade+0x720/0x720 [ 3250.796012] ? lock_acquire+0x170/0x3c0 [ 3250.800006] ? __might_fault+0xef/0x1d0 [ 3250.803987] ? copy_mount_string+0x40/0x40 [ 3250.808231] ? __might_fault+0x192/0x1d0 [ 3250.812296] ? _copy_from_user+0xd2/0x130 [ 3250.816450] ? copy_mount_options+0x26f/0x380 [ 3250.820972] ksys_mount+0xcf/0x130 [ 3250.824521] __x64_sys_mount+0xba/0x150 [ 3250.828504] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3250.832921] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 3250.833092] do_syscall_64+0xf9/0x620 [ 3250.844233] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3250.849422] RIP: 0033:0x45cb29 [ 3250.852622] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 05:33:00 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000000000003f00000c0004"], 0x30}}, 0x0) [ 3250.871526] RSP: 002b:00007fe38a84bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3250.879243] RAX: ffffffffffffffda RBX: 00000000004f7560 RCX: 000000000045cb29 [ 3250.886512] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000000 [ 3250.893783] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3250.901051] R10: 0000000000a51000 R11: 0000000000000246 R12: 0000000000000004 [ 3250.908337] R13: 000000000000077b R14: 00000000004ca735 R15: 00007fe38a84c6d4 05:33:00 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) write$P9_RCREATE(r0, &(0x7f00000000c0)={0x18, 0x73, 0x2, {{0x1a, 0x2, 0x5}, 0x10000}}, 0x18) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x6, 0x0, 0x0, 0x41c1, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}}, 0x0, 0x6, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r1, &(0x7f0000000180)=""/186, 0xba) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000040)={@rand_addr, @loopback}, &(0x7f0000000080)=0xc) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:33:00 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x80, 0x0) ioctl$TIOCL_SETVESABLANK(r0, 0x541c, &(0x7f0000000080)) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:33:00 executing program 5 (fault-call:3 fault-nth:50): perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:33:00 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140)='devlink\x00') sendmsg$DEVLINK_CMD_GET(r1, &(0x7f00000003c0)={0x0, 0xfffff000, &(0x7f0000000380)={&(0x7f0000000180)={0x14, r2, 0xc91add0bf88807dd, 0x0, 0x0, {0xf}}, 0x14}}, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r3, &(0x7f0000000180)=""/186, 0xba) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x200440, 0x0) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r5, &(0x7f0000000180)=""/186, 0xba) fcntl$getownex(r5, 0x10, &(0x7f0000000080)={0x0, 0x0}) sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0xf0, r2, 0x2, 0x70bd27, 0x25dfdbfc, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x4}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_FD={0x8, 0x8a, r3}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x1}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x2}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_FD={0x8, 0x8a, r4}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r6}}]}, 0xf0}, 0x1, 0x0, 0x0, 0x8000}, 0x24000000) inotify_init() [ 3251.078848] FAULT_INJECTION: forcing a failure. [ 3251.078848] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3251.090686] CPU: 1 PID: 2432 Comm: syz-executor.5 Not tainted 4.19.131-syzkaller #0 [ 3251.098487] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3251.107941] Call Trace: [ 3251.110519] dump_stack+0x1fc/0x2fe [ 3251.114148] should_fail.cold+0xa/0x14 [ 3251.118036] ? check_preemption_disabled+0x41/0x280 [ 3251.123039] ? setup_fault_attr+0x200/0x200 [ 3251.127349] __alloc_pages_nodemask+0x239/0x2890 [ 3251.132090] ? __lock_acquire+0x6de/0x3ff0 [ 3251.136316] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 3251.141149] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 3251.145993] ? __lock_acquire+0x6de/0x3ff0 [ 3251.150259] ? __lock_acquire+0x6de/0x3ff0 [ 3251.154504] ? ____cache_alloc_node+0x156/0x1d0 [ 3251.159190] cache_grow_begin+0xa4/0x8a0 [ 3251.163271] ? check_preemption_disabled+0x41/0x280 [ 3251.168297] ____cache_alloc_node+0x170/0x1d0 [ 3251.172794] ? check_preemption_disabled+0x41/0x280 [ 3251.177823] kmem_cache_alloc+0x1e4/0x370 [ 3251.182021] alloc_vfsmnt+0x23/0x780 [ 3251.185738] clone_mnt+0x6c/0x11b0 [ 3251.189286] ? is_subdir+0x246/0x410 [ 3251.193009] copy_tree+0x100/0xaf0 [ 3251.196557] ? lock_acquire+0x170/0x3c0 [ 3251.200537] ? is_subdir+0x164/0x410 [ 3251.204267] propagate_one.part.0+0x3a8/0x710 [ 3251.208774] propagate_mnt+0x201/0x530 [ 3251.212665] ? invent_group_ids+0x152/0x210 [ 3251.216994] attach_recursive_mnt+0x697/0xd80 [ 3251.221495] ? count_mounts+0x210/0x210 [ 3251.225476] ? clone_mnt+0x701/0x11b0 [ 3251.229288] graft_tree+0x187/0x210 [ 3251.232911] do_mount+0x217b/0x2f10 [ 3251.236529] ? lock_downgrade+0x720/0x720 [ 3251.240660] ? lock_acquire+0x170/0x3c0 [ 3251.244746] ? __might_fault+0xef/0x1d0 [ 3251.248714] ? copy_mount_string+0x40/0x40 [ 3251.252948] ? __might_fault+0x192/0x1d0 [ 3251.257004] ? _copy_from_user+0xd2/0x130 [ 3251.261151] ? copy_mount_options+0x26f/0x380 [ 3251.265642] ksys_mount+0xcf/0x130 [ 3251.269169] __x64_sys_mount+0xba/0x150 [ 3251.273139] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3251.277716] do_syscall_64+0xf9/0x620 [ 3251.281515] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3251.286685] RIP: 0033:0x45cb29 [ 3251.289870] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3251.308753] RSP: 002b:00007fe38a84bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3251.316441] RAX: ffffffffffffffda RBX: 00000000004f7560 RCX: 000000000045cb29 [ 3251.323699] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000000 [ 3251.330966] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3251.338230] R10: 0000000000a51000 R11: 0000000000000246 R12: 0000000000000004 [ 3251.345592] R13: 000000000000077b R14: 00000000004ca735 R15: 00007fe38a84c6d4 [ 3251.383660] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 05:33:01 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}, 0x1, 0x2a1e3}, 0x0) 05:33:01 executing program 4: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) read$usbfs(r0, &(0x7f0000000080)=""/149, 0x95) syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x20) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:33:01 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) openat$pidfd(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self\x00', 0x10101, 0x0) 05:33:01 executing program 5 (fault-call:3 fault-nth:51): perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:33:01 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c000300000000002d5400000c0004"], 0x30}}, 0x0) 05:33:01 executing program 2: r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x6, &(0x7f0000000000)=""/179) inotify_init() [ 3251.514706] FAULT_INJECTION: forcing a failure. [ 3251.514706] name failslab, interval 1, probability 0, space 0, times 0 [ 3251.583913] CPU: 1 PID: 2452 Comm: syz-executor.5 Not tainted 4.19.131-syzkaller #0 [ 3251.591838] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3251.601190] Call Trace: [ 3251.603793] dump_stack+0x1fc/0x2fe [ 3251.603883] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 3251.607431] should_fail.cold+0xa/0x14 [ 3251.607450] ? setup_fault_attr+0x200/0x200 [ 3251.607467] ? lock_acquire+0x170/0x3c0 [ 3251.607488] __should_failslab+0x115/0x180 [ 3251.607506] should_failslab+0x5/0xf [ 3251.634929] kmem_cache_alloc+0x277/0x370 [ 3251.639084] alloc_vfsmnt+0x23/0x780 [ 3251.642807] clone_mnt+0x6c/0x11b0 [ 3251.646351] ? is_subdir+0x246/0x410 [ 3251.650093] copy_tree+0x100/0xaf0 [ 3251.653642] ? lock_acquire+0x170/0x3c0 [ 3251.657618] ? is_subdir+0x164/0x410 [ 3251.661364] propagate_one.part.0+0x3a8/0x710 [ 3251.661383] propagate_mnt+0x40d/0x530 [ 3251.661400] ? invent_group_ids+0x152/0x210 [ 3251.661418] attach_recursive_mnt+0x697/0xd80 [ 3251.661433] ? count_mounts+0x210/0x210 [ 3251.661448] ? clone_mnt+0x701/0x11b0 [ 3251.661464] graft_tree+0x187/0x210 [ 3251.661477] do_mount+0x217b/0x2f10 [ 3251.661494] ? lock_downgrade+0x720/0x720 [ 3251.697807] ? lock_acquire+0x170/0x3c0 [ 3251.697825] ? __might_fault+0xef/0x1d0 [ 3251.705793] ? copy_mount_string+0x40/0x40 [ 3251.705810] ? __might_fault+0x192/0x1d0 [ 3251.714081] ? _copy_from_user+0xd2/0x130 [ 3251.718249] ? copy_mount_options+0x26f/0x380 [ 3251.718267] ksys_mount+0xcf/0x130 [ 3251.718283] __x64_sys_mount+0xba/0x150 05:33:01 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) ioctl$vim2m_VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f0000000000)={0x3, @vbi={0x9, 0xff, 0x4, 0x3136564e, [0x1, 0x2], [0x0, 0x10001], 0x1}}) inotify_init() r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cachefiles\x00', 0x20000, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x8000, 0x0) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f00000002c0)) linkat(r1, &(0x7f0000000140)='./file0\x00', r0, &(0x7f0000000240)='./file0\x00', 0x1800) 05:33:01 executing program 2: inotify_init() r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) ioctl$FBIOPAN_DISPLAY(r0, 0x4606, &(0x7f0000000000)={0x800, 0x1e0, 0x3c0, 0x0, 0x1000, 0x6, 0x2, 0x0, {0x7, 0x9, 0x1}, {0x11b7, 0x9, 0x1}, {0x200, 0xd092, 0x1}, {0x40000000, 0x10, 0x1}, 0x0, 0x80, 0x3ff, 0x100, 0x1, 0xfffffff7, 0x6, 0x4, 0x4, 0x2000000, 0x3, 0x200, 0x20, 0x0, 0x3, 0xc}) [ 3251.730287] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3251.730301] do_syscall_64+0xf9/0x620 [ 3251.730321] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3251.743874] RIP: 0033:0x45cb29 [ 3251.743891] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3251.765955] RSP: 002b:00007fe38a84bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3251.773668] RAX: ffffffffffffffda RBX: 00000000004f7560 RCX: 000000000045cb29 05:33:01 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c0003000000000000f000000c0004"], 0x30}}, 0x0) [ 3251.780940] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000000 [ 3251.788213] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3251.795500] R10: 0000000000a51000 R11: 0000000000000246 R12: 0000000000000004 [ 3251.802769] R13: 000000000000077b R14: 00000000004ca735 R15: 00007fe38a84c6d4 05:33:01 executing program 2: inotify_init() ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f0000000040)={0xa, 0x8000, {0x51, 0x44, 0x7e, {0x3, 0x5}, {0x7efa, 0x1}, @period={0x5c, 0x4, 0x35f, 0x7, 0x27, {0x3, 0x4, 0x9, 0x5}, 0x1, &(0x7f0000000000)=[0xc3c]}}, {0x51, 0xfc67, 0xfa3, {0x2, 0x4a7c}, {0x7fff, 0x1164}, @rumble={0xfff, 0x1}}}) 05:33:01 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) read$dsp(r0, &(0x7f0000000080)=""/143, 0x8f) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000040)) 05:33:01 executing program 5 (fault-call:3 fault-nth:52): perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:33:01 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}, 0x1, 0x2a1e4}, 0x0) 05:33:01 executing program 2: inotify_init() r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) write$sndseq(r0, &(0x7f0000000000)=[{0x7, 0x9, 0x3, 0x8, @tick=0xbc, {0x0, 0x3}, {0x40}, @result={0x2, 0xfff}}, {0x1, 0x7f, 0x81, 0x4, @time={0x198, 0x2}, {0x9, 0x7}, {}, @addr={0x7, 0x40}}, {0x19, 0x0, 0x2, 0x0, @tick=0xc0000000, {0x4, 0x2}, {0x2, 0x81}, @raw32={[0xffffffff, 0x1ff, 0x78]}}, {0x0, 0x6, 0x0, 0x81, @tick=0x7, {0xe9, 0x20}, {0x8d, 0xe}, @note={0xff, 0x80, 0x8, 0x40, 0x8000}}, {0x1d, 0x0, 0x2, 0x7f, @time={0x4ae0, 0x2e}, {0x20}, {0xd2, 0x9}, @raw32={[0x9, 0x1, 0x10000]}}], 0x8c) 05:33:01 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000000000004003000c0004"], 0x30}}, 0x0) 05:33:01 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, &(0x7f0000000040)={{0x2, 0x6}, 0x1b}, 0x10) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3252.038692] FAULT_INJECTION: forcing a failure. [ 3252.038692] name failslab, interval 1, probability 0, space 0, times 0 [ 3252.055343] CPU: 1 PID: 2545 Comm: syz-executor.5 Not tainted 4.19.131-syzkaller #0 [ 3252.063163] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3252.072519] Call Trace: [ 3252.075116] dump_stack+0x1fc/0x2fe [ 3252.078759] should_fail.cold+0xa/0x14 [ 3252.082660] ? setup_fault_attr+0x200/0x200 [ 3252.086990] ? lock_acquire+0x170/0x3c0 [ 3252.090988] __should_failslab+0x115/0x180 [ 3252.095237] should_failslab+0x5/0xf [ 3252.098960] __kmalloc_track_caller+0x2a6/0x3c0 [ 3252.103640] ? kstrdup_const+0x53/0x80 [ 3252.107545] kstrdup+0x36/0x70 [ 3252.110788] kstrdup_const+0x53/0x80 [ 3252.114508] alloc_vfsmnt+0xb5/0x780 [ 3252.118228] clone_mnt+0x6c/0x11b0 [ 3252.121775] ? is_subdir+0x246/0x410 [ 3252.125506] copy_tree+0x100/0xaf0 [ 3252.129053] ? lock_acquire+0x170/0x3c0 [ 3252.133036] ? is_subdir+0x164/0x410 [ 3252.136765] propagate_one.part.0+0x3a8/0x710 [ 3252.141271] propagate_mnt+0x201/0x530 [ 3252.145162] ? invent_group_ids+0x152/0x210 [ 3252.149495] attach_recursive_mnt+0x697/0xd80 [ 3252.153998] ? count_mounts+0x210/0x210 [ 3252.157989] ? clone_mnt+0x701/0x11b0 [ 3252.161837] graft_tree+0x187/0x210 [ 3252.165472] do_mount+0x217b/0x2f10 [ 3252.169108] ? lock_downgrade+0x720/0x720 [ 3252.173255] ? lock_acquire+0x170/0x3c0 [ 3252.177228] ? __might_fault+0xef/0x1d0 [ 3252.181227] ? copy_mount_string+0x40/0x40 [ 3252.185467] ? __might_fault+0x192/0x1d0 [ 3252.189533] ? _copy_from_user+0xd2/0x130 [ 3252.193682] ? copy_mount_options+0x26f/0x380 [ 3252.198186] ksys_mount+0xcf/0x130 [ 3252.201734] __x64_sys_mount+0xba/0x150 [ 3252.205722] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3252.210314] do_syscall_64+0xf9/0x620 [ 3252.214123] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3252.219315] RIP: 0033:0x45cb29 [ 3252.222525] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3252.222533] RSP: 002b:00007fe38a84bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3252.222547] RAX: ffffffffffffffda RBX: 00000000004f7560 RCX: 000000000045cb29 05:33:02 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000000000000340000c0004"], 0x30}}, 0x0) 05:33:02 executing program 5 (fault-call:3 fault-nth:53): perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3252.222556] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000000 [ 3252.222563] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3252.222571] R10: 0000000000a51000 R11: 0000000000000246 R12: 0000000000000004 [ 3252.222579] R13: 000000000000077b R14: 00000000004ca735 R15: 00007fe38a84c6d4 05:33:02 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) ioctl$USBDEVFS_DISCARDURB(r0, 0x550b, &(0x7f0000000000)=0xffffffffffff8000) inotify_init() 05:33:02 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000000000fffff0000c0004"], 0x30}}, 0x0) 05:33:02 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) ioctl$TIOCL_GETKMSGREDIRECT(r0, 0x541c, &(0x7f0000000040)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3252.457462] FAULT_INJECTION: forcing a failure. [ 3252.457462] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3252.469294] CPU: 0 PID: 2610 Comm: syz-executor.5 Not tainted 4.19.131-syzkaller #0 [ 3252.477084] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3252.486518] Call Trace: [ 3252.489116] dump_stack+0x1fc/0x2fe [ 3252.492769] should_fail.cold+0xa/0x14 [ 3252.492785] ? check_preemption_disabled+0x41/0x280 [ 3252.492799] ? setup_fault_attr+0x200/0x200 [ 3252.492835] __alloc_pages_nodemask+0x239/0x2890 [ 3252.492865] ? __lock_acquire+0x6de/0x3ff0 [ 3252.492886] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 3252.492900] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 3252.492913] ? mark_held_locks+0xa6/0xf0 [ 3252.492949] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3252.492965] ? rcu_nmi_exit+0xb3/0x180 [ 3252.492983] ? ____cache_alloc_node+0x156/0x1d0 [ 3252.493003] cache_grow_begin+0xa4/0x8a0 [ 3252.493016] ? check_preemption_disabled+0x41/0x280 [ 3252.493046] ____cache_alloc_node+0x170/0x1d0 [ 3252.493057] ? check_preemption_disabled+0x41/0x280 [ 3252.493071] kmem_cache_alloc+0x1e4/0x370 [ 3252.493086] alloc_vfsmnt+0x23/0x780 [ 3252.493099] clone_mnt+0x6c/0x11b0 [ 3252.493112] ? is_subdir+0x246/0x410 [ 3252.493128] copy_tree+0x100/0xaf0 [ 3252.493140] ? lock_acquire+0x170/0x3c0 [ 3252.493150] ? is_subdir+0x164/0x410 [ 3252.493168] propagate_one.part.0+0x3a8/0x710 [ 3252.493182] propagate_mnt+0x201/0x530 [ 3252.493192] ? invent_group_ids+0x152/0x210 [ 3252.493206] attach_recursive_mnt+0x697/0xd80 [ 3252.493236] ? count_mounts+0x210/0x210 [ 3252.493250] ? clone_mnt+0x701/0x11b0 [ 3252.493264] graft_tree+0x187/0x210 [ 3252.493275] do_mount+0x217b/0x2f10 [ 3252.493293] ? lock_downgrade+0x720/0x720 [ 3252.493306] ? lock_acquire+0x170/0x3c0 [ 3252.493320] ? __might_fault+0xef/0x1d0 [ 3252.493333] ? copy_mount_string+0x40/0x40 [ 3252.493348] ? __might_fault+0x192/0x1d0 [ 3252.493363] ? _copy_from_user+0xd2/0x130 [ 3252.493379] ? copy_mount_options+0x26f/0x380 [ 3252.493394] ksys_mount+0xcf/0x130 [ 3252.493431] __x64_sys_mount+0xba/0x150 [ 3252.493442] ? __sanitizer_cov_trace_pc+0x27/0x50 [ 3252.493457] do_syscall_64+0xf9/0x620 [ 3252.493474] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3252.493484] RIP: 0033:0x45cb29 [ 3252.493498] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3252.692265] RSP: 002b:00007fe38a84bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3252.692278] RAX: ffffffffffffffda RBX: 00000000004f7560 RCX: 000000000045cb29 05:33:02 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000000000000000010c0004"], 0x30}}, 0x0) 05:33:02 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) ioctl$KVM_GET_XCRS(r0, 0x8188aea6, &(0x7f0000000040)={0x5, 0x10000, [{0xfffffff9, 0x0, 0x2}, {0x3, 0x0, 0x7fff}, {0x1000, 0x0, 0x9}, {0xac, 0x0, 0x5}, {0xfff, 0x0, 0x11}]}) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000000)={r2, 0xffff, 0x8001}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000000c0)={r2, 0x5}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000280)={r3, 0x800, 0x6, 0x10000}, 0x10) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:33:02 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000000000000000020c0004"], 0x30}}, 0x0) 05:33:02 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}, 0x1, 0x2a1e5}, 0x0) 05:33:02 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000000000000000030c0004"], 0x30}}, 0x0) [ 3252.692286] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000000 [ 3252.692298] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3252.721794] R10: 0000000000a51000 R11: 0000000000000246 R12: 0000000000000004 [ 3252.721803] R13: 000000000000077b R14: 00000000004ca735 R15: 00007fe38a84c6d4 05:33:02 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000000)={r2, 0xffff, 0x8001}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000001580)={0x78, 0x201, 0x10e4, 0xf8d80000, r2}, &(0x7f0000001a40)=0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000001a80)={r3, 0xf6a}, &(0x7f0000001ac0)=0x8) r4 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x40000) sendmsg$kcm(r4, &(0x7f0000001a00)={0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000000040)="855888b9fa986dc88dd8b20e3b5fb38d749cb55fffda73721a46f358b1cde894a87a7a3f1ef8692d3bf056672ff36c42c59ba559ec2089e4a94d32514b82a6eb149c6b003c7d44ab0acf958adefb339092fbfdf52f028269cdfee9f37c8678cb146f04dab9dfecadd0f4a0bc0bb68c1773a1d9191990f243ce4d70522c0d520a7aec1cb9", 0x84}, {&(0x7f0000000100)="b2e433e379d43ad945b89c44a2bd62f22f4879ce59e5bd81871fa4af3498ede0a01bcb917dfaf7d5481e46c9bc4e14429f954c9c71d80deea576743bd6edc00bc2367ff86a3dc881d593d93c3fd66b0c79aeee2bd64967fd2b77873facbfcc55068543f81c0f9ad4704f828b62a790265be13d057ed67695a9eb53018377f9379ae3c64448467d0efdbcf2", 0x8b}, {&(0x7f0000001980)="a3cc937ad7b62fc5881b583f2892c05ca04e3cbddca6275b7c61515f39223718d1b08150f970fb77aade6427c1dbcf656b150b5084060f49c18821212334c452234d", 0x42}, {&(0x7f0000000240)="41929a9e8720e2793a41b92aa264ba27422c23b0201f5f34c3a26bdb707f77cc8c94137dde79650d62b22c7682f30b54adbac6716600813031978997de2a0a840bc30f38a830b1257b21380cdbe4e22ba6d7adc366", 0x55}, {&(0x7f00000002c0)="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", 0x1000}, {&(0x7f00000012c0)="18fe7026a29e041fcd5fde6bbc71f90ff3ee03f53d5801f7f16ecc0687de37a5a837a75eb97537065f", 0x29}, {&(0x7f0000001300)="d5d4b7237e9bef762e313c75c38db8b5f33cfb087a9099527672721946b2fdf1e8b11ce43a509b1b2c812bccf603ba3998e617c6456413e7193c0b3f96dd5070615e87145d3b1354d9c16fd56eed92949aa48ae8c07bb634b4", 0x59}], 0x7, &(0x7f0000002100)=[{0xd0, 0x100, 0x3, "fb594a2c60ea6ad0912c07ab42507701cb3d452341cf267bd9c0056d8e3de6d2f62e7ff724708fbbb515cea7b9849b45f898c3ff7eea33b6d08f42094a4bc9615e518e0f5730591e0090aca00faf9e463e551fdbead2f7da8a66b11a9779bcf84982d04ae0ad8b2c7cbb981f9655d71236022d3db5c316aecc703dc12403237b0ad55d472b1681db9b748c966f29004c3075c9d04ddd49888b03ba4f93a8676160410c81d4c396252f5bb19c945fbe81651cd4c725c36c41b99b"}, {0x178, 0x10f, 0x7, "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"}, {0xa0, 0x101, 0x1ff, "d8f6ea3d9f01bb1132f5c32c509cf5f5e43afd48f55be387b1cb5fe8be8209c56f09725409fb90f5fa2afb9020626db8a8ae2177e2b42fe3cb50e472b00f66a47110805c88537f80cfa40ff348d3bbd1d0c26876c005441e895b65a225020ef63137361cbea05f226ccf1ce8dea95a9da84c24581f091ef8bc8fd97255d924a0449a7bef08333be9df9f8885e574d9a7"}, {0x88, 0x84, 0x1ff, "80ad9c16f91fa9f4c37b57f3a7a3d4f77e2d0370653f31a5c65d22d3346d887c37a87e52889b0f1e6380bd91b3f71282fbd579ac54daa843ce13df28844335ee5d19e7f146367401b8f15776b2ef342b42c445fb9601c110808d18939c43608e6c3054825f54aabb72e086ec1d56136eba78abb9ea"}, {0x98, 0x3a, 0x2941, "c8ecbfc464fa10f25c44aa14e2b90962b6509b862eed2891e6cd0d61fdbd5d1730ce577a91b4a4d83207475ab9cff73a7c254cacf5e81ec3a8801bd484bd1820991b594d6b301098ec85eabba6afa6d6d28c576692cd5a34bfe1ed3438bca6cf1e09e905c08a91aecd3e2a1f1b791bdf78afa613db81850da1a0d0f06ad2ea3e13317bc83ec1b8"}, {0x110, 0x112, 0x0, "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"}, {0xc0, 0x29, 0x7, "26bb1a8b128f0cb535b07a786b1819ddc6fa3bec641f00c8a87d1c74c9521e84ca14a7fef4127940cb984bc73c449b23cf2292f6053090123b89a3965630874555c66405f84a399bc4e6a8a80e748beac55c3117214590fb29ba56a6bcda71c13d1ed9f73aa9dff4142beb789cf9c04ab917c803910029b68e79448d72f7ebd2950950ee42a5609278d8302b3984aa8dffce6dafa64a3fa6aa835ccef9a58fc5d2ae5122c328d9e90ab5b5f832"}, {0x48, 0x101, 0x7, "72099552a97f7a127c0fc598e5ffffff00000030bf572d9abfad39ac1d884639e6ccf50200000000000000262e3168083a"}, {0xa0, 0x117, 0x28b0, "6fbce1622e99981e441d3c4bda3bb3b25b2ece47bc148c4deb7cc078dc6cc7655be59c3525ebbbf2a987f81b3482515f27d7682304229adcf25c97e262ca32e961990c9c4248d2a0d7facafb32f792333e09b2ae3da606781f5daeea2f2019d38a29e6de73cc4d4ae63cf4c08d65e04344c28d04c8644f7afcddbebbd6e51b7c49b3fa7eb1619f7f6c693c"}], 0x6c0}, 0x10) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) splice(r4, &(0x7f0000001400)=0x1, r5, &(0x7f0000001440), 0x0, 0x1) read$dsp(r5, &(0x7f0000000180)=""/186, 0xba) fdatasync(r5) recvmsg$can_raw(r5, &(0x7f0000001940)={0x0, 0x0, &(0x7f0000001880)=[{&(0x7f0000001580)}, {&(0x7f00000015c0)=""/221, 0xdd}, {&(0x7f00000016c0)=""/137, 0x89}, {&(0x7f0000001780)=""/253, 0xfd}], 0x4, &(0x7f00000018c0)=""/119, 0x77}, 0x40000000) sendmsg$RDMA_NLDEV_CMD_GET_CHARDEV(0xffffffffffffffff, &(0x7f0000001540)={&(0x7f0000001480)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001500)={&(0x7f00000014c0)=ANY=[@ANYBLOB="280000000f1400022bbd7000fddbdf2508004500346164000d0045006f70615f766e696300000000"], 0x28}, 0x1, 0x0, 0x0, 0x20000800}, 0x20000000) 05:33:02 executing program 5 (fault-call:3 fault-nth:54): perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3252.904529] FAULT_INJECTION: forcing a failure. [ 3252.904529] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3252.916360] CPU: 0 PID: 2652 Comm: syz-executor.5 Not tainted 4.19.131-syzkaller #0 [ 3252.924150] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3252.933499] Call Trace: [ 3252.936092] dump_stack+0x1fc/0x2fe [ 3252.939736] should_fail.cold+0xa/0x14 [ 3252.943641] ? kernel_text_address+0xbd/0xf0 [ 3252.948059] ? setup_fault_attr+0x200/0x200 05:33:02 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c000300000000000000000f0c0004"], 0x30}}, 0x0) 05:33:02 executing program 4: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x3}, {0xa, 0x0, 0x0, @mcast1}, r2}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {r2, 0xb}}, 0x10) syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:33:02 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r1, &(0x7f0000000180)=""/186, 0xba) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000180)='reno\x00', 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$iso9660(&(0x7f0000000100)='iso9660\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000026c0)={[{@check_strict='check=strict'}, {@gid={'gid', 0x3d, r2}}]}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r4) setfsuid(r4) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r6) setfsuid(r6) mount$9p_xen(&(0x7f0000000040)='syz\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x400, &(0x7f0000000440)=ANY=[@ANYBLOB='trans=xen,dfltgid=', @ANYRESHEX=r2, @ANYBLOB=',rootcontext=system_u,audit,subj_user=./cgroup/syz0\x00,euid<', @ANYRESDEC=r4, @ANYBLOB="2c726f6f74637d6e7465000001006f6f742c7569643c0f2e273391be18c68664f823f5dda9ee1b33707266a9fe0c419d833f3c482b9e3f19736dbf227b00000040b7c4592a19a210351c8544c9b1b44aa630ae89c614b9fc6363d78f1434f002967ffc82130620ea88bac6d3b9544a82d371e4e33e680c9cb838757eb16b74dab9ff010000000000001920aeef9ff6979ac97c49c92ec0000000e477046196a795f70563d86218aeac54dfed49cee16d7f7e75b6de6956ca27b3f2115d2ee1f18deaca4d15627c14c9230f1a0225a1935816e4f873759cf1bfcbfe", @ANYRESDEC=r6, @ANYBLOB=',appraise,appraiV\a,dont_hash,dontEmeHsure,\x00']) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3252.952385] ? unwind_get_return_address+0x51/0x90 [ 3252.957322] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3252.962704] ? __save_stack_trace+0xaf/0x190 [ 3252.962727] __alloc_pages_nodemask+0x239/0x2890 [ 3252.962745] ? __lock_acquire+0x6de/0x3ff0 [ 3252.962765] ? __lock_acquire+0x6de/0x3ff0 [ 3252.962786] ? gfp_pfmemalloc_allowed+0x150/0x150 05:33:02 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c000300000000000000542d0c0004"], 0x30}}, 0x0) [ 3252.962807] ? __lock_acquire+0x6de/0x3ff0 [ 3252.962829] ? mark_held_locks+0xa6/0xf0 05:33:02 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c000300000000000000003f0c0004"], 0x30}}, 0x0) [ 3252.962844] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3252.962863] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3252.962879] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3252.962901] cache_grow_begin+0xa4/0x8a0 [ 3252.962918] ? setup_fault_attr+0x200/0x200 [ 3252.962932] ? cache_alloc_pfmemalloc+0x1e/0x140 [ 3252.962950] cache_alloc_refill+0x273/0x340 [ 3252.962971] kmem_cache_alloc+0x346/0x370 [ 3252.962987] alloc_vfsmnt+0x23/0x780 [ 3252.963001] clone_mnt+0x6c/0x11b0 05:33:03 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000000000ffffff9e0c0004"], 0x30}}, 0x0) 05:33:03 executing program 5 (fault-call:3 fault-nth:55): perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3252.963016] ? is_subdir+0x246/0x410 [ 3252.963034] copy_tree+0x100/0xaf0 [ 3252.963048] ? lock_acquire+0x170/0x3c0 [ 3252.963060] ? is_subdir+0x164/0x410 [ 3252.963083] propagate_one.part.0+0x3a8/0x710 [ 3252.963101] propagate_mnt+0x201/0x530 [ 3252.963113] ? invent_group_ids+0x152/0x210 05:33:03 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000000000fffffff00c0004"], 0x30}}, 0x0) [ 3252.963130] attach_recursive_mnt+0x697/0xd80 [ 3252.963145] ? count_mounts+0x210/0x210 [ 3252.963161] ? clone_mnt+0x701/0x11b0 [ 3252.963177] graft_tree+0x187/0x210 [ 3252.963192] do_mount+0x217b/0x2f10 [ 3252.963210] ? lock_downgrade+0x720/0x720 [ 3252.963224] ? lock_acquire+0x170/0x3c0 [ 3252.963239] ? __might_fault+0xef/0x1d0 [ 3252.963253] ? copy_mount_string+0x40/0x40 [ 3252.963271] ? __might_fault+0x192/0x1d0 [ 3252.963287] ? _copy_from_user+0xd2/0x130 [ 3252.963303] ? copy_mount_options+0x26f/0x380 [ 3252.963319] ksys_mount+0xcf/0x130 [ 3252.963335] __x64_sys_mount+0xba/0x150 [ 3252.963361] ? do_syscall_64+0x56/0x620 [ 3252.963376] do_syscall_64+0xf9/0x620 [ 3252.963395] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3252.963406] RIP: 0033:0x45cb29 [ 3252.963420] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3252.963428] RSP: 002b:00007fe38a84bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3252.963441] RAX: ffffffffffffffda RBX: 00000000004f7560 RCX: 000000000045cb29 [ 3252.963449] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000000 [ 3252.963457] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3252.963464] R10: 0000000000a51000 R11: 0000000000000246 R12: 0000000000000004 [ 3252.963472] R13: 000000000000077b R14: 00000000004ca735 R15: 00007fe38a84c6d4 [ 3253.146533] 9pnet: Could not find request transport: xen [ 3253.335311] FAULT_INJECTION: forcing a failure. [ 3253.335311] name failslab, interval 1, probability 0, space 0, times 0 [ 3253.458258] CPU: 0 PID: 2689 Comm: syz-executor.5 Not tainted 4.19.131-syzkaller #0 [ 3253.458266] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3253.458272] Call Trace: [ 3253.458339] dump_stack+0x1fc/0x2fe [ 3253.458365] should_fail.cold+0xa/0x14 [ 3253.458384] ? setup_fault_attr+0x200/0x200 [ 3253.458400] ? lock_acquire+0x170/0x3c0 [ 3253.458423] __should_failslab+0x115/0x180 [ 3253.458439] should_failslab+0x5/0xf [ 3253.458454] kmem_cache_alloc+0x277/0x370 [ 3253.458469] alloc_vfsmnt+0x23/0x780 [ 3253.458483] clone_mnt+0x6c/0x11b0 [ 3253.458498] ? is_subdir+0x246/0x410 [ 3253.458514] copy_tree+0x100/0xaf0 [ 3253.458528] ? lock_acquire+0x170/0x3c0 [ 3253.458540] ? is_subdir+0x164/0x410 [ 3253.458562] propagate_one.part.0+0x3a8/0x710 [ 3253.458598] propagate_mnt+0x201/0x530 [ 3253.458611] ? invent_group_ids+0x152/0x210 [ 3253.458627] attach_recursive_mnt+0x697/0xd80 05:33:03 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}, 0x1, 0x2a1e6}, 0x0) 05:33:03 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r1, &(0x7f0000000180)=""/186, 0xba) sendto$x25(r1, &(0x7f0000006d40)="757fab244b933906a7f2291e6ae1445dc57decda3fd618c0ee468c777d72037660f95d4dab05520eb2761e797f87639ad92a903154c3a96919886f9f50096a643ab40c2a811f8a3a6caad4ec3b7709993ffe78b0973ec942d0c8b46c3f9d46185c751e77037c7ae9cbeef1016c95ca0f96d0ae2c29e1f5413933dd8d2dffde43d0fd937ae339b04e769de044ac691a6f1905592d1973809ddfd9f2c049c4e6d48a94f17141942d50a50c889a920db04c31bfc8a64cf709c0f26301876b08b2fbecfdb24dd3def02b204b3dfa54f991d6885bdcd75487fd41113a1d0a772d275f9dbf39302694c0963da516b870e4cf14c8778ef28838b8dd45e6ca933f4c6d5eebf833f59023a4ecb2e81352012631ad272034ec00ce85e2a8f10ed77a97e86389f5956ba23fa06175ce5cd77993a4cbd25822f664011a5615a842b1a4f3c84f16f3e1d2245eae37c6a773314eaf1924129574ae68eb67ae282a30ff8608b78d28768823173844ddb2ca2f569d7f6a1e80d4bf79036fbbe29fd2b9ab8475c80eb7b79f8f08521a1d4424a458dce094a2bc239f7d160e16f362f7708452cc80825612c52d8febd9b0b97444e1d83112ea869baad6e59eb3d42a282ca864447cd5bf1197cb8f900e5b9512403d5bf3a6ce8fbd0f41cd4d2ebeece73721f570f3218d6a46757f8871971cfb86ff12e803fcd48f0743780f44587a9ed0d542fda1e5f8068b753721c6aef48e43fceb9fe8608871e0fd1ac51c962f425b3ad431ecae7c8b60c3ae09ef422688bef340e5018b560648f6d59366b706a3e6968efc8387b27124e004f7c9db4b1cb3701705d3a8e403ee316353666df6466045e736248ea4bebabf42a1f20ea151499be0ca657c0a1450c7f92ff932233e42acc8a1f6ca17dd226a7e557e6d59bd4b3932e710a23947e9f452b2bb34a5b4c4f4614644cf57c84d219da149829d37e3abfb5c66c080cec35c6c582eaa796de0847f1e496e5fa413ae5260877ec21b29983e2e5412a66e3dc1ac84d2488e72a06d3d3a3676cc2338f37a7e9ba55bcc2ce38b0fdf0c27e79760e8ff2551700fbccfc3f8bd8d90c50148d7a660e964033962e3f349d2a4c0add76d41e1b812f616af059e9ad55e3bbfb4dc0af03ce26d3db033650774095863b54bac4b017d4393362168459e4b8f366e8a952aa35c1d5b577a5d114bfe4164ac18bdd50ec215b0f2bc8564bea017f97f55084019560a98616b18e34bafd8aabb8dc8839a00af29c432c82eee72a07ff3079a916e018016bb3f6d6cc9223ad4866b98ac93169c6ff02dfa3726951a1a0e5201ea81db19e612a47b6b5765cb77b60c044f71adce366ab4b3e98e3609f2da95b036e075a8c47e04e93cc9431e1e171d0d4227507cc7ae0d063d0bca45fd4613c7a1176c32cb7c4dd1dcf2996ca04e029171fe9dcb517fb00b91361eec15264cc2b0dec5b5f19401d6e343293b9ce6e68b7a8a1291ab9ea75fc909e33c8c3c687c9c76ca523372a2ab6d2a936d7c8c010bc9dd24198e3220268795de50cee33ebc4468fc0342a51f2464192e52d2af7dceeea4422df29e541b42095289b79bcdde6bc99d06129c92a5e6ed3081151344729f705cb1456d9257c760d7109b59c47d0aaa23bea26aaa345484f5ba9654876d519811e816a5b8c3f41e3b471ad97d3574f7afc90d86f600a21c2a834c7d62b96ee1c83c5ecd49c80a0f151f8bb957fe12f1c3f76917341930f3a287d0eb0a8fe3591fb8558d1ffbb354a765899c6d9b7b9ce59bb5f9961ea97653b33a50f9cffc47cc30272dc292a134bbe78d3eef4b130f3581774ddb16cb1205e249827f7a6d294ca63a70b24a4543e83de9ef466e093da63c29e9ccfc726f7721fd39c03ac42be86ac070acd8213a4dcb60f70a9db124aa50fd19420033ae7d76b1b7e3630eb577b8d3069edcb2f5df2f9aaa55ddb853a87c8fd5919eeee7caff6124ddae977ebfb3b5173a2c7a4428ef36f11e35ae81dd996279d399ccd0b83ac6e7060f7e87eeb6f5c3d2efd39f132c2921eab111aeb56d3f9002c90ef3609ff333965344360d60bcc90c5abf43342403a286a2d2c4ec609dcae62d14bae7c0da1981db9813a0ecbc9cdf6208a293217bd8869bfde4da367494fb8bc4d68e7cebf535192e9239548ce2f4cd443e916dc18c51e351d760b243cca82ee90600329d99423fbcc1de6ceb2c00c4a4021bf7bcdf33b55be3d211243f59ef148861065407fc899559b96dea37f00a073cb5746711006252305eb4e60e4289cbbba6ee1a62887c9b4ef0fbcfad25d337529b929dfd7a9342d36b694dd4dd8220dc317c158135d068cbe5531a37355ba7d123573bcaa07a2561d1f32657c2a8560db1a57b37fde712d39b6ccc829f5a2fab21871e04a44b787b8b305c15e8370902f2e6dba6f0d95654dba80c94ac45d3607c173bc112021ce13c1ffc4e6ef248efc44937471425132f7631ce2f22ad8debca83199f968b85bbd1435666d133e7fd5d2a760246d7340fccf1dc2d57f0aaff1da956692aaa11de5b46db82e397e96fc2deeb2346c0c41913bf7f8c95b33dff268bebf59755307fb84784204530b8478aece3c66e160f7b9b279e433a0d43bceeeba3c1a378267af56f66805599815bf0efc561e0fcaa1e6186e1a9a0e3bd86a2332c09ae9c8bd1d06849abc4f1e63c34e4151c78e7bd8f7aa5d9ff1f22c509191a6b5cf03f0d0e070e3de733a7ca1ef32190fc0564a50ecc9163d230e4e2a4d8129c86d5ae0bbd2399850e83d309ac21d23e0167b200ef345e37fbf19a2de9318d913184a82cfed06b7d9d329a2c9e60de3b1870aa80dc95f236377be93671defb3b567dc3a6f1c9d8aaa1c9ee7e4626906a1faf15137372c7072955a5d3fa2a874b60b45786e97d0c82dff766e30a9f11ddedbc6fe01f3f170fe7dca2da1d93c58071c61985b179b18966baa96e25bf01a56dd03068d16c74e463834ed34c6905c469626cfae9b210bc9acfffe4d239dae0d9dbd20a5fcf81525b4d9ad813c8b27c164431d40bd0a5528ad78aeabdb840cd6e496a5d693ebc94497069f40134f1c348d2d4ca8fa19ee433ef34ab270f6d2268e58699c77bf2462ef23be380935b32915f579504c2b2a0a65bfca08892f375250270fdfcb9f347abe2ba26a43fbfd0b895aa866b598133147d12775e65470ec702ec741252eba2b3f9d96c50f59ca8db93950b51cfbb4af9dfd1f6e8165a32383d9096425d965b4afbf9999fcd45950e6a27919ea4cedcef615ea7c5e1052e3b390aac629189a02e24cac76022dad3f0efd9501d3f3b667eda25919f67cb0d9496da48fbe248e1ab13479538a8d8a03bf956eb3914c3dbb6976a4c3176df080a41967cc7da8e3d148a79ff017c90430b83edb166a6aa0336f237099af1b4d6c3d6094ae8ca5032e73d15891149a43564c379ea15b1c2ddda7a28b07eee17b7325ee15066b640e11f4133f19912b32fc6e00c018e36e2729bc77396d47058bc128d0a76f68aa35c418a188243bcbefc23c18e42cd64029e0b9cc8f65a8954dc48a0523a001133815337421b9079d0a4ff060ffa7b208fd2d55ac4f860718598ae4038a3d7e3338e7adec176cffbb3e007e6494dbadce3a4de1d05a5bb710c46fdc06b17c5fddcc9ce8a8e48d8537237b2e466097ccd0f27d2c95168273e5df3439a70b6e6107672e1681196709aa2218a583dcb12d48ce9ab9a918dbcc913f84f510cc95d011cec305b6b6576b8c240bc62c880fad35c6d347a6d849e135a7d007a640cf07db691e0d8cd559d6071259cdc5bbac49954b6ec91ab3a4812ee1206952b4b578a962660284e751a84b2811a9e59cb027672dab01e25062b73f38c0a98eb6bd010893dc0369f865f86ed6f00446215469cdc2d34cb74d63b83892d468e1ef78089f84c0e7490ca2a4b4d9cae1c6be1db9ef6667088e2692bfe9c3889859fd7766d66bdc4113e448bbba416f805d53c668a83dae9767e4a08c270d8e278e44507ae238e879943aae47b41c4dba746d7704731f146e001edad206139399f58785b686fc220ac36a25dc3e73986d9a6c286a25a6f52b35ef9adcacddb5f1aef8028a82fd6e5a434315a015f216377e2ab6e2cdd0c4e8f0231467ce6fd79c70e2a1183738b92ff42cda679e64a6cdacb824b2ce4346c056a6cbc696d06bc7725579c0c7a00ca3326e4e220b22a0b5c81655f1a654cbecb747fecf98cbdc3b01b21a591b386642a1d2782bbb7fe10f74951117a13bf30f7403a77135cb0460a8f4ae097cec46b4955861fe0b8eef1c07934a94266d2c637250fb842037ffb8f6dd1971b8015a8a3797c7bde2d621995862e0d58e0028538a712b5e477b7a4027bccc709e7c56402f9c106c7bf949a71bab1aa094c2e2a508f9e3338578a652ee147e8a3c9852888fc92667dc46040499ad499eb3a451de5a49614e35c9679bf7d7ea5ba30d54e13292ef460aad5c2a968a95c0c4d0ef4ea49f0a366485ce2ce8ea8a84af5ac96dcd7db84b8b399e1e0d08bf721ab4655e4676a0c046c2ae4dc90b192c19ec59c7d9cda075f8af85ffa42372b29f5269a5cc1e3aef519027b1826de677c0796a72931eb38ae3a491f8b3115f402fee701d1aebb3adc38b87975043acfc70cf497fd4ddd9ae939f98da2c453e4354eba5516839d980ef2be831c0bd0be3f69c7fb14ac3f936bc31d1e555b6f4709f53133cdaaa5f06e6b38fa0401563e9796a03825be0699a25477fb0618c268a4361b90d9d8354490f50523b8683b3ba2555ba3ba1abaea81d505a7d00fbde5df0a390d0bf2289002b64ee6e0201042ffa9ff565b2a2f51b8f9559b4ffce3082994194bcc5e32f165398d4da6ef6f577f9ad4a738942e6be42b240329a6ffefda3b3c8d98c985fbe6f2ec3939592cf367e4ccf28b86c52ef43ef3038b9f1753ec31f178fb7649a5d43aea134e7a6be05b00dacacf8d1be50d177c7a5ec3940b45885526aa5a77671fabb4102eb54399688e91e7439f55342127a49244f74f66b3fc78fa0269094608f0f571b3f961605f3518ee7cfb66be4b38fd1b04826aeb248b279370949938202886ce3a770000fb90595b50f42c60a76d7c30445513d05256c6987860361af6539a828b51f85a3668a164e55ff815fd7fe6c59ced127da2751c93c8cad3fdee00d19514a1a7d866f4b2dd87876e06be65cfe46c0e2e6822022f37fe6ddf14c86f9e58171bc3ecf0eff81c458e65f9b1fad3fe08579979a4aec42537d7c866c26f9052e5708fa2b85f64c5892b3003c0473235d30ef2182ead01b196219aa88b8ab8b3800945d184c17f05a12a6ba950a9fc937bf7d7782d69f4c513bf30822e69fa4b08066cdf00f11f32fe85de301bb98c94e1b9ad6444afe3754eadac59a14b0c8123f58911057899f597dd7068d1004fefb4ea258b5685d075af60aa5cd74eb41541e3e9e7f2bb3350c45bcc47726a4712ff4f6c03ffe3912b0a0c2f099860e6f1347e24dadd47eec3e656fb2053efe03c47de362da9f1bdb8e883f70607bc0303d16cac51e76a70313f075e3ec00c1f27f084e8b1cd972880872c77dd72f75fd4e5c24dc5ffc33a54f604078268406ba470da8367230b7fd1f57ad3f6efb71d8c6743923cce00517f3ff1c1493cc8176062a2566eadf26c6fb7b1bb33b90e2d1355e350f2c12d045cdbc67352a2e02607af64126e659e0d4c63d41cd0e3def7a282eb4f571202102d59412a15ae526d23f108f6461b3d7eb8fc8381c52307f2c6ee0dad144811a16efb14dba0", 0x1000, 0x9ca1bc957888f04e, &(0x7f0000007d40)={0x9, @remote={[], 0x2}}, 0x12) bind$inet(r1, &(0x7f0000007d80)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x23}}, 0x10) [ 3253.458643] ? count_mounts+0x210/0x210 [ 3253.458671] ? clone_mnt+0x701/0x11b0 [ 3253.458687] graft_tree+0x187/0x210 [ 3253.458720] do_mount+0x217b/0x2f10 [ 3253.458738] ? lock_downgrade+0x720/0x720 [ 3253.458751] ? lock_acquire+0x170/0x3c0 [ 3253.458765] ? __might_fault+0xef/0x1d0 [ 3253.458779] ? copy_mount_string+0x40/0x40 [ 3253.458797] ? __might_fault+0x192/0x1d0 [ 3253.458813] ? _copy_from_user+0xd2/0x130 [ 3253.458835] ? copy_mount_options+0x26f/0x380 [ 3253.458852] ksys_mount+0xcf/0x130 sendmsg$NFT_MSG_GETSETELEM(r0, &(0x7f0000006d00)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000006cc0)={&(0x7f0000000040)={0x6c48, 0xd, 0xa, 0x201, 0x0, 0x0, {0x2, 0x0, 0x7}, [@NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x2090, 0x3, 0x0, 0x1, [{0x8, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPR={0x4}]}, {0xa8, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_USERDATA={0xa2, 0x6, 0x1, 0x0, "4e07be163d29dc73cf91973ee6aac0fab92612f2788c98a3b092caf50daa16fac76333c2ec80c506628db5060d56a91b286046fec5ef000e12c38df6c7478551d3f200dedea01689619e7832611bb0690474a8e4c36063faf716aa326896b63a1e98eb81f71525ab02a02c107e064b300b1189ab0ad021cc82ab81360a317276b25dc445fec23ac778963634a10e8f2d7a37038c7b919ac1829b09e329c7"}]}, {0x788, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_DATA={0x3d8, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0x48, 0x1, "a4e4a46478cfdb1f8f9fc33d48de66ff23951eef7e372021abc8bc2fd6bc7e0e62aa6d41e08adcfcfa898e0e1dc197326339c63e193cbaa0dcc92d6d047ffb3948f78dd9"}, @NFTA_DATA_VALUE={0xcb, 0x1, "d0a0dc96b617da8d65a84985c235f88c3af34d307d1518ee8145bd8e623b1db9595765978505681fe5e7ddb13d02b05b9ed66cf1f636a40c1c27bb61264cec7e75d43e04c76e67b1eb2847221d147875ce4a7e2ddb53cf76b095eacd6057b1406c87e2e0dac246cb04ab14b62c6c6f9581f4040190a866efa339124656a28017b55c7dc21b25ad892000fcf58493be39dd5ea49870bede9f127367bd745e6cf3a7be5196535cb4292f080a264c233ff901e9a3759b6e7ae881606054cbfa26e135c5dbc358a9b8"}, @NFTA_DATA_VERDICT={0x30, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}]}, @NFTA_DATA_VALUE={0xf5, 0x1, "c887726e5c1a569a6f3438174b165d505cf4288879a4506977d956c18b09f65586df990909b06910e689d2bf4380f77321f714bd45e9a8e0853ee03edcdba894d24e066fbab9c828c9c3c1d6fbbe90e1142bc033c9964131198a01fb42e65b56721c0ca2a7526eebf14f3aa28919b67d9d7246c87d0ffcae713e7f5a4d4bb975173438d51e6def6948fbb17172002d75c5a6cedd3e5fe7211a98b5945a9d749ab933daa98a646d977a63e050d02cbbe0ca1b2555cb928428de6cb65bfdb4a5e797c43baf753c4a94bd48b234cc8e1545e0710e9bf407035a64e39a8b45a1e27f389a7fecb67b1df65a70de6385ba3681f3"}, @NFTA_DATA_VERDICT={0x44, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}]}, @NFTA_DATA_VERDICT={0x38, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}]}, @NFTA_DATA_VERDICT={0x1c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VALUE={0xff, 0x1, "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"}]}, @NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_DATA={0x88, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x30, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0x3}]}, @NFTA_DATA_VERDICT={0x54, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}]}]}, @NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_KEY={0x2c0, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x24, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0x6}]}, @NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VALUE={0x4e, 0x1, "0f09d01ac89836596ca0a8ebff65f80773903d70b4a812e7c353c4d74abb4d4e1bf0101660caa86a0026c181f2955c4fd067eb9f3bddd8ce886c2a22715d7bf96d1249880b42a112e9ca"}, @NFTA_DATA_VALUE={0x101, 0x1, "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"}, @NFTA_DATA_VALUE={0x97, 0x1, "e88da728816c23f1fc97cc752bc9ff5a40742c9ec5be0d8f8736dafb9225867a193d68068c0be11085993fde7fca9d41c0f1a5ad579bdf3415548823a2b9054ee0ab63e7c854622df39fc32f553658ade71b56a18087cb54559c57ff7578f862d341eff9cab8f1d1c6f2c7ba89d6ac0bc57a2eac4b4ebc0b93dffe0684474327d5fc2c3fab4e059fac4e587819de9a68135023"}, @NFTA_DATA_VALUE={0x24, 0x1, "825db440cecd583e6c5c7538afa74a90180a9d8892a8af5021ac68d7d27b59b1"}, @NFTA_DATA_VERDICT={0x1c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}]}, @NFTA_DATA_VERDICT={0x14, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffff8}]}, @NFTA_DATA_VERDICT={0x48, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}]}, @NFTA_SET_ELEM_USERDATA={0x3a, 0x6, 0x1, 0x0, "9ddae4e6d306b2cc62031bf58fafe6b63c7c9ec97435c4c601a572d08191b5028d5a224c75d193d582e8f8e4c1a791b5ef237a627207"}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz0\x00'}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x9}]}, {0xc, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8}]}, {0x14e0, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_KEY={0x2b4, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0x7, 0x1, "bb8fe7"}, @NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}]}, @NFTA_DATA_VERDICT={0x24, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}]}, @NFTA_DATA_VERDICT={0x58, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VERDICT={0x6c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0x4}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VALUE={0x5f, 0x1, "f5fec4282c6ffaefd52e26b15c4d0ce4a6973a0cf2d67fcff19aaef548eb1b014bcee1f484d219b46e108aa6ecf6634f1828301595ffb328899ec9ac644b76f757cdabaaa58995576f4309fd44220e4d878d1e22e203db7b844890"}, @NFTA_DATA_VERDICT={0x28, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}]}, @NFTA_DATA_VALUE={0xc9, 0x1, "860aa8cfad4cc9faf32717a74018a7262d868b3aa068a736e48b114be5b08565cb3f294a9eb2644c4b5e3b4e39fbedd19a39913f22a035b5f3346cabdbc1cb0b170bac27c6c0fe6ef91f3a53eae7917faab8812712d96cc41c745126d56393775290a2af116c6c3491cfa7e7d64a42bbb3a3d8126a05180f9b4a9c1f71db75378efc90aadfe8cc6226c45b96e96d2be9c32630749c52896580073f73b3fcdba3adc7dd004d44816eaa75a36bdf02dff0f6037534a88857cb9216fadfea647b41b3fa6f4237"}, @NFTA_DATA_VERDICT={0x60, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}]}]}, @NFTA_SET_ELEM_DATA={0x180, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x1c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}]}, @NFTA_DATA_VALUE={0xeb, 0x1, "47a03386baed8ca102b8b51832fe57028de58e2e5e93f4cb7e70224ea06f8737655b52e85603edf4f13e67ea0819c02731a6b0c2580b77055ae34a017ad0ff6b2dc300ec2932f44ed6ddfa7f1d615b8ee58f0d6fdb942c6f69c408512af43cdac9e8b2ce4c37549db8b320bb393b4b5802da50979d8ab9dedbf55c302ca07852ae4eb074b80314200ef0e01c0a6c7309dacecea16dc2292bdf47f0d6a4da0142df3efc2e2cc6fc056733c7260227885ee99b255a8f85ade6079879ba0dd0860c45a6676ffdc944bba4576746ab0c467e40180cc9763cc89b0733816ad20c3d5b2abb855d29685a"}, @NFTA_DATA_VALUE={0xc, 0x1, "b0a822a7224d956c"}, @NFTA_DATA_VERDICT={0x5c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}]}, @NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_SET_ELEM_DATA={0x109c, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0x89, 0x1, "920240fa4cf2385e5b10b613738551f5711e9974905fcb69c097dd1e8bfb4175cdbeaf8b643d071e28a886a5a97eda644300c47e741e29335a86acecc1e11648423a05eecfc9f54815ca7884b243eb0b93b7d01f5c4c519b3b1af0b119105c2066013e4a4c08e540249d6250197266bbc38db0471c938828ebe4f4d309514352acde5ba4eb"}, @NFTA_DATA_VALUE={0x1004, 0x1, "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"}, @NFTA_DATA_VALUE={0x7, 0x1, "0e7b5e"}]}]}, {0x368, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz2\x00'}, @NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0x6}, @NFTA_SET_ELEM_USERDATA={0x37, 0x6, 0x1, 0x0, "0c47713bf3c5792f5bb8b3da93f93917b842ba37a383d7dba1d1aabbbf265b3aa47681cfb10643081cbe66f2b24a96a7bce366"}, @NFTA_SET_ELEM_DATA={0x110, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x24, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VERDICT={0x38, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VALUE={0xaf, 0x1, "ff0f625fd37212d1d0931e3ec2e43ab23b72859f8f1483bca166353c7256910d82c076cdf955bee1db02d371baed1a8dd6dd7bd02774d351e673be02929785709ea4f3de2e048c55f4509c7af25fcb37ef9b34ea47cbb7585823bb0f9fa47ab5d358e84013c93aefe58decd04b7cbb6de4e823edc9fed74aae71b149e0da2f87113160e60ac676576c02fb56fd3ef1bae9d33fa921697778131afb0b46c923c9f4d4884bc398e8d5c38f94"}]}, @NFTA_SET_ELEM_DATA={0x1fc, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x14, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}]}, @NFTA_DATA_VALUE={0xfd, 0x1, "d797647a6052ea2ac48e327bc6d9bc03bdd9efb0b845368421f1dd5550fea2d8f60506e53a9f31108b707874f159991a8c8c0c0a2baa5a836d7d2094d738342a16afaa0baeb90d9419535ac8ba6ac0c6c5b5d73e71bfc512447c5cc5a0a1bb911165c261bb867de6e81945093c728f81302a91cbd9f97880be4a0d5c89ca0f9c998d4cd2aa2cfc6068d250da8f5e758900aa098ac3dc6ed1358d69491f8229ffbfd96afd21cfdd19d3d95a45abef8ee82b4fb3f45dd1020d4c7dccde1f31807d986890ec47e3249fd0bc8bbc64d005983a94f83c5d4c97ad86cfbf86bd7ec0f901475b0b067931ce278b8ee16d725976aa1780bc9340874414"}, @NFTA_DATA_VERDICT={0x30, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VERDICT={0x18, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VALUE={0x9c, 0x1, "0a36465ccee0a7b7e55bf137e7aa1deb73284a20d09429c9929d0dcd0325dc773d050e91e80f7b20c582eadb4658dc18a08ec57f02e16f7d3f67ebde4684f66160f98ab3d9af1f062122edd51da204f5d881dd302452cf8abd62e0bc4dd473b70611ca57ac5af7d2b98e5b33dae522aa237db44be5e5bbc636610e614a1125eb86b86572166b787fe246ab1228973c21aec3ffa3196940ca"}]}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x1a98, 0x3, 0x0, 0x1, [{0x16c, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0x17a53f8a}, @NFTA_SET_ELEM_USERDATA={0x85, 0x6, 0x1, 0x0, "f5528717dee03acf99a6c210de5e6172e2f0c57dc7fa5e29c227d3eda17c64740e13a3a78f6c63f761ae3efe12d49d5923f4dd6c631dcff8e4fc1b77bc3b4201de36093a51dd3320f6925ad23f3df46b8e1743de59289f5c50c277ec2ced7dc8e107f5313bb4769404727afa6a4c2c47de968bd3bc5137dda6f56270cd0aef4779"}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x5}, @NFTA_SET_ELEM_USERDATA={0xc8, 0x6, 0x1, 0x0, "88ddbb9cd4f50439ef8fbabfeabf3832ae5d4e92935d8ff20d693c2f7d7ae540cf5edce1ababeb30277a01b709b1df4da8af8ea39f8c6bea436a2324577b8b48a68abd0fb1c7a617cacb347826fefdc82ec45832d3afb030f32a34e4433943bc0a1d421cd9e9d330890f5c02992c864c3ed61fafd83f263e6e2a9424240b9acab60f5f9ca69a07dff9a904a3e4e0bc78354b3d36716d55e38a78751b30bfa38ab0f2dbf1c2d90fe9fb60f29a86e137746e15aeb1413d69b60a8ddc3978c353e9c9d09ebc"}]}, {0x14e8, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY={0xa0, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VALUE={0x77, 0x1, "d07f0b2cb33192943ee8f0e2e93549a37b741d38de655aadf48da7a75f38f40762c8ca7325c8bcd93b4c8456cb856c82a7ba1b05d37e42e3e55134df2b4a95be706176cf1b296995086b7d0786d912ddfd65f80f17f20dd383b958e9b1fac210897dd8ce33c929ee076bbc401b3069454b92a1"}, @NFTA_DATA_VALUE={0x13, 0x1, "b47112c131caa47a547e4820ea9e4c"}]}, @NFTA_SET_ELEM_DATA={0x88, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0x73, 0x1, "009c237858f1b5d4e0fa9e87356a53d452bbe28019bb415afbbcdb8a53104feb5a6da92c002084872d536d520f147c23c626678b5ee2795720305586a3e2b6e66b0b76c07043f9b656c992f92c4ff22472b83a42435e8f63f6abe941a3ee0c647244d5de1c58b69ba6f3e26fdb2a62"}, @NFTA_DATA_VALUE={0x10, 0x1, "bc9ac0acafdc617146be2188"}]}, @NFTA_SET_ELEM_USERDATA={0x4a, 0x6, 0x1, 0x0, "e197f7e27986f2d637884f8a60f1c577581cf122d98506b626a7f3e2759d6289eb7cfedd7af958f93e0c5927c4ab5c7e889a58365c8d634de40b708b39a6327e1bde8558f8cf"}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x608c897b}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x9}, @NFTA_SET_ELEM_KEY={0x134c, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VALUE={0x1004, 0x1, "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"}, @NFTA_DATA_VALUE={0xb5, 0x1, "e13f97868d8957bf31095e7622fe5da29f75337d06d48e98bd2651fbe8a851f9674d9e633fb34c2729f8d581657df992621a746d6e89d7cba8d0cccac2bb5f49a5a058cd655fa0b71632945775f77db7940c08cb6a79ca662cd6abb62f8379d517df03dbe4c59ff1985a466805e1f73d3bca055375982cba94cc2b1c06ff0cc6c7559831918f25e1d4200456892bb41a639ce8a0f38fad27581a5021b0b571acd27cad3f42f5b7e74454139d5da6faa489"}, @NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VALUE={0x5d, 0x1, "f9c47a2e2586558a594259bd812ffd5dfd4f100c0abe6807da99895e6cf3bec2cce254bb6c7c32ebd07a2f61a6b3c641422da3e8bc418118506bd08b02948b302f1d1594d2cad317c752298bc3e0471be5774178616d535006"}, @NFTA_DATA_VALUE={0x8d, 0x1, "cc15b73ee2a8bfc581bffbf61491b1fccc3791644bdf7d0ad3ac9a213a1c2a57757206fd88314f565bf22003c896b6a02785094b0546eafef0ba34e366f38b92d63735a2a0c625ef61ab93c72bf1bedb7938609bfe40b48c9449ef8f340de73e0c24b7e56177dc4be6eac4d247bb47116db9f42b23ee55b88fb179b92e0443e22034a34a34b407ce95"}, @NFTA_DATA_VALUE={0x7a, 0x1, "c7b4acff3f654feb9cf085170ba6624573bdf10c58093fbe4ab497dc42b22f2c4adf965a8dba5c5a83ab622d88b63ec49d510a7a3cc5b94184e18404f4af015f2ff6025d15adf58d105f8a7cbf9f4da2a5c743c11df7bd78162485a853e81ed62577c4f294765caf57e30ad0af656f60a47d276f48b4"}, @NFTA_DATA_VALUE={0xcf, 0x1, "6af6b304aa3ce360731bea5af224a6b481d98e7128c6824764a1e796f7bd3786fd1d490aa61f594190f3d380ba473626d2e5082d3c2eb0dcc87c0fa56120ef17d682db270899aac6ce5fc61821d709fd8d2f7990221b2c8587c5f71636f1124281f24f8154ac96fc828d3244a60da2490e77e8141476cd59ac415583ac2d872f304d3a0d0e4c99ff0a760b5fbefd186327b2597e51ac7a4bf1d8c09553a1d27c5546706799e8551dc6edd56ada51b3a4a30a07c75edb6ebc3b61db60b10cd71648ec53266590e1b7a194e0"}, @NFTA_DATA_VERDICT={0x34, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}]}]}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz1\x00'}]}, {0x440, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0x100000001}, @NFTA_SET_ELEM_KEY={0x140, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0xe7, 0x1, "428c29d6e972c6761f371bdf981c46c39fd615278c55b36af4253021e368af4829081100b1d43bd53d6ed662bea79781995fb196c54f4822a5f1552ae962f5670393b5e1c464f31e51e9a8761f8c9ae0d300111ee1755c59ad91d0674301e9e28c337c9d1ca6f6c6b29385b4dd899f992ea512a42e893b9a80195ef32c547467626b9524d8cce346823c9fd09cfac16991e08f197135f8890c1649318c4c2a9c9061b1622daf74bd9f3b7f3ec92150c51586ec5e51183517d09ae02ab793f0638690454d2f35479a342bec559cae9f4d86326f2b3df3644b712b1f94459ff9b085102b"}, @NFTA_DATA_VALUE={0x51, 0x1, "8291612ab22ab207a1949548b76ec679c8fa7d15805d9cdeae1accf632bdc71c09fd3593f60c10e7373b2b361969c9d334e5106da87bd0405e7563c9321df72c121dee99f98d34f17df030d6d7"}]}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x4}, @NFTA_SET_ELEM_KEY_END={0x19c, 0xa, 0x0, 0x1, [@NFTA_DATA_VALUE={0x95, 0x1, "eda618aff20bf8336d8969e56fa0d67ec40593d011b0419554daa090093cdfa11132b8fd3bbf21698950c6a8c3c64f074287593498d0d5bf008b1ad26bb7eb7749956d988d74637f39ee714be1668e0d509c65e9bdd1ca671e1008a99351250e94dc4148c23d3ddf125300e4815b0aba22c9b282702ef30e24fed472668f02707cdc36ad64c17892b7dd7f5a3e82e19a3e"}, @NFTA_DATA_VALUE={0xbc, 0x1, "b0aee4c9aa8e9fdf966203df2a9940cb2dda579ceb280b30f6147067cc0403de57aaac9c5da693dd83b429d5dec68d35b3279a6df25cc39f7fbd9ddd3ff62ba30698fe67dad48b5483198ee8199816815661a72580b073477f4e7e8563b424ec1657995ec006f6873fe98ce2e44bc6b105df7a5a8db30b99a80d3f18423bd64e845c4473dbace5bf0d99a49daf16d54f17ab7c67f643743105d1321521ac83e82a7b89029ae39903bedea54500cc1a6a357196506a1b8d5c"}, @NFTA_DATA_VERDICT={0x34, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}]}, @NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0x8}, @NFTA_SET_ELEM_KEY_END={0x128, 0xa, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VALUE={0x41, 0x1, "84041d390f3ef176c43e993fc755fea218acf5e094902b5436d12dde3c844b5fe5ab6b765239881cc919644309fdb592be637863dfe169cf2914c5f874"}, @NFTA_DATA_VALUE={0xce, 0x1, "6b13398cdf43b2d575c43b5b3e1ffd80a2add38712489b9182e437495b88c1ca10b0a9388d662c8eabece2152fcd6f4f3966a16342e8a55f20ab708d4b7a27a3a542d30f4e4cbe85c0887a8d4475b9f4f3a911462be715ae8c0e4699133aa04422c0cc0eaee174661aac60d9e6e361d4a310b75a8b6e6cb3fa928dba378b1e4a83e52372dc8629e5809d002176157d7c7c4996cda2c533faa519ccfabae58e10e998f95b02540f53c12258346d2a505124980b3f0bf7c95d243b9b9715997758b13c0896fe854a5dd199"}]}, @NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x1}]}]}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x1710, 0x3, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8}]}, {0x4}, {0x1628, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY_END={0x164, 0xa, 0x0, 0x1, [@NFTA_DATA_VALUE={0x68, 0x1, "44952ee054998d452b47bccba378ce08251b90366c62c9943998f461ba3e6fcafa1eb6608482d76dc7de7576e81ed05f558b7fd53a787cad3c6bbed63a474989a80d5024790e4567f0779bccfa8e9ecc50eaf9e5408382c93bf252568328624f1899f9d2"}, @NFTA_DATA_VALUE={0xb0, 0x1, "3d7656b28ff60d5bbaefc3a82380339bf8ccff786c66cf6d224a6085f503213c744c2e551f40c6d0332c899b275e482a0a852af479ac07362317201af8aca2f2ddde760c10106eeceb6043feb9a6deeb7e8adcc4bd3bcd71e92ef66999d85a752d3bf475a5b625717644cc310d958c767c7f77846f66976a42481a75917d9a680da4999ac678d54d7e073cf1640ff833037193f187fb4eb507dfa4db63f6b414aaf9068f762a6453b1fd4f5d"}, @NFTA_DATA_VERDICT={0x48, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}]}]}, @NFTA_SET_ELEM_DATA={0x1138, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0x66, 0x1, "0deec8c81bbe83a16f151a9c805662d5f3f93ebf5b8dfcea7fcf25ca9f6ce0b1e75f29a3b8e18e9c333fbd5cb102e938ebc69c94f89fe26abaed73d96f5dab76aa07afcb0da581be22c12a16c032612394b8a069edbca6234b0e300d200f0d688853"}, @NFTA_DATA_VALUE={0xa8, 0x1, "1f2e458d3faec42446c72827cd812fdc4143bbfa29efa3e91cb55cfc1c77a6e67c15e6bf91b0423442ce63b2be6695815e645e679f354d66630886c594eb25f5269e062c78b01b6eee7e72ce35a2278cc3dbac633a58f422345bacfc7fcff177d71f7df36a3ea7178184d4da7c9bf98cda0ae7e5b8d26717bfb97c8c34d4731299e5ce2c1efd1eb8aa5093321a5c9c407176ebd94c909fa35b4dd1e00c0fcd56f4547f20"}, @NFTA_DATA_VERDICT={0x20, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0x3}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}]}, @NFTA_DATA_VALUE={0x1004, 0x1, "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"}]}, @NFTA_SET_ELEM_DATA={0x388, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0xd2, 0x1, "6d9330f2be19b639944455528cb177ba3790f8d712302eea1b8098bcbefbb0a9fb3f7cc008d1bba1d29d90ba416bec65d762cc5e34b8c36ec1e1c646c0e586ed86c9c5bdbf82b80924ec9d810fe63a0613d7f8bba3ed21b66cc7f2708f829e3f83e1744f897941411800a5dace5ead6adc6daf916cfeb01d3fd4e9357e140557875f784e59ee3fd876e54a94410187e7572e89b24d9a90e85ae4e56c86a1992f4e6b21f57370908755a57af52d8e8feb5f0a80187b92ad8da79d193513fdadf9fe91d06fc2175011d8704b76bc5f"}, @NFTA_DATA_VERDICT={0x1c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VALUE={0xb1, 0x1, "bce7cf384f248597b5f28ebf747c373949fd8387a8044413b0dce9938a98cf1d7298081cbf17e181a850ed040c9b61b7cb72d82e9064bd963c0f4b129f15c8e9aed820a756f4eef2ec41696770ba5ca4f7456ecd4fce010be9667073219413029808ea3fb5e9c87cea803992b3fa21a24381efd76adfc03a3a6f8dd3fa96b2bb9f8181bbb1727d3202896422ef182e6955072c76c694e8a7e898136359be1b858b9dd6bd0f2595d895c76a03be"}, @NFTA_DATA_VALUE={0xb5, 0x1, "629eb2d2c1beec79e4a7ea43ffe031d1e487ed3b1c758e5a6101331b51098062bad331fcf7d51b8a6d31e95976d594bf7a59e475f3d47449bf0613f43bc06ca7d5c9ca01292879f3e6c7ebc90f3935707a28315f6a3c4ea7530e93ba40040465d4659021896e4ef3508b0d5470449740c046f75bf5cb1d0acdeff5b88e9d3552d4cf24ac865ccf308e13f57a91784056226fc2f0618f79ca28072fd8855061dec4404a21d062f5cf466b492c3755ecd273"}, @NFTA_DATA_VALUE={0xed, 0x1, "6e2ecda231191b9a7072f38a2f09d5d28608ff462b13615d38296baf3513c6ebe6470a8b8e8aced0b06bd6310a3af1fd390d1d2e95ee7227c2cd486425a2e95484783abb8b79b94460457ef0ebdb987a4e578987561a5bf20ebb868a5053d1a4277ff77fe3ffa2ce5288504fdfacabf72c99e5e2a86bda83c2a3d3d3d7d7c534c8f5499f99eae3d345ddba2eceab72e879a046668c4294aeab7f4bae14966b2a00db3df5757c5cd3c658d50c16cbf1dde8d6a179b4afb47495ed2a0a0a16b6fddddeb0958e6decd644cd67e3119009c8cb03cb80c52850b48564ad3f702243bb040084aa1ecd3c90fa"}, @NFTA_DATA_VERDICT={0x14, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}]}, @NFTA_DATA_VERDICT={0x24, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}]}]}, {0xa8, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_USERDATA={0x96, 0x6, 0x1, 0x0, "a361fef6863a8bc88d2946722212fd865dd3743d63ee77075fc424f77b5a65aac87ad38c34e1f5129b49700f0959c7a60d4dbe2481a483152e466cd65cd20c0152ab2a9a9b4bca799b46c58ac25e772116aa3a8380248903face82e235101a1cb2134cfe7207f98838bb7bbf6fd89721b464242587ba9054034f066372dcec3831a302fd99461049321d6fd283e40fa7c681"}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x1}]}, {0x1c, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x25f1010d}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x401}]}, {0x10, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x8}]}]}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x19c4, 0x3, 0x0, 0x1, [{0x119c, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY={0x10f8, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0xef, 0x1, "4dba5703ac0b224e3261799a57837caea27fe099d2f400be0a4f5025b64140511814c60d7599ba71d34a68f6a7776cee7f2b5ed903f98654365b69a78a50ea871ef37737dc5dfb8b7e8bd6ebed3b04b53658c49f41b3b851809586ed4aa1d0f3f5b128790654059bc40a31f8788895483e66d9bef21777a05d5042a8e3db0c487dbe8cf7d3743528d0598c76a9a681aca5340853318f5f35040873e06f1e374b4702bf2535d441ed5d5e6413f351d1dd3fddde69e8ff0e44ee2b9fddc03376c088bd5df0a80297d482714077aa630726a980982400b6089d26bdd58486e524cdb329a641f1ba023cf7fec8"}, @NFTA_DATA_VALUE={0x1004, 0x1, "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"}]}, @NFTA_SET_ELEM_KEY_END={0x94, 0xa, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x60, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VALUE={0x2d, 0x1, "e3e6134ffb7466a4c95049e3f95c823eef10377a45dba3abac083c9c19bf329a7d1df25ae1fe18a402"}]}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz2\x00'}]}, {0x13c, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY={0x38, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x34, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}]}, @NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0xfffffffffffffff9}, @NFTA_SET_ELEM_KEY_END={0xb4, 0xa, 0x0, 0x1, [@NFTA_DATA_VALUE={0x97, 0x1, "c620405f383ac0894d1390f437157117626d7ad431cfef78e3da84bec676f5a8056b93aef02d67565de35e0e8a3442fada89533fe9fdf4cc7ac91fea21d2357f2b8fdb971377a6eabdda9df83e5cbcb619f4b48ed7016a91d09dd84e3e9c1a5ff7d7c69156002f6377634e5067dc3b390c1fa5b40a4ab0264fdbcd23641d19a89e9c72e9ec09f1c31c491abdbb4f82632c84df"}, @NFTA_DATA_VERDICT={0x18, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}]}, @NFTA_SET_ELEM_TIMEOUT={0xc}, @NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0x101}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_USERDATA={0x17, 0x6, 0x1, 0x0, "ca4f7bfe91d4a206b31b271273ce9101067102"}]}, {0x20, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz1\x00'}, @NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}]}, {0x2a0, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY_END={0xe4, 0xa, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VALUE={0x9a, 0x1, "b547eb8d73a5f9ebb499697614554b1ecae09cb1f8e4eeaefb3c76783eae9a1457e1f32afaed49b2c29e89aa6ca16e0e5c8368413db9d56b4be80608082274e2f73794ee96cf31a0550bb69664db1ee4118e44567239f9f26ba61ec91a8c6bf0c56edf6d8c683ef696aa617d52640d3728caf41ab7e201c49a9ab43e91ffcdfc1388fbd417768502da4dc2f9d55dae928d36c02d9da8"}, @NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}]}, @NFTA_DATA_VERDICT={0x28, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}]}, @NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_USERDATA={0xbc, 0x6, 0x1, 0x0, "da3e8eebe1dc887df877321ab51ac225c0243aa3a58937226b569fd09380d53c1c598d8ed049c7d74422d5082e0f90f9d9f612ce12f2a20487bc85af5a4ae9727b0142e0f61059569c915277c389c6dc0652e1bfc4667ae20ac86869ab47735c95a2a68e1d107171e52fa4f79ba638d409f10c74c9409aa59be994235770cfaf1f1c44304942cc077b3d8b5ee5c01345eb1cd4762a6c94bfc392d683735f0cd4e2c52254a43495c04d3e968b67b3f10f845dcbe385bb8674"}, @NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0xfffffffffffff801}, @NFTA_SET_ELEM_KEY_END={0xd0, 0xa, 0x0, 0x1, [@NFTA_DATA_VALUE={0xa7, 0x1, "461c0dc1972e79a330ea8270b843c3ce42aa1564f2b77a92fbc73f66dbdc9e21fc9266161ce1e7a14d0d5fb60083c05f1414d33e74009619aa38908dad64398160870d4e385425f2a7223f20aae94a6e24df2c4f927309e7ad640991188360dc9fc22e0db56981dc75b4678757dc121f35c548b52cfe0a0290ff6c7390b89b86d52a58dbbd1482b45d07098427e89e98c37a275301c7a2cd8710d382d40d75b71eef9e"}, @NFTA_DATA_VERDICT={0x14, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}]}, @NFTA_DATA_VALUE={0xf, 0x1, "d0de9abf56215399076cfb"}]}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz1\x00'}]}, {0x428, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY={0x348, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x58, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0x7}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}]}, @NFTA_DATA_VALUE={0xca, 0x1, "ebf0ac1ef91ea5813b014cf1b6ce80d3e710e9ebb4fa0271666d3266eb5bf7c7b721b5abf63dabc1367cc123eda066632d88a38052c12080bf3804ac221ad93e386b2eeaa57be96bd80f9a43a8197f3d066947852ffd8f84d8ce2a6d818d39436bc26011b5fca26d963a90867d9f1bb84ddd3d4d14250146721047f5ed2bac464a9fc4da9c2d1b2f04490c951e714152e1160e52bc0c39737b749be0f532b2e2f926f7565f75ebecc7eff316f3b3a511cbf5c173be4a1559dc766785b60bc24194ffeafaef9b"}, @NFTA_DATA_VALUE={0xc4, 0x1, "8666d35237c02c7df99cf06372f484335e927d167a053c48525ff2d3d2ae23716b385fcf6ff29eb86b1765980eb6e373608ffab6fc9c2eed84925302b671f205df0a7f9f2d9fe1bba257e98906f688c001e12b577e838364ece95aa344f28be7f262ff3de4c4e34cda6fe0dcabb8ed7966b16ea80e42ed9538cd541c48ff9fe088c13bd5d09e824acc8c1c377938c59bc668789451daa8bc85c6163abd695bd7d1ba0e9aca79109965daee4a90d55a3a70c70e3f987a2ccfc01d0dafaa7ba25f"}, @NFTA_DATA_VERDICT={0x40, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}]}, @NFTA_DATA_VERDICT={0x48, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0x4}]}, @NFTA_DATA_VALUE={0xd4, 0x1, "6d920545c50540cbca06aa97ec042f7586b06126cd3778b22d9af5280b1a1b13e105112a343aa59993d58f8c9f92009d7394b931a9f403c0c417b5c5118f73c5fbade286bb63ec32c95644deddfb542a2a5f56ea9d9a39abca27e4bac6e6df91798e916ac99c8727c57dbc7b68710e5739c5297c69473c5fa43bc55db688377da7efcf4633c882c6bc7f2406d6119b25c751f847dbd62b3bc73bfb7f91e19ecce8af28c47a528c40b7376352f52e8ae2a07faf797cf16e98e05faffb38e04ce7979d5469b9d1d324496d62b7b10d4fc0"}]}, @NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0x1}, @NFTA_SET_ELEM_USERDATA={0xa8, 0x6, 0x1, 0x0, "e6683e720d80f40e1ceba3c0d40e75f9c8106e23faf0e0e2604edd1280e7f72e572c12732a801cb54a26dc4af8c060a9f9f86a170bc18b7a69e1015e0bebee3617318f780db21895e5c4d03dc0e330c69891078cdc5abf53892890f57291f8c718c4260b7dc5005f0725036245731e1f4dbe1b325b24680faff5429462e00ed3b77998513648f914694d19e995036c937075483cb4c7a7395ed252fb154dc1862b5d949f"}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x9}, @NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0x5a550afc}]}]}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}]}, 0x6c48}, 0x1, 0x0, 0x0, 0x8000}, 0x4880) 05:33:03 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c0003000000000000f0ffff0c0004"], 0x30}}, 0x0) 05:33:03 executing program 5 (fault-call:3 fault-nth:56): perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3253.458869] __x64_sys_mount+0xba/0x150 [ 3253.458885] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3253.458901] do_syscall_64+0xf9/0x620 [ 3253.458921] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3253.458932] RIP: 0033:0x45cb29 [ 3253.458947] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3253.458955] RSP: 002b:00007fe38a84bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3253.458969] RAX: ffffffffffffffda RBX: 00000000004f7560 RCX: 000000000045cb29 [ 3253.458978] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000000 [ 3253.458986] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3253.458994] R10: 0000000000a51000 R11: 0000000000000246 R12: 0000000000000004 [ 3253.459003] R13: 000000000000077b R14: 00000000004ca735 R15: 00007fe38a84c6d4 [ 3253.618708] 9pnet: Could not find request transport: xen [ 3253.712915] FAULT_INJECTION: forcing a failure. 05:33:03 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c000300000000007fffffff0c0004"], 0x30}}, 0x0) 05:33:03 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000080)='./file0/file0\x00', 0x0, 0xa51000, 0x0) 05:33:03 executing program 2: inotify_init() r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) ioctl$SNDRV_PCM_IOCTL_PAUSE(r0, 0x40044145, &(0x7f0000000000)=0x101) [ 3253.712915] name failslab, interval 1, probability 0, space 0, times 0 [ 3253.764414] validate_nla: 5 callbacks suppressed [ 3253.764422] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 05:33:03 executing program 1: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x400000, 0x0) ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r1, &(0x7f0000000180)=""/186, 0xba) recvfrom$rxrpc(r1, &(0x7f0000000280)=""/184, 0xb8, 0x40010000, 0x0, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r2, &(0x7f0000000180)=""/186, 0xba) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r3, &(0x7f0000000180)=""/186, 0xba) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$unix(r4, &(0x7f0000000340)=@abs, &(0x7f00000003c0)=0x6e, 0x800) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) perf_event_open(&(0x7f0000000040)={0x1, 0x98, 0x0, 0x0, 0x4, 0x0, 0x0, 0x41c1, 0x1294, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x82c, 0x5}, 0x0, 0xa8a2, 0x2, 0x8, 0xffffffffffffffff, 0x4000}, 0x0, 0x4, 0xffffffffffffffff, 0xa) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:33:03 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r1, &(0x7f0000000180)=""/186, 0xba) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0xa, 0x0, 0x0, r4}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00', r4}) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000000c0)={&(0x7f0000001340)={0x1284, 0x13, 0x800, 0x70bd2c, 0x25dfdbfc, {0x8, 0x1f, 0x1f, 0x20, {0x4e22, 0x4e21, [0x7, 0x8000, 0xb65, 0x8], [0x3, 0x4, 0x101, 0x400], r5, [0x40]}, 0x897, 0xfffffffb}, [@INET_DIAG_REQ_BYTECODE={0x3b, 0x1, "2f4b0141dcffecb5a00c0fd58277b64c2536899ef3c7575a9bc5a2e104cc084425ec42795c502ed5c0831e0f87c2b292b9310d63590815"}, @INET_DIAG_REQ_BYTECODE={0x1004, 0x1, "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"}, @INET_DIAG_REQ_BYTECODE={0x91, 0x1, "b5a37368d236ed58bb7f18d2bc014aa97ce2832d085d2ea1848dcc35c2648edd27da982465d011b439bb99bdb9d86fe812488d5896a0d4c1a63ea81dbea39be15946a22e4779e7ed4de59a7aad3f6bcc68fbb54847bace3017d98dc8f9b14d084a552b4a2e669b1652d8826617da5f2842cd3d1d29e7e84071485b7f5344e30c6a3424e8aa34dd30b423aaa4f9"}, @INET_DIAG_REQ_BYTECODE={0x5d, 0x1, "871b7e87f3f1aeddf63a4cfb65488322663edd4005d51257506c1ebeca8ae0da91566e5ebadc64bf1f203ab14ac21192e65138b89d01a717f7f22aa817de041531471e52d8cbc081832c3d7dc04e6d935fad32441774939a90"}, @INET_DIAG_REQ_BYTECODE={0x2d, 0x1, "9900b3b1d3f328a7db2a7a0819493de80950b58ba6eff095d51c6fcfa47d01d838de3a4cd6e64ff22c"}, @INET_DIAG_REQ_BYTECODE={0xd2, 0x1, "c7bbc2a9488661404a2fb227f6b6e98a7dc0254ad753a9372d4365b7a1a00ba816eafa3e9e4f4bd69ceb110b3364f6e92454b446632732d7b25ab7063d1202f2ecde722e817db189235a70c186a52a4e45f88c54b2bb1b03b3f1b6033aee70248f2d9b18af0735dcfbd35f09fe2210f4b139de04c29e5e1cdee2c016d393b8305b73fea97d58730105036dda53a8da6d302ec1f9d83f4be00cf924411f96aca6f9d11e83fc2a220f52b124e7907ae1ec7ca2bd1bb56a3672feb5163f1e613e05c32a47bdf3b9d93ef5cbffcf2456"}]}, 0x1284}, 0x1, 0x0, 0x0, 0x4008050}, 0x880) r6 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r6, &(0x7f0000000180)=""/186, 0xba) ioctl$VHOST_GET_VRING_BASE(r6, 0xc008af12, &(0x7f0000000280)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3253.930308] CPU: 1 PID: 2759 Comm: syz-executor.5 Not tainted 4.19.131-syzkaller #0 [ 3253.938130] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3253.947592] Call Trace: [ 3253.950186] dump_stack+0x1fc/0x2fe [ 3253.953825] should_fail.cold+0xa/0x14 [ 3253.957750] ? setup_fault_attr+0x200/0x200 [ 3253.962079] ? lock_acquire+0x170/0x3c0 [ 3253.966071] __should_failslab+0x115/0x180 [ 3253.970315] should_failslab+0x5/0xf [ 3253.974053] __kmalloc_track_caller+0x2a6/0x3c0 05:33:03 executing program 2: inotify_init() setsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f0000000000)={0x5, 0x8}, 0x2) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) [ 3253.978734] ? kstrdup_const+0x53/0x80 [ 3253.982643] kstrdup+0x36/0x70 [ 3253.982660] kstrdup_const+0x53/0x80 [ 3253.982674] alloc_vfsmnt+0xb5/0x780 [ 3253.982692] clone_mnt+0x6c/0x11b0 [ 3253.996822] ? is_subdir+0x246/0x410 [ 3253.996841] copy_tree+0x100/0xaf0 [ 3253.996855] ? lock_acquire+0x170/0x3c0 05:33:03 executing program 5 (fault-call:3 fault-nth:57): perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3253.996867] ? is_subdir+0x164/0x410 [ 3253.996889] propagate_one.part.0+0x3a8/0x710 [ 3253.996907] propagate_mnt+0x201/0x530 [ 3253.996920] ? invent_group_ids+0x152/0x210 [ 3253.996936] attach_recursive_mnt+0x697/0xd80 [ 3253.996952] ? count_mounts+0x210/0x210 [ 3253.996967] ? clone_mnt+0x701/0x11b0 [ 3253.996983] graft_tree+0x187/0x210 [ 3253.996997] do_mount+0x217b/0x2f10 [ 3253.997016] ? lock_downgrade+0x720/0x720 [ 3253.997030] ? lock_acquire+0x170/0x3c0 [ 3253.997044] ? __might_fault+0xef/0x1d0 05:33:03 executing program 5 (fault-call:3 fault-nth:58): perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3253.997059] ? copy_mount_string+0x40/0x40 [ 3253.997076] ? __might_fault+0x192/0x1d0 [ 3253.997092] ? _copy_from_user+0xd2/0x130 [ 3253.997108] ? copy_mount_options+0x26f/0x380 [ 3253.997124] ksys_mount+0xcf/0x130 [ 3253.997139] __x64_sys_mount+0xba/0x150 [ 3253.997155] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3253.997171] do_syscall_64+0xf9/0x620 [ 3253.997190] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3253.997201] RIP: 0033:0x45cb29 [ 3253.997215] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3253.997222] RSP: 002b:00007fe38a84bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3253.997235] RAX: ffffffffffffffda RBX: 00000000004f7560 RCX: 000000000045cb29 [ 3253.997242] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000000 [ 3253.997249] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3253.997256] R10: 0000000000a51000 R11: 0000000000000246 R12: 0000000000000004 [ 3253.997264] R13: 000000000000077b R14: 00000000004ca735 R15: 00007fe38a84c6d4 [ 3254.134558] FAULT_INJECTION: forcing a failure. [ 3254.134558] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3254.134576] CPU: 1 PID: 2808 Comm: syz-executor.5 Not tainted 4.19.131-syzkaller #0 [ 3254.134584] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3254.134589] Call Trace: [ 3254.134612] dump_stack+0x1fc/0x2fe [ 3254.134634] should_fail.cold+0xa/0x14 [ 3254.134648] ? check_preemption_disabled+0x41/0x280 [ 3254.134664] ? setup_fault_attr+0x200/0x200 [ 3254.134688] __alloc_pages_nodemask+0x239/0x2890 [ 3254.134707] ? __lock_acquire+0x6de/0x3ff0 [ 3254.134738] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 3254.134752] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 3254.134765] ? __lock_acquire+0x6de/0x3ff0 [ 3254.134791] ? __lock_acquire+0x6de/0x3ff0 [ 3254.134806] ? ____cache_alloc_node+0x156/0x1d0 [ 3254.134826] cache_grow_begin+0xa4/0x8a0 [ 3254.134840] ? check_preemption_disabled+0x41/0x280 [ 3254.134858] ____cache_alloc_node+0x170/0x1d0 [ 3254.134871] ? check_preemption_disabled+0x41/0x280 [ 3254.134888] kmem_cache_alloc+0x1e4/0x370 [ 3254.134903] alloc_vfsmnt+0x23/0x780 [ 3254.134915] clone_mnt+0x6c/0x11b0 [ 3254.134930] ? is_subdir+0x246/0x410 [ 3254.134946] copy_tree+0x100/0xaf0 [ 3254.134960] ? lock_acquire+0x170/0x3c0 [ 3254.134972] ? is_subdir+0x164/0x410 [ 3254.134994] propagate_one.part.0+0x3a8/0x710 [ 3254.135011] propagate_mnt+0x201/0x530 [ 3254.135024] ? invent_group_ids+0x152/0x210 [ 3254.135040] attach_recursive_mnt+0x697/0xd80 [ 3254.135054] ? count_mounts+0x210/0x210 [ 3254.135070] ? clone_mnt+0x701/0x11b0 [ 3254.135086] graft_tree+0x187/0x210 [ 3254.135100] do_mount+0x217b/0x2f10 [ 3254.135118] ? lock_downgrade+0x720/0x720 [ 3254.135132] ? lock_acquire+0x170/0x3c0 [ 3254.135146] ? __might_fault+0xef/0x1d0 [ 3254.135161] ? copy_mount_string+0x40/0x40 [ 3254.135178] ? __might_fault+0x192/0x1d0 [ 3254.135194] ? _copy_from_user+0xd2/0x130 [ 3254.135210] ? copy_mount_options+0x26f/0x380 [ 3254.135227] ksys_mount+0xcf/0x130 [ 3254.135242] __x64_sys_mount+0xba/0x150 [ 3254.135259] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3254.135275] do_syscall_64+0xf9/0x620 [ 3254.135294] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3254.135305] RIP: 0033:0x45cb29 [ 3254.135321] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3254.135329] RSP: 002b:00007fe38a84bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3254.135343] RAX: ffffffffffffffda RBX: 00000000004f7560 RCX: 000000000045cb29 [ 3254.135352] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000000 [ 3254.135360] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3254.135368] R10: 0000000000a51000 R11: 0000000000000246 R12: 0000000000000004 [ 3254.135376] R13: 000000000000077b R14: 00000000004ca735 R15: 00007fe38a84c6d4 [ 3254.262572] FAULT_INJECTION: forcing a failure. [ 3254.262572] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3254.262589] CPU: 1 PID: 2843 Comm: syz-executor.5 Not tainted 4.19.131-syzkaller #0 [ 3254.262596] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3254.262600] Call Trace: [ 3254.262619] dump_stack+0x1fc/0x2fe [ 3254.262638] should_fail.cold+0xa/0x14 [ 3254.262651] ? check_preemption_disabled+0x41/0x280 [ 3254.262665] ? setup_fault_attr+0x200/0x200 [ 3254.262688] __alloc_pages_nodemask+0x239/0x2890 [ 3254.262722] ? __lock_acquire+0x6de/0x3ff0 [ 3254.262743] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 3254.262756] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 3254.262769] ? __lock_acquire+0x6de/0x3ff0 [ 3254.262793] ? __lock_acquire+0x6de/0x3ff0 [ 3254.262808] ? ____cache_alloc_node+0x156/0x1d0 [ 3254.262828] cache_grow_begin+0xa4/0x8a0 [ 3254.262841] ? check_preemption_disabled+0x41/0x280 [ 3254.262858] ____cache_alloc_node+0x170/0x1d0 [ 3254.262869] ? check_preemption_disabled+0x41/0x280 [ 3254.262885] kmem_cache_alloc+0x1e4/0x370 [ 3254.262899] alloc_vfsmnt+0x23/0x780 [ 3254.262912] clone_mnt+0x6c/0x11b0 [ 3254.262925] ? is_subdir+0x246/0x410 [ 3254.262941] copy_tree+0x100/0xaf0 [ 3254.262953] ? lock_acquire+0x170/0x3c0 [ 3254.262964] ? is_subdir+0x164/0x410 [ 3254.262983] propagate_one.part.0+0x3a8/0x710 [ 3254.263000] propagate_mnt+0x201/0x530 [ 3254.263011] ? invent_group_ids+0x152/0x210 [ 3254.263026] attach_recursive_mnt+0x697/0xd80 [ 3254.263040] ? count_mounts+0x210/0x210 [ 3254.263054] ? clone_mnt+0x701/0x11b0 [ 3254.263068] graft_tree+0x187/0x210 [ 3254.263082] do_mount+0x217b/0x2f10 [ 3254.263098] ? lock_downgrade+0x720/0x720 [ 3254.263111] ? lock_acquire+0x170/0x3c0 [ 3254.263123] ? __might_fault+0xef/0x1d0 [ 3254.263136] ? copy_mount_string+0x40/0x40 [ 3254.263152] ? __might_fault+0x192/0x1d0 [ 3254.263166] ? _copy_from_user+0xd2/0x130 [ 3254.263181] ? copy_mount_options+0x26f/0x380 [ 3254.263196] ksys_mount+0xcf/0x130 [ 3254.263209] __x64_sys_mount+0xba/0x150 [ 3254.263224] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3254.263238] do_syscall_64+0xf9/0x620 [ 3254.263256] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3254.263266] RIP: 0033:0x45cb29 [ 3254.263278] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3254.263285] RSP: 002b:00007fe38a84bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3254.263297] RAX: ffffffffffffffda RBX: 00000000004f7560 RCX: 000000000045cb29 [ 3254.263305] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000000 05:33:04 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}, 0x1, 0x2a1e7}, 0x0) 05:33:04 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c000300000000009effffff0c0004"], 0x30}}, 0x0) 05:33:04 executing program 5 (fault-call:3 fault-nth:59): perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3254.263312] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3254.263319] R10: 0000000000a51000 R11: 0000000000000246 R12: 0000000000000004 [ 3254.263326] R13: 000000000000077b R14: 00000000004ca735 R15: 00007fe38a84c6d4 [ 3254.374660] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 3255.024532] FAULT_INJECTION: forcing a failure. [ 3255.024532] name failslab, interval 1, probability 0, space 0, times 0 [ 3255.037713] CPU: 0 PID: 2869 Comm: syz-executor.5 Not tainted 4.19.131-syzkaller #0 [ 3255.045548] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3255.054903] Call Trace: [ 3255.057515] dump_stack+0x1fc/0x2fe [ 3255.061181] should_fail.cold+0xa/0x14 [ 3255.065084] ? setup_fault_attr+0x200/0x200 [ 3255.069418] ? lock_acquire+0x170/0x3c0 [ 3255.073405] __should_failslab+0x115/0x180 [ 3255.077650] should_failslab+0x5/0xf [ 3255.081370] kmem_cache_alloc+0x277/0x370 [ 3255.085522] alloc_vfsmnt+0x23/0x780 [ 3255.089246] clone_mnt+0x6c/0x11b0 [ 3255.092794] ? copy_tree+0xad/0xaf0 [ 3255.096432] copy_tree+0x100/0xaf0 [ 3255.099980] ? lock_acquire+0x170/0x3c0 [ 3255.101158] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 3255.103954] ? is_subdir+0x164/0x410 [ 3255.103979] propagate_one.part.0+0x3a8/0x710 [ 3255.104000] propagate_mnt+0x201/0x530 [ 3255.123437] ? invent_group_ids+0x152/0x210 [ 3255.127768] attach_recursive_mnt+0x697/0xd80 [ 3255.132272] ? count_mounts+0x210/0x210 [ 3255.136256] ? clone_mnt+0x701/0x11b0 [ 3255.140064] graft_tree+0x187/0x210 [ 3255.143693] do_mount+0x217b/0x2f10 [ 3255.147328] ? lock_downgrade+0x720/0x720 [ 3255.151481] ? lock_acquire+0x170/0x3c0 [ 3255.155465] ? __might_fault+0xef/0x1d0 [ 3255.159448] ? copy_mount_string+0x40/0x40 [ 3255.163688] ? __might_fault+0x192/0x1d0 [ 3255.167758] ? _copy_from_user+0xd2/0x130 [ 3255.171917] ? copy_mount_options+0x26f/0x380 [ 3255.176426] ksys_mount+0xcf/0x130 [ 3255.179976] __x64_sys_mount+0xba/0x150 [ 3255.183958] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3255.188552] do_syscall_64+0xf9/0x620 [ 3255.192361] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3255.197548] RIP: 0033:0x45cb29 [ 3255.200755] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 05:33:05 executing program 2: chmod(&(0x7f0000000040)='./file0\x00', 0x110) r0 = inotify_init() ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000000)={0x3, 0xffffffff, 0x1}) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x448001, 0x0) read$dsp(r1, &(0x7f0000000180)=""/186, 0xba) ioctl$RTC_AIE_ON(r1, 0x7001) 05:33:05 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000040)='NLBL_CALIPSO\x00') 05:33:05 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0)=@known='trusted.overlay.origin\x00', &(0x7f0000000100)='\x00', 0x1, 0x3) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3255.219656] RSP: 002b:00007fe38a84bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3255.227366] RAX: ffffffffffffffda RBX: 00000000004f7560 RCX: 000000000045cb29 [ 3255.234638] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000000 [ 3255.241905] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3255.249176] R10: 0000000000a51000 R11: 0000000000000246 R12: 0000000000000004 [ 3255.256444] R13: 000000000000077b R14: 00000000004ca735 R15: 00007fe38a84c6d4 05:33:05 executing program 5 (fault-call:3 fault-nth:60): perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:33:05 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000040)=0xfe6b, 0x4) inotify_init() r1 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x240, 0x0) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) [ 3255.440462] FAULT_INJECTION: forcing a failure. [ 3255.440462] name failslab, interval 1, probability 0, space 0, times 0 [ 3255.458386] CPU: 0 PID: 2923 Comm: syz-executor.5 Not tainted 4.19.131-syzkaller #0 [ 3255.466195] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3255.475548] Call Trace: [ 3255.478153] dump_stack+0x1fc/0x2fe [ 3255.481809] should_fail.cold+0xa/0x14 [ 3255.485703] ? setup_fault_attr+0x200/0x200 [ 3255.490034] ? lock_acquire+0x170/0x3c0 [ 3255.494028] __should_failslab+0x115/0x180 [ 3255.498270] should_failslab+0x5/0xf [ 3255.501991] __kmalloc_track_caller+0x2a6/0x3c0 [ 3255.506666] ? kstrdup_const+0x53/0x80 [ 3255.510559] kstrdup+0x36/0x70 [ 3255.513758] kstrdup_const+0x53/0x80 [ 3255.517476] alloc_vfsmnt+0xb5/0x780 [ 3255.521194] clone_mnt+0x6c/0x11b0 [ 3255.524738] ? is_subdir+0x246/0x410 [ 3255.528464] copy_tree+0x100/0xaf0 [ 3255.532009] ? lock_acquire+0x170/0x3c0 [ 3255.535987] ? is_subdir+0x164/0x410 [ 3255.539717] propagate_one.part.0+0x3a8/0x710 [ 3255.544229] propagate_mnt+0x201/0x530 [ 3255.548208] ? invent_group_ids+0x152/0x210 [ 3255.552530] attach_recursive_mnt+0x697/0xd80 [ 3255.557029] ? count_mounts+0x210/0x210 [ 3255.561003] ? clone_mnt+0xaf8/0x11b0 [ 3255.564824] ? clone_mnt+0xb0d/0x11b0 [ 3255.568638] ? clone_mnt+0x701/0x11b0 [ 3255.572442] graft_tree+0x187/0x210 [ 3255.576067] do_mount+0x217b/0x2f10 [ 3255.576252] ttyprintk ttyprintk: tty_port_close_start: tty->count = 1 port count = 2 [ 3255.579682] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3255.579694] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3255.579704] ? copy_mount_string+0x40/0x40 [ 3255.579714] ? rcu_nmi_exit+0xb3/0x180 [ 3255.579727] ? copy_mount_options+0x26f/0x380 [ 3255.579738] ksys_mount+0xcf/0x130 [ 3255.579749] __x64_sys_mount+0xba/0x150 [ 3255.579760] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 3255.579770] do_syscall_64+0xf9/0x620 [ 3255.579783] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3255.579791] RIP: 0033:0x45cb29 [ 3255.579802] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3255.579807] RSP: 002b:00007fe38a84bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3255.579818] RAX: ffffffffffffffda RBX: 00000000004f7560 RCX: 000000000045cb29 [ 3255.579824] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000000 [ 3255.579830] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3255.579836] R10: 0000000000a51000 R11: 0000000000000246 R12: 0000000000000004 [ 3255.579842] R13: 000000000000077b R14: 00000000004ca735 R15: 00007fe38a84c6d4 [ 3255.696968] [ 3255.696971] ====================================================== [ 3255.696974] WARNING: possible circular locking dependency detected [ 3255.696976] 4.19.131-syzkaller #0 Not tainted [ 3255.696979] ------------------------------------------------------ [ 3255.696982] syz-executor.2/2928 is trying to acquire lock: [ 3255.696983] 00000000fc07068c (console_owner){-.-.}, at: vprintk_emit+0x3e5/0x730 [ 3255.696991] [ 3255.696993] but task is already holding lock: [ 3255.696994] 000000007f4cd685 (&(&port->lock)->rlock){-.-.}, at: tty_port_close_start.part.0+0x28/0x540 [ 3255.697002] [ 3255.697004] which lock already depends on the new lock. [ 3255.697005] [ 3255.697006] [ 3255.697009] the existing dependency chain (in reverse order) is: [ 3255.697010] [ 3255.697011] -> #2 (&(&port->lock)->rlock){-.-.}: [ 3255.697018] tty_port_tty_get+0x1d/0x80 [ 3255.697020] tty_port_default_wakeup+0x11/0x40 [ 3255.697022] serial8250_tx_chars+0x490/0xaf0 [ 3255.697025] serial8250_handle_irq.part.0+0x24b/0x290 [ 3255.697027] serial8250_default_handle_irq+0xae/0x220 [ 3255.697029] serial8250_interrupt+0xf2/0x1d0 [ 3255.697032] __handle_irq_event_percpu+0x27e/0x8e0 [ 3255.697034] handle_irq_event+0x102/0x285 [ 3255.697036] handle_edge_irq+0x260/0xcf0 [ 3255.697038] handle_irq+0x35/0x50 [ 3255.697039] do_IRQ+0x93/0x1c0 [ 3255.697041] ret_from_intr+0x0/0x1e [ 3255.697044] _raw_spin_unlock_irqrestore+0xa3/0xe0 [ 3255.697046] uart_write+0x3bb/0x6f0 [ 3255.697048] do_output_char+0x5de/0x850 [ 3255.697050] n_tty_write+0x46e/0xff0 [ 3255.697051] tty_write+0x496/0x810 [ 3255.697054] redirected_tty_write+0xaa/0xb0 [ 3255.697055] do_iter_write+0x461/0x5d0 [ 3255.697057] vfs_writev+0x153/0x2e0 [ 3255.697059] do_writev+0x136/0x330 [ 3255.697066] do_syscall_64+0xf9/0x620 [ 3255.697069] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3255.697070] [ 3255.697071] -> #1 (&port_lock_key){-.-.}: [ 3255.697078] serial8250_console_write+0x89b/0xad0 [ 3255.697080] console_unlock+0xbb6/0x1110 [ 3255.697082] vprintk_emit+0x2b8/0x730 [ 3255.697084] vprintk_func+0x79/0x17e [ 3255.697086] printk+0xba/0xed [ 3255.697088] register_console+0x87f/0xc90 [ 3255.697090] univ8250_console_init+0x3a/0x46 [ 3255.697092] console_init+0x4cb/0x718 [ 3255.697094] start_kernel+0x68b/0x916 [ 3255.697096] secondary_startup_64+0xa4/0xb0 [ 3255.697097] [ 3255.697098] -> #0 (console_owner){-.-.}: [ 3255.697105] vprintk_emit+0x422/0x730 [ 3255.697107] vprintk_func+0x79/0x17e [ 3255.697108] printk+0xba/0xed [ 3255.697111] tty_port_close_start.part.0+0x4f3/0x540 [ 3255.697113] tty_port_close+0x46/0x160 [ 3255.697115] tty_release+0x455/0xf60 [ 3255.697116] __fput+0x2ce/0x890 [ 3255.697118] task_work_run+0x148/0x1c0 [ 3255.697121] exit_to_usermode_loop+0x251/0x2a0 [ 3255.697123] do_syscall_64+0x538/0x620 [ 3255.697125] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3255.697126] [ 3255.697128] other info that might help us debug this: [ 3255.697129] [ 3255.697131] Chain exists of: [ 3255.697132] console_owner --> &port_lock_key --> &(&port->lock)->rlock [ 3255.697141] [ 3255.697143] Possible unsafe locking scenario: [ 3255.697144] [ 3255.697146] CPU0 CPU1 [ 3255.697148] ---- ---- [ 3255.697149] lock(&(&port->lock)->rlock); [ 3255.697154] lock(&port_lock_key); [ 3255.697159] lock(&(&port->lock)->rlock); [ 3255.697163] lock(console_owner); [ 3255.697166] [ 3255.697168] *** DEADLOCK *** [ 3255.697169] [ 3255.697171] 2 locks held by syz-executor.2/2928: [ 3255.697172] #0: 00000000f75aabc8 (&tty->legacy_mutex){+.+.}, at: tty_lock+0x6a/0xa0 [ 3255.697180] #1: 000000007f4cd685 (&(&port->lock)->rlock){-.-.}, at: tty_port_close_start.part.0+0x28/0x540 [ 3255.697189] [ 3255.697191] stack backtrace: [ 3255.697194] CPU: 1 PID: 2928 Comm: syz-executor.2 Not tainted 4.19.131-syzkaller #0 [ 3255.697198] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3255.697199] Call Trace: [ 3255.697201] dump_stack+0x1fc/0x2fe [ 3255.697204] print_circular_bug.constprop.0.cold+0x2d7/0x41e [ 3255.697206] __lock_acquire+0x30c9/0x3ff0 [ 3255.697208] ? mark_held_locks+0xf0/0xf0 [ 3255.697209] ? memcpy+0x35/0x50 [ 3255.697211] ? vprintk_emit+0x3fd/0x730 [ 3255.697213] lock_acquire+0x170/0x3c0 [ 3255.697215] ? vprintk_emit+0x3e5/0x730 [ 3255.697217] vprintk_emit+0x422/0x730 [ 3255.697219] ? vprintk_emit+0x3e5/0x730 [ 3255.697221] vprintk_func+0x79/0x17e [ 3255.697223] printk+0xba/0xed [ 3255.697225] ? log_store.cold+0x16/0x16 [ 3255.697227] ? lock_acquire+0x170/0x3c0 [ 3255.697229] ? tty_port_close_start.part.0+0x28/0x540 [ 3255.697231] tty_port_close_start.part.0+0x4f3/0x540 [ 3255.697233] tty_port_close+0x46/0x160 [ 3255.697235] ? tpk_open+0x60/0x60 [ 3255.697237] tty_release+0x455/0xf60 [ 3255.697239] ? do_tty_hangup+0x30/0x30 [ 3255.697241] __fput+0x2ce/0x890 [ 3255.697243] task_work_run+0x148/0x1c0 [ 3255.697245] exit_to_usermode_loop+0x251/0x2a0 [ 3255.697247] do_syscall_64+0x538/0x620 [ 3255.697249] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3255.697251] RIP: 0033:0x416721 [ 3255.697258] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 3255.697260] RSP: 002b:00007fff9571d630 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 3255.697265] RAX: 0000000000000000 RBX: 0000000000000005 RCX: 0000000000416721 [ 3255.697268] RDX: 0000000000000000 RSI: 000000000000055b RDI: 0000000000000004 05:33:06 executing program 2: inotify_init() r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x10400, 0x0) ioctl$KVM_GET_IRQCHIP(r0, 0xc208ae62, &(0x7f0000000040)) 05:33:06 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) tkill(r1, 0x6) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x7, 0x0) tkill(0x0, 0x2) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, 0x0, 0x7ffc, 0x0) ptrace$peek(0x3, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x1}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51080, 0x0) [ 3255.697271] RBP: 0000000000000001 R08: 000000007f11455b R09: 000000007f11455f [ 3255.697274] R10: 00007fff9571d720 R11: 0000000000000293 R12: 000000000078c900 [ 3255.697277] R13: 000000000078c900 R14: ffffffffffffffff R15: 000000000078bfac 05:33:06 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/sco\x00') ioctl$SNDCTL_DSP_GETBLKSIZE(r0, 0xc0045004, &(0x7f0000000080)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:33:06 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3256.375878] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 05:33:06 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}, 0x1, 0x2a1e8}, 0x0) 05:33:06 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0xa, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00', r3}) inotify_init() 05:33:06 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000000000f0ffffff0c0004"], 0x30}}, 0x0) 05:33:06 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0xc0, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f0000000040)={0x17, 0xf000000, 0x5, 0x9, 0x1f}) 05:33:06 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x0, 0x0, 0x2, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r1, &(0x7f0000000180)=""/186, 0xba) fcntl$dupfd(r1, 0x406, r0) write$P9_RREADLINK(r0, &(0x7f0000000040)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) 05:33:06 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x1000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3256.516314] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 05:33:06 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000002, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:33:06 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c0003000000000000000000030004"], 0x30}}, 0x0) 05:33:06 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x8, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r1, &(0x7f0000000180)=""/186, 0xba) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r2, &(0x7f0000000180)=""/186, 0xba) getsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f0000000040)=""/10, &(0x7f0000000280)=0xa) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r3, &(0x7f0000000180)=""/186, 0xba) getsockopt$inet_sctp6_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000000c0)={r4, 0x0, 0x20}, 0xc) 05:33:06 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = shmget$private(0x0, 0x3000, 0x2, &(0x7f0000ffa000/0x3000)=nil) shmat(r0, &(0x7f0000ffc000/0x2000)=nil, 0x8000) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x40000, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x2d, &(0x7f0000000080)={0x8, {{0xa, 0x4e23, 0x8, @loopback, 0x8}}}, 0x88) 05:33:06 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}, 0x1, 0x2a1e9}, 0x0) 05:33:06 executing program 2: inotify_init() r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r1, &(0x7f0000000180)=""/186, 0xba) r2 = syz_open_dev$vim2m(&(0x7f0000000040)='/dev/video#\x00', 0xe1a, 0x2) splice(r1, &(0x7f0000000000)=0xb3, r2, &(0x7f0000000080)=0x1000, 0x7f, 0x4) fanotify_mark(0xffffffffffffffff, 0xde, 0x8000008, 0xffffffffffffffff, &(0x7f0000000340)='./file0\x00') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) r3 = syz_open_procfs(r0, &(0x7f00000000c0)='numa_maps\x00') r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r5, &(0x7f0000000180)=""/186, 0xba) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000000)={r7, 0xffff, 0x8001}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000240)={r7, @in={{0x2, 0x4e24, @rand_addr=0x64010101}}, 0x3, 0x3f}, &(0x7f0000000300)=0x90) sendmsg$TIPC_NL_NET_SET(r3, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="01002dbd7000ffdbdf250f000000"], 0x14}, 0x1, 0x0, 0x0, 0x40088}, 0x0) [ 3256.720958] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 3256.730251] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 05:33:06 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000004, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:33:06 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000000000000200000c0004"], 0x30}}, 0x0) 05:33:06 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000006, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:33:06 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:33:06 executing program 2: inotify_init() pipe(&(0x7f0000000000)) [ 3256.807081] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 05:33:06 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_GET_STATION(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x1c, r2, 0xf2b, 0x0, 0x0, {0x32}, [@NL80211_ATTR_STA_PLINK_ACTION={0x4}]}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_SET_REG(r0, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f0000000280)={0x70, r2, 0x300, 0x70bd2c, 0x25dfdbfd, {}, [@NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x1}, @NL80211_ATTR_REG_RULES={0x4c, 0x22, 0x0, 0x1, [@NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x5}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x1}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x80000000}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x10000}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0x9}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x5}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x7}, @NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0x3f}, @NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0xe1}]}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x4}]}, 0x70}}, 0x20008000) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r3, &(0x7f0000000180)=""/186, 0xba) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'team_slave_1\x00', &(0x7f0000000040)=@ethtool_ts_info}) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:33:06 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000008, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:33:06 executing program 2: inotify_init() r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r2, &(0x7f0000000180)=""/186, 0xba) read$dsp(r2, &(0x7f0000000180)=""/186, 0xba) read$dsp(r1, &(0x7f0000000040)=""/160, 0xa0) ioctl$USBDEVFS_REAPURBNDELAY(r0, 0x4008550d, &(0x7f0000000000)) 05:33:06 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x511301, 0x0) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f0000000080)={0x1ee, 0x17, &(0x7f0000000280)}) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:33:06 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000000000000300000c0004"], 0x30}}, 0x0) [ 3256.999864] netlink: 'syz-executor.1': attribute type 25 has an invalid length. 05:33:06 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}, 0x1, 0x2a1ea}, 0x0) 05:33:06 executing program 2: inotify_init() r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x1e, r2, 0x1, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @udp='udp:syz2\x00'}}}}, 0x34}}, 0x0) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r2, 0x4, 0x70bd2c, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x9}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x48000) 05:33:06 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x2000000a, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:33:06 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000000000000f00000c0004"], 0x30}}, 0x0) 05:33:06 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000027, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3257.104553] netlink: 'syz-executor.1': attribute type 25 has an invalid length. [ 3257.137680] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 05:33:06 executing program 2: inotify_init() r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x1e, r2, 0x1, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @udp='udp:syz2\x00'}}}}, 0x34}}, 0x0) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r2, 0x4, 0x70bd2c, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x9}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x48000) 05:33:06 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x2, 0x301000) ioctl$SIOCX25SCAUSEDIAG(r0, 0x89ec, &(0x7f0000000080)) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000180)={0x0, {0x2, 0x4e24, @private=0xa010102}, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x3f}}, {0x2, 0x4e21, @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x3a01, &(0x7f00000000c0)='veth0_to_hsr\x00', 0x9, 0x100000000, 0x3ff}) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) 05:33:07 executing program 4: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x83, 0x0, 0x41c4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf1, 0xfff}, 0xac0, 0x0, 0x0, 0x0, 0xfffffbfffffffffe}, r1, 0xa, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$SIOCX25GCALLUSERDATA(r0, 0x89e4, &(0x7f0000000040)={0x7c, "0db76bc513b06ab7123eebb4d1748d1fa40a61ea2f44391eb45c5792f86344c53cd1f29a358ec1545b55b02471043c02cebe0bfa72f3f8e6eda4e57e426ee09712f69f7b3506dcd58bbdad1dd890c377877423892bd200b55e0e7f375a5d6ff0c966b300b854838a5c30c47c17194a75e33760558abfd4d2c870c15beb65abc3"}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0x1, 0x5, &(0x7f0000000540)=[{&(0x7f00000002c0)="926c7fafd345269728a0395f4d0de758a18f5948f2641572a95f4853e4994f92e72326f6651011641809d6488dacff06566a5f02eeb9b8a1a63ef35cbe142258cdd81c82b474909fa3ebcd", 0x4b, 0x7}, {&(0x7f0000000340)="977f39a9a126b33d766593e6f802837a966d6933d8d503f2cfc50c9e130c3592537bdda703a5f518b98bf68ed7978a1019ff330b9812b7fcef", 0x39, 0x401}, {&(0x7f0000000380)="890790c8ed9b3a6536afa09a3641abd82a3be797db60c07b8dc9e3dd038f9a82aff701eae82092f0902455f9a893636deec573f49abe3c503319857994b4f0448ffd7032bb90bbbf40ccddcf4a8c73248e7d2c75f9e8f06b8bc83b819dea9992e0efea8477856daff53a5f4a1cb1609fd248497c67d406f800c2ac5738f7052d9b3afd673817968414", 0x89, 0x9}, {&(0x7f0000001340)="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", 0x1000, 0xee}, {&(0x7f0000000440)="1e66aa69d55c1b65e880c8e50d947977e4f036f1603dc1cc9e6f48e27da36b1a81e7e32aecda118e69290795e3298fa1ae0b5b2e163af369721d064000196566e7ef35ccb3900a8ae5d0471e8b6a7c06f76c0b60272215c7475be216e266d43b9038a2eff89cf258989fff89fb44186f865d34242607d55863f34458da358878178626be4f81897315bf4abded6ad632dd644771b4531adf4b4b1795a0b9a2e98682218823d8321007451a7c2576346a81407097209a1285e3e53db70e746e88d6c6fde422b8510181280dc735f133c7ab2f1704d6d926475ca509ff5e0ac9dc03d12c7ea998c08c346b33e1b81e5d8270e32776f9", 0xf5, 0x5}], 0x1008010, &(0x7f00000005c0)={[{@nodots='nodots'}], [{@dont_hash='dont_hash'}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x64, 0x64, 0x30, 0x38, 0x37, 0x63], 0x2d, [0x30, 0x37, 0x65, 0x62], 0x2d, [0x31, 0x62, 0x38, 0x6a], 0x2d, [0x34, 0x66, 0x37, 0x62], 0x2d, [0x63, 0x66, 0x38, 0x37, 0x35, 0x62, 0x30, 0x62]}}}, {@dont_hash='dont_hash'}]}) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r2, &(0x7f0000000180)=""/186, 0xba) read(r2, &(0x7f0000000180)=""/182, 0xb6) 05:33:07 executing program 2: inotify_init() r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x1e, r2, 0x1, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @udp='udp:syz2\x00'}}}}, 0x34}}, 0x0) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r2, 0x4, 0x70bd2c, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x9}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x48000) 05:33:07 executing program 1: r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) read$dsp(0xffffffffffffffff, &(0x7f0000000180)=""/186, 0xba) recvmmsg(0xffffffffffffffff, &(0x7f0000001bc0)=[{{&(0x7f0000000280)=@phonet, 0x80, &(0x7f0000000600)=[{&(0x7f0000000300)=""/74, 0x4a}, {&(0x7f0000000100)}, {&(0x7f0000000380)=""/225, 0xe1}, {&(0x7f0000000480)=""/215, 0xd7}, {&(0x7f0000000580)=""/111, 0x6f}], 0x5, &(0x7f0000000680)=""/28, 0x1c}, 0x8}, {{&(0x7f00000006c0)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000000c00)=[{&(0x7f0000000740)=""/174, 0xae}, {&(0x7f0000000800)=""/9, 0x9}, {&(0x7f0000000840)=""/76, 0x4c}, {&(0x7f00000008c0)=""/122, 0x7a}, {&(0x7f0000000940)=""/103, 0x67}, {&(0x7f00000009c0)=""/29, 0x1d}, {&(0x7f0000000a00)=""/68, 0x44}, {&(0x7f0000000a80)=""/70, 0x46}, {&(0x7f0000000b00)=""/205, 0xcd}], 0x9, &(0x7f0000000cc0)=""/202, 0xca}, 0x1}, {{0x0, 0x0, &(0x7f0000001040)=[{&(0x7f0000000dc0)=""/62, 0x3e}, {&(0x7f0000000e00)=""/247, 0xf7}, {&(0x7f0000000f00)=""/36, 0x24}, {&(0x7f0000000f40)=""/132, 0x84}, {&(0x7f0000001000)=""/63, 0x3f}], 0x5, &(0x7f00000010c0)=""/242, 0xf2}, 0xd386}, {{&(0x7f00000011c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000001740)=[{&(0x7f0000001340)=""/204, 0xcc}, {&(0x7f0000001240)=""/76, 0x4c}, {&(0x7f0000001440)=""/208, 0xd0}, {&(0x7f0000001540)=""/42, 0x2a}, {&(0x7f0000001ec0)=""/200, 0xc8}, {&(0x7f0000001680)=""/137, 0x89}], 0x6, &(0x7f00000017c0)=""/199, 0xc7}, 0x10000}, {{&(0x7f00000018c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private0}}}, 0x80, &(0x7f0000001b80)=[{&(0x7f0000001940)=""/7, 0x7}, {&(0x7f0000001980)=""/190, 0xbe}, {&(0x7f0000001a80)=""/222, 0xde}], 0x3}, 0x1}], 0x5, 0x2000, &(0x7f0000001d00)={0x0, 0x989680}) socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000000)={0x0, 0xffff, 0x8001}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000001d40)={0x0, 0x7, 0x20}, &(0x7f0000001d80)=0xc) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000001dc0)={r2, 0x0, 0x6, 0x7fff}, &(0x7f0000001e00)=0x10) ptrace$cont(0x7, r0, 0xfffffffffffffffe, 0x0) r3 = perf_event_open(&(0x7f0000001e40)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x41c1, 0x104, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0}, 0x0, 0x800000000000, 0x8, 0x2, 0x20000, 0x6e, 0x8}, r0, 0x8, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r4, &(0x7f0000000180)=""/186, 0xba) getsockopt$CAN_RAW_FILTER(r4, 0x65, 0x1, &(0x7f0000000080), &(0x7f00000000c0)) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) write$FUSE_NOTIFY_RETRIEVE(r4, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x3, 0x20006, 0x3}}, 0x30) ioctl$TIOCNOTTY(r3, 0x5422) 05:33:07 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x2000004f, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:33:07 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f0000000040)={0x70}) 05:33:07 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}, 0x1, 0x2a1eb}, 0x0) 05:33:07 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f0000000040)={{0x89, @dev={0xac, 0x14, 0x14, 0x13}, 0x4e21, 0x2, 'sh\x00', 0x4, 0x6, 0x47}, {@private=0xa010100, 0x4e20, 0x10000, 0x735, 0x101, 0x2}}, 0x44) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=""/14}) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:33:07 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000054, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:33:07 executing program 2: inotify_init() r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x1e, r2, 0x1, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @udp='udp:syz2\x00'}}}}, 0x34}}, 0x0) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r2, 0x4, 0x70bd2c, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x9}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x48000) 05:33:07 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c0003000000000000f000000c0004"], 0x30}}, 0x0) 05:33:07 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x43c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x144) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:33:07 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000064, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:33:07 executing program 2: inotify_init() openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x1e, r1, 0x1, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @udp='udp:syz2\x00'}}}}, 0x34}}, 0x0) 05:33:07 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000000000000003000c0004"], 0x30}}, 0x0) 05:33:07 executing program 2: inotify_init() openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') 05:33:07 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x200000f0, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:33:07 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c0003000000000000000f000c0004"], 0x30}}, 0x0) 05:33:07 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x200001d8, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:33:07 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x3f, 0x0, 0x0, 0x3c, 0x0, 0x41c1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={0x0, 0xa}, 0x20, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) ioctl$ASHMEM_PURGE_ALL_CACHES(r0, 0x770a, 0x0) r1 = add_key$keyring(&(0x7f00000003c0)='keyring\x00', 0x0, 0x0, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="757064617465206563727970746673202fbae039abae2e"], 0x1e, r1) keyctl$invalidate(0x15, r1) sendmsg$RDMA_NLDEV_CMD_RES_GET(r0, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x18, 0x1409, 0x2, 0x70bd26, 0x25dfdbfc, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}]}, 0x18}, 0x1, 0x0, 0x0, 0x20008084}, 0x800) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r2, &(0x7f0000000180)=""/186, 0xba) write$cgroup_subtree(r2, &(0x7f0000000040)={[{0x2d, 'pids'}, {0x2d, 'pids'}]}, 0xc) 05:33:07 executing program 2: inotify_init() openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 05:33:07 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$setregs(0xf, 0xffffffffffffffff, 0x3, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x3, 0xfffffec0, 0x0, 0x0, 0x2, 0x3, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x7}, r0, 0x4, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r1, &(0x7f0000000180)=""/186, 0xba) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f0000000040)={0x200000000, 0x80000000}) mlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) 05:33:07 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}, 0x1, 0x2a1ec}, 0x0) 05:33:07 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c0003000000000000542d000c0004"], 0x30}}, 0x0) 05:33:07 executing program 4: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000040)={{r0}, 0xff, 0xfffffffffffff000, 0x8000}) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000100)='NLBL_UNLBL\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r1, &(0x7f0000000180)=""/186, 0xba) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x2) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r4) setfsuid(r4) ioctl$DRM_IOCTL_GET_CLIENT(r1, 0xc0286405, &(0x7f0000000080)={0x101, 0x38, {r2}, {r4}, 0x3aab, 0x8000}) ptrace$setregset(0x4205, r5, 0x201, &(0x7f00000000c0)={&(0x7f0000000280)="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", 0x1000}) 05:33:07 executing program 2: inotify_init() openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) 05:33:07 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x200003f4, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:33:07 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c0003000000000000003f000c0004"], 0x30}}, 0x0) 05:33:07 executing program 2: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) 05:33:07 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x200003f6, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:33:07 executing program 2: openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:33:07 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000000000002d54000c0004"], 0x30}}, 0x0) 05:33:07 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0xa, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000100)={'batadv0\x00', r3}) perf_event_open(&(0x7f00000012c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffeffd, 0x4, @perf_config_ext={0x9a}, 0x8000}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r4, &(0x7f0000000180)=""/186, 0xba) write$cgroup_type(r4, &(0x7f0000000040)='threaded\x00', 0x9) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x30340, 0x0) ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r5, 0xc0305616, &(0x7f00000000c0)={0x0, {0xf5e, 0x80}}) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:33:07 executing program 4: syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:33:08 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}, 0x1, 0x2a1ed}, 0x0) 05:33:08 executing program 2: openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:33:08 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x200003f8, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:33:08 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c000300000000000000f0000c0004"], 0x30}}, 0x0) 05:33:08 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:33:08 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x18001) fanotify_mark(r0, 0x27, 0x1000, 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00') ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r0, 0x40045542, &(0x7f0000000080)=0x1ff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:33:08 executing program 2: openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:33:08 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000000000000000000f0004"], 0x30}}, 0x0) 05:33:08 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x200003f9, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:33:08 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}, 0x1, 0x2a1ec}, 0x0) 05:33:08 executing program 4: r0 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmctl$IPC_RMID(r0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x200000, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000080)=0x3, 0x4) shmctl$SHM_LOCK(r0, 0xb) syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:33:08 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x2580, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x40}, 0x0, 0x5, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000040)=0x3f) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r1, &(0x7f0000000180)=""/186, 0xba) sendmsg$IPSET_CMD_PROTOCOL(r1, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000280)={&(0x7f0000000100)={0x34, 0x1, 0x6, 0x3, 0x0, 0x0, {0x0, 0x0, 0x3}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0xc014}, 0x80) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000080)=0xd, 0x4) [ 3258.443347] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 05:33:08 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}, 0x1, 0x2a1ee}, 0x0) 05:33:08 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x200003fa, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:33:08 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c0003000000000000000000150004"], 0x30}}, 0x0) 05:33:08 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:33:08 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) ioctl$SOUND_PCM_READ_CHANNELS(r0, 0x80045006, &(0x7f0000000040)) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:33:08 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}, 0x1, 0x2a1ec}, 0x0) 05:33:08 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x200003fb, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3258.723949] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 05:33:08 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x200003fc, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:33:08 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) r1 = socket$xdp(0x2c, 0x3, 0x0) recvfrom(r0, &(0x7f0000000040)=""/209, 0xd1, 0xd6da89ec6920276e, &(0x7f0000000280)=@pppol2tp={0x18, 0x1, {0x0, r1, {0x2, 0x4e22, @multicast1}, 0x1, 0x8, 0x1}}, 0x80) [ 3258.786022] validate_nla: 10 callbacks suppressed [ 3258.786031] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 05:33:08 executing program 1: perf_event_open(&(0x7f00000012c0)={0x3, 0x70, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0x9}, 0x200, 0x0, 0x4fe5020e, 0x0, 0x0, 0x5898, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000280)=""/185, 0xb9) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_GET_STATION(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x1c, r2, 0xf2b, 0x0, 0x0, {0x32}, [@NL80211_ATTR_STA_PLINK_ACTION={0x4}]}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_GET_MPP(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, r2, 0x8, 0x70bd27, 0x25dfdbfd, {}, [@NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @multicast}]}, 0x20}, 0x1, 0x0, 0x0, 0x20000010}, 0x2000c841) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:33:08 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x200003fd, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:33:08 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x200003fe, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:33:08 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}, 0x1, 0x2a1ef}, 0x0) 05:33:08 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000600, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:33:08 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0xff, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:33:08 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c0003000000000000000000180004"], 0x30}}, 0x0) 05:33:08 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3259.047516] netlink: 'syz-executor.1': attribute type 25 has an invalid length. [ 3259.059887] netlink: 'syz-executor.1': attribute type 25 has an invalid length. [ 3259.072440] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 05:33:08 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}, 0x1, 0x2a1ec}, 0x0) 05:33:08 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000a00, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3259.142914] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 05:33:09 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000000)={r2, 0xffff, 0x8001}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000040)={r2, 0x8, 0x4}, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:33:09 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20002700, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:33:09 executing program 4: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000040)=""/43) syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r1, &(0x7f0000000180)=""/186, 0xba) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_GET_STATION(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x1c, r3, 0xf2b, 0x0, 0x0, {0x32}, [@NL80211_ATTR_STA_PLINK_ACTION={0x4}]}, 0x1c}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0xa, 0x0, 0x0, r6}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) sendmsg$NL80211_CMD_SET_BEACON(r1, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000000c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="a0f065466887fc9cf90327d75b0337387619856ca2b2a1fe928b25d293f308de963b30faa930299f05d40690a18f11c484b1ce3d242b6562401c44944b8a0d55df4f59ce130680cb7019822252bded2def15014a240578ea507df05cbbef146fa90500000000000000cfc040b9968b5fe41d87563fd277c9e50000000000000002f29650631563455f57", @ANYRES16=r3, @ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="08007e0002000000"], 0x184}}, 0x85) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) read$dsp(0xffffffffffffffff, &(0x7f0000000180)=""/186, 0xba) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000440)=0x3) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:33:09 executing program 1: r0 = perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) write(r0, &(0x7f0000001340)="d5ce8b7dfb73f8b34a440796d3cb083bb034f664924211f5cb24ed0c21a976c908a1100c79bc829d4cc1bad3b7e22a91812f4095648c5ff7e24cead2525e8e0e68189fc45a75985ed4b83203bce3e33f040f2bde8cb10e8c20029b058b23bda0c4a036d416c1996569f6c33b92845f337a14689814452f6b10e0529a082a513bcc7723024c5b6830f5cf8dd9a6dc34a88236e92f14eb76e6f59a5f88108912b6977776f652d8d4d4a5e870af1e5a705c36f22dff435eba0c856b", 0xba) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r1, &(0x7f0000000180)=""/186, 0xba) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f0000000080)={'nat\x00', 0x0, 0x4, 0x1000, [], 0x1, &(0x7f0000000040)=[{}], &(0x7f0000000280)=""/4096}, &(0x7f0000000100)=0x78) 05:33:09 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20003f00, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3259.749444] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3259.758481] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 05:33:09 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}, 0x1, 0x2a1f0}, 0x0) 05:33:09 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20004000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:33:09 executing program 1: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/adsp1\x00', 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000001c0)={&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff7000/0x4000)=nil, &(0x7f0000ff8000/0x2000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff5000/0x3000)=nil, &(0x7f0000ffa000/0x6000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000080)="10775e7530b48b9f356cfe5854a0720b0ff1e65bac259b6cfc2f0affd25d194ea019837f76dc92dd84c4f5f11ccfd6799de7ec310e99a476dc636127b6941432950ff341e70901247b0ddeb9e8d03a3560c29826464ffc17875e7cfdcc6d901a24a0dc351cb0350cc20168fb254852c19a806e6f463ba004dc4e865e1b084237a702d20530d31be3b558a6e98a7d4b902977fa2b619805186b85df25b29f9dafe6abf7b4f22959b353e894", 0xab, r0}, 0x68) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x80, 0x3, 0x0, 0x0, 0x41c1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r1, &(0x7f0000000180)=""/186, 0xba) ioctl$KDGETLED(r1, 0x4b31, &(0x7f0000000280)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) open(&(0x7f0000000040)='./file0\x00', 0x2241, 0x14) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:33:09 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000000000000002000c0004"], 0x30}}, 0x0) 05:33:09 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8}]}, 0x4c}, 0x1, 0x2a1ec}, 0x0) 05:33:09 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000040)=0x80000001, 0x4) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3259.858104] netlink: 'syz-executor.4': attribute type 25 has an invalid length. [ 3259.890065] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 05:33:09 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20004f00, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:33:09 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000000000000003000c0004"], 0x30}}, 0x0) [ 3259.954926] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 05:33:09 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsu\x00', 0x44282, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x2) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) capset(&(0x7f0000000200)={0x20071026, r2}, &(0x7f0000000280)={0x1, 0x2, 0xf6, 0x85, 0x9, 0xfffffffc}) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x30, r1, 0x4, 0x70bd25, 0x25dfdbfb, {{}, {}, {0x14, 0x19, {0x9, 0x10001, 0x22, 0x3}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x80}, 0xc010) 05:33:09 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8}]}, 0x4c}, 0x1, 0x2a1ec}, 0x0) 05:33:09 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20005400, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:33:09 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) ioctl$EVIOCGPHYS(r0, 0x80404507, &(0x7f0000000040)=""/178) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3260.109586] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 05:33:10 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x2) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:33:10 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20006400, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:33:10 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c0003000000000000000f000c0004"], 0x30}}, 0x0) 05:33:10 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000180)=""/186, 0xba) ioctl$vim2m_VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000040)={0x800, 0x1, 0x2, {0x1, @pix={0x8c0, 0x6, 0x4c47504a, 0x8, 0x9, 0x1, 0xc, 0x473b, 0x0, 0x6}}, 0x4}) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:33:10 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}, 0x1, 0x2a1f1}, 0x0) 05:33:10 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8}]}, 0x4c}, 0x1, 0x2a1ec}, 0x0) 05:33:10 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x2000d801, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:33:10 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c000300000000000000f0000c0004"], 0x30}}, 0x0) 05:33:10 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0xa, 0x0, 0x0, r2}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)=@gettfilter={0x2c, 0x2e, 0x300, 0x70bd26, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, {0xffe0, 0x2}, {0x5, 0x2}, {0x7, 0xb}}, [{0x8, 0xb, 0xff}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000080}, 0xc080) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) prctl$PR_GET_SECCOMP(0x15) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x80, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r4, &(0x7f0000000180)=""/186, 0xba) setsockopt$PNPIPE_ENCAP(r4, 0x113, 0x1, &(0x7f0000000280), 0x4) ioctl$KVM_GET_ONE_REG(r3, 0x4010aeab, &(0x7f0000000080)={0x8, 0x3ff}) 05:33:10 executing program 1: r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4}, r0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:33:10 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x2000f000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) 05:33:10 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="9f8200000000000000000f0000001c0007800c00030000000000000000030c0004"], 0x30}}, 0x0) 05:33:10 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}, 0x1, 0x2a1ec}, 0x0) 05:33:10 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) read$dsp(r1, &(0x7f0000000180)=""/186, 0xba) read$dsp(r1, &(0x7f0000000180)=""/186, 0xba) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r0, 0x800443d2, &(0x7f0000000100)={0x7, &(0x7f0000000040)=[{}, {@fixed}, {@none}, {@fixed}, {@fixed}, {}, {@none}]}) 05:33:10 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x2000f403, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3260.616975] QAT: Invalid ioctl 05:33:10 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x2000f603, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0) [ 3260.779102] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4176 comm=syz-executor.4 [ 3260.803962] QAT: Invalid ioctl 05:33:10 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x805, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}, 0x1, 0x2a1f2}, 0x0) 05:33:10 executing program 1: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0