00)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x7000000, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xa00}}], [], 0x700}) 00:19:40 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') r1 = socket$inet6(0xa, 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r1, r2, &(0x7f0000000040)=0x100000, 0x8001) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f00000000c0)=[@in6={0xa, 0x4e21, 0xfffffff7, @mcast2, 0xd0}, @in={0x2, 0x4e20, @empty}, @in6={0xa, 0x4e20, 0x3, @remote, 0xffffffff}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e21, 0x10000, @loopback, 0x1b45}, @in={0x2, 0x4e23, @loopback}, @in={0x2, 0x4e22, @multicast1}, @in6={0xa, 0x4e24, 0xfe000000, @local, 0x1}, @in6={0xa, 0x4e21, 0x6, @remote, 0x93e5}], 0xcc) getdents64(r0, &(0x7f0000002100)=""/4096, 0x13c3) 00:19:40 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents64(r0, &(0x7f0000002100)=""/4096, 0x13c3) epoll_create1(0x80000) getdents64(r0, 0x0, 0xfd5c) [ 257.564969][T11466] FAULT_INJECTION: forcing a failure. [ 257.564969][T11466] name failslab, interval 1, probability 0, space 0, times 0 [ 257.654630][T11476] netlink: 'syz-executor.4': attribute type 15 has an invalid length. [ 257.664924][T11466] CPU: 0 PID: 11466 Comm: syz-executor.0 Not tainted 5.3.0+ #0 [ 257.672506][T11466] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 257.682564][T11466] Call Trace: [ 257.682591][T11466] dump_stack+0x172/0x1f0 [ 257.682612][T11466] should_fail.cold+0xa/0x15 [ 257.682632][T11466] ? fault_create_debugfs_attr+0x180/0x180 [ 257.682655][T11466] ? ___might_sleep+0x163/0x2c0 [ 257.695085][T11466] __should_failslab+0x121/0x190 [ 257.695109][T11466] should_failslab+0x9/0x14 [ 257.695123][T11466] __kmalloc_track_caller+0x2dc/0x760 [ 257.695145][T11466] ? setup_sigcontext+0x7d0/0x7d0 [ 257.720287][T11481] EXT4-fs (sda1): required extra inode space not available [ 257.720582][T11466] ? __bad_area_nosemaphore+0xb3/0x420 [ 257.737386][T11481] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000a00, [ 257.738257][T11466] ? strndup_user+0x77/0xd0 00:19:40 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents64(r0, &(0x7f0000002100)=""/4096, 0x13c3) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='veno\x00', 0x5) getdents64(r0, 0x0, 0xfd5c) [ 257.751709][T11466] memdup_user+0x26/0xb0 [ 257.755973][T11466] strndup_user+0x77/0xd0 [ 257.760439][T11466] ksys_mount+0x3c/0x150 [ 257.764703][T11466] __x64_sys_mount+0xbe/0x150 [ 257.769412][T11466] do_syscall_64+0xfa/0x760 [ 257.773936][T11466] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 257.779842][T11466] RIP: 0033:0x45c47a [ 257.783750][T11466] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 00:19:40 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:19:40 executing program 3: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f454c44065b050073118ce83feba746d2f6778c7d0be4de0842d8ab9ba8738c7592bbf57e75ef9b589bd7d0c15090b000"/59], 0xa) r6 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) close(r2) r7 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) 00:19:40 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000100)) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r0, r2, &(0x7f0000000040)=0x100000, 0x8001) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000000)={0x5, 0xfe, 0x80, 0x0, 0x182, 0x24, 0xfb, 0x8, 0x3, 0x3f, 0x4, 0x2, 0x0, 0x54, 0x80000000, 0x7, 0x5d, 0x0, 0xff}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents64(r3, &(0x7f0000002100)=""/4096, 0x13c3) r4 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x20, 0x101000) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x14, r6, 0x1}, 0x14}}, 0x0) sendmsg$TIPC_NL_SOCK_GET(r4, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2db00}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="500000009cb05761e8bc9a8cfa091a79174b37f94d1bdbfd2f00bb230ae47ccdec88e01a4ad9e0c5002b3312491ed5bcb9c8362a8fb3456920b20be69ce0d3d032e7bfb3109f5b4b884f6e", @ANYRES16=r6, @ANYBLOB="000627bd700004000000060000003c000200080001000100000008000200ffffffff08000100040000000400040008000100d5c200000400040008000200010000000800010094000000"], 0x50}, 0x1, 0x0, 0x0, 0x53645fb7ad4cd551}, 0x0) [ 257.803406][T11466] RSP: 002b:00007fcc4938da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 257.811835][T11466] RAX: ffffffffffffffda RBX: 00007fcc4938db40 RCX: 000000000045c47a [ 257.819998][T11466] RDX: 00007fcc4938dae0 RSI: 0000000020000040 RDI: 00007fcc4938db00 [ 257.827966][T11466] RBP: 0000000000000000 R08: 00007fcc4938db40 R09: 00007fcc4938dae0 [ 257.835939][T11466] R10: 00000000008000a6 R11: 0000000000000206 R12: 0000000000000004 [ 257.843912][T11466] R13: 00000000004c8b7b R14: 00000000004dfc28 R15: 0000000000000003 [ 257.933369][T11485] EXT4-fs (sda1): required extra inode space not available [ 257.963308][T11492] netlink: 'syz-executor.4': attribute type 15 has an invalid length. [ 257.979599][T11485] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000a00, 00:19:40 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') r1 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video36\x00', 0x2, 0x0) signalfd4(r1, &(0x7f0000000040)={0x89cc}, 0x8, 0x800) getdents64(r0, &(0x7f0000002100)=""/4096, 0x13c3) preadv(r0, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/62, 0x3e}, {&(0x7f0000000100)=""/107, 0x6b}], 0x2, 0x0) recvfrom$inet6(r0, &(0x7f00000001c0)=""/31, 0x1f, 0x12001, 0x0, 0x0) 00:19:40 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:19:40 executing program 0 (fault-call:2 fault-nth:34): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x700}) 00:19:40 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x8000000, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xa00}}], [], 0x700}) 00:19:40 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='ns\x00') getdents64(r0, &(0x7f0000002100)=""/4096, 0x13c3) getdents64(r0, 0x0, 0xfd5c) 00:19:40 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000000)) syz_open_dev$admmidi(&(0x7f0000000100)='/devmmidj#\x00', 0xa8, 0x202f0331eb838189) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/softnet_stat\x00') getdents64(r1, &(0x7f0000002100)=""/4096, 0x17a3) [ 258.199131][T11508] netlink: 'syz-executor.4': attribute type 15 has an invalid length. 00:19:40 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) [ 258.371450][T11524] EXT4-fs (sda1): required extra inode space not available [ 258.384545][T11519] FAULT_INJECTION: forcing a failure. [ 258.384545][T11519] name failslab, interval 1, probability 0, space 0, times 0 [ 258.402649][T11529] netlink: 'syz-executor.4': attribute type 15 has an invalid length. 00:19:41 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents64(r0, &(0x7f0000002100)=""/4096, 0x13c3) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r1, r2, &(0x7f0000000040)=0x100000, 0x8001) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r3, r4, &(0x7f0000000040)=0x100000, 0x8001) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r5, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r5, r6, &(0x7f0000000040)=0x100000, 0x8001) r7 = socket$inet6(0xa, 0x2, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r7, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r7, r8, &(0x7f0000000040)=0x100000, 0x8001) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000600)=ANY=[@ANYRES16=0x0, @ANYRESOCT=0x0, @ANYRESDEC, @ANYRESHEX=r6, @ANYPTR64=&(0x7f0000000040)=ANY=[@ANYRES32=r0, @ANYRES16], @ANYRESDEC=0x0, @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYRES64=0x0, @ANYPTR=&(0x7f0000000380)=ANY=[@ANYRES32=r2, @ANYPTR64, @ANYPTR64, @ANYPTR, @ANYRES64=r0, @ANYRES32=r4], @ANYRESOCT=0x0, @ANYRESDEC=r6, @ANYRES16=r8], @ANYRESDEC, @ANYPTR=&(0x7f0000000480)=ANY=[@ANYBLOB="2b80ef8d5a4f10138711e1e0d1a856849cbe5c3784771c1ba01d82204481a9cfcc67bf2d24f0682c21b598ad30641af36c41dfda68eb2ffb88c31461446cb7960bf0ca7f63138873648fd74e6177b66d6b6cd70d95104f541a8295904e9df792c960f231f29f903b7edfb1b115086329f3f137e7a1761047667cc508a4dea0b2a2d5370d7d44211a2c6c7d25c44528e191add25ed5d8c6c456d763c313877ac10e7dba9d1353ed6047e2d29c10d75c6ace2309a57b850bc276555a790d662255b9af4b", @ANYPTR64=&(0x7f0000000400)=ANY=[@ANYRES64=r8, @ANYRESDEC]]], &(0x7f0000000280)=""/196, 0x8, 0xc4}, 0x11) getdents64(r0, 0x0, 0xfd5c) 00:19:41 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:19:41 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') r1 = socket$inet6(0xa, 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r1, r2, &(0x7f0000000040)=0x100000, 0x8001) getsockopt$bt_BT_RCVMTU(r2, 0x112, 0xd, &(0x7f0000000000)=0xac68, &(0x7f0000000040)=0x2) getdents64(r0, &(0x7f0000002100)=""/4096, 0x13c3) [ 258.577122][T11519] CPU: 1 PID: 11519 Comm: syz-executor.0 Not tainted 5.3.0+ #0 [ 258.584720][T11519] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 258.594784][T11519] Call Trace: [ 258.598095][T11519] dump_stack+0x172/0x1f0 [ 258.602469][T11519] should_fail.cold+0xa/0x15 [ 258.607761][T11519] ? fault_create_debugfs_attr+0x180/0x180 [ 258.607786][T11519] ? ___might_sleep+0x163/0x2c0 [ 258.607808][T11519] __should_failslab+0x121/0x190 [ 258.607830][T11519] should_failslab+0x9/0x14 [ 258.624942][T11538] netlink: 'syz-executor.4': attribute type 15 has an invalid length. [ 258.627937][T11519] kmem_cache_alloc_trace+0x2d3/0x790 [ 258.627959][T11519] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 258.627973][T11519] ? _copy_from_user+0x12c/0x1a0 [ 258.627995][T11519] copy_mount_options+0x5c/0x3f0 [ 258.628016][T11519] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 258.657771][T11519] ksys_mount+0xa7/0x150 [ 258.657793][T11519] __x64_sys_mount+0xbe/0x150 [ 258.657814][T11519] do_syscall_64+0xfa/0x760 [ 258.657839][T11519] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 258.683541][T11519] RIP: 0033:0x45c47a [ 258.687456][T11519] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 258.707086][T11519] RSP: 002b:00007fcc4938da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 258.715515][T11519] RAX: ffffffffffffffda RBX: 00007fcc4938db40 RCX: 000000000045c47a [ 258.723498][T11519] RDX: 00007fcc4938dae0 RSI: 0000000020000040 RDI: 00007fcc4938db00 [ 258.731499][T11519] RBP: 0000000000000000 R08: 00007fcc4938db40 R09: 00007fcc4938dae0 [ 258.739481][T11519] R10: 00000000008000a6 R11: 0000000000000206 R12: 0000000000000004 [ 258.747463][T11519] R13: 00000000004c8b7b R14: 00000000004dfc28 R15: 0000000000000003 00:19:41 executing program 3: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f454c44065b050073118ce83feba746d2f6778c7d0be4de0842d8ab9ba8738c7592bbf57e75ef9b589bd7d0c15090b000"/59], 0xa) r6 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) close(r2) r7 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) 00:19:41 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x9000000, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xa00}}], [], 0x700}) 00:19:41 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:19:41 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) r3 = syz_open_procfs(r2, &(0x7f0000000080)='ns\x00') getdents64(r3, &(0x7f0000000480)=""/4096, 0x1079) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @remote}], 0x143) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r5, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r5, r6, &(0x7f0000000040)=0x100000, 0x8001) write$FUSE_POLL(r6, &(0x7f00000001c0)={0x18, 0x0, 0x1, {0xfff}}, 0x18) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="25265504", @ANYRES32=0x0], &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0x11, &(0x7f0000000200)=@assoc_value={r8}, 0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r8, 0x81, 0xfffe}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000140)={r9, 0x8, 0x20}, &(0x7f0000000180)=0xc) [ 258.928772][T11551] netlink: 'syz-executor.4': attribute type 15 has an invalid length. 00:19:41 executing program 0 (fault-call:2 fault-nth:35): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x700}) 00:19:41 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000000)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents64(r2, &(0x7f0000002100)=""/4096, 0x13c3) getdents64(r2, 0x0, 0xfd5c) 00:19:41 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:19:41 executing program 2: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)=0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r1, r2, &(0x7f0000000040)=0x100000, 0x8001) sendmsg(r1, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000080)="3097707b9c4a02d57d85fb2c22d9a48a34e0daa0fd65bf32a722d79001f1fc27afc05bb9d30cfd669018728e96cd44ff9bf6c88cd248e0858dbc3897f24d91a3083c6c03210b62c3938cfabe2101027d5117b65f1194ac81f5f86644252785334caa66c62c0eed970cc73439836297c7a3ae1b671a5cdaf8e90cdf2e", 0x7c}, {&(0x7f0000000100)="8416d84d51246988bf36456d9da7f67d16b322ea228aff1eb069db549bd13831f71684367c0f19", 0x27}, {&(0x7f0000000140)="a7c8a37692e328a4ead6e65c5968b9c7fa0e411a5a9eeb991aa1606ca47fad6c354904b9474a560af022de3d2cb79cb8fdb49ddb1c899d285a08a50ee1227032af38863d6e76d4d5c1bca46af34f9ea118e5ddd5b82e57df6bd0fd5fe551c8b4f559cf33ad9d161b82359aaa3de20c9e3e4f8a218a79e0fbf7e7f68d017474dcdb0fb6d5e3870ed60ec5847fdb6895e914ed2b7726e01bb58a9bc6d2b51ea2f6b7c51a39e3b5898d2b22dcde4311985f22318992d4e2d6f75796a58eac920c892ac014cf09ec7d24f69fd7ada6fa85feac453080db72b16338cf5fba1a6cdf69bc89da290f", 0xe5}], 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="d0000000000000005e85346fff0f0000da7b321b9ac0a0f9203ecca50470cf9a1c01d46dabdd798bb1a6977dccee1447312c1f225d00c56ac095160f1986d5176e98391aa777f494d056f04ec4ce5f5f5da0648067ad537e7375c1c0fda2c80a2d503bad9faef99c3dc95b00b2d146fc6553f857a54e5f48a5c35077f490a8a917e0995b602b52a89fa970ce0114fb094af3060d3a154108d2902bd6d573efaef9c336e0a14a3c61b3f396b3ca184d0875a7bb522cb287a618d02e0c20b9793eba44c7eca301c74a4d0000000000000010010000000000000701000000000000a6bf26e0198e1e5b4e5463365f16b7d2f7930a4ddf3a2f61bac206cc319c3d80b072e3aa0c8b9d713bdcfdc4da0ea82bc4a1a89a9ff99ca2537b28bab294a5590cb253cc921798d518215c8b0f0af231912d2f6d21ef19a511cb2cf503e7c7679a9abacb109879dad1012e85dbebe048863db9dbbe53cd7444b3c9ae592e46e68a3f1100b3ca15c38df6bb4b75127f8b860b67cb03e74ec95c9135d4bf20b286b8bcb954af82e591fe7744b56fa0502adfb3feb7180fa0d292924e2e93433281f9c805aaff15d5f27587495f51133b16e44b66cdddc1cf45c8b1f1fc8cd754ccdbee836cad94622c1cf0388e21de376460bd2001264830b60ce2d8e7d01d000010100000000000001501000004000000d1d038c1497c67579851fc08edb8cd6de56fdedc175a0e9fc884957fc2bb153f1890a58dda08ab02042f4e4c40f69f8b9db302dee08f9843f29757c63d96b061bc8d5fdd4440bfc835ebf66565f239ca5faaf63f62076288d720d9c279aa19dabae1d5197227dd663e4740b5500f45be0a51dca0373e23b0a7415726ba2710574f6dc355174637d82df30f940c8f24151e16877425f1449a2647ab60ec42b4f4cecd61cff1c1f41f3295364506551a635dec8b8ce79cc07388df796978ae25afeb1867659c2b7c4c2971bc997b560523b743e7a8bcf277bb7d929ee54152828f426b79fb29dd13016b8ae820aa76ef62deee3734f475d78f0aaf1c68a6ea98a8aa9c8a82ffb0b78175ef9e31f2396f10b1e6cb410c3d827592ae9205da7ee3a442595e8dd5da91ef4012c1f732b651c90930ddae0382c4fe2fb6b7f5641024acab562c4098255685e6f35ea21493974dece1c0c0c3663f66875ccb10f4834d871ec3e155561ad9591ce26eb9fca90cd39cc0ad06b6b0a78dd922f14c41ee81809b0816b7aedf69e85250dcf71f56ca63d3772775eabda0448b81c0a2aba5653d367ba2977f1823d6c856b4cc4f06e7c6c0fbc364b7b8298fb9ed6047dd7f2feb658c726677c7e447b042bb38bc45226962b5c7c194e311068c3a7170639119931a728e5cbb3b7efec7e45ea2cc8f1bdf20783f391bdc64cbbd25de97a28f07eeda23a3a6d5449fb6420966357846bc2a3bf8ca1dc63132b1497b9a9d46c72ce498fa451c54475367c1f87c6fc6aac3ac553355eb642aa76ddec37f6e8c94e26eb941bfff8c3be724bb4fb8de3d95c6308e843dfc5ebd3a1bd07046eea15742681e25a30a3c2bbdd7b78365b9c9c1f133f7fd9ff8b064b9a2deb261307412e82464424e880e61b3acbd286e3242e1791e339ee6f74747235c7fa917198dd0b787f033556cb6aa85d62f82e62594e56fc5e82dba059ee1a0faf7a2182e7768e0a1a79514368c941f68d6f9a3b156223e3a3d422caaa59b778c8808687560cd9d72d7260bde07ccbc3ffa9bcf7e0088a638aaa2e6b44e00d6a44572454ae48184eaad824831fb10fb9660f46ae5edbcf265da65af8a4295b72896bc72dee39df5a843a25e6749427e5c22061415f44cebe4277fa3020fcc03d1fa5fddbdc249390617cf2e7fc8772b12f7c6e32ae47cf7c15df076b37464caf1d3d8b85ec8d53e71cd18073dad163eaf0a6ea139281068f34fe966af47bfa14f864a883f37ad66338c568a75d34254fab59fa993e7c6dbf15441f1520ad360e362751dd342678d257560df7e1c9ecc0a50de4c2bac251da468b0f318d2f5100c32fb92dba9e26d8d88c9821020773abddc655b15d7843c7d62559bcbe63422f98ac846e59fd8a3d94253f9db8a0f83c9dc640087cb2a3070e9fe9cf59ca81047c1ba3e7b2365c6ddb34d3966cc71d79ffafa3f9550cb4744e570e6ffea249fb584c13b48641da857f14dcc275227dc686a51f52f240607585e0a64f34b5b490a97947778a60de00656b6dc5f3e8dcacab55802aa4dde295a7e57094a5b2c43e937d65d86b9ec6ad1e400974bf7141a0dfa3a0e30a5850079699836cd6edfc7882ba40ce80154f500ee9406bbf79a27624803ba4fe9fb59bb66e241ee9f7aaf32be340d3527ca34943313407e8df2f71b331a535a6909981ca9b35c3d3c56b99d7a97cced82ef8e3cc90cbb2f448fcdc89098b45c9c9a16648b27c13375da19186f3d96cf27bfa8a0bfb0ddaa2d9ae0e021f9fa89c619f7d778294b4023ad6b0373f37d8e5883b120a43f6a52a0217f3fc9a8e0d261922aae0a6e53d7476d6bce411328b7fd316defd9f9a67293098d76af2872916aa357e5991ef771c2c9b36571d3c655fcc278de7f69e96bbf079a43a6671277014d468ba83d6b2a5f1532103cfba2e62cd2c8d6dcc688045b56c3a4dda2bb4b43ac514537948bd9e1ae3cb0c96c19f1cd9b2e431cc8007f0fec3ce98f40ba0035ed381d8092961688fa6b21c226c17c982301718b95610a66cb8da7f8a25ff2b11f8b9185a9c6b5e257e3cbf3eb791b30a77a6534b0f00a537b06c40c1cd0f5fdebe3dd252fbb02efe5de541318d7eb0902cea3bb159d9575c9d4ceb819d07d9503b1fce2b102e77d8d7e43553fcd3df1543e6c3757a767def0b7bbe2bf1f2ab375271ad197583c47b12eb13a5c838ab5ce20b2778d7e734f822b47339c28ff3b3aaecf4575c58da6b603183ff50d126a0e7c9a3993fa818046928fc9715b92802c3362dd1b5f8514cf4f5cfee4e235dcc72bfad9e1a3389c36b42c0a7c90f3b27416ad46c3c57229fa0c486519ea2068eb04439203bbdd00be17a701bf9b3df8d5f48c4d80bb4bda59f7d37d06b9610e15f38fd35df1d5a353c42179c4d00e5ac27e7fc895dfbc36aab5c57d562819de1bf16f921cf5bec9fc64de05011b1ea13120e4fd6b7e5ee91b0331691904d249f3ebd2712cebb39d16472757cd68c1e762be3485fc043d0f25fc9303c54ef847ca98e410222f90da75a8b15da89a36468970e81f9495e4be988d3152afaca21a41b1f0268dc79ccc1579be49efb81f25cb33abda39c0f44d699b9a85ca6c50bfe3da6e802220f228879724113a7fd32b61e5f5c384d41d2eec49068347ffb315324dd7a2486dffa6930f1904dfb743c8077635682cb9eaa50705f54032338e252063f0a7ed35597cb671bb70d8ab55c3bfd19e618a747da6b423887ac715970071b473f637ec7b53759d9e3a8f7dbaaf55a19bcc3f8851ead563011c1caafde023985b4551993a13fa4e936739a26bc52f6128031df6d66c06ac2e4b1ef3e9bacf743dacfdea8e4a25049372231a39bf82106c64084274ad09370a4d184a01e5e8d34acae7076a099dccf43563b70018d35b1d8ed6d811e7bd409c9dd7c4cbdec1eea5990f9ee95fc55c9a4d23a4aa8dfd1ed720e290b682ab698dd721dac122f36feec177cf36be223853b35547025470e0bd1f830a9e7fa6caec64df7770286acd1c4c6becb30ee6a72bc5a372b3293d4d1f6ffa85b5b0d5454a7587696d12e9baeec3e7a0086cd04f399269326fc8d3efa8656c7adc107fceb0b17dea1563405a0a325b0bf5c33944edfad55a95c433d4928e55bc004aa2d29b831dc55a82da507a7d6f7724879e026d7dad105d71f7d0df1e0bc4c3351f42b4ac52590a57ca73f32bbffaf79484aeaeede75cecbfae5cc2bd6849c5e742f982992b85284fb311e4ca55dde5c7712ab1ce1e27a5c363679cdfaaa33d14be624a4b5d7c961c0942ee3a8394a20e4b9c459eb9f666fcffa5ec10186e880463f7c6b352f6ee9d79cf90030c952dcdcad2c05b3fe3c124e127f4ebc5b5df5cbab53c18024e8fccec55f0df4e13e41327582795fe16bef99853edb1e14fab4b9c18fada72458cf4db2e73ac369751ca2a938f392ea78e384594942783dcee71076bd403ffb9f152a34270cb865ea363a7a4e0eb3051167649351d8e06793ae10d40c735f98870c8110a76dafb5563945abbd67b3a618d61f810b8a7365a1d2c8d9443a0b13b357dd4e778cc54644079a7dbb38d57a71dca2869d47da03ca1abb80d2975027e5c5d742153f9a9e39c3b84e0341217e6347ef04fde2352a6c7bb2a7347cd791b08c85bbeadee79e5b7386352ca83edc941c57d31460b305901a8ba79e76491a3b036703c52e9fba6b9ae09f669eacd8bb570aee533994680423605d41fd8a641c9aaf82bf2dcf22fbe7c28afeb9f036662280ae4c7b860faa254c4f6ff59caf47fe83eedfc4fcaaf70a836661e7e1cd28a13b24e563ced1afd34b86ab114f0ca81a833560cf6ba9a11aa5b1f2a4a010d62336061f3d524dd492d9308c062a17981446582897bb987218939056aa8adb2ad1531797160b10638d9a4315de4a774761be6d3a0473fc6ed7bc627acd32004086d7d4de4473174c048588c30776c0b5e24329b30899500dbefa607ffd098438f3206b0a9b6aa2e3e0d206352d771680ece6acc4d9a772e66be98f1f5ddd68cff993addb8b23c1bd77b18fe1cddf8200c38715d050627ee86576867cec07e625f9233fabb33c18dfba78b90946ff6da698292b089772c47b461b6a33e004b042d11940b9c8030447cdf72fa491b662070a51644675c5a6e463e9a62aff5bfc6f425d54f056bd8cf12676feab8146cba4b59a4b65beb6abae4cff413aa94d615aba99d1e1bc1d61654c7e6742279dacefab82440b006b93805a2552807d6209b12d4311763d826052439841378b034a18ddb89ddb009b27b31cb68dd600573e0b90bb00e577c36b1ce5950ca2666c573a74add48d443ea941b642843bc818ee3549342c1a2a9c4770e1bb6db01884061549aa9e0abfe193e89fae49b9eb465d3611e871103a7b7a3bcfb0139a230125461e71107311cf2b6c2b22ea556c4fbc248750deefd42a8d3a79380de6a4d1ddcd780e52da49fcffd12dbdb9ea77ba375cab860b503303fe77228a9841c59081460ecbf8284813768a8cfa9f6e8125d2c9da1eb2275c15e0329c026fef453a6f5373177bf4aab2486d809d159b844cadd68318d3efcdc2ea1bfb9efcdb9eb5e800dd79b79104b80523f03b2854425e03cf6049debf810005c8dc9985582d2cba08350c22e672e8896ae5a9fa2929483bfb53f2ae01a9e23afb0e9361af150cff588ed61bc051117475b29787b15287428a708acd01ef92133c2af6de9a65dfb1028ba15cb3c5c31e50147212184ae3aee7786141a405d0552182d2b42804628dbef48f12859426ea51f8222ae0cc3341bc1de35f64e6291b2fe1a3e5e1cc3cf59e77a113d78934384c24d9a7fae0290ac0edd308ee34ecd0e0a323f2e7519e4b2433585ae507a5fa6a60b199e61f3e508ad9bc97735c19c0fe3c0cdc6d4e13269650efef1299db0e55a9127f4bf72b605886a2b33f20c391f2d649a66c8af1e3360fae217b62823e302765c2ecd05f08b92a2e338f9418ffd31b2fefba0ab4650e10d490448537e479a272b474a4198bfc558a0c7993ffd9afe1d4558b6ff4fcf185af686cb8559087fa4fde1afc7667b9f250b7c7edb286b0e419d9bf4eff66ee0cb485cd6d83126d518d875bfc6f90de55ad179a46261551e855b99d2b950c7c90063c424f2d8361e810b8b47f327e1e79f5748a58ff33dff704c4814d137dc669e27093938f7ad17275efbe0aba624ed293cb3e73c0a51a079299b07ef64e547b7bddc8dfd8d5608efcddde2daed45d1cb468856081e1ba1a844bbcf744846efbea2fa9427775fc21265238acfa37bdf72fdfc34d1705878db709142dc4e8d856e98cfd2c1094bfb090241e16c24e9ecc1b0e547f510960bacfa7987d6195077512567b931a938ccdba8e70efdd7e3f2cd30bfc6a756a707c026209af037cff03d18ea72bec5d6a4cf77fd9c81ddb800a699f262fa2619c16f72b7cc0d4773533b9f1cc7fe2e676ec1c7e2c1d42bed737eb7416dd734bff06e6e5a478b677c5ea78838a82cf910b0be28ee2e55780606f4e07e6247a28920549bfcdc17e9afce495c5d5abcd64f6678eb617189f9dee4126f45035a6cba5d84100459dcbbcfde02f5780f19210b99c29aad4a41dddb6b5bd2fe39934fa58434314d240ab6dc8ec2f39fcac4ae3e9dc356507f0390092525b5f05d25da7679007182e65a288bf6f0b0768f775632a5135a1f94d2895c6ab6fd7b1ea0d0147d3a37785bc51f681e716f015fa69bb7a1244a5c6d6ddec7ec40c85a2956408df899a17dc841673df2f0be5900"], 0x11f0}, 0xda460039c2ceb7d8) r3 = syz_open_procfs(r0, &(0x7f0000000040)='ns\x00') getdents64(r3, &(0x7f0000002100)=""/4096, 0x13c3) 00:19:41 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x10000000, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xa00}}], [], 0x700}) [ 259.221836][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 259.222904][T11573] netlink: 'syz-executor.4': attribute type 15 has an invalid length. [ 259.227654][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 259.301865][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 259.307760][ C0] protocol 88fb is buggy, dev hsr_slave_1 00:19:41 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x383000) getdents64(r0, &(0x7f00000000c0)=""/4096, 0xfffffecf) 00:19:41 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents64(r0, &(0x7f0000002100)=""/4096, 0x13c3) getdents64(r0, 0x0, 0xfd5c) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = socket$inet6(0xa, 0x2, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r3, r4, &(0x7f0000000040)=0x100000, 0x8001) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e24, 0x8, @remote, 0x1}, 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r1, r2, &(0x7f0000000040)=0x100000, 0x8001) setsockopt$ALG_SET_AEAD_AUTHSIZE(r2, 0x117, 0x5, 0x0, 0x9) 00:19:41 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x2d000000, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xa00}}], [], 0x700}) [ 259.344303][T11584] FAULT_INJECTION: forcing a failure. [ 259.344303][T11584] name failslab, interval 1, probability 0, space 0, times 0 [ 259.396130][T11584] CPU: 1 PID: 11584 Comm: syz-executor.0 Not tainted 5.3.0+ #0 [ 259.403906][T11584] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 259.413981][T11584] Call Trace: [ 259.414008][T11584] dump_stack+0x172/0x1f0 [ 259.414031][T11584] should_fail.cold+0xa/0x15 [ 259.414050][T11584] ? fault_create_debugfs_attr+0x180/0x180 [ 259.414068][T11584] ? ___might_sleep+0x163/0x2c0 [ 259.414085][T11584] __should_failslab+0x121/0x190 [ 259.414102][T11584] should_failslab+0x9/0x14 [ 259.414115][T11584] kmem_cache_alloc_trace+0x2d3/0x790 [ 259.414132][T11584] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 259.414145][T11584] ? _copy_from_user+0x12c/0x1a0 [ 259.414161][T11584] copy_mount_options+0x5c/0x3f0 [ 259.414174][T11584] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 259.414189][T11584] ksys_mount+0xa7/0x150 [ 259.414207][T11584] __x64_sys_mount+0xbe/0x150 [ 259.414228][T11584] do_syscall_64+0xfa/0x760 [ 259.432430][T11584] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 259.432442][T11584] RIP: 0033:0x45c47a [ 259.432456][T11584] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 259.432462][T11584] RSP: 002b:00007fcc4938da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 259.432477][T11584] RAX: ffffffffffffffda RBX: 00007fcc4938db40 RCX: 000000000045c47a [ 259.432485][T11584] RDX: 00007fcc4938dae0 RSI: 0000000020000040 RDI: 00007fcc4938db00 [ 259.432493][T11584] RBP: 0000000000000000 R08: 00007fcc4938db40 R09: 00007fcc4938dae0 [ 259.432500][T11584] R10: 00000000008000a6 R11: 0000000000000206 R12: 0000000000000004 [ 259.432512][T11584] R13: 00000000004c8b7b R14: 00000000004dfc28 R15: 0000000000000003 00:19:42 executing program 3: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f454c44065b050073118ce83feba746d2f6778c7d0be4de0842d8ab9ba8738c7592bbf57e75ef9b589bd7d0c15090b000"/59], 0xa) r6 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) close(r2) r7 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) 00:19:42 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:19:42 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents64(r0, &(0x7f0000002100)=""/4096, 0x13c3) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') ioctl$VIDIOC_TRY_ENCODER_CMD(r0, 0xc028564e, &(0x7f0000000100)={0x2, 0x1, [0x7, 0x7ff, 0x9f, 0x800, 0x3f, 0x1000, 0x5, 0x2d]}) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e23, 0xfffffffd, @dev={0xfe, 0x80, [], 0x16}, 0x3f}, 0x1c) rt_sigreturn() sendfile(r1, r2, &(0x7f0000000040)=0x100000, 0x8001) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'gre0\x00'}) 00:19:42 executing program 0 (fault-call:2 fault-nth:36): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x700}) 00:19:42 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='ns\x00') getdents64(r0, &(0x7f0000002100)=""/4096, 0x13c3) getdents64(r0, 0x0, 0xfd5c) 00:19:42 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x3b000000, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xa00}}], [], 0x700}) [ 259.919339][T11616] netlink: 'syz-executor.4': attribute type 15 has an invalid length. [ 259.972809][T11618] FAULT_INJECTION: forcing a failure. [ 259.972809][T11618] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 259.986054][T11618] CPU: 1 PID: 11618 Comm: syz-executor.0 Not tainted 5.3.0+ #0 [ 259.993601][T11618] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 260.004442][T11618] Call Trace: [ 260.007747][T11618] dump_stack+0x172/0x1f0 [ 260.012103][T11618] should_fail.cold+0xa/0x15 [ 260.016802][T11618] ? __kasan_check_read+0x11/0x20 [ 260.021840][T11618] ? fault_create_debugfs_attr+0x180/0x180 [ 260.027652][T11618] ? __kasan_check_read+0x11/0x20 [ 260.032695][T11618] ? __lock_acquire+0x1703/0x4e70 [ 260.037733][T11618] should_fail_alloc_page+0x50/0x60 [ 260.042972][T11618] __alloc_pages_nodemask+0x1a1/0x8f0 [ 260.048347][T11618] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 260.053984][T11618] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 260.059709][T11618] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 260.065350][T11618] ? fault_create_debugfs_attr+0x180/0x180 [ 260.071157][T11618] cache_grow_begin+0x90/0xd20 [ 260.075922][T11618] ? copy_mount_options+0x5c/0x3f0 [ 260.081190][T11618] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 260.087416][T11618] kmem_cache_alloc_trace+0x6b3/0x790 [ 260.092815][T11618] copy_mount_options+0x5c/0x3f0 [ 260.097735][T11618] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 260.104481][T11618] ksys_mount+0xa7/0x150 [ 260.108712][T11618] __x64_sys_mount+0xbe/0x150 [ 260.113731][T11618] do_syscall_64+0xfa/0x760 [ 260.118227][T11618] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 260.124166][T11618] RIP: 0033:0x45c47a [ 260.128044][T11618] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 260.151656][T11618] RSP: 002b:00007fcc4938da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 260.160074][T11618] RAX: ffffffffffffffda RBX: 00007fcc4938db40 RCX: 000000000045c47a 00:19:42 executing program 2: r0 = syz_open_dev$cec(&(0x7f0000000240)='\x00\x00\x00\x00\x02\x00@\x00', 0x3, 0x2) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm-monitor\x00', 0x10000, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000280)) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r2, r3, &(0x7f0000000040)=0x100000, 0x8001) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r4, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r4, r5, &(0x7f0000000040)=0x100000, 0x8001) r6 = socket$inet6(0xa, 0x2, 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r6, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r6, r7, &(0x7f0000000040)=0x100000, 0x8001) r8 = socket$inet6(0xa, 0x2, 0x0) r9 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r8, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r8, r9, &(0x7f0000000040)=0x100000, 0x8001) r10 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x422d, 0x400402) poll(&(0x7f0000000300)=[{r3, 0x900}, {r5, 0x2404}, {r7, 0x1}, {r9, 0x2172}, {r10}, {r1, 0x100}, {r1, 0x50}], 0x7, 0x401) r11 = syz_open_procfs(0x0, &(0x7f0000000140)='\x00\x00\x00\x00\x00\x00\x00\x00\x10\xacC+\\\x12\x8c\x11x\x14\xe4O\bEj\xca\xd8,\xea{\x953\xcd\x14dNk\x9f\x94\a\xb1\x1e\xd7\xd6\xae\x9c\xf6\xbd\xe7\xff\xdd\xf2\x05(B\x15\x01^\x03\xe8\x80a\xab\x90\xd9\xc38\x9d\xd3H\x9b\xd5iZ\xca\'5-\xf0/\x9dg\xaf\x1d\x04\x83\xeb\x8a\x8d\x9f\x9a\x85\xa16H>\x1dl\x88\xf2%\"\xce\x02\xb9\x9953?dd\xb4!Dp\x85\xc1n\xc7\xe0\x16=Nn\x96\xfc+\x84R\xeb39{\xe9\xad)c\x9d\x10R\x8a\x04\xd1&\xb2\xff\v\f,S\n?\xf2\xa9]\x9dU\xe9R\xc2\xc7\xce)\x90\xb3\x84\xc8\x05\x95Q\x1f^D6\xa0\xdf\xaf\b(O\x05\x1a\xf9\x9b=\xf3\xba\n\xc5\xdd\xd4!\x0e\x89}.\xebH\x8er\xd2\xf8\xfd\xd9\x98\x0eg\x1fo\x11\xb1r7\x0f\xfc\xdf\xa5\xdb\xcfX\x1f\xeeQ\xaa\xa3\xaa\b\xaf=t\x1b\xc9\x0f\x83\xa1\x13\xf7\x00\x00') connect$vsock_stream(r11, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x1}, 0x10) ioctl$SIOCGIFHWADDR(r0, 0x8927, &(0x7f00000000c0)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r11, 0x84, 0x1d, &(0x7f0000000080)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000100)=0x10) getdents64(r11, &(0x7f0000002100)=""/4096, 0x13c3) 00:19:42 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x3f000000, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xa00}}], [], 0x700}) 00:19:42 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) [ 260.168034][T11618] RDX: 00007fcc4938dae0 RSI: 0000000020000040 RDI: 00007fcc4938db00 [ 260.176002][T11618] RBP: 0000000000000000 R08: 00007fcc4938db40 R09: 00007fcc4938dae0 [ 260.183956][T11618] R10: 00000000008000a6 R11: 0000000000000206 R12: 0000000000000004 [ 260.192093][T11618] R13: 00000000004c8b7b R14: 00000000004dfc28 R15: 0000000000000003 00:19:42 executing program 0 (fault-call:2 fault-nth:37): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x700}) 00:19:42 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000002100)=""/4096, 0x1000) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r2, r3, &(0x7f0000000040)=0x100000, 0x8001) getdents64(r0, 0x0, 0xfffffffffffffe81) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r4, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r4, r5, &(0x7f0000000040)=0x100000, 0x8001) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="00000000000aa489b1a98910a90573ea522e9ff1c0000400280012ec0b00016b2dcfe9662aa09800180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000004480)=ANY=[@ANYBLOB="40000000100001007ea779066ba5000000000000", @ANYRES32=r8, @ANYBLOB="00000000000000000c000140aaaaaaaaaa00ff00140003002f7269646739a7c22c083855a3c299ec655f7361022f23d70a931b"], 0x40}}, 0x0) r9 = socket$inet6(0xa, 0x2, 0x0) r10 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r9, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r9, r10, &(0x7f0000000040)=0x100000, 0x8001) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r9, 0x84, 0x65, &(0x7f0000004400)=[@in6={0xa, 0x4e20, 0x73d3fd, @local, 0x5}, @in={0x2, 0x4e23, @empty}, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x17}}, @in6={0xa, 0x4e20, 0x4, @dev={0xfe, 0x80, [], 0x23}, 0xd8}, @in={0x2, 0x1, @multicast1}], 0x68) r11 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r11, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r11, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r12 = socket$inet6(0xa, 0x2, 0x0) r13 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r12, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r12, r13, &(0x7f0000000040)=0x100000, 0x8001) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r12, 0x84, 0x1d, &(0x7f0000004700)=ANY=[@ANYBLOB="7f00000000000000b6c810731865d85ce9cdfd58214b76929772cc3c757e4a6e583f2f117bc319dd056b0a62f6d05e4e865602ca054ec0ccb3f510a2440a98f2f8ef22d119e5eb2fb7a49470c3e8fd6c2b3f5b3e74691f5b8c059e2ce4b13f2726f8e9a928903dc882099b7a0dd0ece071fd97b61100668620b8db76632035337fbe6aaf5b2547b371e8b1d7541c07665039", @ANYRES32=0x0], &(0x7f0000003140)=0x32e) r14 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r14, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r11, 0x84, 0x11, &(0x7f0000000200)=@assoc_value={r15}, 0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000043c0)=@assoc_id=r15, &(0x7f0000004500)=0x4) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000004540)={r16, 0x9}, &(0x7f0000004580)=0x8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vcan0\x00', r8}) r17 = socket$netlink(0x10, 0x3, 0x0) r18 = socket$netlink(0x10, 0x3, 0x0) r19 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r19, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r19, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r18, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000004a80)=ANY=[@ANYBLOB="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", @ANYRES32=r20, @ANYBLOB="00000000000aa489b1a98910a90573ea522e9ff1c0000400280012ec0b00016b2dcfe9662aa09800180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000008d9949805a01f3cf3d6147e29f89157ebf04e2e5724f027542a1f88ab85c091878b1e39548f08174597e2ae589a400fded38272b4a02"], 0x48}}, 0x0) sendmsg$nl_route(r17, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="40000000100001007ea779066ba5000000000000", @ANYRES32=r20, @ANYBLOB="00000000000000000c000140aaaaaaaaaa000000140003002f72696467655f736c6176655f310000"], 0x40}}, 0x0) sendmsg$xdp(r5, &(0x7f0000004380)={&(0x7f00000000c0)={0x2c, 0x2, r20, 0x14}, 0xfffffffffffffd2d, &(0x7f0000004300)=[{&(0x7f0000000100)="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", 0x1000}, {&(0x7f0000001100)="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", 0x1000}, {&(0x7f0000003100)="0f43548cde23554e54793027a4", 0xd}, {&(0x7f00000045c0)="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", 0x135}, {&(0x7f00000031c0)="96ac59d9efcc55df3b59a56065cd3a5e8d507b152ee8a97f96b0188d709b2f828550859e0d1b52c758aaf6e3cd472a434bfa7c2f6b35a9db84981248cf03dc78e3acdf44400b287a54a7c678017a1b5c3dfef1db9469e02652a444eb85cc7bb47fbf0ae5ff7df1771c654b311bdd04ec51c3d342aad210ba67a7b0755482fa7799ba22cbb154f086251b954cede4c43ee3f510507eb53948fc3c8db3438b2fc07aa52b532a", 0xfffffffffffffe66}, {&(0x7f0000003280)="b534f484506421e2912a91e86300628a67b9a6e484521bbaabaeb15792413c6d3c24087b6c6e8c007844ecb9e833924aebdb35757fe42a2fac8e52f6b45ae0c9523c61e3a75707bfcaed6a99fccf4cb9b4ba767d604814162c51709f1115d0af44604826bfccd914968c1cf44b02b3718eab0ab6f2", 0x75}, {&(0x7f0000003300)="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", 0x1000}], 0x7}, 0x40) 00:19:43 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) [ 260.445171][T11641] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.1'. [ 260.558185][T11648] FAULT_INJECTION: forcing a failure. [ 260.558185][T11648] name failslab, interval 1, probability 0, space 0, times 0 [ 260.602123][T11648] CPU: 0 PID: 11648 Comm: syz-executor.0 Not tainted 5.3.0+ #0 [ 260.609016][T11655] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.1'. [ 260.610323][T11648] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 260.610330][T11648] Call Trace: [ 260.610358][T11648] dump_stack+0x172/0x1f0 [ 260.610388][T11648] should_fail.cold+0xa/0x15 [ 260.642101][T11648] ? fault_create_debugfs_attr+0x180/0x180 [ 260.648709][T11648] ? ___might_sleep+0x163/0x2c0 [ 260.653601][T11648] __should_failslab+0x121/0x190 [ 260.658565][T11648] should_failslab+0x9/0x14 [ 260.663077][T11648] __kmalloc_track_caller+0x2dc/0x760 [ 260.668477][T11648] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 260.677952][T11648] ? strndup_user+0x77/0xd0 [ 260.682576][T11648] memdup_user+0x26/0xb0 [ 260.686841][T11648] strndup_user+0x77/0xd0 [ 260.691193][T11648] ksys_mount+0x7b/0x150 [ 260.695477][T11648] __x64_sys_mount+0xbe/0x150 [ 260.700240][T11648] do_syscall_64+0xfa/0x760 [ 260.704763][T11648] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 260.710645][T11648] RIP: 0033:0x45c47a [ 260.714573][T11648] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 260.734523][T11648] RSP: 002b:00007fcc4938da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 260.734539][T11648] RAX: ffffffffffffffda RBX: 00007fcc4938db40 RCX: 000000000045c47a [ 260.734547][T11648] RDX: 00007fcc4938dae0 RSI: 0000000020000040 RDI: 00007fcc4938db00 [ 260.734555][T11648] RBP: 0000000000000000 R08: 00007fcc4938db40 R09: 00007fcc4938dae0 [ 260.734563][T11648] R10: 00000000008000a6 R11: 0000000000000206 R12: 0000000000000004 [ 260.734571][T11648] R13: 00000000004c8b7b R14: 00000000004dfc28 R15: 0000000000000003 00:19:43 executing program 3: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f454c44065b050073118ce83feba746d2f6778c7d0be4de0842d8ab9ba8738c7592bbf57e75ef9b589bd7d0c15090b000"/59], 0xa) r6 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) close(r2) r7 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) 00:19:43 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x8000, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f0000000100)='ns\x00') getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x481, &(0x7f0000000000), &(0x7f0000000040)=0xc) getdents64(r0, &(0x7f0000002100)=""/4096, 0x1505) 00:19:43 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x40000000, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xa00}}], [], 0x700}) 00:19:43 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') r1 = socket$inet6(0xa, 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r1, r2, &(0x7f0000000040)=0x100000, 0x8001) fsetxattr$security_evm(r2, &(0x7f0000000000)='security.evm\x00', &(0x7f00000000c0)=@v2={0x5, 0x1, 0x12, 0xfffffffb, 0x90, "baf6584e426b1aafcb559676485e563e335a442b9e4926309b891a8fa75efc4a88c46c0c644cff4e4fd278c9a168c3171b0fe5d11e10a0238ddf2927f063e16d2d779aac7915cc7ed8076e576b1775a10bb23a319c56f2d2a0f6d357a098c72acf1599568cc26657d5223728d10129ef83a16c5f9023d8b7164597b9bdfb072a4310580d9febbdfa27f34908efd58f8e"}, 0x9a, 0x1) getdents64(r0, &(0x7f0000002100)=""/4096, 0x13c3) getdents64(r0, 0x0, 0xfd5c) 00:19:43 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:19:43 executing program 0 (fault-call:2 fault-nth:38): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x700}) [ 261.041945][T11673] FAULT_INJECTION: forcing a failure. [ 261.041945][T11673] name failslab, interval 1, probability 0, space 0, times 0 [ 261.055066][T11673] CPU: 1 PID: 11673 Comm: syz-executor.0 Not tainted 5.3.0+ #0 [ 261.062617][T11673] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 261.072681][T11673] Call Trace: [ 261.075976][T11673] dump_stack+0x172/0x1f0 [ 261.080306][T11673] should_fail.cold+0xa/0x15 [ 261.084991][T11673] ? fault_create_debugfs_attr+0x180/0x180 [ 261.092001][T11673] ? ___might_sleep+0x163/0x2c0 [ 261.096928][T11673] __should_failslab+0x121/0x190 [ 261.101853][T11673] should_failslab+0x9/0x14 [ 261.106346][T11673] __kmalloc+0x2e0/0x770 [ 261.110570][T11673] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 261.116804][T11673] ? d_absolute_path+0x11b/0x170 [ 261.121817][T11673] ? __d_path+0x140/0x140 [ 261.126149][T11673] ? tomoyo_encode2.part.0+0xf5/0x400 [ 261.132038][T11673] tomoyo_encode2.part.0+0xf5/0x400 [ 261.137252][T11673] tomoyo_encode+0x2b/0x50 [ 261.141660][T11673] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 261.147293][T11673] tomoyo_mount_acl+0x149/0x840 [ 261.152139][T11673] ? __kasan_check_read+0x11/0x20 [ 261.157161][T11673] ? mark_lock+0xc2/0x1220 [ 261.161576][T11673] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 261.167132][T11673] ? __kasan_check_read+0x11/0x20 [ 261.172139][T11673] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 261.178291][T11673] ? lock_acquire+0x190/0x410 [ 261.182955][T11673] ? tomoyo_mount_permission+0x10a/0x410 [ 261.188589][T11673] tomoyo_mount_permission+0x16a/0x410 [ 261.194029][T11673] ? tomoyo_mount_permission+0x10a/0x410 [ 261.199654][T11673] ? tomoyo_mount_acl+0x840/0x840 [ 261.204759][T11673] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 261.210994][T11673] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 261.217218][T11673] ? strncpy_from_user+0x2b4/0x400 [ 261.222330][T11673] tomoyo_sb_mount+0x35/0x40 [ 261.226926][T11673] security_sb_mount+0x87/0xd0 [ 261.231680][T11673] do_mount+0x1d0/0x1d10 [ 261.235923][T11673] ? retint_kernel+0x2b/0x2b [ 261.240502][T11673] ? copy_mount_string+0x40/0x40 [ 261.245689][T11673] ? __sanitizer_cov_trace_const_cmp4+0x1/0x20 [ 261.251839][T11673] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 261.258067][T11673] ? copy_mount_options+0x2e8/0x3f0 [ 261.263252][T11673] ksys_mount+0xdb/0x150 [ 261.267488][T11673] __x64_sys_mount+0xbe/0x150 [ 261.272153][T11673] do_syscall_64+0xfa/0x760 [ 261.276668][T11673] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 261.282540][T11673] RIP: 0033:0x45c47a [ 261.286432][T11673] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 261.306638][T11673] RSP: 002b:00007fcc4938da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 261.315052][T11673] RAX: ffffffffffffffda RBX: 00007fcc4938db40 RCX: 000000000045c47a [ 261.323106][T11673] RDX: 00007fcc4938dae0 RSI: 0000000020000040 RDI: 00007fcc4938db00 [ 261.331148][T11673] RBP: 0000000000000000 R08: 00007fcc4938db40 R09: 00007fcc4938dae0 00:19:43 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) [ 261.339355][T11673] R10: 00000000008000a6 R11: 0000000000000206 R12: 0000000000000004 [ 261.347338][T11673] R13: 00000000004c8b7b R14: 00000000004dfc28 R15: 0000000000000003 [ 261.356208][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 261.362041][ C1] protocol 88fb is buggy, dev hsr_slave_1 00:19:43 executing program 2: getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000000), 0x10) getdents64(0xffffffffffffffff, &(0x7f0000002100)=""/4096, 0x13c3) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000001600)={0x3}) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r2, r3, &(0x7f0000000040)=0x100000, 0x8001) r4 = dup3(r1, r2, 0x80000) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r5, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r5, r6, &(0x7f0000000040)=0x100000, 0x8001) readv(r6, &(0x7f0000001580)=[{&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/184, 0xb8}, {&(0x7f0000000280)=""/109, 0x6d}, {&(0x7f0000000300)=""/72, 0x48}, {&(0x7f0000000380)=""/40, 0x28}, {&(0x7f0000001480)=""/215, 0xd7}, {&(0x7f00000003c0)=""/105, 0x69}], 0x7) r7 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r4, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10088000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x6c, r7, 0x0, 0x70bd26, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9f63}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x40}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffffffff}, @IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xc9}]}, 0x6c}, 0x1, 0x0, 0x0, 0x40000}, 0x4000000) 00:19:43 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='auxv\x00') getdents64(r0, &(0x7f0000002100)=""/4096, 0x13c3) getdents64(r0, 0x0, 0xfd5c) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r1, r2, &(0x7f0000000040)=0x100000, 0x8001) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000100)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x0, {0xa, 0x1000, 0x20, @mcast1, 0x80}, r3}}, 0x38) [ 261.529956][T11673] ERROR: Out of memory at tomoyo_realpath_from_path. 00:19:44 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x86008000, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xa00}}], [], 0x700}) 00:19:44 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:19:44 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') open(&(0x7f0000000100)='\x00', 0x448040, 0x56) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r1, r2, &(0x7f0000000040)=0x100000, 0x8001) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r3, r4, &(0x7f0000000040)=0x100000, 0x8001) getdents64(r4, &(0x7f0000002100)=""/4096, 0xfffffffffffffe4f) keyctl$session_to_parent(0x12) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r7 = socket$inet6(0xa, 0x2, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r7, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r7, r8, &(0x7f0000000040)=0x100000, 0x8001) fanotify_mark(r8, 0xa, 0x8000000, r6, &(0x7f00000000c0)='./file0\x00') connect$inet6(r5, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r5, r6, &(0x7f0000000040)=0x100000, 0x8001) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000000)=""/111) getdents64(r0, 0x0, 0xfd5c) 00:19:44 executing program 3: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f454c44065b050073118ce83feba746d2f6778c7d0be4de0842d8ab9ba8738c7592bbf57e75ef9b589bd7d0c15090b000"/59], 0xa) r6 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) close(r2) r7 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) 00:19:44 executing program 1: r0 = gettid() tkill(r0, 0x1002000000016) r1 = gettid() tkill(r1, 0x1002000000016) r2 = gettid() tkill(r2, 0x1002000000016) r3 = getpgrp(r2) r4 = syz_open_procfs(r3, &(0x7f0000000200)='\x00\x00\x10FP\xd2[\xc3\xf2\xd4\xeeH\x14\xd4\xf2`w\x1b\xc1)\x1e\xe84A\xbc\x1f\x97\xb2z\xffo\x1f\xb1\x8a\x1f\xac\x91\xc8\xa1\xfe\xae\x19\a\xe2\x0e;\xad\xfc\xfd\xa9\x1e\xcd\xe3\x10E\xd0\x9a\xfb\xb9\x8cK\xdc\\lZ\xbcw\xfa\xed3\x9e\x80\xf46\x93dB\xba\xf8\a\xa4\xc9\xf0\x12lB5[,\xe2\xf2x\xc4\xc3J\\8\x17\x1aQ\x83F\"\xca\x0e\x00\x89\x01ps\xd5\xa8\x814\xa1\xf8G\x94\x96\xae\x02\xbb,\xa4\xd3bd\xf1\x9d\x12\xd8h\'\xe6^\xfe\xd6\rC\xfca=\x99l\xa6mo\xce\xe2\x8f\x80\x8dO\xda\xac\r\r+\x93\x8c\xf9\x1f\x85\\\x8a\xed\xc9\xb7n\xc4\f3R\xc3\x9e\x96\x17\xc0,\xb1\xb0\xeev\xc7\xbcK\xa3\r\xd5~UL\xdb\x8b%k#&\v\x01yO\x1b\xbf\xe1\x82\x97g\xe1o\xdf?\x91\x91\xd3\xb4\x99exTE]U{\x87\x06\b\x96\x11\xf2\xdf\x7fa\xb5\xe4V\x8b\xd1\xea\x876\xea\xe7\xb5\x9c \x96\xc1\xe3\x8e\xfaNF\xab \x01\x845 \xff\xcaV\x96_\xb8\x8f\xbcG\xdfC\x0fm\xb8\xde\xad-4\x9a?\x9c\xfa\x0f\x8b\xdf{\x95\a\xa1\xd7\xe2\xb9\x9f\xf6s&_\xa8P\x18#\x9bq\xa3m') getdents64(r4, &(0x7f0000002100)=""/4096, 0x13c3) getdents64(r4, 0x0, 0xfd5c) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x42000, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000000040)=0x100, 0x4) 00:19:44 executing program 0 (fault-call:2 fault-nth:39): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x700}) 00:19:44 executing program 2: setsockopt$RXRPC_EXCLUSIVE_CONNECTION(0xffffffffffffffff, 0x110, 0x3) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='\x00\x00\x00') ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000040)={0x7, [0x2, 0xa6bd, 0x1, 0x800, 0x0, 0x4, 0x8]}) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r0, 0x110, 0x4, &(0x7f0000000080)=0x2, 0x4) getdents64(r0, &(0x7f0000002100)=""/4096, 0x13c3) 00:19:44 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:19:44 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x8cffffff, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xa00}}], [], 0x700}) [ 261.969958][T11721] validate_nla: 5 callbacks suppressed [ 261.969970][T11721] netlink: 'syz-executor.4': attribute type 15 has an invalid length. [ 262.002525][T11719] FAULT_INJECTION: forcing a failure. [ 262.002525][T11719] name failslab, interval 1, probability 0, space 0, times 0 [ 262.081934][T11719] CPU: 0 PID: 11719 Comm: syz-executor.0 Not tainted 5.3.0+ #0 [ 262.090864][T11719] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 262.101107][T11719] Call Trace: [ 262.104430][T11719] dump_stack+0x172/0x1f0 [ 262.108785][T11719] should_fail.cold+0xa/0x15 [ 262.113399][T11719] ? fault_create_debugfs_attr+0x180/0x180 [ 262.119230][T11719] ? ___might_sleep+0x163/0x2c0 [ 262.124105][T11719] __should_failslab+0x121/0x190 [ 262.129061][T11719] should_failslab+0x9/0x14 [ 262.133578][T11719] kmem_cache_alloc+0x2aa/0x710 [ 262.138802][T11719] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 262.145246][T11719] getname_flags+0xd6/0x5b0 [ 262.149774][T11719] user_path_at_empty+0x2f/0x50 [ 262.154653][T11719] do_mount+0x14e/0x1d10 [ 262.158937][T11719] ? copy_mount_string+0x40/0x40 [ 262.163895][T11719] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 262.170157][T11719] ? copy_mount_options+0x2e8/0x3f0 [ 262.175381][T11719] ksys_mount+0xdb/0x150 [ 262.179703][T11719] __x64_sys_mount+0xbe/0x150 [ 262.184407][T11719] do_syscall_64+0xfa/0x760 [ 262.188935][T11719] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 262.194951][T11719] RIP: 0033:0x45c47a [ 262.198868][T11719] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 262.218635][T11719] RSP: 002b:00007fcc4938da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 00:19:44 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x24400, 0x0) ioctl$KVM_SET_NESTED_STATE(r0, 0x4080aebf, &(0x7f0000000080)={0x1, 0x0, 0x2080, {0x1, 0xd000, 0x2}, [], "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", "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"}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/sctp\x00') getdents64(r1, &(0x7f0000002100)=""/4096, 0x13c3) [ 262.227058][T11719] RAX: ffffffffffffffda RBX: 00007fcc4938db40 RCX: 000000000045c47a [ 262.235042][T11719] RDX: 00007fcc4938dae0 RSI: 0000000020000040 RDI: 00007fcc4938db00 [ 262.243469][T11719] RBP: 0000000000000000 R08: 00007fcc4938db40 R09: 00007fcc4938dae0 [ 262.251712][T11719] R10: 00000000008000a6 R11: 0000000000000206 R12: 0000000000000004 [ 262.259695][T11719] R13: 00000000004c8b7b R14: 00000000004dfc28 R15: 0000000000000003 00:19:44 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) [ 262.291113][T11732] EXT4-fs: 24 callbacks suppressed [ 262.291124][T11732] EXT4-fs (sda1): required extra inode space not available [ 262.317767][T11732] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000a00, 00:19:45 executing program 0 (fault-call:2 fault-nth:40): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x700}) 00:19:45 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xf6ffffff, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xa00}}], [], 0x700}) [ 262.426679][T11748] netlink: 'syz-executor.4': attribute type 15 has an invalid length. 00:19:45 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:19:45 executing program 2: r0 = gettid() tkill(r0, 0x1002000000016) r1 = getpgrp(r0) r2 = syz_open_procfs(r1, &(0x7f00000000c0)='^et/\x1a\xba\xf0\x99\x01\x9f\xdeW\xc3\xf7R\xa3C^q\n\xa6 \xfc\xb7\xd1\xe8h1?\xc4W\x9f\x0f\xbe\r\x8b\xdd/)b\x02\xaci\xb1\x87\xa4q0\x83\xb0\xa4\xd4\xd5]\x81*\xe0:V\xcb\xd9#\x1cf\xc0\xf9i\xeb\xab\xcc\n\xb7\xe6\x16X8[\xd6\xfb\xec\x0f\xf2g\x05\xd6\xac=\x99\x05\xeav\xc6\xa9\xfb\xc9\xab\xe5\x97n\x92\xc8\xe7%d4k\xe1\x84\xb4\xae\x03\xcb!\xc0I\xc4\xa8\xfa\xd5tD\r<\xbe\xcd\xa1\xbe\'\x8a\xdfR7\xe6\x1a\x0e\x99U\x8a\xdd\xf8\x14:rLM\xa5%(\r\x16\xcf\x1f\xb9\x801\x83?\agg9\xebG\x1d\xbf3\xf2\xd6g%\x15\xf1S\xa4_3\xa7\xc4\xb4\xde\xdd\x00\xaf\xb01\x94\xfb\xd4w\x844S\xab^\vq\xf0\x8e\xd9\xe0\xa9\x95\xd2\x84\xe12 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 262.922417][T11754] RSP: 002b:00007fcc4938da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 262.931417][T11754] RAX: ffffffffffffffda RBX: 00007fcc4938db40 RCX: 000000000045c47a [ 262.939379][T11754] RDX: 00007fcc4938dae0 RSI: 0000000020000040 RDI: 00007fcc4938db00 [ 262.947434][T11754] RBP: 0000000000000000 R08: 00007fcc4938db40 R09: 00007fcc4938dae0 [ 262.955397][T11754] R10: 00000000008000a6 R11: 0000000000000206 R12: 0000000000000004 [ 262.963353][T11754] R13: 00000000004c8b7b R14: 00000000004dfc28 R15: 0000000000000003 [ 262.973424][T11754] ERROR: Out of memory at tomoyo_realpath_from_path. 00:19:45 executing program 3: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f454c44065b050073118ce83feba746d2f6778c7d0be4de0842d8ab9ba8738c7592bbf57e75ef9b589bd7d0c15090b000"/59], 0xa) r6 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) close(r2) r7 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) 00:19:45 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xff000000, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xa00}}], [], 0x700}) 00:19:45 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:19:45 executing program 0 (fault-call:2 fault-nth:41): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x700}) [ 263.104607][T11768] EXT4-fs (sda1): required extra inode space not available [ 263.125519][T11776] netlink: 'syz-executor.4': attribute type 15 has an invalid length. [ 263.140919][T11768] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000a00, [ 263.258205][T11781] EXT4-fs (sda1): required extra inode space not available [ 263.289545][T11781] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000a00, [ 263.313989][T11783] FAULT_INJECTION: forcing a failure. [ 263.313989][T11783] name failslab, interval 1, probability 0, space 0, times 0 [ 263.327222][T11783] CPU: 1 PID: 11783 Comm: syz-executor.0 Not tainted 5.3.0+ #0 [ 263.334782][T11783] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 263.345979][T11783] Call Trace: [ 263.349290][T11783] dump_stack+0x172/0x1f0 [ 263.353647][T11783] should_fail.cold+0xa/0x15 [ 263.358261][T11783] ? fault_create_debugfs_attr+0x180/0x180 [ 263.364721][T11783] ? ___might_sleep+0x163/0x2c0 [ 263.369623][T11783] __should_failslab+0x121/0x190 [ 263.374679][T11783] should_failslab+0x9/0x14 [ 263.379196][T11783] __kmalloc+0x2e0/0x770 [ 263.384158][T11783] ? save_stack+0x5c/0x90 [ 263.388501][T11783] ? save_stack+0x23/0x90 [ 263.392842][T11783] ? tomoyo_encode2.part.0+0xf5/0x400 [ 263.398248][T11783] tomoyo_encode2.part.0+0xf5/0x400 [ 263.403580][T11783] ? do_syscall_64+0xfa/0x760 [ 263.408281][T11783] tomoyo_encode+0x2b/0x50 [ 263.412711][T11783] tomoyo_mount_acl+0xe0/0x840 [ 263.417503][T11783] ? __kasan_check_read+0x11/0x20 [ 263.422538][T11783] ? mark_lock+0xc2/0x1220 [ 263.426991][T11783] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 263.432572][T11783] ? __kasan_check_read+0x11/0x20 [ 263.437620][T11783] ? __lock_acquire+0x8a1/0x4e70 [ 263.442575][T11783] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 263.448851][T11783] ? lock_acquire+0x190/0x410 [ 263.453675][T11783] ? tomoyo_mount_permission+0x10a/0x410 [ 263.459361][T11783] tomoyo_mount_permission+0x16a/0x410 [ 263.461911][ C0] net_ratelimit: 2 callbacks suppressed [ 263.461919][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 263.464829][T11783] ? tomoyo_mount_permission+0x10a/0x410 [ 263.470405][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 263.476067][T11783] ? tomoyo_mount_acl+0x840/0x840 [ 263.476083][T11783] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 263.476104][T11783] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 263.476119][T11783] ? strncpy_from_user+0x2b4/0x400 [ 263.476139][T11783] tomoyo_sb_mount+0x35/0x40 [ 263.517288][T11783] security_sb_mount+0x87/0xd0 [ 263.522229][T11783] do_mount+0x1d0/0x1d10 [ 263.526721][T11783] ? copy_mount_string+0x40/0x40 [ 263.531822][T11783] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 263.538248][T11783] ? copy_mount_options+0x2e8/0x3f0 [ 263.543444][T11783] ksys_mount+0xdb/0x150 [ 263.547790][T11783] __x64_sys_mount+0xbe/0x150 [ 263.552465][T11783] do_syscall_64+0xfa/0x760 [ 263.556962][T11783] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 263.562926][T11783] RIP: 0033:0x45c47a [ 263.566806][T11783] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 263.588795][T11783] RSP: 002b:00007fcc4938da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 263.597193][T11783] RAX: ffffffffffffffda RBX: 00007fcc4938db40 RCX: 000000000045c47a [ 263.605576][T11783] RDX: 00007fcc4938dae0 RSI: 0000000020000040 RDI: 00007fcc4938db00 [ 263.613544][T11783] RBP: 0000000000000000 R08: 00007fcc4938db40 R09: 00007fcc4938dae0 [ 263.621518][T11783] R10: 00000000008000a6 R11: 0000000000000206 R12: 0000000000000004 [ 263.629733][T11783] R13: 00000000004c8b7b R14: 00000000004dfc28 R15: 0000000000000003 [ 263.637961][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 263.644589][ C1] protocol 88fb is buggy, dev hsr_slave_1 00:19:47 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents64(r0, &(0x7f0000002100)=""/4096, 0x13c3) getdents64(r0, 0x0, 0xfd5c) openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x280000) 00:19:47 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:19:47 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xffffff8c, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xa00}}], [], 0x700}) 00:19:47 executing program 0 (fault-call:2 fault-nth:42): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x700}) 00:19:47 executing program 3: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f454c44065b050073118ce83feba746d2f6778c7d0be4de0842d8ab9ba8738c7592bbf57e75ef9b589bd7d0c15090b000"/59], 0xa) r6 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) close(r2) r7 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) [ 265.022288][T11807] netlink: 'syz-executor.4': attribute type 15 has an invalid length. [ 265.053450][T11806] FAULT_INJECTION: forcing a failure. [ 265.053450][T11806] name failslab, interval 1, probability 0, space 0, times 0 00:19:47 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:19:47 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents64(r0, &(0x7f0000002100)=""/4096, 0x13c3) getdents64(r0, 0x0, 0xfd5c) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r1, r2, &(0x7f0000000040)=0x100000, 0x8001) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)=0x0) r5 = syz_init_net_socket$rose(0xb, 0x5, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f00000000c0)=0xc) keyctl$get_persistent(0x4, r6, 0xffffffffffffffff) r7 = socket$inet6(0xa, 0x2, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r7, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r7, r8, &(0x7f0000000040)=0x100000, 0x8001) ftruncate(r8, 0x2) getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0) setsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000180)={r4, r6, r9}, 0xc) [ 265.104571][T11806] CPU: 1 PID: 11806 Comm: syz-executor.0 Not tainted 5.3.0+ #0 [ 265.112509][T11806] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 265.125523][T11806] Call Trace: [ 265.128834][T11806] dump_stack+0x172/0x1f0 [ 265.133197][T11806] should_fail.cold+0xa/0x15 [ 265.137807][T11806] ? fault_create_debugfs_attr+0x180/0x180 [ 265.145026][T11806] ? ___might_sleep+0x163/0x2c0 [ 265.150861][T11806] __should_failslab+0x121/0x190 [ 265.155817][T11806] should_failslab+0x9/0x14 [ 265.160350][T11806] __kmalloc_track_caller+0x2dc/0x760 [ 265.165743][T11806] ? save_stack+0x5c/0x90 [ 265.165758][T11806] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 265.165770][T11806] ? __kmalloc_track_caller+0x15f/0x760 [ 265.165784][T11806] ? kstrdup+0x3a/0x70 [ 265.165798][T11806] ? ext4_remount+0xf1/0x22d0 [ 265.165817][T11806] ? legacy_reconfigure+0x124/0x180 [ 265.177203][T11806] ? match_number.isra.0+0x8d/0x190 [ 265.177225][T11806] kmemdup_nul+0x31/0xa0 [ 265.177240][T11806] match_number.isra.0+0x8d/0x190 [ 265.177252][T11806] ? match_token+0x2c9/0x5b0 [ 265.177265][T11806] ? match_strdup+0x80/0x80 [ 265.177277][T11806] ? match_wildcard+0x320/0x320 [ 265.177295][T11806] match_int+0x5a/0x80 [ 265.177312][T11806] parse_options+0xf5a/0x23e0 [ 265.177337][T11806] ? clear_qf_name+0x1f0/0x1f0 [ 265.239544][T11806] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 265.245629][T11806] ? __kmalloc_track_caller+0x5f8/0x760 [ 265.246783][T11822] netlink: 'syz-executor.4': attribute type 15 has an invalid length. [ 265.251189][T11806] ? memcpy+0x46/0x50 [ 265.251214][T11806] ext4_remount+0x54c/0x22d0 [ 265.251246][T11806] ? ext4_register_li_request+0x7f0/0x7f0 [ 265.274190][T11806] ? shrink_dentry_list+0x39e/0x4a0 [ 265.279411][T11806] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 265.285235][T11806] ? find_next_bit+0x107/0x130 [ 265.290015][T11806] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 265.296360][T11806] ? shrink_dentry_list+0x4a0/0x4a0 [ 265.301576][T11806] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 265.307920][T11806] ? apparmor_capable+0x2ed/0x630 [ 265.312999][T11806] ? cap_capable+0x205/0x270 [ 265.317613][T11806] ? ext4_register_li_request+0x7f0/0x7f0 [ 265.323658][T11806] legacy_reconfigure+0x124/0x180 [ 265.328789][T11806] reconfigure_super+0x2eb/0x920 [ 265.333745][T11806] ? fs_umode_to_dtype+0xb0/0xb0 [ 265.338701][T11806] do_mount+0x167b/0x1d10 [ 265.343034][T11806] ? copy_mount_string+0x40/0x40 [ 265.343052][T11806] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 265.343066][T11806] ? _copy_from_user+0x12c/0x1a0 [ 265.343088][T11806] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 265.354367][T11806] ? copy_mount_options+0x2e8/0x3f0 [ 265.354388][T11806] ksys_mount+0xdb/0x150 [ 265.354406][T11806] __x64_sys_mount+0xbe/0x150 [ 265.354425][T11806] do_syscall_64+0xfa/0x760 [ 265.354444][T11806] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 265.390894][T11806] RIP: 0033:0x45c47a [ 265.394800][T11806] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 265.415064][T11806] RSP: 002b:00007fcc4938da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 265.423742][T11806] RAX: ffffffffffffffda RBX: 00007fcc4938db40 RCX: 000000000045c47a [ 265.431797][T11806] RDX: 00007fcc4938dae0 RSI: 0000000020000040 RDI: 00007fcc4938db00 [ 265.439866][T11806] RBP: 0000000000000000 R08: 00007fcc4938db40 R09: 00007fcc4938dae0 [ 265.447874][T11806] R10: 00000000008000a6 R11: 0000000000000206 R12: 0000000000000004 [ 265.456112][T11806] R13: 00000000004c8b7b R14: 00000000004dfc28 R15: 0000000000000003 [ 265.502345][T11810] EXT4-fs (sda1): required extra inode space not available [ 265.511010][T11810] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000a00, [ 265.541861][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 265.548380][ C0] protocol 88fb is buggy, dev hsr_slave_1 00:19:48 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='sessioXid\x00\xb7\xe3\x1a\xd9\xb7\xa9H%uO\xe7\x9c\x98{\x01yu(\x81\x18\f\x028\t\x8a\xd1\x84\xa9 I\xaf\xdbVm\"\\\xa0b\xb2\xfb\xc6i\xe6&\x8e\xa4qZv\x823\xd2\xc5(\xf8,\xd2\x1b9\xad\x8c\tr\x81u_\xf5J?\x8f^\xd4\xc6w\xc4\x7f\x93\x13+ew\x9d\xe3\xac\xc06\xb9\xf3\xf1J\b\x16 \xe2E\xf0.\x00\x00\x00\x00\x80\x00\x00\x00\x01\x00\x00<\xbf\xc1b2\x13R!\x1e]\xeaq\x81\r\xbb\xd5\x00\x91\x9d\v\x18\xa1\x06Z\x1fm\xf1\x1d/\xed\x9e\xf3\xfb]\x9bb^\x1a\x1a,~pd\x10\x1e\x84M\xec\x80\'\x81j\xf23\x1e#\xea\xddG\xdf\xb2x\xc3v\x04L\x92?:\xa7\xec\x01e\x16\x01\xe6\x03\x13\xdbi\"u\xeb\xe6|\xa8/\x8b\x8b{@rG\x8d\xa1\xed\xe2\x99\xa0\\\xf6F]\xbdg\xf6\x86\t\a\xf6\x8e\x8e\xf47\xeebz\xce|Q\x97\a\xae\xda$1]nb\xdax\xcf\x92X\x84\x8d\xa4\xab;m\x94\xfeR\xf6\xcb$\x8b\xc2V\xac\n(\xcd\x00\x10\xd2\xbf;\x04\x00\x00\x00\x00\x00\x002\xfc\xfdx}=') getdents64(r0, &(0x7f0000002100)=""/4096, 0x13c3) 00:19:48 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents64(r0, &(0x7f0000002100)=""/4096, 0x13c3) getdents64(r0, 0x0, 0xfd5c) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1}, 0x1c) r3 = dup3(r0, r1, 0x80000) write$FUSE_NOTIFY_STORE(r3, &(0x7f00000000c0)=ANY=[@ANYBLOB="2900e9ff040200000000001ba9e8ec000000090002000000000000"], 0x29) sendfile(r1, r2, &(0x7f0000000040)=0xffffd, 0x68) ioctl$DRM_IOCTL_GET_MAP(r2, 0xc0286404, &(0x7f0000000000)={&(0x7f0000ffb000/0x4000)=nil, 0xfffffffffffffffe, 0x57baf959c4098cec, 0x10, &(0x7f0000000000/0x3000)=nil, 0xffff1e10}) 00:19:48 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:19:48 executing program 0 (fault-call:2 fault-nth:43): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x700}) [ 265.672172][T11833] netlink: 'syz-executor.4': attribute type 15 has an invalid length. [ 265.701940][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 265.707807][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 265.723094][T11834] FAULT_INJECTION: forcing a failure. [ 265.723094][T11834] name failslab, interval 1, probability 0, space 0, times 0 00:19:48 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents64(r0, &(0x7f0000002100)=""/4096, 0xfffffffffffffe98) getdents64(r0, 0x0, 0xfd5c) [ 265.785458][T11834] CPU: 1 PID: 11834 Comm: syz-executor.0 Not tainted 5.3.0+ #0 [ 265.793395][T11834] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 265.803548][T11834] Call Trace: [ 265.806944][T11834] dump_stack+0x172/0x1f0 [ 265.811300][T11834] should_fail.cold+0xa/0x15 [ 265.815926][T11834] ? fault_create_debugfs_attr+0x180/0x180 [ 265.821750][T11834] ? ___might_sleep+0x163/0x2c0 [ 265.826630][T11834] __should_failslab+0x121/0x190 [ 265.831593][T11834] should_failslab+0x9/0x14 [ 265.836109][T11834] kmem_cache_alloc_trace+0x2d3/0x790 [ 265.841496][T11834] ? apparmor_capable+0x2ed/0x630 [ 265.846706][T11834] ? cap_capable+0x205/0x270 [ 265.851311][T11834] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 265.857574][T11834] alloc_fs_context+0x5a/0x780 [ 265.862370][T11834] fs_context_for_reconfigure+0x73/0x90 [ 265.867936][T11834] do_mount+0x8bc/0x1d10 [ 265.872200][T11834] ? copy_mount_string+0x40/0x40 [ 265.877162][T11834] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 00:19:48 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) [ 265.883428][T11834] ? copy_mount_options+0x2e8/0x3f0 [ 265.888644][T11834] ksys_mount+0xdb/0x150 [ 265.892900][T11834] __x64_sys_mount+0xbe/0x150 [ 265.897592][T11834] do_syscall_64+0xfa/0x760 [ 265.902113][T11834] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 265.908036][T11834] RIP: 0033:0x45c47a [ 265.911951][T11834] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 00:19:48 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xfffffff6, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xa00}}], [], 0x700}) 00:19:48 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents64(r0, &(0x7f0000002100)=""/4096, 0x13c3) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) [ 265.931599][T11834] RSP: 002b:00007fcc4938da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 265.940030][T11834] RAX: ffffffffffffffda RBX: 00007fcc4938db40 RCX: 000000000045c47a [ 265.948033][T11834] RDX: 00007fcc4938dae0 RSI: 0000000020000040 RDI: 00007fcc4938db00 [ 265.955496][T11848] netlink: 'syz-executor.4': attribute type 15 has an invalid length. [ 265.956012][T11834] RBP: 0000000000000000 R08: 00007fcc4938db40 R09: 00007fcc4938dae0 [ 265.956022][T11834] R10: 00000000008000a6 R11: 0000000000000206 R12: 0000000000000004 [ 265.956032][T11834] R13: 00000000004c8b7b R14: 00000000004dfc28 R15: 0000000000000003 00:19:48 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x28001) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x55, 0x2}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$evdev(r0, &(0x7f0000000040)=[{}, {}], 0x52a) 00:19:48 executing program 3: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f454c44065b050073118ce83feba746d2f6778c7d0be4de0842d8ab9ba8738c7592bbf57e75ef9b589bd7d0c15090b000"/59], 0xa) r6 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) close(r2) r7 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) 00:19:48 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:19:48 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x100000000000000, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xa00}}], [], 0x700}) 00:19:48 executing program 0 (fault-call:2 fault-nth:44): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x700}) [ 266.181832][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 266.181865][ C1] protocol 88fb is buggy, dev hsr_slave_1 00:19:49 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:19:49 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x800000000000012, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 266.485637][T11886] FAULT_INJECTION: forcing a failure. [ 266.485637][T11886] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 266.498891][T11886] CPU: 1 PID: 11886 Comm: syz-executor.0 Not tainted 5.3.0+ #0 [ 266.506793][T11886] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 266.516887][T11886] Call Trace: [ 266.520203][T11886] dump_stack+0x172/0x1f0 [ 266.524561][T11886] should_fail.cold+0xa/0x15 [ 266.529168][T11886] ? __kmalloc+0x163/0x770 [ 266.533612][T11886] ? fault_create_debugfs_attr+0x180/0x180 [ 266.539434][T11886] ? do_mount+0x1d0/0x1d10 [ 266.543902][T11886] ? ksys_mount+0xdb/0x150 [ 266.548332][T11886] ? __x64_sys_mount+0xbe/0x150 [ 266.553205][T11886] ? do_syscall_64+0xfa/0x760 [ 266.557905][T11886] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 266.564024][T11886] should_fail_alloc_page+0x50/0x60 [ 266.569260][T11886] __alloc_pages_nodemask+0x1a1/0x8f0 [ 266.574656][T11886] ? kernel_text_address+0x73/0xf0 [ 266.579791][T11886] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 266.581537][T11891] netlink: 'syz-executor.4': attribute type 15 has an invalid length. [ 266.585585][T11886] ? unwind_get_return_address+0x61/0xa0 [ 266.585598][T11886] ? profile_setup.cold+0xbb/0xbb [ 266.585620][T11886] ? fault_create_debugfs_attr+0x180/0x180 [ 266.585640][T11886] cache_grow_begin+0x90/0xd20 [ 266.585655][T11886] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 266.585671][T11886] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 266.585693][T11886] __kmalloc+0x6b2/0x770 [ 266.631170][T11886] ? __kmalloc+0x608/0x770 [ 266.635575][T11886] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 266.641281][T11886] tomoyo_realpath_from_path+0xcd/0x7b0 [ 266.646816][T11886] tomoyo_mount_acl+0x149/0x840 [ 266.651660][T11886] ? __kasan_check_read+0x11/0x20 [ 266.656675][T11886] ? mark_lock+0xc2/0x1220 [ 266.661093][T11886] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 266.666630][T11886] ? __kasan_check_read+0x11/0x20 [ 266.671643][T11886] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 266.677807][T11886] ? lock_acquire+0x190/0x410 [ 266.682469][T11886] ? tomoyo_mount_permission+0x10a/0x410 [ 266.688090][T11886] tomoyo_mount_permission+0x16a/0x410 [ 266.693552][T11886] ? tomoyo_mount_permission+0x10a/0x410 [ 266.699167][T11886] ? tomoyo_mount_acl+0x840/0x840 [ 266.704176][T11886] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 266.710405][T11886] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 266.716982][T11886] ? strncpy_from_user+0x2b4/0x400 [ 266.722099][T11886] tomoyo_sb_mount+0x35/0x40 [ 266.726677][T11886] security_sb_mount+0x87/0xd0 [ 266.731441][T11886] do_mount+0x1d0/0x1d10 [ 266.735688][T11886] ? copy_mount_string+0x40/0x40 [ 266.740612][T11886] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 266.746837][T11886] ? copy_mount_options+0x2e8/0x3f0 [ 266.752023][T11886] ksys_mount+0xdb/0x150 [ 266.756253][T11886] __x64_sys_mount+0xbe/0x150 [ 266.760957][T11886] do_syscall_64+0xfa/0x760 [ 266.765463][T11886] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 266.771352][T11886] RIP: 0033:0x45c47a [ 266.775251][T11886] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 266.794838][T11886] RSP: 002b:00007fcc4938da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 266.803270][T11886] RAX: ffffffffffffffda RBX: 00007fcc4938db40 RCX: 000000000045c47a [ 266.811247][T11886] RDX: 00007fcc4938dae0 RSI: 0000000020000040 RDI: 00007fcc4938db00 [ 266.819209][T11886] RBP: 0000000000000000 R08: 00007fcc4938db40 R09: 00007fcc4938dae0 [ 266.827178][T11886] R10: 00000000008000a6 R11: 0000000000000206 R12: 0000000000000004 [ 266.835143][T11886] R13: 00000000004c8b7b R14: 00000000004dfc28 R15: 0000000000000003 00:19:49 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:19:49 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x200000000000000, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xa00}}], [], 0x700}) [ 267.017654][T11898] netlink: 'syz-executor.4': attribute type 15 has an invalid length. 00:19:49 executing program 1: syz_emit_ethernet(0x3a, &(0x7f0000000000)={@random="37cf8e1a23d5", @empty, [], {@ipv4={0x800, {{0x9, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @broadcast, {[@timestamp={0x44, 0x10, 0x7, 0x1, 0x0, [{[@loopback]}, {}]}]}}}}}}, 0x0) 00:19:49 executing program 3: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000200), 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f454c44065b050073118ce83feba746d2f6778c7d0be4de0842d8ab9ba8738c7592bbf57e75ef9b589bd7d0c15090b000"/59], 0xa) r6 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) close(r2) r7 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) 00:19:49 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:19:49 executing program 0 (fault-call:2 fault-nth:45): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x700}) 00:19:49 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x800000000000012, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, 0x0) [ 267.259983][T11914] netlink: 'syz-executor.4': attribute type 15 has an invalid length. [ 267.345366][T11912] EXT4-fs: 11 callbacks suppressed [ 267.345379][T11912] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 00:19:49 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x300000000000000, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xa00}}], [], 0x700}) 00:19:50 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) [ 267.421584][T11912] FAULT_INJECTION: forcing a failure. [ 267.421584][T11912] name failslab, interval 1, probability 0, space 0, times 0 [ 267.531936][T11912] CPU: 1 PID: 11912 Comm: syz-executor.0 Not tainted 5.3.0+ #0 [ 267.539528][T11912] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 267.539536][T11912] Call Trace: [ 267.539563][T11912] dump_stack+0x172/0x1f0 [ 267.539586][T11912] should_fail.cold+0xa/0x15 [ 267.539607][T11912] ? fault_create_debugfs_attr+0x180/0x180 [ 267.567646][T11912] ? ___might_sleep+0x163/0x2c0 [ 267.572524][T11912] __should_failslab+0x121/0x190 [ 267.577479][T11912] should_failslab+0x9/0x14 [ 267.581990][T11912] __kmalloc+0x2e0/0x770 [ 267.586294][T11912] ? mark_held_locks+0xf0/0xf0 [ 267.591075][T11912] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 267.596939][T11912] tomoyo_realpath_from_path+0xcd/0x7b0 [ 267.596958][T11912] ? tomoyo_path_number_perm+0x193/0x520 [ 267.596981][T11912] tomoyo_path_number_perm+0x1dd/0x520 [ 267.596995][T11912] ? tomoyo_path_number_perm+0x193/0x520 [ 267.597016][T11912] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 267.625037][T11912] ? save_stack+0x5c/0x90 [ 267.629359][T11912] ? save_stack+0x23/0x90 [ 267.629400][T11912] ? __fget+0x384/0x560 [ 267.637849][T11912] ? ksys_dup3+0x3e0/0x3e0 [ 267.642280][T11912] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 267.644343][T11926] EXT4-fs (sda1): required extra inode space not available [ 267.647838][T11912] tomoyo_file_ioctl+0x23/0x30 [ 267.647858][T11912] security_file_ioctl+0x77/0xc0 [ 267.647878][T11912] ksys_ioctl+0x57/0xd0 [ 267.647899][T11912] __x64_sys_ioctl+0x73/0xb0 [ 267.673498][T11912] do_syscall_64+0xfa/0x760 [ 267.678002][T11912] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 267.683893][T11912] RIP: 0033:0x459897 [ 267.687789][T11912] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 267.708529][T11912] RSP: 002b:00007fcc4938da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 267.716958][T11912] RAX: ffffffffffffffda RBX: 00007fcc4938db40 RCX: 0000000000459897 [ 267.724945][T11912] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 00:19:50 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(0xffffffffffffffff, 0x800442d4, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(0xffffffffffffffff, 0x400448c8, 0x0) syz_emit_ethernet(0x3e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x33, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x5, 0x4, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, 0x0) [ 267.732932][T11912] RBP: 0000000000000000 R08: 00007fcc4938db40 R09: 00007fcc4938dae0 [ 267.740914][T11912] R10: 00000000008000a6 R11: 0000000000000246 R12: 0000000000000004 [ 267.748895][T11912] R13: 00000000004c8b7b R14: 00000000004dfc28 R15: 0000000000000003 [ 267.758326][T11926] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000a00, 00:19:50 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(0xffffffffffffffff, 0x800442d4, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(0xffffffffffffffff, 0x400448c8, 0x0) syz_emit_ethernet(0x3e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x33, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x5, 0x4, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, 0x0) [ 267.839323][T11912] ERROR: Out of memory at tomoyo_realpath_from_path. [ 267.846435][T11935] netlink: 'syz-executor.4': attribute type 15 has an invalid length. 00:19:50 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xa00}}], [], 0x700}) 00:19:50 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:19:50 executing program 0 (fault-call:2 fault-nth:46): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x700}) 00:19:50 executing program 1: openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x4000) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000100)) poll(&(0x7f00000001c0)=[{0xffffffffffffffff, 0x100}, {}, {}, {r0, 0x2}], 0x4, 0x7) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) syz_emit_ethernet(0x3e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0xffffff89, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x5, 0x4, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, 0x0) 00:19:50 executing program 3: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000200), 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f454c44065b050073118ce83feba746d2f6778c7d0be4de0842d8ab9ba8738c7592bbf57e75ef9b589bd7d0c15090b000"/59], 0xa) r6 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) close(r2) r7 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) [ 268.132913][T11944] netlink: 'syz-executor.4': attribute type 15 has an invalid length. 00:19:50 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) [ 268.286539][T11954] EXT4-fs (sda1): required extra inode space not available [ 268.299306][T11953] FAULT_INJECTION: forcing a failure. [ 268.299306][T11953] name failslab, interval 1, probability 0, space 0, times 0 00:19:50 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net\x00\x04lc\x00Z\xf7\xa6k\b\x18\\p\xacmi4\x9b^\xaa]\xcb\x8e\x15\xf6\xcd4\xcf\xbd\xd7B@i\xb4\xe2\xbe:R\xfa\xf6\xfc\x99 QI\x9cRT\x93N\xf4\xcd}\x8d&$\xdb8*\xcdA\xeb\xd6\x8b\x88\xd5\x82Jd\x91\xc6\x81\xecg\x16\xef\xfc\x19\xc1\x0e{\xc4L\x8f\xa0\xf5A\\\xa5\x87H\xa4\x1f\x0fx?Q?\xcc\xa3B\xe8\xa1\xb7\xc7\xe9\n\x8a,\xd7c\xd2\x99\xbc\xbb\xfc\\\xa3\xc7\xbbRl\xf1\x91\xa8u\x7f\x86\xde\x06\xda\xa3\x8e\x8e\xa9h`G\xe7wE\xa8\xdf\xb9\x1a\xb2;\xfe\"?\x00\xf0$\xfe\x96\xc7#\x1c\xa58\xe2\x1f\x141K\xf7\x83_\x03N\xa1u\xd6\x89GD\xa8\"\x0e\xc9\xc3\x00\xb7\x83w\xea3\x98\x89\xa5V\x8c\x00\x99M;\xf3k\x14\x95\x86\xdf\rj\x10\xf1m\xf1\xdc\xd0N$') r1 = socket$inet(0xa, 0x801, 0x84) listen(r1, 0x100000000000008) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r2, r3, &(0x7f0000000040)=0x100000, 0x8001) r4 = shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x6000) shmdt(r4) shmdt(r4) ioctl$SCSI_IOCTL_SYNC(r3, 0x4) getdents64(r0, &(0x7f0000002100)=""/4096, 0x13c3) [ 268.379639][T11954] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000a00, [ 268.411388][T11967] netlink: 'syz-executor.4': attribute type 15 has an invalid length. [ 268.416039][T11953] CPU: 1 PID: 11953 Comm: syz-executor.0 Not tainted 5.3.0+ #0 [ 268.427146][T11953] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 268.437215][T11953] Call Trace: [ 268.440522][T11953] dump_stack+0x172/0x1f0 [ 268.444869][T11953] should_fail.cold+0xa/0x15 [ 268.449478][T11953] ? fault_create_debugfs_attr+0x180/0x180 [ 268.455310][T11953] ? ___might_sleep+0x163/0x2c0 [ 268.460181][T11953] __should_failslab+0x121/0x190 [ 268.465136][T11953] should_failslab+0x9/0x14 [ 268.469664][T11953] kmem_cache_alloc_trace+0x2d3/0x790 [ 268.475052][T11953] ? apparmor_capable+0x2ed/0x630 [ 268.480095][T11953] ? cap_capable+0x205/0x270 [ 268.484699][T11953] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 268.491137][T11953] alloc_fs_context+0x5a/0x780 [ 268.495930][T11953] fs_context_for_reconfigure+0x73/0x90 [ 268.501498][T11953] do_mount+0x8bc/0x1d10 [ 268.505765][T11953] ? copy_mount_string+0x40/0x40 [ 268.510737][T11953] ? copy_mount_options+0x241/0x3f0 [ 268.515960][T11953] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 268.522215][T11953] ? copy_mount_options+0x2e8/0x3f0 00:19:51 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:19:51 executing program 1: openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x4000) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000100)) poll(&(0x7f00000001c0)=[{0xffffffffffffffff, 0x100}, {}, {}, {r0, 0x2}], 0x4, 0x7) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) syz_emit_ethernet(0x3e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0xffffff89, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x5, 0x4, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, 0x0) [ 268.527441][T11953] ksys_mount+0xdb/0x150 [ 268.531700][T11953] __x64_sys_mount+0xbe/0x150 [ 268.536409][T11953] do_syscall_64+0xfa/0x760 [ 268.540934][T11953] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 268.546832][T11953] RIP: 0033:0x45c47a [ 268.550739][T11953] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 268.570360][T11953] RSP: 002b:00007fcc4938da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 268.578783][T11953] RAX: ffffffffffffffda RBX: 00007fcc4938db40 RCX: 000000000045c47a [ 268.587132][T11953] RDX: 00007fcc4938dae0 RSI: 0000000020000040 RDI: 00007fcc4938db00 [ 268.595119][T11953] RBP: 0000000000000000 R08: 00007fcc4938db40 R09: 00007fcc4938dae0 [ 268.603106][T11953] R10: 00000000008000a6 R11: 0000000000000206 R12: 0000000000000004 [ 268.611275][T11953] R13: 00000000004c8b7b R14: 00000000004dfc28 R15: 0000000000000003 00:19:51 executing program 2: r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000400)={'syz'}, &(0x7f00000001c0)="04", 0x1, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000001740)='user\x00', &(0x7f0000000440)={'y]\xbd'}, &(0x7f0000001780)="646d234ef9258d4dcbbbe0404df284bef9d50d6a43aac9b7adcab3cd3eff53ff61ddb3eb53046ed5a4ab992876121218c0d0f8e448bad6bcd3616391c614d281b18962a7b4233202f1b911fe8c5728fefd40cc7470daad2224874c41e2dbd81b2ad818f831eeecf296c0b814ce03a194aa508ba1b36970eb3e05d69e5b09732671f2088e5dce9a2ef05e970a33363d508ae672739b84007e43791ac16c91", 0x9e, 0xfffffffffffffffd) bind$inet6(0xffffffffffffffff, &(0x7f0000001700)={0xa, 0x4e20, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x101}, 0x1c) keyctl$dh_compute(0x17, &(0x7f0000000040)={r1, r0, r1}, 0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)={'sha256-ni\x00'}}) r2 = gettid() r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/autofs\x00', 0x8ddafc6701ee8d20, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r4, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r4, r5, &(0x7f0000000040)=0x100000, 0x8001) ioctl$PPPIOCCONNECT(r5, 0x4004743a, &(0x7f0000001940)) ioctl$KDGKBMODE(r3, 0x4b44, &(0x7f0000001600)) tkill(r2, 0x1002000000016) r6 = getpgrp(r2) tkill(r6, 0x15) r7 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, r7) r8 = request_key(&(0x7f0000000040)='syzkaller\x00', &(0x7f0000001440)={'syz', 0x3}, &(0x7f0000001480)='ns\x00', r7) keyctl$instantiate_iov(0x14, r1, &(0x7f00000013c0)=[{&(0x7f00000000c0)="a267c5914b26ad05417f7114513fed9f3511029c69115c4326757885b7f56283ce0821c218dfcd69d0357cc9bfdef0cfc15a075c79398ab3fdb2c000216d2fbc5d06b2ca3106b94d773d18a9470aa168dcdd133363f8966acb48610af8d1d6f336206f83fb71a62eceb47b45fce1b4b36a9583072b616afb57df997cfa3b09000b35c9bb28065e031456592b8da42e23a1850ba01b955fbbf1085cdadce6af9c4d819e0a9341cc750600000000000000b7f387f956dc59772b97f46b80615010efef4912d64f59f4d6a1c49258c8d7b131b62236ddfe5658a8fd0aeac1540377d1d3c49789f91257cf771f295ed0", 0xee}, {&(0x7f0000000000)="b81fb3bf92803e15915565f401a523092e05a6212cbc75", 0x17}, {&(0x7f00000001c0)="32cca3253edf8d3cb18d7b58391557c72a97cd67e4b2314ff480573be0038ebdfdd48b4cb52edb2910029239869827d0f85707bcb42ae7b5385fea02d51ffe0cb3564438992cebd8c771c5ade8c85402e6804ebd1feb64fbc79dc33374fe73727f4b439bea1f5a99a8daa5f574f73287b268932cfb9b88cceaede6c1f9e887da796ebc50c5758a8e5a6d3d811502cffffc9dd6", 0x17c}, {&(0x7f0000000280)="90c24fe4021e8a0ff3ce9f2a929380a593bd078974986f660e99a4b1ca37a8970479c3737bed4d768323cd80ef9fe62913cb6c26cf64573806390cc6369e80875e8381ef64009b5462f51120043ff5430a9d436563f4e1", 0x57}, {&(0x7f0000000300)="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", 0x1000}, {&(0x7f0000001300)="1dcbf2408f14fdc6d29af27ffac42e22305c03f9507e3c6d9b9c88e2f24f159f7696a1a24d8e3c1c19db00471fc95efbdb27abcf9bcb8d7a7b3ccd6e86fb909a2c2095d2644ed1b8d36816e4d40a7bc1d11d3b649a96c2acc4eb878cf62df21f358a0ecaa89f165600e19601ae95b36ed3dae4d7d1667c3c94269983662fe67f583d4c020e3e15e2fd83617fe90fc70725943a8e35dc29b25ab8ad4818fa0d", 0x9f}], 0x1ec, r8) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') open(&(0x7f0000001500)='./file0\x00', 0x202000, 0x1) r10 = syz_open_dev$cec(&(0x7f00000014c0)='/dev/cec#\x00', 0x1, 0x2) ioctl$sock_inet_SIOCDARP(r3, 0x8953, &(0x7f0000001840)={{0x2, 0x4e24, @remote}, {0x1, @dev={[], 0xc}}, 0x20, {0x2, 0x4e24, @remote}, 'bridge0\x00'}) ioctl$BLKTRACESTOP(r10, 0x1275, 0x0) getdents64(r9, &(0x7f0000002100)=""/4096, 0x13c3) r11 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000001680)='/dev/qat_adf_ctl\x00', 0x125480, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000016c0)={&(0x7f0000001640)='./file0\x00', r11}, 0x10) r12 = socket$inet6(0xa, 0x2, 0x0) r13 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r12, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r12, r13, &(0x7f0000000040)=0x100000, 0x8001) perf_event_open(&(0x7f00000018c0)={0x0, 0x70, 0x6, 0x1f, 0x0, 0x71, 0x0, 0x8, 0x40000, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7e00, 0x1, @perf_config_ext={0xff2, 0xffffffffffffffff}, 0x200, 0x7f, 0x0, 0x7, 0x9709, 0x65f8, 0x6}, 0x0, 0xa, r13, 0x18) r14 = syz_open_dev$usb(&(0x7f0000001540)='/dev/bus/usb/00#/00#\x00', 0x400, 0x0) ioctl$BLKDISCARD(r14, 0x1277, &(0x7f0000001580)=0xcf15) [ 268.674431][T11978] EXT4-fs (sda1): required extra inode space not available [ 268.706789][T11982] netlink: 'syz-executor.4': attribute type 15 has an invalid length. [ 268.731836][T11978] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000a00, 00:19:51 executing program 0 (fault-call:2 fault-nth:47): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x700}) 00:19:51 executing program 1: openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x4000) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000100)) poll(&(0x7f00000001c0)=[{0xffffffffffffffff, 0x100}, {}, {}, {r0, 0x2}], 0x4, 0x7) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) syz_emit_ethernet(0x3e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0xffffff89, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x5, 0x4, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, 0x0) 00:19:51 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x500000000000000, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xa00}}], [], 0x700}) 00:19:51 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) [ 268.963413][T11986] could not allocate digest TFM handle sha256-ni [ 269.010006][T11998] FAULT_INJECTION: forcing a failure. [ 269.010006][T11998] name failslab, interval 1, probability 0, space 0, times 0 [ 269.062006][T12003] netlink: 'syz-executor.4': attribute type 15 has an invalid length. [ 269.074793][T11998] CPU: 0 PID: 11998 Comm: syz-executor.0 Not tainted 5.3.0+ #0 [ 269.082403][T11998] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 269.092484][T11998] Call Trace: [ 269.095794][T11998] dump_stack+0x172/0x1f0 [ 269.100146][T11998] should_fail.cold+0xa/0x15 [ 269.104767][T11998] ? fault_create_debugfs_attr+0x180/0x180 [ 269.110592][T11998] ? ___might_sleep+0x163/0x2c0 [ 269.115467][T11998] __should_failslab+0x121/0x190 [ 269.120421][T11998] should_failslab+0x9/0x14 [ 269.124939][T11998] kmem_cache_alloc_trace+0x2d3/0x790 [ 269.130330][T11998] ? apparmor_capable+0x2ed/0x630 [ 269.135371][T11998] ? cap_capable+0x205/0x270 [ 269.139971][T11998] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 269.146224][T11998] alloc_fs_context+0x5a/0x780 [ 269.146246][T11998] fs_context_for_reconfigure+0x73/0x90 [ 269.146269][T11998] do_mount+0x8bc/0x1d10 [ 269.156558][T11998] ? copy_mount_string+0x40/0x40 [ 269.156580][T11998] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 269.156595][T11998] ? copy_mount_options+0x2e8/0x3f0 [ 269.156615][T11998] ksys_mount+0xdb/0x150 [ 269.156638][T11998] __x64_sys_mount+0xbe/0x150 [ 269.186116][T11998] do_syscall_64+0xfa/0x760 [ 269.190667][T11998] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 269.192782][T12006] EXT4-fs (sda1): required extra inode space not available [ 269.196562][T11998] RIP: 0033:0x45c47a 00:19:51 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:19:51 executing program 3: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000200), 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f454c44065b050073118ce83feba746d2f6778c7d0be4de0842d8ab9ba8738c7592bbf57e75ef9b589bd7d0c15090b000"/59], 0xa) r6 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) close(r2) r7 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) [ 269.196579][T11998] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 269.196587][T11998] RSP: 002b:00007fcc4938da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 269.196601][T11998] RAX: ffffffffffffffda RBX: 00007fcc4938db40 RCX: 000000000045c47a [ 269.196616][T11998] RDX: 00007fcc4938dae0 RSI: 0000000020000040 RDI: 00007fcc4938db00 [ 269.220574][T12006] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000a00, 00:19:51 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 269.989330][T12040] RSP: 002b:00007fcc4938da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 269.997762][T12040] RAX: ffffffffffffffda RBX: 00007fcc4938db40 RCX: 0000000000459897 [ 270.005838][T12040] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 270.013828][T12040] RBP: 0000000000000000 R08: 00007fcc4938db40 R09: 00007fcc4938dae0 [ 270.021810][T12040] R10: 00000000008000a6 R11: 0000000000000246 R12: 0000000000000004 [ 270.029797][T12040] R13: 00000000004c8b7b R14: 00000000004dfc28 R15: 0000000000000003 [ 270.041904][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 270.047695][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 270.061970][T12040] ERROR: Out of memory at tomoyo_realpath_from_path. 00:19:54 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000200)=[{0x0}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f454c44065b050073118ce83feba746d2f6778c7d0be4de0842d8ab9ba8738c7592bbf57e75ef9b589bd7d0c15090b000"/59], 0xa) r6 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) close(r2) r7 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) [ 271.784412][T12063] netlink: 'syz-executor.4': attribute type 15 has an invalid length. [ 271.815014][T12066] FAULT_INJECTION: forcing a failure. [ 271.815014][T12066] name failslab, interval 1, probability 0, space 0, times 0 00:19:54 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) [ 271.911326][T12066] CPU: 0 PID: 12066 Comm: syz-executor.0 Not tainted 5.3.0+ #0 [ 271.918922][T12066] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 271.928991][T12066] Call Trace: [ 271.932310][T12066] dump_stack+0x172/0x1f0 [ 271.936665][T12066] should_fail.cold+0xa/0x15 [ 271.941263][T12066] ? fault_create_debugfs_attr+0x180/0x180 [ 271.947070][T12066] ? __kasan_check_read+0x11/0x20 [ 271.947089][T12066] __should_failslab+0x121/0x190 [ 271.947106][T12066] should_failslab+0x9/0x14 00:19:54 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) r2 = socket$nl_generic(0x10, 0x3, 0x10) accept4$bt_l2cap(r1, &(0x7f0000000180), &(0x7f00000001c0)=0xe, 0x100c00) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r3, 0x9195c46b19ebeeb7}, 0x14}}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, r3, 0x1, 0x70bd2d, 0x25dfdbfc, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000001}, 0x800) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents64(r4, &(0x7f0000002100)=""/4096, 0x13c3) [ 271.947118][T12066] kmem_cache_alloc+0x47/0x710 [ 271.947133][T12066] ? ___might_sleep+0x163/0x2c0 [ 271.947152][T12066] ? mempool_alloc+0x380/0x380 [ 271.947169][T12066] mempool_alloc_slab+0x47/0x60 [ 271.980929][T12066] mempool_alloc+0x169/0x380 [ 271.985544][T12066] ? mempool_destroy+0x40/0x40 [ 271.990339][T12066] ? ext4_register_li_request+0x1cc/0x7f0 [ 271.996083][T12066] ? __unlock_page_memcg+0x53/0x100 [ 272.001302][T12066] bio_alloc_bioset+0x3b9/0x680 [ 272.006171][T12066] ? bvec_alloc+0x2f0/0x2f0 00:19:54 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:19:54 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 272.180138][T12066] RSP: 002b:00007fcc4938da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 272.188563][T12066] RAX: ffffffffffffffda RBX: 00007fcc4938db40 RCX: 000000000045c47a [ 272.192521][T12080] validate_nla: 1 callbacks suppressed [ 272.192532][T12080] netlink: 'syz-executor.4': attribute type 15 has an invalid length. 00:19:54 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, &(0x7f00000000c0)={0x4, 0x3, 'client0\x00', 0xffffffff80000000, "426604a9a07f5318", "989cfbcee5d28db6a437e0c81787cd64d45aa2d7f79934a141743e35f2f7e0a8", 0x1, 0x1ff}) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r1, r2, &(0x7f0000000040)=0x100000, 0x8001) ioctl$KVM_GET_NESTED_STATE(r2, 0xc080aebe, &(0x7f0000003100)={0x0, 0x0, 0x2080}) getdents64(r0, &(0x7f0000002100)=""/4096, 0x13c3) getdents64(r0, &(0x7f0000000180)=""/142, 0x8e) [ 272.196540][T12066] RDX: 00007fcc4938dae0 RSI: 0000000020000040 RDI: 00007fcc4938db00 [ 272.196549][T12066] RBP: 0000000000000000 R08: 00007fcc4938db40 R09: 00007fcc4938dae0 [ 272.196558][T12066] R10: 00000000008000a6 R11: 0000000000000206 R12: 0000000000000004 [ 272.196567][T12066] R13: 00000000004c8b7b R14: 00000000004dfc28 R15: 0000000000000003 00:19:54 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:19:54 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x80\xc5\x06\xcd\x99\xf3\x15\x0f\x02\xd8\xa9\xa8@r\xbfJ\x01\x81(\x95E\x06\x9e\x8e\x16\x9e\xf0i\xc4\xf0\a\xec\x8dL\x05\xbe\xc8\x8f\xbe\x91\xab\xd2u}oz[\x16E\xcc(\xe8i(Lx^R4[\x9f\x01\xb7\xe5o\x81\x00\xcf\ttB#\xa3\x0fg\xdc+\xc6\xd8\xd5\xfee\xca\xfdv\xf9-0\xa3\xf0\xb6\x98\xe7o(]\x83\xbdb\x9d\xc5,>\xbb\xd6\xd3\xdaZ\x96\xfb;\xb2W\x92@|\x9a\xbfwq0jh;\'') getdents64(r0, &(0x7f0000002100)=""/4096, 0x13c3) 00:19:54 executing program 0 (fault-call:2 fault-nth:50): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x700}) [ 272.386188][T12089] EXT4-fs: 7 callbacks suppressed [ 272.386197][T12089] EXT4-fs (sda1): required extra inode space not available [ 272.421836][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 272.421841][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 272.421884][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 272.427679][ C0] protocol 88fb is buggy, dev hsr_slave_1 00:19:55 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000200)=[{0x0}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f454c44065b050073118ce83feba746d2f6778c7d0be4de0842d8ab9ba8738c7592bbf57e75ef9b589bd7d0c15090b000"/59], 0xa) r6 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) close(r2) r7 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) [ 272.646154][T12100] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 00:19:55 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) [ 272.732098][T12100] FAULT_INJECTION: forcing a failure. [ 272.732098][T12100] name failslab, interval 1, probability 0, space 0, times 0 [ 272.821480][T12100] CPU: 0 PID: 12100 Comm: syz-executor.0 Not tainted 5.3.0+ #0 [ 272.829114][T12100] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 272.839182][T12100] Call Trace: [ 272.842503][T12100] dump_stack+0x172/0x1f0 [ 272.846888][T12100] should_fail.cold+0xa/0x15 [ 272.851502][T12100] ? fault_create_debugfs_attr+0x180/0x180 [ 272.857351][T12100] ? ___might_sleep+0x163/0x2c0 [ 272.862218][T12100] __should_failslab+0x121/0x190 [ 272.867172][T12100] should_failslab+0x9/0x14 [ 272.871678][T12100] __kmalloc+0x2e0/0x770 [ 272.875938][T12100] ? preempt_schedule_irq+0xf3/0x160 [ 272.879579][T12119] netlink: 'syz-executor.4': attribute type 15 has an invalid length. [ 272.881230][T12100] ? retint_kernel+0x2b/0x2b [ 272.893948][T12100] ? tomoyo_encode2.part.0+0xf5/0x400 [ 272.899339][T12100] tomoyo_encode2.part.0+0xf5/0x400 [ 272.904552][T12100] tomoyo_encode+0x2b/0x50 [ 272.908973][T12100] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 272.914687][T12100] tomoyo_path_number_perm+0x1dd/0x520 [ 272.920153][T12100] ? tomoyo_path_number_perm+0x193/0x520 [ 272.925827][T12100] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 272.931643][T12100] ? save_stack+0x5c/0x90 [ 272.935972][T12100] ? save_stack+0x23/0x90 [ 272.940337][T12100] ? __fget+0x384/0x560 [ 272.944501][T12100] ? ksys_dup3+0x3e0/0x3e0 [ 272.948912][T12100] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 272.954482][T12100] tomoyo_file_ioctl+0x23/0x30 [ 272.959239][T12100] security_file_ioctl+0x77/0xc0 [ 272.964187][T12100] ksys_ioctl+0x57/0xd0 [ 272.968365][T12100] __x64_sys_ioctl+0x73/0xb0 [ 272.972964][T12100] do_syscall_64+0xfa/0x760 [ 272.977464][T12100] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 272.983353][T12100] RIP: 0033:0x459897 [ 272.987238][T12100] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 273.007174][T12100] RSP: 002b:00007fcc4938da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 00:19:55 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x800000000000012, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x803, 0x85) ioctl$SIOCGSTAMP(r3, 0x8906, 0x0) [ 273.195311][T12116] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000a00, [ 273.201901][T12100] ERROR: Out of memory at tomoyo_realpath_from_path. [ 273.231284][T12132] netlink: 'syz-executor.4': attribute type 15 has an invalid length. 00:19:55 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:19:55 executing program 0 (fault-call:2 fault-nth:51): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x700}) 00:19:55 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x900000000000000, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xa00}}], [], 0x700}) 00:19:56 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 273.949184][T12149] RSP: 002b:00007fcc4938da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 273.957859][T12149] RAX: ffffffffffffffda RBX: 00007fcc4938db40 RCX: 000000000045c47a [ 273.965824][T12149] RDX: 00007fcc4938dae0 RSI: 0000000020000040 RDI: 00007fcc4938db00 [ 273.973794][T12149] RBP: 0000000000000000 R08: 00007fcc4938db40 R09: 00007fcc4938dae0 [ 273.981756][T12149] R10: 00000000008000a6 R11: 0000000000000206 R12: 0000000000000004 [ 273.989725][T12149] R13: 00000000004c8b7b R14: 00000000004dfc28 R15: 0000000000000003 [ 274.008688][T12149] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 274.056587][T12161] netlink: 'syz-executor.4': attribute type 15 has an invalid length. [ 274.085030][T12159] EXT4-fs (sda1): required extra inode space not available 00:19:56 executing program 3: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000200)=[{0x0}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f454c44065b050073118ce83feba746d2f6778c7d0be4de0842d8ab9ba8738c7592bbf57e75ef9b589bd7d0c15090b000"/59], 0xa) r6 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) close(r2) r7 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) 00:19:56 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x800000000000012, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) getsockopt$sock_buf(r3, 0x1, 0x1c, 0x0, &(0x7f00000001c0)) 00:19:56 executing program 0 (fault-call:2 fault-nth:52): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x700}) 00:19:56 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) [ 274.119272][T12159] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000a00, 00:19:56 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 274.612486][T12174] RSP: 002b:00007fcc4938da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 274.621121][T12174] RAX: ffffffffffffffda RBX: 00007fcc4938db40 RCX: 0000000000459897 [ 274.629173][T12174] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 274.637138][T12174] RBP: 0000000000000000 R08: 00007fcc4938db40 R09: 00007fcc4938dae0 [ 274.645105][T12174] R10: 00000000008000a6 R11: 0000000000000246 R12: 0000000000000004 [ 274.653101][T12174] R13: 00000000004c8b7b R14: 00000000004dfc28 R15: 0000000000000003 00:19:57 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000000000)={&(0x7f0000ffb000/0x5000)=nil, 0x1000000, 0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r0, 0x4010641c, &(0x7f0000000340)={0x0, 0x0}) [ 274.774769][T12191] netlink: 'syz-executor.4': attribute type 15 has an invalid length. 00:19:57 executing program 0 (fault-call:2 fault-nth:53): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x700}) 00:19:57 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 275.362735][T12212] RSP: 002b:00007fcc4938da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 275.371184][T12212] RAX: ffffffffffffffda RBX: 00007fcc4938db40 RCX: 0000000000459897 [ 275.379165][T12212] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 00:19:57 executing program 3: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f454c44065b050073118ce83feba746d2f6778c7d0be4de0842d8ab9ba8738c7592bbf57e75ef9b589bd7d0c15090b000"/59], 0xa) r6 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) close(r2) r7 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) 00:19:57 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x10000000000004}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) connect$l2tp(r1, &(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) sendmmsg(r1, &(0x7f0000005fc0), 0xa9, 0x0) 00:19:57 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x2d00000000000000, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xa00}}], [], 0x700}) 00:19:57 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 275.961835][T12241] RSP: 002b:00007fcc4938da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 275.970269][T12241] RAX: ffffffffffffffda RBX: 00007fcc4938db40 RCX: 0000000000459897 [ 275.978261][T12241] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 275.986256][T12241] RBP: 0000000000000000 R08: 00007fcc4938db40 R09: 00007fcc4938dae0 [ 275.994238][T12241] R10: 00000000008000a6 R11: 0000000000000246 R12: 0000000000000004 [ 276.002220][T12241] R13: 00000000004c8b7b R14: 00000000004dfc28 R15: 0000000000000003 [ 276.021862][ C0] net_ratelimit: 12 callbacks suppressed [ 276.021870][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 276.027582][ C0] protocol 88fb is buggy, dev hsr_slave_1 00:19:58 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:19:58 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f454c44065b050073118ce83feba746d2f6778c7d0be4de0842d8ab9ba8738c7592bbf57e75ef9b589bd7d0c15090b000"/59], 0xa) r6 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) close(r2) r7 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) 00:19:59 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 276.866745][T12281] RSP: 002b:00007fcc4936ca88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 276.875169][T12281] RAX: ffffffffffffffda RBX: 00007fcc4936cb40 RCX: 000000000045c47a [ 276.883154][T12281] RDX: 00007fcc4936cae0 RSI: 0000000020000040 RDI: 00007fcc4936cb00 00:19:59 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) [ 276.891143][T12281] RBP: 0000000000000000 R08: 00007fcc4936cb40 R09: 00007fcc4936cae0 [ 276.899129][T12281] R10: 00000000008000a6 R11: 0000000000000206 R12: 0000000000000004 [ 276.907118][T12281] R13: 00000000004c8b7b R14: 00000000004dfc28 R15: 0000000000000003 [ 276.915383][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 276.921190][ C0] protocol 88fb is buggy, dev hsr_slave_1 00:19:59 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") recvmmsg(r1, &(0x7f0000003200)=[{{&(0x7f0000000600)=@rc, 0x80, &(0x7f0000000840)=[{&(0x7f0000001380)=""/4096, 0x1000}], 0x1}}, {{&(0x7f0000000940)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000a80)=[{&(0x7f00000009c0)=""/163, 0xa3}], 0x1, &(0x7f0000000ac0)=""/98, 0x62}, 0x6}, {{&(0x7f0000000b40)=@l2, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000bc0)=""/116, 0x74}, {&(0x7f0000000c40)=""/37, 0x25}, {&(0x7f0000000c80)=""/117, 0x75}, {&(0x7f0000000d00)=""/18, 0x12}, {&(0x7f0000000d40)=""/227, 0xe3}, {&(0x7f0000000e40)=""/11, 0xb}, {&(0x7f0000000e80)=""/154, 0x9a}], 0x7, &(0x7f0000000fc0)=""/142, 0x8e}, 0x6}, {{0x0, 0x0, &(0x7f0000002ac0)=[{&(0x7f0000004880)=""/4096, 0x1000}], 0x1}}], 0x4, 0x0, &(0x7f0000008000)={0x0, 0x989680}) 00:19:59 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xa00}}], [], 0x700}) 00:19:59 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f454c44065b050073118ce83feba746d2f6778c7d0be4de0842d8ab9ba8738c7592bbf57e75ef9b589bd7d0c15090b000"/59], 0xa) r6 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) close(r2) r7 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) 00:20:00 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x8600800000000000, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xa00}}], [], 0x700}) 00:20:00 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:20:00 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 277.815725][T12328] RSP: 002b:00007fcc4938da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 277.824142][T12328] RAX: ffffffffffffffda RBX: 00007fcc4938db40 RCX: 0000000000459897 [ 277.832115][T12328] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 277.840081][T12328] RBP: 0000000000000000 R08: 00007fcc4938db40 R09: 00007fcc4938dae0 [ 277.848048][T12328] R10: 00000000008000a6 R11: 0000000000000246 R12: 0000000000000004 [ 277.856010][T12328] R13: 00000000004c8b7b R14: 00000000004dfc28 R15: 0000000000000003 00:20:00 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:20:00 executing program 0 (fault-call:2 fault-nth:57): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x700}) 00:20:00 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 278.587714][T12361] RSP: 002b:00007fcc4938da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 278.596118][T12361] RAX: ffffffffffffffda RBX: 00007fcc4938db40 RCX: 0000000000459897 [ 278.604319][T12361] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 278.612412][T12361] RBP: 0000000000000000 R08: 00007fcc4938db40 R09: 00007fcc4938dae0 [ 278.620393][T12361] R10: 00000000008000a6 R11: 0000000000000246 R12: 0000000000000004 [ 278.628355][T12361] R13: 00000000004c8b7b R14: 00000000004dfc28 R15: 0000000000000003 [ 278.684343][T12373] EXT4-fs (sda1): required extra inode space not available [ 278.704172][T12373] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000a00, 00:20:01 executing program 3: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)='X\x00\x00\x00', 0x4}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f454c44065b050073118ce83feba746d2f6778c7d0be4de0842d8ab9ba8738c7592bbf57e75ef9b589bd7d0c15090b000"/59], 0xa) r6 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) close(r2) r7 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) 00:20:01 executing program 2: r0 = userfaultfd(0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f00000a0fe0)={{&(0x7f00005e3000/0x800000)=nil, 0x20ee6000}, 0x200000}) 00:20:01 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:20:01 executing program 0 (fault-call:2 fault-nth:58): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x700}) [ 278.804309][T12384] netlink: 'syz-executor.4': attribute type 15 has an invalid length. [ 278.830704][T12385] EXT4-fs (sda1): required extra inode space not available 00:20:01 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 279.385050][T12397] RSP: 002b:00007fcc4938da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 279.393485][T12397] RAX: ffffffffffffffda RBX: 00007fcc4938db40 RCX: 0000000000459897 [ 279.401457][T12397] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 279.409524][T12397] RBP: 0000000000000000 R08: 00007fcc4938db40 R09: 00007fcc4938dae0 00:20:02 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) [ 279.417495][T12397] R10: 00000000008000a6 R11: 0000000000000246 R12: 0000000000000004 [ 279.425635][T12397] R13: 00000000004c8b7b R14: 00000000004dfc28 R15: 0000000000000003 00:20:02 executing program 2: r0 = userfaultfd(0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f00000a0fe0)={{&(0x7f00005e3000/0x800000)=nil, 0x20ee6000}, 0x200000}) 00:20:02 executing program 0 (fault-call:2 fault-nth:59): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x700}) [ 279.566719][T12415] netlink: 'syz-executor.4': attribute type 15 has an invalid length. 00:20:02 executing program 3: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)='X\x00\x00\x00', 0x4}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f454c44065b050073118ce83feba746d2f6778c7d0be4de0842d8ab9ba8738c7592bbf57e75ef9b589bd7d0c15090b000"/59], 0xa) r6 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) close(r2) r7 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) 00:20:02 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc800) read(0xffffffffffffffff, &(0x7f0000000000)=""/17, 0xfffffcd6) 00:20:02 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:20:02 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xff00000000000000, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xa00}}], [], 0x700}) [ 279.784882][T12430] netlink: 'syz-executor.4': attribute type 15 has an invalid length. 00:20:02 executing program 2: r0 = userfaultfd(0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f00000a0fe0)={{&(0x7f00005e3000/0x800000)=nil, 0x20ee6000}, 0x200000}) 00:20:02 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc800) read(0xffffffffffffffff, &(0x7f0000000000)=""/17, 0xfffffcd6) [ 279.862244][T12424] FAULT_INJECTION: forcing a failure. [ 279.862244][T12424] name failslab, interval 1, probability 0, space 0, times 0 [ 279.894894][T12424] CPU: 0 PID: 12424 Comm: syz-executor.0 Not tainted 5.3.0+ #0 [ 279.902545][T12424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 279.913482][T12424] Call Trace: [ 279.917018][T12424] dump_stack+0x172/0x1f0 [ 279.921403][T12424] should_fail.cold+0xa/0x15 [ 279.926013][T12424] ? fault_create_debugfs_attr+0x180/0x180 [ 279.931922][T12424] ? ___might_sleep+0x163/0x2c0 [ 279.936795][T12424] __should_failslab+0x121/0x190 [ 279.941742][T12424] should_failslab+0x9/0x14 [ 279.946246][T12424] kmem_cache_alloc_node_trace+0x274/0x750 [ 279.952043][T12424] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 279.958009][T12424] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 279.963807][T12424] __kmalloc_node_track_caller+0x3d/0x70 [ 279.969444][T12424] __kmalloc_reserve.isra.0+0x40/0xf0 [ 279.974805][T12424] __alloc_skb+0x10b/0x5e0 [ 279.979210][T12424] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 279.984753][T12424] ? __kasan_check_read+0x11/0x20 [ 279.989766][T12424] alloc_uevent_skb+0x83/0x1e2 [ 279.994517][T12424] kobject_uevent_env+0xaa3/0x101d [ 279.999619][T12424] kobject_uevent+0x20/0x26 [ 280.004266][T12424] __loop_clr_fd+0x4ee/0xd60 [ 280.008856][T12424] lo_ioctl+0x2bd/0x1460 [ 280.013089][T12424] ? loop_set_fd+0x1020/0x1020 [ 280.017849][T12424] blkdev_ioctl+0xedb/0x1c1a [ 280.022426][T12424] ? blkpg_ioctl+0xa90/0xa90 [ 280.027005][T12424] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 280.032810][T12424] block_ioctl+0xee/0x130 [ 280.037122][T12424] ? blkdev_fallocate+0x410/0x410 [ 280.042132][T12424] do_vfs_ioctl+0xdb6/0x13e0 [ 280.046712][T12424] ? ioctl_preallocate+0x210/0x210 [ 280.051806][T12424] ? __fget+0x384/0x560 [ 280.055947][T12424] ? ksys_dup3+0x3e0/0x3e0 [ 280.060364][T12424] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 280.066335][T12424] ? tomoyo_file_ioctl+0x23/0x30 [ 280.071256][T12424] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 280.077491][T12424] ? security_file_ioctl+0x8d/0xc0 [ 280.082587][T12424] ksys_ioctl+0xab/0xd0 [ 280.086742][T12424] __x64_sys_ioctl+0x73/0xb0 [ 280.091317][T12424] do_syscall_64+0xfa/0x760 [ 280.095866][T12424] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 280.101760][T12424] RIP: 0033:0x459897 [ 280.105659][T12424] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 280.125267][T12424] RSP: 002b:00007fcc4938da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 280.133671][T12424] RAX: ffffffffffffffda RBX: 00007fcc4938db40 RCX: 0000000000459897 [ 280.141644][T12424] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 280.149600][T12424] RBP: 0000000000000000 R08: 00007fcc4938db40 R09: 00007fcc4938dae0 00:20:02 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) [ 280.157580][T12424] R10: 00000000008000a6 R11: 0000000000000246 R12: 0000000000000004 [ 280.165534][T12424] R13: 00000000004c8b7b R14: 00000000004dfc28 R15: 0000000000000003 00:20:02 executing program 0 (fault-call:2 fault-nth:60): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x700}) 00:20:02 executing program 2: r0 = userfaultfd(0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f00000a0fe0)={{&(0x7f00005e3000/0x800000)=nil, 0x20ee6000}, 0x200000}) [ 280.294687][T12449] netlink: 'syz-executor.4': attribute type 15 has an invalid length. 00:20:02 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:20:02 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 280.878233][T12466] RSP: 002b:00007fcc4938da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 280.886685][T12466] RAX: ffffffffffffffda RBX: 00007fcc4938db40 RCX: 0000000000459897 [ 280.894654][T12466] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 280.902649][T12466] RBP: 0000000000000000 R08: 00007fcc4938db40 R09: 00007fcc4938dae0 [ 280.910618][T12466] R10: 00000000008000a6 R11: 0000000000000246 R12: 0000000000000004 [ 280.918602][T12466] R13: 00000000004c8b7b R14: 00000000004dfc28 R15: 0000000000000003 00:20:03 executing program 3: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)='X\x00\x00\x00', 0x4}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f454c44065b050073118ce83feba746d2f6778c7d0be4de0842d8ab9ba8738c7592bbf57e75ef9b589bd7d0c15090b000"/59], 0xa) r6 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) close(r2) r7 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) 00:20:03 executing program 2: r0 = userfaultfd(0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f00000a0fe0)={{&(0x7f00005e3000/0x800000)=nil, 0x20ee6000}, 0x200000}) 00:20:03 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x3, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xa00}}], [], 0x700}) 00:20:03 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 281.775744][T12498] RSP: 002b:00007fcc4938da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 281.784284][T12498] RAX: ffffffffffffffda RBX: 00007fcc4938db40 RCX: 0000000000459897 [ 281.792455][T12498] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 281.800455][T12498] RBP: 0000000000000000 R08: 00007fcc4938db40 R09: 00007fcc4938dae0 [ 281.810350][T12498] R10: 00000000008000a6 R11: 0000000000000246 R12: 0000000000000004 [ 281.818950][T12498] R13: 00000000004c8b7b R14: 00000000004dfc28 R15: 0000000000000003 00:20:04 executing program 3: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400", 0x6}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f454c44065b050073118ce83feba746d2f6778c7d0be4de0842d8ab9ba8738c7592bbf57e75ef9b589bd7d0c15090b000"/59], 0xa) r6 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) close(r2) r7 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) 00:20:04 executing program 2: r0 = userfaultfd(0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f00000a0fe0)={{&(0x7f00005e3000/0x800000)=nil, 0x20ee6000}, 0x200000}) 00:20:04 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, 0x0, 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400", 0x6}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f454c44065b050073118ce83feba746d2f6778c7d0be4de0842d8ab9ba8738c7592bbf57e75ef9b589bd7d0c15090b000"/59], 0xa) r6 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) close(r2) r7 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) 00:20:05 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) fcntl$setstatus(r0, 0x4, 0xc800) read(r0, &(0x7f0000000000)=""/17, 0xfffffcd6) 00:20:05 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x8, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xa00}}], [], 0x700}) 00:20:05 executing program 2: ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc028aa03, &(0x7f00000a0fe0)={{&(0x7f00005e3000/0x800000)=nil, 0x20ee6000}, 0x200000}) 00:20:05 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:20:05 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x2, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x700}) 00:20:05 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x9, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xa00}}], [], 0x700}) 00:20:05 executing program 2: ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc028aa03, &(0x7f00000a0fe0)={{&(0x7f00005e3000/0x800000)=nil, 0x20ee6000}, 0x200000}) [ 282.989577][T12543] netlink: 'syz-executor.4': attribute type 15 has an invalid length. [ 283.017941][T12545] EXT4-fs: 14 callbacks suppressed [ 283.017953][T12545] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 00:20:05 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) fcntl$setstatus(r0, 0x4, 0xc800) read(r0, &(0x7f0000000000)=""/17, 0xfffffcd6) 00:20:05 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) [ 283.141856][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 283.147720][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 283.177259][T12550] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 283.214839][T12559] netlink: 'syz-executor.4': attribute type 15 has an invalid length. 00:20:05 executing program 2: ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc028aa03, &(0x7f00000a0fe0)={{&(0x7f00005e3000/0x800000)=nil, 0x20ee6000}, 0x200000}) 00:20:05 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x10, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xa00}}], [], 0x700}) 00:20:06 executing program 3: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400", 0x6}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f454c44065b050073118ce83feba746d2f6778c7d0be4de0842d8ab9ba8738c7592bbf57e75ef9b589bd7d0c15090b000"/59], 0xa) r6 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) close(r2) r7 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) 00:20:06 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:20:06 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x3, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x700}) 00:20:06 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) fcntl$setstatus(r0, 0x4, 0xc800) read(r0, &(0x7f0000000000)=""/17, 0xfffffcd6) 00:20:06 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f00000a0fe0)={{&(0x7f00005e3000/0x800000)=nil, 0x20ee6000}, 0x200000}) 00:20:06 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x2d, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xa00}}], [], 0x700}) 00:20:06 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x3b, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xa00}}], [], 0x700}) 00:20:06 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f00000a0fe0)={{&(0x7f00005e3000/0x800000)=nil, 0x20ee6000}, 0x200000}) 00:20:06 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="5f454c44065b050073118ce83feba746d2f6778c7d0be4de0842d8ab9ba8738c7592bbf57e75ef9b589bd7d0c15090b000"/59], 0xa) r6 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) close(r2) r7 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) 00:20:07 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="5f454c44065b050073118ce83feba746d2f6778c7d0be4de0842d8ab9ba8738c7592bbf57e75ef9b589bd7d0c15090b000"/59], 0xa) r6 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) close(r2) r7 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) 00:20:08 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f00000a0fe0)={{&(0x7f00005e3000/0x800000)=nil, 0x20ee6000}, 0x200000}) 00:20:08 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="5f454c44065b050073118ce83feba746d2f6778c7d0be4de0842d8ab9ba8738c7592bbf57e75ef9b589bd7d0c15090b000"/59], 0xa) r6 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) close(r2) r7 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) 00:20:09 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f00000a0fe0)={{&(0x7f00005e3000/0x800000)=nil, 0x20ee6000}, 0x200000}) 00:20:09 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x3b00, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xa00}}], [], 0x700}) 00:20:09 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, 0x0, 0x0) r6 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) close(r2) r7 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) 00:20:10 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f00000a0fe0)={{&(0x7f00005e3000/0x800000)=nil, 0x20ee6000}, 0x200000}) 00:20:10 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x4000, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xa00}}], [], 0x700}) 00:20:10 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:20:10 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, 0x0, 0x0) r6 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) close(r2) r7 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) 00:20:11 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x800086, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xa00}}], [], 0x700}) 00:20:11 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:20:11 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, 0x0, 0x0) r6 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) close(r2) r7 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) 00:20:12 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x2000000, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xa00}}], [], 0x700}) 00:20:12 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:20:12 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x0) r6 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) close(r2) r7 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) 00:20:13 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x4c, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x700}) 00:20:13 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, 0x0) 00:20:13 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:20:13 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x5000000, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xa00}}], [], 0x700}) 00:20:13 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x0) r6 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) close(r2) r7 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) 00:20:14 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, 0x0) 00:20:14 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:20:14 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x7000000, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xa00}}], [], 0x700}) 00:20:14 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x0) r6 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) close(r2) r7 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) 00:20:15 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x9000000, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xa00}}], [], 0x700}) 00:20:15 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f00000a0fe0)={{&(0x7f00005e3000/0x800000)=nil, 0x20ee6000}}) 00:20:15 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0) r6 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) close(r2) r7 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) 00:20:16 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:20:16 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timer_create(0x5, 0x0, 0x0) 00:20:16 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0) r6 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) close(r2) r7 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) 00:20:17 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:20:17 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x8cffffff, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xa00}}], [], 0x700}) [ 294.613422][T12908] netlink: 'syz-executor.4': attribute type 15 has an invalid length. [ 294.638490][T12904] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 00:20:17 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:20:17 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) [ 294.698520][T12911] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 00:20:17 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x1000000000000000, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xa00}}], [], 0x700}) [ 294.741861][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 294.747745][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 294.779079][T12915] netlink: 'syz-executor.4': attribute type 15 has an invalid length. 00:20:17 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:20:17 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x600, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x700}) [ 294.866910][T12920] netlink: 'syz-executor.2': attribute type 15 has an invalid length. 00:20:17 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xf6ffffff, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xa00}}], [], 0x700}) 00:20:17 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x700000000000000, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xa00}}], [], 0x700}) [ 294.939178][T12923] netlink: 'syz-executor.4': attribute type 15 has an invalid length. [ 294.959954][T12919] EXT4-fs (sda1): required extra inode space not available 00:20:17 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) [ 294.993705][T12919] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000a00, [ 295.029943][T12926] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 00:20:17 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xff000000, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xa00}}], [], 0x700}) [ 295.122753][T12933] netlink: 'syz-executor.4': attribute type 15 has an invalid length. [ 295.139552][T12931] EXT4-fs (sda1): required extra inode space not available [ 295.167461][T12931] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000a00, [ 295.197926][T12935] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 00:20:18 executing program 3: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0) r6 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) close(r2) r7 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) 00:20:18 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xa00}}], [], 0x700}) 00:20:18 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:20:18 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x700, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x700}) 00:20:18 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:20:18 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xffffff8c, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xa00}}], [], 0x700}) [ 295.562784][T12944] netlink: 'syz-executor.4': attribute type 15 has an invalid length. 00:20:18 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x9000000, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xa00}}], [], 0x700}) 00:20:18 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:20:18 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xfffffff6, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xa00}}], [], 0x700}) 00:20:18 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:20:18 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x900, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x700}) 00:20:18 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r4 = dup3(r3, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f454c44065b050073118ce83feba746d2f6778c7d0be4de0842d8ab9ba8738c7592bbf57e75ef9b589bd7d0c15090b000"/59], 0xa) r5 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) close(r2) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) 00:20:19 executing program 3: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f454c44065b050073118ce83feba746d2f6778c7d0be4de0842d8ab9ba8"], 0x1e) r6 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) close(r2) r7 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) 00:20:19 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x100000000000000, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xa00}}], [], 0x700}) 00:20:19 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x700, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xa00}}], [], 0x700}) 00:20:19 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:20:19 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xa00, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x700}) 00:20:19 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x200000000000000, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xa00}}], [], 0x700}) 00:20:19 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:20:19 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xf34, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x700}) 00:20:19 executing program 2: openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents64(r0, &(0x7f0000002100)=""/4096, 0x13c3) getdents64(r0, 0x0, 0xfd5c) 00:20:19 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:20:19 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x300000000000000, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xa00}}], [], 0x700}) 00:20:19 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="5f454c44065b050073118ce83feba746d2f6778c7d0be4de0842d8ab9ba8738c7592bbf57e75ef9b589bd7d0c15090b000"/59], 0xa) r4 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) close(r0) r5 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0xa8f4, 0x0) 00:20:20 executing program 3: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f454c44065b050073118ce83feba746d2f6778c7d0be4de0842d8ab9ba8"], 0x1e) r6 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) close(r2) r7 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) 00:20:20 executing program 2: openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents64(r0, &(0x7f0000002100)=""/4096, 0x13c3) getdents64(r0, 0x0, 0xfd5c) 00:20:20 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x1f00, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x700}) 00:20:20 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:20:20 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x400000000000000, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xa00}}], [], 0x700}) 00:20:20 executing program 1 (fault-call:7 fault-nth:0): openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 297.908992][T13011] RSP: 002b:00007f49b7541c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 297.917395][T13011] RAX: ffffffffffffffda RBX: 00007f49b7541c90 RCX: 0000000000459a29 [ 297.925367][T13011] RDX: 00000000fffffcd6 RSI: 0000000020000000 RDI: 0000000000000004 [ 297.933324][T13011] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 00:20:20 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x500000000000000, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xa00}}], [], 0x700}) 00:20:20 executing program 2: openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents64(r0, &(0x7f0000002100)=""/4096, 0x13c3) getdents64(r0, 0x0, 0xfd5c) 00:20:20 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) [ 297.941893][T13011] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f49b75426d4 [ 297.949847][T13011] R13: 00000000004c5cfb R14: 00000000004dc2f8 R15: 0000000000000007 [ 297.958211][ C0] net_ratelimit: 6 callbacks suppressed [ 297.958222][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 297.969590][ C0] protocol 88fb is buggy, dev hsr_slave_1 00:20:20 executing program 1 (fault-call:7 fault-nth:1): openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f454c44065b050073118ce83feba746d2f6778c7d0be4de0842d8ab9ba8"], 0x1e) r6 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) close(r2) r7 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) 00:20:20 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x600000000000000, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xa00}}], [], 0x700}) [ 298.203321][T13028] FAULT_INJECTION: forcing a failure. [ 298.203321][T13028] name failslab, interval 1, probability 0, space 0, times 0 [ 298.239136][T13028] CPU: 1 PID: 13028 Comm: syz-executor.1 Not tainted 5.3.0+ #0 [ 298.246728][T13028] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 298.246752][T13028] Call Trace: [ 298.260110][T13028] dump_stack+0x172/0x1f0 [ 298.264459][T13028] should_fail.cold+0xa/0x15 [ 298.264480][T13028] ? fault_create_debugfs_attr+0x180/0x180 [ 298.274861][T13028] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 298.281116][T13028] ? __kasan_check_read+0x11/0x20 [ 298.286165][T13028] __should_failslab+0x121/0x190 [ 298.291123][T13028] should_failslab+0x9/0x14 [ 298.295634][T13028] kmem_cache_alloc+0x47/0x710 [ 298.300405][T13028] ? ___might_sleep+0x163/0x2c0 [ 298.305280][T13028] ? mempool_alloc+0x380/0x380 [ 298.310055][T13028] mempool_alloc_slab+0x47/0x60 [ 298.314925][T13028] mempool_alloc+0x169/0x380 [ 298.319532][T13028] ? mempool_destroy+0x40/0x40 [ 298.324309][T13028] ? __get_user_pages_fast+0x410/0x410 [ 298.329765][T13028] ? ext4_update_bh_state+0xb1/0x110 [ 298.335135][T13028] ? _ext4_get_block+0x142/0x5f0 [ 298.335153][T13028] bio_alloc_bioset+0x3b9/0x680 [ 298.335175][T13028] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 298.335188][T13028] ? bvec_alloc+0x2f0/0x2f0 [ 298.335216][T13028] do_blockdev_direct_IO+0x241e/0x8420 [ 298.360624][T13028] ? rcu_read_lock_held_common+0x130/0x130 [ 298.366447][T13028] ? sb_init_dio_done_wq+0x80/0x80 [ 298.371588][T13028] ? pagevec_lookup_range_tag+0x40/0x80 [ 298.377176][T13028] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 298.383690][T13028] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 298.390184][T13028] __blockdev_direct_IO+0xa1/0xca [ 298.395200][T13028] ? __blockdev_direct_IO+0xa1/0xca [ 298.400425][T13028] ext4_direct_IO+0x57a/0x1c30 [ 298.405184][T13028] ? touch_atime+0xe9/0x2a0 [ 298.409676][T13028] ? atime_needs_update+0x5f0/0x5f0 [ 298.414864][T13028] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 298.421098][T13028] generic_file_read_iter+0x344/0x2c00 [ 298.426540][T13028] ? __kasan_check_read+0x11/0x20 [ 298.431560][T13028] ? __lock_acquire+0x1703/0x4e70 [ 298.436626][T13028] ? aa_file_perm+0x40b/0xeb0 [ 298.441390][T13028] ? find_held_lock+0x35/0x130 [ 298.446148][T13028] ? aa_file_perm+0x40b/0xeb0 [ 298.450827][T13028] ? filemap_write_and_wait_range+0x1d0/0x1d0 [ 298.456887][T13028] ? __kasan_check_read+0x11/0x20 [ 298.461898][T13028] ? aa_file_perm+0x432/0xeb0 [ 298.466576][T13028] ? kstrtouint+0x142/0x1a0 [ 298.471095][T13028] ext4_file_read_iter+0x1d6/0x420 [ 298.476217][T13028] new_sync_read+0x4d7/0x800 [ 298.480825][T13028] ? vfs_dedupe_file_range+0x780/0x780 [ 298.486280][T13028] ? __fget+0x384/0x560 [ 298.490427][T13028] ? security_file_permission+0x8f/0x380 [ 298.496047][T13028] __vfs_read+0xe1/0x110 [ 298.500275][T13028] vfs_read+0x1f0/0x440 [ 298.504416][T13028] ksys_read+0x14f/0x290 [ 298.508646][T13028] ? kernel_write+0x130/0x130 [ 298.513330][T13028] ? do_syscall_64+0x26/0x760 [ 298.518020][T13028] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 298.524087][T13028] ? do_syscall_64+0x26/0x760 [ 298.528766][T13028] __x64_sys_read+0x73/0xb0 [ 298.533262][T13028] do_syscall_64+0xfa/0x760 [ 298.537755][T13028] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 298.543630][T13028] RIP: 0033:0x459a29 [ 298.547509][T13028] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 298.567118][T13028] RSP: 002b:00007f49b7541c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 298.575532][T13028] RAX: ffffffffffffffda RBX: 00007f49b7541c90 RCX: 0000000000459a29 [ 298.583495][T13028] RDX: 00000000fffffcd6 RSI: 0000000020000000 RDI: 0000000000000004 [ 298.591490][T13028] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 00:20:21 executing program 2: openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000002100)=""/4096, 0x13c3) 00:20:21 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x700000000000000, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xa00}}], [], 0x700}) 00:20:21 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:20:21 executing program 2: openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000002100)=""/4096, 0x13c3) [ 298.599476][T13028] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f49b75426d4 [ 298.607462][T13028] R13: 00000000004c5cfb R14: 00000000004dc2f8 R15: 0000000000000007 00:20:21 executing program 1 (fault-call:7 fault-nth:2): openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 299.203738][T13050] RSP: 002b:00007f49b7541c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 299.212157][T13050] RAX: ffffffffffffffda RBX: 00007f49b7541c90 RCX: 0000000000459a29 [ 299.220131][T13050] RDX: 00000000fffffcd6 RSI: 0000000020000000 RDI: 0000000000000004 00:20:21 executing program 3: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f454c44065b050073118ce83feba746d2f6778c7d0be4de0842d8ab9ba8738c7592bbf57e75ef9b589bd7d0c1"], 0x2d) r6 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) close(r2) r7 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) [ 299.228102][T13050] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 299.236071][T13050] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f49b75426d4 [ 299.244166][T13050] R13: 00000000004c5cfb R14: 00000000004dc2f8 R15: 0000000000000007 [ 299.267000][T13055] netlink: 'syz-executor.4': attribute type 15 has an invalid length. 00:20:21 executing program 1 (fault-call:7 fault-nth:3): openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 299.926819][T13067] RSP: 002b:00007f49b7541c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 299.935326][T13067] RAX: ffffffffffffffda RBX: 00007f49b7541c90 RCX: 0000000000459a29 [ 299.943300][T13067] RDX: 00000000fffffcd6 RSI: 0000000020000000 RDI: 0000000000000004 [ 299.951279][T13067] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 00:20:22 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) [ 299.959251][T13067] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f49b75426d4 [ 299.967225][T13067] R13: 00000000004c5cfb R14: 00000000004dc2f8 R15: 0000000000000007 [ 299.981914][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 299.987743][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 299.993614][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 299.999405][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 300.005372][ C1] protocol 88fb is buggy, dev hsr_slave_0 00:20:22 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1000000000000000, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xa00}}], [], 0x700}) [ 300.011151][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 300.021838][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 300.027738][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 300.048443][T13077] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 00:20:22 executing program 2: r0 = syz_open_procfs(0x0, 0x0) getdents64(r0, &(0x7f0000002100)=""/4096, 0x13c3) [ 300.075498][T13079] netlink: 'syz-executor.4': attribute type 15 has an invalid length. 00:20:22 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:20:22 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x2d00000000000000, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xa00}}], [], 0x700}) [ 300.128796][T13083] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 00:20:22 executing program 3: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f454c44065b050073118ce83feba746d2f6778c7d0be4de0842d8ab9ba8738c7592bbf57e75ef9b589bd7d0c1"], 0x2d) r6 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) close(r2) r7 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) 00:20:22 executing program 2: r0 = syz_open_procfs(0x0, 0x0) getdents64(r0, &(0x7f0000002100)=""/4096, 0x13c3) 00:20:22 executing program 1 (fault-call:7 fault-nth:4): openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 300.796111][T13096] RSP: 002b:00007f49b7541c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 300.804526][T13096] RAX: ffffffffffffffda RBX: 00007f49b7541c90 RCX: 0000000000459a29 [ 300.812489][T13096] RDX: 00000000fffffcd6 RSI: 0000000020000000 RDI: 0000000000000004 [ 300.820446][T13096] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 300.828403][T13096] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f49b75426d4 00:20:23 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents64(0xffffffffffffffff, &(0x7f0000002100)=""/4096, 0x13c3) [ 300.836359][T13096] R13: 00000000004c5cfb R14: 00000000004dc2f8 R15: 0000000000000007 [ 300.849462][T13097] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 300.898743][T13103] netlink: 'syz-executor.4': attribute type 15 has an invalid length. 00:20:23 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x3f00000000000000, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xa00}}], [], 0x700}) [ 300.948278][T13106] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 00:20:23 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:20:23 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents64(0xffffffffffffffff, &(0x7f0000002100)=""/4096, 0x13c3) 00:20:23 executing program 1 (fault-call:7 fault-nth:5): openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 301.724944][T13116] RSP: 002b:00007f49b7541c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 301.733358][T13116] RAX: ffffffffffffffda RBX: 00007f49b7541c90 RCX: 0000000000459a29 [ 301.741850][T13116] RDX: 00000000fffffcd6 RSI: 0000000020000000 RDI: 0000000000000004 00:20:24 executing program 3: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f454c44065b050073118ce83feba746d2f6778c7d0be4de0842d8ab9ba8738c7592bbf57e75ef9b589bd7d0c1"], 0x2d) r6 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) close(r2) r7 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) 00:20:24 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents64(0xffffffffffffffff, &(0x7f0000002100)=""/4096, 0x13c3) 00:20:24 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:20:24 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x4000000000000000, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xa00}}], [], 0x700}) [ 301.749820][T13116] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 301.758087][T13116] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f49b75426d4 [ 301.766069][T13116] R13: 00000000004c5cfb R14: 00000000004dc2f8 R15: 0000000000000007 00:20:24 executing program 1 (fault-call:7 fault-nth:6): openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f454c44065b050073118ce83feba746d2f6778c7d0be4de0842d8ab9ba8738c7592bbf57e75ef9b589bd7d0c15090b000000000"], 0x34) r6 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) close(r2) r7 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) 00:20:25 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xf6ffffff00000000, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xa00}}], [], 0x700}) 00:20:25 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:20:25 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents64(r0, 0x0, 0x0) 00:20:25 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x4800, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x700}) 00:20:25 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 303.297256][T13172] RSP: 002b:00007f347db1ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 303.305706][T13172] RAX: ffffffffffffffda RBX: 00007f347db1ec90 RCX: 0000000000459a29 00:20:25 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'%ebug_want_extra_isize', 0x3d, 0xa00}}], [], 0x700}) 00:20:25 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) [ 303.313903][T13172] RDX: 00000000000013c3 RSI: 0000000020002100 RDI: 0000000000000003 [ 303.321922][T13172] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 303.329915][T13172] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f347db1f6d4 [ 303.337910][T13172] R13: 00000000004c04bf R14: 00000000004d28c0 R15: 0000000000000004 [ 303.393114][T13179] validate_nla: 3 callbacks suppressed [ 303.393126][T13179] netlink: 'syz-executor.4': attribute type 15 has an invalid length. 00:20:26 executing program 3: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f454c44065b050073118ce83feba746d2f6778c7d0be4de0842d8ab9ba8738c7592bbf57e75ef9b589bd7d0c15090b000000000"], 0x34) r6 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) close(r2) r7 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) 00:20:26 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x4c00, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x700}) 00:20:26 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/rt_acct\x00') r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r2, r1, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x800800) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) fcntl$setstatus(r2, 0x4, 0x910a3f82771389ff) read(r0, &(0x7f0000000000)=""/17, 0xfffffcd6) 00:20:26 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:20:26 executing program 2 (fault-call:1 fault-nth:1): r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents64(r0, &(0x7f0000002100)=""/4096, 0x13c3) 00:20:26 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'\\ebug_want_extra_isize', 0x3d, 0xa00}}], [], 0x700}) [ 303.829656][T13190] FAULT_INJECTION: forcing a failure. [ 303.829656][T13190] name failslab, interval 1, probability 0, space 0, times 0 [ 303.843094][T13193] netlink: 'syz-executor.4': attribute type 15 has an invalid length. [ 303.863515][T13191] EXT4-fs: 3 callbacks suppressed [ 303.863529][T13191] EXT4-fs (sda1): Unrecognized mount option "\ebug_want_extra_isize=0x0000000000000a00" or missing value 00:20:26 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) [ 303.891146][T13190] CPU: 0 PID: 13190 Comm: syz-executor.2 Not tainted 5.3.0+ #0 [ 303.898743][T13190] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 303.908817][T13190] Call Trace: [ 303.912128][T13190] dump_stack+0x172/0x1f0 [ 303.916485][T13190] should_fail.cold+0xa/0x15 [ 303.921107][T13190] ? fault_create_debugfs_attr+0x180/0x180 [ 303.926945][T13190] ? ___might_sleep+0x163/0x2c0 [ 303.931829][T13190] __should_failslab+0x121/0x190 [ 303.936811][T13190] ? proc_free_inode+0x20/0x20 00:20:26 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x9, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) [ 303.939984][T13201] netlink: 'syz-executor.4': attribute type 15 has an invalid length. [ 303.941587][T13190] should_failslab+0x9/0x14 [ 303.941602][T13190] kmem_cache_alloc+0x2aa/0x710 [ 303.941618][T13190] ? __kasan_check_read+0x11/0x20 [ 303.941639][T13190] ? proc_free_inode+0x20/0x20 [ 303.941656][T13190] proc_alloc_inode+0x1c/0x1a0 [ 303.974163][T13190] alloc_inode+0x68/0x1e0 [ 303.979473][T13190] new_inode_pseudo+0x19/0xf0 [ 303.984168][T13190] new_inode+0x1f/0x40 00:20:26 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0xf, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) [ 303.988402][T13190] proc_pid_make_inode+0x22/0x230 [ 303.993451][T13190] ? lockdep_init_map+0x1be/0x6d0 [ 303.998505][T13190] proc_ns_instantiate+0x58/0x100 [ 304.003981][T13190] proc_fill_cache+0x3a1/0x4f0 [ 304.008758][T13190] ? show_softirqs+0x280/0x280 [ 304.013532][T13190] ? proc_pid_instantiate+0x160/0x160 [ 304.018935][T13190] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 304.025189][T13190] ? filldir64+0x29b/0x380 [ 304.029635][T13190] proc_ns_dir_readdir+0x3f0/0x560 [ 304.034772][T13190] iterate_dir+0x47f/0x5e0 00:20:26 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x10, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) [ 304.039213][T13190] ksys_getdents64+0x1ce/0x320 [ 304.043991][T13190] ? __ia32_sys_getdents+0x3b0/0x3b0 [ 304.049295][T13190] ? ksys_write+0x1cf/0x290 [ 304.053811][T13190] ? compat_fillonedir+0x300/0x300 [ 304.058947][T13190] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 304.064428][T13190] ? do_syscall_64+0x26/0x760 [ 304.069127][T13190] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 304.075262][T13190] ? do_syscall_64+0x26/0x760 [ 304.079968][T13190] __x64_sys_getdents64+0x73/0xb0 [ 304.085006][T13190] do_syscall_64+0xfa/0x760 00:20:26 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x5b, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) [ 304.089526][T13190] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 304.095426][T13190] RIP: 0033:0x459a29 [ 304.099338][T13190] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 304.118957][T13190] RSP: 002b:00007f347db1ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 304.127387][T13190] RAX: ffffffffffffffda RBX: 00007f347db1ec90 RCX: 0000000000459a29 00:20:26 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0xc0, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) [ 304.135375][T13190] RDX: 00000000000013c3 RSI: 0000000020002100 RDI: 0000000000000003 [ 304.143350][T13190] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 304.151337][T13190] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f347db1f6d4 [ 304.159317][T13190] R13: 00000000004c04bf R14: 00000000004d28c0 R15: 0000000000000004 [ 304.171924][ C1] net_ratelimit: 8 callbacks suppressed [ 304.171934][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 304.181846][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 304.183400][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 304.189123][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 304.194958][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 304.206387][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 304.212268][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 304.218041][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 304.238783][T13194] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 304.401878][T13216] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 00:20:27 executing program 3: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f454c44065b050073118ce83feba746d2f6778c7d0be4de0842d8ab9ba8738c7592bbf57e75ef9b589bd7d0c15090b000000000"], 0x34) r6 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) close(r2) r7 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) 00:20:27 executing program 2 (fault-call:1 fault-nth:2): r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents64(r0, &(0x7f0000002100)=""/4096, 0x13c3) 00:20:27 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00:20:27 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 305.797035][T13253] RSP: 002b:00007f347db1ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 305.805459][T13253] RAX: ffffffffffffffda RBX: 00007f347db1ec90 RCX: 0000000000459a29 [ 305.813433][T13253] RDX: 00000000000013c3 RSI: 0000000020002100 RDI: 0000000000000003 [ 305.821429][T13253] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 305.829399][T13253] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f347db1f6d4 [ 305.837368][T13253] R13: 00000000004c04bf R14: 00000000004d28c0 R15: 0000000000000004 [ 305.850029][T13251] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 00:20:28 executing program 3: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f454c44065b050073118ce83feba746d2f6778c7d0be4de0842d8ab9ba8738c7592bbf57e75ef9b589bd7d0c15090b00000000000000000"], 0x38) r6 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) close(r2) r7 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) 00:20:28 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 306.261888][ C0] protocol 88fb is buggy, dev hsr_slave_0 00:20:28 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0}) setsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000180)={r9, r10}, 0xc) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @rand_addr="4000000000000000001d00"}, 0x8) sendfile(r5, r6, &(0x7f0000000040)=0x100000, 0x8001) getsockopt$X25_QBITINCL(r6, 0x106, 0x1, &(0x7f0000000240), &(0x7f0000000480)=0x4) read(r5, &(0x7f0000000000)=""/17, 0x11) 00:20:28 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'de%ug_want_extra_isize', 0x3d, 0xa00}}], [], 0x700}) 00:20:28 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x7400, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x700}) [ 306.277110][T13263] RSP: 002b:00007f347db1ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 306.277125][T13263] RAX: ffffffffffffffda RBX: 00007f347db1ec90 RCX: 0000000000459a29 [ 306.277132][T13263] RDX: 00000000000013c3 RSI: 0000000020002100 RDI: 0000000000000003 [ 306.277139][T13263] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 306.277146][T13263] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f347db1f6d4 [ 306.277153][T13263] R13: 00000000004c04bf R14: 00000000004d28c0 R15: 0000000000000004 [ 306.277515][ C1] protocol 88fb is buggy, dev hsr_slave_0 00:20:29 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x2, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:20:29 executing program 2 (fault-call:1 fault-nth:5): r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents64(r0, &(0x7f0000002100)=""/4096, 0x13c3) [ 306.459620][T13277] EXT4-fs (sda1): Unrecognized mount option "de%ug_want_extra_isize=0x0000000000000a00" or missing value 00:20:29 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x3, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) [ 306.526318][T13284] FAULT_INJECTION: forcing a failure. [ 306.526318][T13284] name failslab, interval 1, probability 0, space 0, times 0 [ 306.554202][T13284] CPU: 0 PID: 13284 Comm: syz-executor.2 Not tainted 5.3.0+ #0 [ 306.561799][T13284] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 306.571863][T13284] Call Trace: [ 306.571896][T13284] dump_stack+0x172/0x1f0 [ 306.571918][T13284] should_fail.cold+0xa/0x15 [ 306.571938][T13284] ? fault_create_debugfs_attr+0x180/0x180 [ 306.571959][T13284] ? ___might_sleep+0x163/0x2c0 [ 306.571979][T13284] __should_failslab+0x121/0x190 [ 306.571998][T13284] should_failslab+0x9/0x14 [ 306.572009][T13284] kmem_cache_alloc+0x2aa/0x710 [ 306.572021][T13284] ? __lock_acquire+0x8a1/0x4e70 [ 306.572039][T13284] ? __kasan_check_read+0x11/0x20 [ 306.584266][T13284] ? mark_lock+0xc2/0x1220 [ 306.584280][T13284] ? __lock_acquire+0x1703/0x4e70 [ 306.584295][T13284] ? __lock_acquire+0x1703/0x4e70 [ 306.584318][T13284] __d_alloc+0x2e/0x8c0 [ 306.584339][T13284] d_alloc+0x4d/0x280 [ 306.584359][T13284] d_alloc_parallel+0xf4/0x1c30 [ 306.584375][T13284] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 306.584393][T13284] ? __kasan_check_read+0x11/0x20 [ 306.658391][T13284] ? __d_lookup+0x42f/0x760 [ 306.662900][T13284] ? __d_lookup_rcu+0x6c0/0x6c0 [ 306.667767][T13284] ? lockdep_init_map+0x1be/0x6d0 [ 306.672896][T13284] ? lockdep_init_map+0x1be/0x6d0 [ 306.677937][T13284] proc_fill_cache+0x314/0x4f0 [ 306.682707][T13284] ? show_softirqs+0x280/0x280 [ 306.687476][T13284] ? proc_pid_instantiate+0x160/0x160 [ 306.692876][T13284] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 306.699118][T13284] ? filldir64+0x29b/0x380 [ 306.703548][T13284] proc_ns_dir_readdir+0x3f0/0x560 [ 306.708667][T13284] iterate_dir+0x47f/0x5e0 [ 306.713095][T13284] ksys_getdents64+0x1ce/0x320 [ 306.717862][T13284] ? __ia32_sys_getdents+0x3b0/0x3b0 [ 306.723151][T13284] ? ksys_write+0x1cf/0x290 [ 306.727672][T13284] ? compat_fillonedir+0x300/0x300 [ 306.732807][T13284] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 306.738282][T13284] ? do_syscall_64+0x26/0x760 [ 306.742987][T13284] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 306.749069][T13284] ? do_syscall_64+0x26/0x760 [ 306.753762][T13284] __x64_sys_getdents64+0x73/0xb0 [ 306.758801][T13284] do_syscall_64+0xfa/0x760 [ 306.763326][T13284] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 306.769229][T13284] RIP: 0033:0x459a29 [ 306.773141][T13284] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 306.792753][T13284] RSP: 002b:00007f347db1ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 306.801171][T13284] RAX: ffffffffffffffda RBX: 00007f347db1ec90 RCX: 0000000000459a29 [ 306.809280][T13284] RDX: 00000000000013c3 RSI: 0000000020002100 RDI: 0000000000000003 [ 306.817398][T13284] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 306.825381][T13284] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f347db1f6d4 [ 306.833362][T13284] R13: 00000000004c04bf R14: 00000000004d28c0 R15: 0000000000000004 00:20:29 executing program 2 (fault-call:1 fault-nth:6): r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents64(r0, &(0x7f0000002100)=""/4096, 0x13c3) 00:20:29 executing program 3: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f454c44065b050073118ce83feba746d2f6778c7d0be4de0842d8ab9ba8738c7592bbf57e75ef9b589bd7d0c15090b00000000000000000"], 0x38) r6 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) close(r2) r7 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) 00:20:29 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x4, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) [ 306.998216][T13293] FAULT_INJECTION: forcing a failure. [ 306.998216][T13293] name failslab, interval 1, probability 0, space 0, times 0 [ 307.043838][T13293] CPU: 1 PID: 13293 Comm: syz-executor.2 Not tainted 5.3.0+ #0 [ 307.051483][T13293] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 307.061558][T13293] Call Trace: [ 307.064869][T13293] dump_stack+0x172/0x1f0 [ 307.069213][T13293] should_fail.cold+0xa/0x15 [ 307.073826][T13293] ? fault_create_debugfs_attr+0x180/0x180 [ 307.079646][T13293] ? ___might_sleep+0x163/0x2c0 [ 307.084505][T13293] __should_failslab+0x121/0x190 [ 307.089449][T13293] ? proc_free_inode+0x20/0x20 [ 307.094237][T13293] should_failslab+0x9/0x14 [ 307.098743][T13293] kmem_cache_alloc+0x2aa/0x710 [ 307.103597][T13293] ? __kasan_check_read+0x11/0x20 [ 307.108635][T13293] ? proc_free_inode+0x20/0x20 [ 307.113411][T13293] proc_alloc_inode+0x1c/0x1a0 [ 307.118195][T13293] alloc_inode+0x68/0x1e0 [ 307.122540][T13293] new_inode_pseudo+0x19/0xf0 [ 307.127222][T13293] new_inode+0x1f/0x40 [ 307.131294][T13293] proc_pid_make_inode+0x22/0x230 [ 307.136321][T13293] ? lockdep_init_map+0x1be/0x6d0 [ 307.141350][T13293] proc_ns_instantiate+0x58/0x100 [ 307.146383][T13293] proc_fill_cache+0x3a1/0x4f0 [ 307.151149][T13293] ? show_softirqs+0x280/0x280 [ 307.155925][T13293] ? proc_pid_instantiate+0x160/0x160 [ 307.161324][T13293] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 307.167570][T13293] ? filldir64+0x29b/0x380 [ 307.171998][T13293] proc_ns_dir_readdir+0x3f0/0x560 [ 307.177120][T13293] iterate_dir+0x47f/0x5e0 [ 307.181542][T13293] ksys_getdents64+0x1ce/0x320 [ 307.186324][T13293] ? __ia32_sys_getdents+0x3b0/0x3b0 [ 307.191612][T13293] ? ksys_write+0x1cf/0x290 [ 307.196119][T13293] ? compat_fillonedir+0x300/0x300 [ 307.201237][T13293] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 307.206699][T13293] ? do_syscall_64+0x26/0x760 [ 307.211382][T13293] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 307.217450][T13293] ? do_syscall_64+0x26/0x760 [ 307.222142][T13293] __x64_sys_getdents64+0x73/0xb0 [ 307.227175][T13293] do_syscall_64+0xfa/0x760 [ 307.231688][T13293] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 307.237580][T13293] RIP: 0033:0x459a29 00:20:29 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'deb%g_want_extra_isize', 0x3d, 0xa00}}], [], 0x700}) [ 307.241480][T13293] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 307.261088][T13293] RSP: 002b:00007f347db1ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 307.269512][T13293] RAX: ffffffffffffffda RBX: 00007f347db1ec90 RCX: 0000000000459a29 [ 307.277487][T13293] RDX: 00000000000013c3 RSI: 0000000020002100 RDI: 0000000000000003 [ 307.285468][T13293] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 00:20:29 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x7a00, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x700}) [ 307.293449][T13293] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f347db1f6d4 [ 307.301422][T13293] R13: 00000000004c04bf R14: 00000000004d28c0 R15: 0000000000000004 00:20:29 executing program 2 (fault-call:1 fault-nth:7): r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents64(r0, &(0x7f0000002100)=""/4096, 0x13c3) [ 307.491822][T13305] FAULT_INJECTION: forcing a failure. [ 307.491822][T13305] name failslab, interval 1, probability 0, space 0, times 0 [ 307.511641][T13305] CPU: 0 PID: 13305 Comm: syz-executor.2 Not tainted 5.3.0+ #0 [ 307.519209][T13305] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 307.519216][T13305] Call Trace: [ 307.519244][T13305] dump_stack+0x172/0x1f0 [ 307.519272][T13305] should_fail.cold+0xa/0x15 [ 307.541560][T13305] ? fault_create_debugfs_attr+0x180/0x180 [ 307.547380][T13305] ? ___might_sleep+0x163/0x2c0 [ 307.552249][T13305] __should_failslab+0x121/0x190 [ 307.557188][T13305] ? proc_free_inode+0x20/0x20 [ 307.557204][T13305] should_failslab+0x9/0x14 [ 307.557219][T13305] kmem_cache_alloc+0x2aa/0x710 [ 307.572174][T13305] ? __kasan_check_read+0x11/0x20 [ 307.577206][T13305] ? proc_free_inode+0x20/0x20 [ 307.581982][T13305] proc_alloc_inode+0x1c/0x1a0 [ 307.586750][T13305] alloc_inode+0x68/0x1e0 [ 307.586764][T13305] new_inode_pseudo+0x19/0xf0 [ 307.586777][T13305] new_inode+0x1f/0x40 [ 307.586794][T13305] proc_pid_make_inode+0x22/0x230 [ 307.595811][T13305] ? lockdep_init_map+0x1be/0x6d0 [ 307.604914][T13305] proc_ns_instantiate+0x58/0x100 [ 307.604931][T13305] proc_fill_cache+0x3a1/0x4f0 [ 307.604945][T13305] ? show_softirqs+0x280/0x280 [ 307.604966][T13305] ? proc_pid_instantiate+0x160/0x160 [ 307.629873][T13305] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 307.636136][T13305] ? filldir64+0x29b/0x380 [ 307.640585][T13305] proc_ns_dir_readdir+0x3f0/0x560 [ 307.645712][T13305] iterate_dir+0x47f/0x5e0 [ 307.650142][T13305] ksys_getdents64+0x1ce/0x320 [ 307.654913][T13305] ? __ia32_sys_getdents+0x3b0/0x3b0 [ 307.660199][T13305] ? ksys_write+0x1cf/0x290 [ 307.664706][T13305] ? compat_fillonedir+0x300/0x300 [ 307.669827][T13305] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 307.675291][T13305] ? do_syscall_64+0x26/0x760 [ 307.679990][T13305] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 307.686057][T13305] ? do_syscall_64+0x26/0x760 [ 307.690742][T13305] __x64_sys_getdents64+0x73/0xb0 [ 307.695780][T13305] do_syscall_64+0xfa/0x760 [ 307.700297][T13305] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 307.706187][T13305] RIP: 0033:0x459a29 [ 307.710084][T13305] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 307.729687][T13305] RSP: 002b:00007f347db1ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 307.738200][T13305] RAX: ffffffffffffffda RBX: 00007f347db1ec90 RCX: 0000000000459a29 [ 307.746714][T13305] RDX: 00000000000013c3 RSI: 0000000020002100 RDI: 0000000000000003 [ 307.754694][T13305] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 307.762697][T13305] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f347db1f6d4 [ 307.770698][T13305] R13: 00000000004c04bf R14: 00000000004d28c0 R15: 0000000000000004 00:20:31 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f454c44065b050073118ce83feba746d2f6778c7d0be4de0842d8ab9ba8738c7592bbf57e75ef9b589bd7d0c15090b00000000000000000"], 0x38) r6 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) close(r2) r7 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) 00:20:31 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'deb\\g_want_extra_isize', 0x3d, 0xa00}}], [], 0x700}) [ 309.204596][T13320] FAULT_INJECTION: forcing a failure. [ 309.204596][T13320] name failslab, interval 1, probability 0, space 0, times 0 [ 309.218576][T13317] EXT4-fs: 7 callbacks suppressed [ 309.218590][T13317] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 309.259969][T13320] CPU: 0 PID: 13320 Comm: syz-executor.2 Not tainted 5.3.0+ #0 [ 309.268985][T13320] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 309.279140][T13320] Call Trace: [ 309.282454][T13320] dump_stack+0x172/0x1f0 [ 309.286803][T13320] should_fail.cold+0xa/0x15 [ 309.291509][T13320] ? fault_create_debugfs_attr+0x180/0x180 [ 309.291532][T13320] ? ___might_sleep+0x163/0x2c0 [ 309.291557][T13320] __should_failslab+0x121/0x190 [ 309.307542][T13320] ? proc_free_inode+0x20/0x20 [ 309.307559][T13320] should_failslab+0x9/0x14 [ 309.307573][T13320] kmem_cache_alloc+0x2aa/0x710 [ 309.307591][T13320] ? __kasan_check_read+0x11/0x20 [ 309.326782][T13320] ? proc_free_inode+0x20/0x20 [ 309.331549][T13320] proc_alloc_inode+0x1c/0x1a0 [ 309.336320][T13320] alloc_inode+0x68/0x1e0 [ 309.340652][T13320] new_inode_pseudo+0x19/0xf0 [ 309.345333][T13320] new_inode+0x1f/0x40 [ 309.349402][T13320] proc_pid_make_inode+0x22/0x230 [ 309.354428][T13320] ? lockdep_init_map+0x1be/0x6d0 [ 309.359458][T13320] proc_ns_instantiate+0x58/0x100 [ 309.364507][T13320] proc_fill_cache+0x3a1/0x4f0 [ 309.369273][T13320] ? show_softirqs+0x280/0x280 [ 309.374754][T13320] ? proc_pid_instantiate+0x160/0x160 [ 309.381633][T13320] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 309.388166][T13320] ? filldir64+0x29b/0x380 [ 309.392686][T13320] proc_ns_dir_readdir+0x3f0/0x560 [ 309.397822][T13320] iterate_dir+0x47f/0x5e0 [ 309.403302][T13320] ksys_getdents64+0x1ce/0x320 [ 309.408077][T13320] ? __ia32_sys_getdents+0x3b0/0x3b0 [ 309.413373][T13320] ? ksys_write+0x1cf/0x290 [ 309.417892][T13320] ? compat_fillonedir+0x300/0x300 [ 309.423119][T13320] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 309.428758][T13320] ? do_syscall_64+0x26/0x760 [ 309.433453][T13320] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 309.439526][T13320] ? do_syscall_64+0x26/0x760 [ 309.444216][T13320] __x64_sys_getdents64+0x73/0xb0 [ 309.449337][T13320] do_syscall_64+0xfa/0x760 [ 309.453854][T13320] entry_SYSCALL_64_after_hwframe+0x49/0xbe 00:20:32 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 309.474770][T13318] EXT4-fs (sda1): Unrecognized mount option "deb\g_want_extra_isize=0x0000000000000a00" or missing value [ 309.484491][T13320] RSP: 002b:00007f347db1ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 309.484505][T13320] RAX: ffffffffffffffda RBX: 00007f347db1ec90 RCX: 0000000000459a29 [ 309.484512][T13320] RDX: 00000000000013c3 RSI: 0000000020002100 RDI: 0000000000000003 [ 309.484518][T13320] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 309.484525][T13320] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f347db1f6d4 [ 309.484532][T13320] R13: 00000000004c04bf R14: 00000000004d28c0 R15: 0000000000000004 00:20:32 executing program 2 (fault-call:1 fault-nth:9): r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents64(r0, &(0x7f0000002100)=""/4096, 0x13c3) [ 309.605332][T13329] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 00:20:32 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x7, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:20:32 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debdg_want_extra_isize', 0x3d, 0xa00}}], [], 0x700}) 00:20:32 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xff00, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x700}) 00:20:32 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x8, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) [ 309.878688][T13339] EXT4-fs (sda1): Unrecognized mount option "debdg_want_extra_isize=0x0000000000000a00" or missing value 00:20:32 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x9, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) [ 309.944906][T13344] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 00:20:32 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 310.296842][T13349] RSP: 002b:00007f347db1ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 00:20:32 executing program 3: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f454c44065b050073118ce83feba746d2f6778c7d0be4de0842d8ab9ba8738c7592bbf57e75ef9b589bd7d0c15090b000"/58], 0x3a) r6 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) close(r2) r7 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) [ 310.305700][T13349] RAX: ffffffffffffffda RBX: 00007f347db1ec90 RCX: 0000000000459a29 [ 310.313680][T13349] RDX: 00000000000013c3 RSI: 0000000020002100 RDI: 0000000000000003 [ 310.321677][T13349] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 310.329654][T13349] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f347db1f6d4 [ 310.337646][T13349] R13: 00000000004c04bf R14: 00000000004d28c0 R15: 0000000000000004 00:20:33 executing program 2 (fault-call:1 fault-nth:10): r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents64(r0, &(0x7f0000002100)=""/4096, 0x13c3) 00:20:33 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debog_want_extra_isize', 0x3d, 0xa00}}], [], 0x700}) [ 310.404100][T13350] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 00:20:33 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0xa, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:20:33 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x20000, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x700}) 00:20:33 executing program 1: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 310.812044][T13359] RSP: 002b:00007f347db1ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 310.820465][T13359] RAX: ffffffffffffffda RBX: 00007f347db1ec90 RCX: 0000000000459a29 [ 310.828443][T13359] RDX: 00000000000013c3 RSI: 0000000020002100 RDI: 0000000000000003 [ 310.836780][T13359] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 310.844764][T13359] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f347db1f6d4 [ 310.852741][T13359] R13: 00000000004c04bf R14: 00000000004d28c0 R15: 0000000000000004 [ 310.874476][T13361] EXT4-fs (sda1): Unrecognized mount option "debog_want_extra_isize=0x0000000000000a00" or missing value 00:20:33 executing program 2 (fault-call:1 fault-nth:11): r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents64(r0, &(0x7f0000002100)=""/4096, 0x13c3) 00:20:33 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0xb, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) [ 310.972201][T13372] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 311.011085][T13377] EXT4-fs (sda1): Unrecognized mount option "debog_want_extra_isize=0x0000000000000a00" or missing value 00:20:33 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x10000) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 311.436021][T13386] RSP: 002b:00007f347db1ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 311.444447][T13386] RAX: ffffffffffffffda RBX: 00007f347db1ec90 RCX: 0000000000459a29 [ 311.452508][T13386] RDX: 00000000000013c3 RSI: 0000000020002100 RDI: 0000000000000003 [ 311.460490][T13386] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 311.468581][T13386] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f347db1f6d4 [ 311.476571][T13386] R13: 00000000004c04bf R14: 00000000004d28c0 R15: 0000000000000004 00:20:34 executing program 3: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f454c44065b050073118ce83feba746d2f6778c7d0be4de0842d8ab9ba8738c7592bbf57e75ef9b589bd7d0c15090b000"/58], 0x3a) r6 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) close(r2) r7 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) 00:20:34 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x40000, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x700}) 00:20:34 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0xd, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:20:34 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 311.904218][T13403] RSP: 002b:00007f347db1ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 311.912644][T13403] RAX: ffffffffffffffda RBX: 00007f347db1ec90 RCX: 0000000000459a29 [ 311.920618][T13403] RDX: 00000000000013c3 RSI: 0000000020002100 RDI: 0000000000000003 [ 311.928574][T13403] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 00:20:34 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0xe, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) [ 311.936530][T13403] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f347db1f6d4 [ 311.944484][T13403] R13: 00000000004c04bf R14: 00000000004d28c0 R15: 0000000000000004 [ 311.958719][T13409] syz-executor.1 uses obsolete (PF_INET,SOCK_PACKET) 00:20:34 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debxg_want_extra_isize', 0x3d, 0xa00}}], [], 0x700}) 00:20:34 executing program 2 (fault-call:1 fault-nth:13): r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents64(r0, &(0x7f0000002100)=""/4096, 0x13c3) 00:20:34 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 312.543727][T13422] RSP: 002b:00007f347db1ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 312.553217][T13422] RAX: ffffffffffffffda RBX: 00007f347db1ec90 RCX: 0000000000459a29 [ 312.561488][T13422] RDX: 00000000000013c3 RSI: 0000000020002100 RDI: 0000000000000003 [ 312.569662][T13422] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 312.578269][T13422] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f347db1f6d4 [ 312.586268][T13422] R13: 00000000004c04bf R14: 00000000004d28c0 R15: 0000000000000004 00:20:35 executing program 3: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f454c44065b050073118ce83feba746d2f6778c7d0be4de0842d8ab9ba8738c7592bbf57e75ef9b589bd7d0c15090b000"/58], 0x3a) r6 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) close(r2) r7 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) 00:20:35 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 313.227411][T13452] RSP: 002b:00007f347db1ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 313.241486][T13452] RAX: ffffffffffffffda RBX: 00007f347db1ec90 RCX: 0000000000459a29 [ 313.249925][T13452] RDX: 00000000000013c3 RSI: 0000000020002100 RDI: 0000000000000003 [ 313.257935][T13452] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 313.266452][T13452] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f347db1f6d4 00:20:35 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 313.753118][T13468] RSP: 002b:00007f347db1ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 313.761539][T13468] RAX: ffffffffffffffda RBX: 00007f347db1ec90 RCX: 0000000000459a29 [ 313.769518][T13468] RDX: 00000000000013c3 RSI: 0000000020002100 RDI: 0000000000000003 [ 313.777505][T13468] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 313.785493][T13468] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f347db1f6d4 [ 313.793487][T13468] R13: 00000000004c04bf R14: 00000000004d28c0 R15: 0000000000000004 00:20:36 executing program 3: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f454c44065b050073118ce83feba746d2f6778c7d0be4de0842d8ab9ba8738c7592bbf57e75ef9b589bd7d0c15090b000"/59], 0xa) r6 = socket$packet(0x11, 0x0, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) close(r2) r7 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) 00:20:36 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x3ff800, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x700}) 00:20:36 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 314.297388][T13480] RSP: 002b:00007f347db1ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 00:20:36 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r0 = gettid() tkill(r0, 0x1002000000016) r1 = syz_open_procfs(r0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 314.730774][T13497] RSP: 002b:00007f347db1ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 314.739196][T13497] RAX: ffffffffffffffda RBX: 00007f347db1ec90 RCX: 0000000000459a29 [ 314.747176][T13497] RDX: 00000000000013c3 RSI: 0000000020002100 RDI: 0000000000000003 [ 314.755154][T13497] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 314.763145][T13497] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f347db1f6d4 [ 314.771123][T13497] R13: 00000000004c04bf R14: 00000000004d28c0 R15: 0000000000000004 00:20:37 executing program 3: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f454c44065b050073118ce83feba746d2f6778c7d0be4de0842d8ab9ba8738c7592bbf57e75ef9b589bd7d0c15090b000"/59], 0xa) r6 = socket$packet(0x11, 0x0, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) close(r2) r7 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) 00:20:37 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x704, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:20:37 executing program 2 (fault-call:1 fault-nth:18): r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents64(r0, &(0x7f0000002100)=""/4096, 0x13c3) [ 314.861866][T13500] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 314.888086][T13503] EXT4-fs (sda1): Unrecognized mount option "debug_wa%t_extra_isize=0x0000000000000a00" or missing value 00:20:37 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_wa\\t_extra_isize', 0x3d, 0xa00}}], [], 0x700}) [ 314.987634][T13508] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 315.009686][T13512] FAULT_INJECTION: forcing a failure. [ 315.009686][T13512] name failslab, interval 1, probability 0, space 0, times 0 [ 315.041889][T13512] CPU: 1 PID: 13512 Comm: syz-executor.2 Not tainted 5.3.0+ #0 [ 315.049488][T13512] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 315.059691][T13512] Call Trace: [ 315.059720][T13512] dump_stack+0x172/0x1f0 [ 315.059743][T13512] should_fail.cold+0xa/0x15 [ 315.059763][T13512] ? fault_create_debugfs_attr+0x180/0x180 [ 315.059782][T13512] ? ___might_sleep+0x163/0x2c0 [ 315.059805][T13512] __should_failslab+0x121/0x190 [ 315.071995][T13512] ? proc_free_inode+0x20/0x20 [ 315.072014][T13512] should_failslab+0x9/0x14 [ 315.072028][T13512] kmem_cache_alloc+0x2aa/0x710 [ 315.072043][T13512] ? __kasan_check_read+0x11/0x20 [ 315.072060][T13512] ? proc_free_inode+0x20/0x20 [ 315.072075][T13512] proc_alloc_inode+0x1c/0x1a0 [ 315.072089][T13512] alloc_inode+0x68/0x1e0 [ 315.072105][T13512] new_inode_pseudo+0x19/0xf0 [ 315.125308][T13512] new_inode+0x1f/0x40 [ 315.129384][T13512] proc_pid_make_inode+0x22/0x230 [ 315.134417][T13512] ? lockdep_init_map+0x1be/0x6d0 [ 315.139451][T13512] proc_ns_instantiate+0x58/0x100 [ 315.144487][T13512] proc_fill_cache+0x3a1/0x4f0 [ 315.149264][T13512] ? show_softirqs+0x280/0x280 [ 315.154077][T13512] ? proc_pid_instantiate+0x160/0x160 [ 315.159510][T13512] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 315.166355][T13512] ? filldir64+0x29b/0x380 [ 315.170938][T13512] proc_ns_dir_readdir+0x3f0/0x560 [ 315.176084][T13512] iterate_dir+0x47f/0x5e0 [ 315.180524][T13512] ksys_getdents64+0x1ce/0x320 [ 315.185308][T13512] ? __ia32_sys_getdents+0x3b0/0x3b0 [ 315.190627][T13512] ? ksys_write+0x1cf/0x290 [ 315.195308][T13512] ? compat_fillonedir+0x300/0x300 [ 315.200434][T13512] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 315.205902][T13512] ? do_syscall_64+0x26/0x760 [ 315.210586][T13512] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 315.216684][T13512] ? do_syscall_64+0x26/0x760 [ 315.221384][T13512] __x64_sys_getdents64+0x73/0xb0 [ 315.226422][T13512] do_syscall_64+0xfa/0x760 [ 315.231011][T13512] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 315.236919][T13512] RIP: 0033:0x459a29 [ 315.240828][T13512] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 315.260541][T13512] RSP: 002b:00007f347db1ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 315.268960][T13512] RAX: ffffffffffffffda RBX: 00007f347db1ec90 RCX: 0000000000459a29 [ 315.276934][T13512] RDX: 00000000000013c3 RSI: 0000000020002100 RDI: 0000000000000003 [ 315.284913][T13512] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 00:20:37 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x706, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) [ 315.292888][T13512] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f347db1f6d4 [ 315.300864][T13512] R13: 00000000004c04bf R14: 00000000004d28c0 R15: 0000000000000004 00:20:37 executing program 2 (fault-call:1 fault-nth:19): r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents64(r0, &(0x7f0000002100)=""/4096, 0x13c3) 00:20:37 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x800086, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x700}) 00:20:38 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x708, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) [ 315.433370][T13517] EXT4-fs (sda1): Unrecognized mount option "debug_wa\t_extra_isize=0x0000000000000a00" or missing value [ 315.485491][T13521] FAULT_INJECTION: forcing a failure. [ 315.485491][T13521] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 315.498757][T13521] CPU: 0 PID: 13521 Comm: syz-executor.2 Not tainted 5.3.0+ #0 [ 315.506334][T13521] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 315.516484][T13521] Call Trace: [ 315.519793][T13521] dump_stack+0x172/0x1f0 [ 315.524148][T13521] should_fail.cold+0xa/0x15 [ 315.528767][T13521] ? __kasan_check_read+0x11/0x20 [ 315.533815][T13521] ? fault_create_debugfs_attr+0x180/0x180 [ 315.539634][T13521] ? rcu_read_unlock+0x16/0x60 [ 315.544431][T13521] ? find_held_lock+0x35/0x130 [ 315.549217][T13521] should_fail_alloc_page+0x50/0x60 [ 315.554430][T13521] __alloc_pages_nodemask+0x1a1/0x8f0 [ 315.559812][T13521] ? lock_downgrade+0x920/0x920 [ 315.564672][T13521] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 315.570435][T13521] ? rcu_read_unlock+0x33/0x60 [ 315.575215][T13521] cache_grow_begin+0x90/0xd20 [ 315.579990][T13521] ? proc_alloc_inode+0x1c/0x1a0 [ 315.584945][T13521] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 315.591211][T13521] kmem_cache_alloc+0x64e/0x710 [ 315.596092][T13521] ? __kasan_check_read+0x11/0x20 [ 315.601134][T13521] ? proc_free_inode+0x20/0x20 [ 315.605911][T13521] proc_alloc_inode+0x1c/0x1a0 [ 315.610691][T13521] alloc_inode+0x68/0x1e0 [ 315.615166][T13521] new_inode_pseudo+0x19/0xf0 [ 315.619927][T13521] new_inode+0x1f/0x40 [ 315.624014][T13521] proc_pid_make_inode+0x22/0x230 [ 315.629058][T13521] ? lockdep_init_map+0x1be/0x6d0 [ 315.634097][T13521] proc_ns_instantiate+0x58/0x100 [ 315.639179][T13521] proc_fill_cache+0x3a1/0x4f0 [ 315.643964][T13521] ? show_softirqs+0x280/0x280 [ 315.648733][T13521] ? proc_pid_instantiate+0x160/0x160 [ 315.648779][T13521] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 315.648793][T13521] ? filldir64+0x29b/0x380 [ 315.648814][T13521] proc_ns_dir_readdir+0x3f0/0x560 [ 315.661296][T13521] iterate_dir+0x47f/0x5e0 [ 315.675197][T13521] ksys_getdents64+0x1ce/0x320 [ 315.679974][T13521] ? __ia32_sys_getdents+0x3b0/0x3b0 [ 315.685267][T13521] ? ksys_write+0x1cf/0x290 [ 315.689774][T13521] ? compat_fillonedir+0x300/0x300 [ 315.694896][T13521] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 315.700374][T13521] ? do_syscall_64+0x26/0x760 [ 315.705065][T13521] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 315.711142][T13521] ? do_syscall_64+0x26/0x760 [ 315.715838][T13521] __x64_sys_getdents64+0x73/0xb0 [ 315.720873][T13521] do_syscall_64+0xfa/0x760 [ 315.726001][T13521] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 315.731895][T13521] RIP: 0033:0x459a29 [ 315.735796][T13521] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 315.755500][T13521] RSP: 002b:00007f347db1ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 315.764075][T13521] RAX: ffffffffffffffda RBX: 00007f347db1ec90 RCX: 0000000000459a29 [ 315.772059][T13521] RDX: 00000000000013c3 RSI: 0000000020002100 RDI: 0000000000000003 [ 315.780035][T13521] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 315.788009][T13521] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f347db1f6d4 [ 315.795981][T13521] R13: 00000000004c04bf R14: 00000000004d28c0 R15: 0000000000000004 [ 315.814990][T13522] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 315.901192][T13527] EXT4-fs (sda1): Unrecognized mount option "debug_wa\t_extra_isize=0x0000000000000a00" or missing value [ 315.963780][T13529] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 00:20:39 executing program 1: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r9, @ANYBLOB="00000000000aa489b1a98910a90573ea522e9ff1c0000400280012ec0b00016b2dcfe9662aa09800180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="40000000100001007ea779066ba5000000000000", @ANYRES32=r9, @ANYBLOB="00000000000000000c000140aaaaaaaaaa000000140003002f72696467655f736c6176655f310000"], 0x40}}, 0x0) bind$packet(r5, &(0x7f0000000040)={0x11, 0x19, r9, 0x1, 0x4, 0x6, @random="49be763ca6c2"}, 0x14) read(r1, &(0x7f0000000000)=""/17, 0xfffffcd6) 00:20:39 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x709, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:20:39 executing program 3: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f454c44065b050073118ce83feba746d2f6778c7d0be4de0842d8ab9ba8738c7592bbf57e75ef9b589bd7d0c15090b000"/59], 0xa) r6 = socket$packet(0x11, 0x0, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) close(r2) r7 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) 00:20:39 executing program 2 (fault-call:1 fault-nth:20): r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents64(r0, &(0x7f0000002100)=""/4096, 0x13c3) 00:20:39 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_wan%_extra_isize', 0x3d, 0xa00}}], [], 0x700}) 00:20:39 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xf83f00, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x700}) 00:20:40 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x70a, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) [ 317.494375][T13538] netlink: 'syz-executor.4': attribute type 15 has an invalid length. [ 317.527439][T13539] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 00:20:40 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents64(r0, &(0x7f0000002100)=""/4096, 0x13c3) [ 317.556743][T13537] EXT4-fs (sda1): Unrecognized mount option "debug_wan%_extra_isize=0x0000000000000a00" or missing value [ 317.566113][T13542] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.1'. [ 317.627166][T13546] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.1'. 00:20:40 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x70b, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:20:40 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x1000000, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x700}) 00:20:40 executing program 1: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0}}, {{@in6=@initdev}, 0x0, @in6}}, &(0x7f00000001c0)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x8916, &(0x7f0000000200)={@loopback, 0x50, r10}) 00:20:40 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_wan/_extra_isize', 0x3d, 0xa00}}], [], 0x700}) 00:20:40 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents64(r0, &(0x7f0000002100)=""/4096, 0x18) [ 317.764532][T13556] netlink: 'syz-executor.4': attribute type 15 has an invalid length. 00:20:40 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x710, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:20:40 executing program 3: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f454c44065b050073118ce83feba746d2f6778c7d0be4de0842d8ab9ba8738c7592bbf57e75ef9b589bd7d0c15090b000"/59], 0xa) socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) close(r2) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) 00:20:40 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents64(r0, &(0x7f0000002100)=""/4096, 0x200034c3) 00:20:40 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="00000000000aa489b1a98910a90573ea522e9ff1c0000400280012ec0b00016b2dcfe9662aa09800180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[]}}, 0x4040008) getsockname$packet(0xffffffffffffffff, &(0x7f0000001480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000014c0)=0x14) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents64(r4, &(0x7f0000002100)=""/4096, 0x13c3) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r5, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r5, r6, &(0x7f0000000040)=0x100000, 0x8001) setsockopt$RDS_FREE_MR(r6, 0x114, 0x3, &(0x7f00000000c0)={{0x1, 0x20}, 0x2}, 0x10) 00:20:41 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f454c44065b050073118ce83feba746d2f6778c7d0be4de0842d8ab9ba8738c7592bbf57e75ef9b589bd7d0c15090b000"/59], 0xa) socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) close(r2) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) 00:20:41 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/attr/exec\x00', 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f00000001c0)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r6+30000000}, 0x0) vmsplice(r4, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r7 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm_plock\x00', 0x80, 0x0) setsockopt$inet_mreq(r7, 0x0, 0x20, &(0x7f0000000240)={@loopback, @remote}, 0x8) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r1) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000100)=@sha1={0x1, "f5fad68886d23920bbfe1b40903f4976f83c538b"}, 0x15, 0x1) r8 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0xa0102, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(0xffffffffffffffff, 0xc0305602, &(0x7f0000000180)={0x0, 0xffff, 0x3008}) ioctl$KVM_X86_SETUP_MCE(r8, 0x4008ae9c, &(0x7f0000000040)={0x1c, 0x1, 0x3}) 00:20:41 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x714, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:20:41 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_\\xtra_isize', 0x3d, 0xa00}}], [], 0x700}) 00:20:41 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x4000000, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x700}) 00:20:42 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x739, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:20:42 executing program 1: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f454c44065b050073118ce83feba746d2f6778c7d0be4de0842d8ab9ba8738c7592bbf57e75ef9b589bd7d0c15090b000"/59], 0xa) socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) close(r2) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) 00:20:42 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x2, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:20:42 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_ex%ra_isize', 0x3d, 0xa00}}], [], 0x700}) 00:20:42 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x6000000, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x700}) [ 320.380314][T13663] netlink: 'syz-executor.4': attribute type 15 has an invalid length. [ 320.415972][T13667] EXT4-fs (sda1): Unrecognized mount option "debug_want_ex%ra_isize=0x0000000000000a00" or missing value 00:20:43 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents64(r0, &(0x7f0000002100)=""/4096, 0x13c3) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r3, r4, &(0x7f0000000040)=0x100000, 0x8001) ioctl$RNDADDENTROPY(r4, 0x40085203, &(0x7f00000001c0)={0x5}) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r5, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r5, r6, &(0x7f0000000040)=0x100000, 0x8001) getpeername$packet(r6, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000002c0)={@rand_addr="44531885cc36c26ce27efdd0cdb98e22", @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, @empty, 0x0, 0xfff, 0xff, 0x0, 0x1007, 0x10000, r7}) sendfile(r1, r2, &(0x7f0000000040)=0x100000, 0x8001) r8 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r8, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r8, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="01000800", @ANYRES32=0x0], &(0x7f0000000180)=0x8) r9 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r8, 0x84, 0x11, &(0x7f0000000200)=@assoc_value={r10}, 0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f00000000c0)={r10, @in={{0x2, 0x4e22, @remote}}, 0x9, 0x7c}, &(0x7f0000000000)=0x90) 00:20:43 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x3, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) [ 320.483794][T13666] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 320.559249][T13675] netlink: 'syz-executor.4': attribute type 15 has an invalid length. 00:20:43 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x7000000, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x700}) 00:20:43 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x4, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:20:43 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_ex/ra_isize', 0x3d, 0xa00}}], [], 0x700}) 00:20:43 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r5, 0x4010641c, &(0x7f0000000440)={r6, &(0x7f0000000380)=""/155}) ioctl$DRM_IOCTL_NEW_CTX(r4, 0x40086425, &(0x7f0000000080)={r6, 0x2}) read(r0, &(0x7f0000000000)=""/17, 0xfffffcd6) 00:20:43 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') connect$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x0, 0x1, 0x4, 0x1, 0x7c, "a8c76db27e5c597b044851a00808d1d5d5b95bd76f95e0a902f4a7e8402b70b5c1d05152397c4873c36f1eff9c21a1faee88d9db3a5ed41798948b6a816e2a", 0x1d}, 0xfffffe1c) getdents64(r0, &(0x7f0000002100)=""/4096, 0x13c3) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x100, 0x0) ioctl$KDGKBMODE(r1, 0x4b44, &(0x7f0000000100)) 00:20:43 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f454c44065b050073118ce83feba746d2f6778c7d0be4de0842d8ab9ba8738c7592bbf57e75ef9b589bd7d0c15090b000"/59], 0xa) r6 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, 0x0, 0x0) close(r2) r7 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) 00:20:43 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x5, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:20:43 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000100), &(0x7f0000000140)=0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x8000) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x400, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="14000000", @ANYRES16=r5, @ANYBLOB="0100000000000000000003005a3e7defce83f2b58e8c8b0000"], 0x14}}, 0x0) sendmsg$TIPC_NL_MON_GET(r3, &(0x7f00000002c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x180000}, 0xc, &(0x7f0000000280)={&(0x7f0000000480)={0x2f0, r5, 0x8, 0x70bd29, 0x25dfdbfc, {}, [@TIPC_NLA_SOCK={0x20, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}]}, @TIPC_NLA_BEARER={0x18, 0x1, [@TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x401}]}]}, @TIPC_NLA_SOCK={0x28, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xfffffffa}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3ff}]}, @TIPC_NLA_MEDIA={0x88, 0x5, [@TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfff}]}]}, @TIPC_NLA_SOCK={0x40, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x80}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xfff}]}, @TIPC_NLA_NET={0x6c, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfffffffffffff001}, @TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xef8}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x154}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xffffffffffff8001}]}, @TIPC_NLA_BEARER={0x7c, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x22}}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x2, @empty, 0xfffffff8}}}}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x583}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x800}]}, @TIPC_NLA_BEARER_NAME={0xc, 0x1, @l2={'eth', 0x3a, 'lo\x00'}}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7f}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}]}, @TIPC_NLA_LINK={0xa4, 0x4, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x725}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3e6}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7ff}]}]}, 0x2f0}, 0x1, 0x0, 0x0, 0x4001}, 0x1004) sendfile(r2, r0, &(0x7f0000000040), 0x1) ioctl$KVM_SET_CPUID(r1, 0x4008ae8a, &(0x7f0000000180)=ANY=[@ANYBLOB="020000000000000001000080030000000c9a000000000080050000000000000200000000000000800400000000080000030000000000000008862c2aae2aaa4e647c0fe3a37dfa6f19834113aadd9a5b9c51326bf877d510d7fa193cab2d0396c9816c657fcb9f0efe78165099355371c10400000000000000d60d9121c6ff47fb33fc7b2f5f7e8a3f"]) syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') 00:20:43 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x8000000, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x700}) 00:20:43 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}, 0x0) ioctl$RNDGETENTCNT(r7, 0x80045200, &(0x7f00000000c0)) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="00000000000aa489b1a98910a90573ea522e9ff1c0000400280012ec0b00016b2dcfe9662aa09800180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="40000000100001007ea779066ba5000000000000", @ANYRES32=r8, @ANYBLOB="00000000000000000c000140aaaaaaaaaa000000140003002f72696467655f736c6176655f310000"], 0x40}}, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x6, r8, 0x1, 0x3f, 0x6, @local}, 0x14) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) fcntl$setstatus(r0, 0x4, 0xc800) read(r0, &(0x7f0000000000)=""/17, 0xfffffcd6) 00:20:43 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_ex\\ra_isize', 0x3d, 0xa00}}], [], 0x700}) [ 321.269148][T13708] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.1'. [ 321.295622][T13710] netlink: 'syz-executor.4': attribute type 15 has an invalid length. 00:20:43 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x6, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) [ 321.327928][T13716] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.1'. 00:20:43 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f454c44065b050073118ce83feba746d2f6778c7d0be4de0842d8ab9ba8738c7592bbf57e75ef9b589bd7d0c15090b000"/59], 0xa) r6 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, 0x0, 0x0) close(r2) r7 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) 00:20:44 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/s\a\xfd\xdd-\xd6\x01xec\x00', 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0}) syz_open_procfs(r5, &(0x7f0000000300)='net/ip_tables_names\x00') sendfile(r1, r2, &(0x7f0000000040)=0x100000, 0x8001) getsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_id=0x0, &(0x7f00000001c0)=0x4) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e20, 0x8, @ipv4={[], [], @local}, 0x8}}, 0x3ff, 0x9, 0x10001, 0xff, 0x20}, 0x98) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000000), &(0x7f0000000040)=0x4) getrandom(&(0x7f00000000c0)=""/139, 0x8b, 0x1) 00:20:47 executing program 3: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f454c44065b050073118ce83feba746d2f6778c7d0be4de0842d8ab9ba8738c7592bbf57e75ef9b589bd7d0c15090b000"/59], 0xa) r6 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, 0x0, 0x0) close(r2) r7 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) 00:20:47 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f454c44065b050073118ce83feba746d2f6778c7d0be4de0842d8ab9ba8738c7592bbf57e75ef9b589bd7d0c15090b000"/59], 0xa) r6 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x0, 0x0}, 0x10) close(r2) r7 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) 00:20:47 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x48, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:20:47 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_%size', 0x3d, 0xa00}}], [], 0x700}) 00:20:47 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x2d000000, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x700}) [ 325.433672][T13822] netlink: 'syz-executor.4': attribute type 15 has an invalid length. [ 325.447006][T13820] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_%size=0x0000000000000a00" or missing value 00:20:48 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x4c, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) [ 325.533471][T13823] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 325.581484][T13829] netlink: 'syz-executor.4': attribute type 15 has an invalid length. 00:20:48 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x4d, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:20:48 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_\\size', 0x3d, 0xa00}}], [], 0x700}) [ 325.739661][T13835] netlink: 'syz-executor.4': attribute type 15 has an invalid length. 00:20:50 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x60, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:20:50 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x340f0000, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x700}) 00:20:50 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_i#ize', 0x3d, 0xa00}}], [], 0x700}) 00:20:50 executing program 3: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f454c44065b050073118ce83feba746d2f6778c7d0be4de0842d8ab9ba8738c7592bbf57e75ef9b589bd7d0c15090b000"/59], 0xa) r6 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x0, 0x0}, 0x10) close(r2) r7 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) 00:20:50 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x80000, 0x0) getdents64(r2, &(0x7f0000000480)=""/4096, 0xffffffffffffff76) 00:20:50 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0, 0x80000, r0}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r5, 0xc00c642e, &(0x7f0000000140)={r6, 0x80000}) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = dup3(r7, r3, 0x0) r9 = socket$inet6(0xa, 0x2, 0x0) r10 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r9, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r9, r10, &(0x7f0000000040)=0x100000, 0x8001) fcntl$setpipe(r10, 0x407, 0xdd8e) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) fcntl$setstatus(r0, 0x4, 0xc800) read(r0, &(0x7f0000000000)=""/17, 0xfffffcd6) [ 327.885787][T13851] netlink: 'syz-executor.4': attribute type 15 has an invalid length. 00:20:50 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x68, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:20:50 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_buf(r1, 0x6, 0x1f, &(0x7f00000000c0)="c6f035694200639ff3a08e0b3bc4994ae3b8e3dd5b3e255cb84110f121cf9d81fcdfdcf5116ab92f6889b1a6b1916cc427b1e11d2e1ce83e4a5eb93c7b37213ac34eec5ac30d10bfdbd2e9d6239b5a291179ade41ed95d78d9b63cfbeb327c55bb6ac9f2fbd38f7f044e31e766f5bd115593ba6a6e89d281eea1b0fb132ef50522946ff90a9aa6c28bde4489fb3f724a4e8f8e048f559da74b5f7c3afb5c2c525307476841dec3deffa0889f4a9f15d08bff3752239c0c5158ae353ab6dc97e4739270c3ebf24101b3efca4611eb10817c6e85b760ac001a5a0771738df2e4b312c9aaef48010cb97811d2959f831059d1b9d6c17b", 0xf5) getdents64(r0, &(0x7f0000002100)=""/4096, 0x13c3) 00:20:50 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="00000000000aa489b1a98910a90573ea522e9ff1c0000400280012ec0b00016b2dcfe9662aa09800180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="40000000100001007ea779066ba5000000000000", @ANYRES32=r7, @ANYBLOB="00000000000000000c000140aaaaaaaaaa000000140003002f72696467655f736c6176655f310000"], 0x40}}, 0x0) setsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@loopback, r7}, 0x14) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000080)) r8 = gettid() tkill(r8, 0x1002000000016) r9 = syz_open_procfs(r8, &(0x7f0000000040)='oup\x00\x00\x80\x00') getdents64(r9, &(0x7f0000002100)=""/4096, 0x13c3) 00:20:50 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f454c44065b050073118ce83feba746d2f6778c7d0be4de0842d8ab9ba8738c7592bbf57e75ef9b589bd7d0c15090b000"/59], 0xa) r6 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x0, 0x0}, 0x10) close(r2) r7 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) 00:20:51 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x3f000000, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x700}) [ 328.793790][T13899] netlink: 'syz-executor.4': attribute type 15 has an invalid length. 00:20:51 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r5, 0xc4c85513, &(0x7f0000000440)={{0x9, 0x2, 0x7fff, 0x3, 'syz1\x00', 0x1}, 0x0, [0x5, 0x4, 0x6, 0x8, 0xffffffffffff39d5, 0x3, 0xacb7, 0x8000, 0x800, 0x2000000000000000, 0x1, 0x9, 0x4, 0x1ff, 0x200, 0x8, 0x7fffffff, 0x81, 0x401, 0x2, 0x674, 0x0, 0x800, 0x200, 0xffffffffffffff61, 0xffff, 0x0, 0xfffffffffffffffe, 0x1, 0x2c54, 0x10001, 0x1ff, 0x6, 0xffffffff, 0x3, 0x4, 0x401, 0x9, 0x7, 0xfffffffffffffeff, 0xfffffffffffffff7, 0x8, 0x1f, 0x100, 0xffffffff00000001, 0xe0, 0x3, 0x50000, 0x1, 0x9, 0x4, 0x8000, 0x7, 0x401, 0xffffffffffffffe1, 0x1, 0x6, 0x1, 0x1, 0xc3, 0x3, 0x2244, 0x8000, 0x10000, 0x2000000000, 0x2, 0x7ff, 0x3, 0x100000000, 0xb5a, 0xfff, 0x2, 0x3, 0x4, 0x4, 0xf60, 0x800, 0x9, 0x7, 0x24000000, 0x7, 0xffffffff, 0xffff, 0x9, 0xb57, 0x5, 0x3, 0x580, 0x80, 0x40000000000000, 0xefbd, 0x4, 0x9, 0x19f, 0x0, 0x0, 0x0, 0x4, 0x8000, 0x4, 0x0, 0x100, 0x72, 0xffff, 0x8001, 0x80000001, 0x1f, 0x6, 0x1000, 0x2, 0x4cbf, 0x6, 0x0, 0x0, 0x40, 0xc9, 0x1f, 0x8001, 0x100, 0x436, 0x6a8, 0xef, 0x5, 0x8, 0x1, 0x2, 0x4, 0x2], {r8, r9+30000000}}) read(r3, &(0x7f0000000000)=""/17, 0x1000000ae) 00:20:51 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0xf0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:20:51 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x40000000, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x700}) 00:20:51 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_i+ize', 0x3d, 0xa00}}], [], 0x700}) 00:20:53 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r3, r4, &(0x7f0000000040)=0x100000, 0x8001) accept$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000200)={@empty, 0x4b, r5}) ioctl$DRM_IOCTL_GET_MAP(r2, 0xc0286404, &(0x7f00000000c0)={&(0x7f0000ffe000/0x2000)=nil, 0x400, 0x5, 0x29, &(0x7f0000ffe000/0x2000)=nil, 0x6}) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) r6 = socket$inet6(0xa, 0x2, 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r6, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r6, r7, &(0x7f0000000040)=0x100000, 0x8001) getdents64(r7, &(0x7f0000002100)=""/4096, 0xfffffeaf) userfaultfd(0x80c00) syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') r8 = socket$inet6(0xa, 0x2, 0x0) r9 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r8, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r8, r9, &(0x7f0000000040)=0x100000, 0x8001) connect$nfc_llcp(r9, &(0x7f0000000100)={0x27, 0x1, 0x2, 0x6, 0x9, 0x20, "25b94fdf5e6dd4b4b9f33e0e2c6e44944a2f757ba21200ff0abcf280ea2a281e5b31c2e7a4a6150207f4515820d2f74c46bd8897a83615ae5ce0d71d247948", 0x9}, 0x60) 00:20:53 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f454c44065b050073118ce83feba746d2f6778c7d0be4de0842d8ab9ba8738c7592bbf57e75ef9b589bd7d0c15090b000"/59], 0xa) r6 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}, 0x10) close(r2) r7 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) [ 331.382305][T13932] validate_nla: 1 callbacks suppressed [ 331.382316][T13932] netlink: 'syz-executor.4': attribute type 15 has an invalid length. [ 331.424962][T13936] EXT4-fs: 19 callbacks suppressed [ 331.424976][T13936] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i-ize=0x0000000000000a00" or missing value [ 331.434339][T13938] Unknown ioctl -1071094780 00:20:54 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x500, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:20:54 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/procwO{Hf//exe\x00', 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f454c44065b050073118ce83feba746d2f6778c7d0be4de0842d8ab9ba8738c7592bbf57e75ef9b589bd7d0c15090b000"/59], 0xa) r6 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}, 0x10) close(r2) r7 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) 00:20:54 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0xa00, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:20:54 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_i0ize', 0x3d, 0xa00}}], [], 0x700}) 00:20:54 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f454c44065b050073118ce83feba746d2f6778c7d0be4de0842d8ab9ba8738c7592bbf57e75ef9b589bd7d0c15090b000"/59], 0xa) r6 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}, 0x10) close(r2) r7 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) [ 335.200116][T14031] netlink: 'syz-executor.4': attribute type 15 has an invalid length. 00:20:57 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents64(r0, &(0x7f0000002100)=""/4096, 0x13c3) r1 = shmget$private(0x0, 0x1000, 0x4, &(0x7f0000ffc000/0x1000)=nil) shmctl$IPC_INFO(r1, 0x3, &(0x7f0000000040)=""/61) shmat(r1, &(0x7f0000fff000/0x1000)=nil, 0x6000) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r2, r3, &(0x7f0000000040)=0x100000, 0x8001) bind$rds(r3, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) 00:20:57 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x2000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:20:57 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0) io_submit(r1, 0x1, &(0x7f0000000440)=[&(0x7f0000000000)={0x60ffffffffff, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f00000001c0)="100000400600"/16, 0x40000010}]) r2 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f454c44065b050073118ce83feba746d2f6778c7d0be4de0842d8ab9ba8738c7592bbf57e75ef9b589bd7d0c15090b000"/59], 0xa) r6 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{}]}, 0x10) close(r2) r7 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) 00:20:58 executing program 2: syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp6\x00') r0 = open(&(0x7f0000000000)='./file0\x00', 0x10800, 0x14a) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x200802, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) prctl$PR_CAPBSET_READ(0x17, 0xd) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r2, r3, &(0x7f0000000040)=0x100000, 0x8001) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xed47) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r4, r5, &(0x7f0000000040)=0x100000, 0x8001) sendmmsg(r3, &(0x7f00000051c0)=[{{&(0x7f00000000c0)=@pppoe={0x18, 0x0, {0x2, @local, 'bridge0\x00'}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="721d7a2efc23d2e3e190281027c6dac184063da7a5614a7971157c08", 0x1c}, {&(0x7f0000000180)="8c238f793533dc0d303f05791f137c9c259a8f", 0x13}], 0x2}}, {{&(0x7f0000000240)=@x25={0x9, @remote={[], 0x2}}, 0x80, &(0x7f00000003c0)=[{&(0x7f00000002c0)='?', 0x1}, {&(0x7f0000000300)="d38699ba65fcd55883b244e3df3668f0", 0x10}, {&(0x7f0000000340)="0dde769074d7829a7c3058ca93e55a1c0ede1cd1cb22e846a4e2349a053165ec85a214", 0x23}, {&(0x7f0000000380)="b5d6921ca86b96d13828acc32bf166ef", 0x10}, {&(0x7f0000000480)="5b5ee236863785738c5d1c643a4198b157c71a4e147e4981cea9c08be1b60956e02f10cecf7c35dcb562cf2f79ef7974dc644770cef8bdaf60e4324939efa827f6c301555d750169b4fa68b405838cdab4fdab619dbfd7f301bab34acd3d8723be39080b5ab3e8ed4d3727f487eea6229e3968b402c0c48fa48bbb6fba40062de6f773b46a7882996d8bc312f66f835d33e3abf8108744bf6406a71ffff69aa27253a7d3316303a9944407465cf5a3379b0acb31c5f21302da00cd392e912dac268e7a2ad93a54e340e1133baa53c3b3b08aae893c4aa9caf65eac3e58e1417c543db45dc217cc63", 0xffffffffffffff5e}, {&(0x7f0000000580)="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", 0x1000}], 0x6, &(0x7f0000001580)=[{0xf0, 0x11, 0x707b, "d8c152cf2342f846a7db78ecfbbdcf66196c9821dd18f1d271f1f87194b5f2a1d8bfab1f4c1e4f1330aac23ba9ee7595ea749b59694e765fefcff0e0c47f58335944acb19c3abecdd7c3f9456e16b1a3c9e6862e7716eecd18ef7df8b3b94fb43ec9db8c734a22fd3f6adc32c9e54e8c8c7d6ab961d119a72978dde3cdbb61ba79f34454437c39ea913f77731e6ddc4475801e40351182c81634cbdea55f9a650cfe8c7089d7ac118f1d44b9d8fbfdd91fa4c97caba32295536e67304a46165ff4d9fd020f8a3d72cf752b77e3ab16af663aac68011b85ddb43b84"}], 0xf0}}, {{&(0x7f0000001680)=@rc={0x1f, {0x2, 0x20, 0x4, 0x6, 0x5, 0x3}, 0x9}, 0x80, &(0x7f00000019c0)=[{&(0x7f0000001700)="528a70a2886700ed955f691c036690d89fb3826646af0ccddbc493fc49acb31ed69f7d28f5bf180a7ed935cd513ec67cf91c99487fbac5f8acceb5147c0c2ae354d0d05de8da87b5be6b4ab5b1e617bacd1233e76a5c5ab1924ee608adbc3d941cace184077ca469562b29db4b22b74435e3c520210a057910eb192e4892964cc10457c6778073dfa4ae91d8fb713989f5", 0x91}, {&(0x7f00000017c0)="1f57f5799a26e1cc2c32c35b5650d0795b3294c96c93a6bf76e533c8aa2844f38ae518c81f67762a6a896ab90e5c240c50f10f315ae00692528d4845ea598e8289da3c869d40ff08f1b4b51f76927a0ce6f9c65ff4781459f8b926038f646d5c8594b850e5d840091b433d7f961fc3ba84299dcd019f7759822b6443973e91fe26f4f37a170ab99b30f6293061acb43ae9489a85275b97b48f21c2fd404ac30be3d7e68428906839f9514c2d6dc39669ba1a60660c02c99fef6dfc028c51fb414953e5403320b5d8e68dbed80d9c3575e0b10336297f4aa4d813d6aa2d3d89f976d9ed9661c8c0dfcdedfa76f055", 0xee}, {&(0x7f0000003100)="343bb03c4b9408a4dd7c0be81b6da53dd76f42cf857210312eca7d36a6eca0acec2fb973df95f87ecffca9e184c8e768284b834665475f0f2a24fda4369c8e16882482a452305b78f715e723c8bdf525f81a880f3eaec1f40d073c8a3e9c0bbc736c7bfd105e6ce4352a363eb7c78c8eaf0ffb2ad21d74f35ec5259000ee45099723d5949eb13c06f563e14913ca67dc1a7d0b3532e9be6fe21f3e419a4d1b3b98c368a68eed64b2e05c64dccaadcfc0c6fdd60a38e1b736dca45a6007870905af3db7d68210ff80b47ac90ab6c90bbaaf6dd873d7434e700ffe4f8dfcf383a949407a9f9d3cb93e76655e8b90037c25ed7fdefabc7b93508b32ac4aaa667eb88ee46c6f9695111d9369f392899daf9e342ce77ff15f1114cec1d1dbb878567fc48c2eae193a24f648e99890698e57fd079dc10759e842b4bc641956c309cf630d92a1af6f409381c66f59e06956be991c01356dbd8079ee0f44d7eb7a8e357698d7bf36a017a9332e96fd8cf02dbb63b2ed07a2dfdd8a9fa79080870f3023bf23787c8fd19294592726704dd5f3792a225f433d0ac91bc671ae713d6d201b58ec4bd8ec3bc53b4cb8270a98cf1dd7f5771f61a9a597de1967ffd3f656d693c88626f14e1e91da705de034bfcd630c9dbdff238f178c2c43be3310e9cd704e35577c6f78ea31c679d553968d1efb1a789cc4578459386db068a7c60a40caedc5bf72a63a91700bb4138973f60db649569f130cfcd8d08e636ac1d6b729f258c9fe9b39ea48914e7e11d14e23d7fac1a96404bf4e64f221b1b521f635c6df6f08003dc74151fdc0568a669157dfbc7fa950a3f4696f4e0e807c3c5faf104dc5f2d5cc3d8002c624576b1a2cf25920cb0ce6dba745a9b148d8feabcca47991daa8926c60e737d75c5a9b5171054ff6984c0aa6bee1d631a1be7d24cba6ea640a014fa404956e664113db58d239fb63451373755a179afdb94953f4b24935dbd94a62f21c7208117b14439e3e8abee26542d88151c36c92853836827034ae126ca4c19393c140549321a69f7c24b4344d68b363b1a261a8a0a899139430db3936b33c056ae672beeb4d0dcd8391b7108bb4c2967ddf1b49a7e7596dea7a7d17bcf99456ea8f0cd85043dd34cb8d8035ac0737d70e102e96015e7d605f4b175ba30be9dfa45d8b1e31981613ad863842045c88df3883bce54e4c8837b13cbd5e750e8dbc128bff816ca2ea70cfe84cbfebfa1fbd4b2fe014daf3193cf5e56aafa09099158ac17fcea791c1963c3532d08ee1465474bacf798c18bfb5a7340e1e59a6dfac562e2269b3672dd70534fca8fd26028412c215e8545157b2444dc830dadeeb33acfb2e4330e7df5180a277f03e8b386995fc5093b023a4c4254dbbe2a188bb5410225500ebac5ea6d04528273d8f0304d19e8b5c1a04cf18ddea44d08d3ab38b50ed679df459d0a4ac644db22faed29daf107d50d7534de0c4da674bd911dab3e49b71f5ba04c78e2cb8de8ab47af9b7e6011c391b0f77ee1d98fecf6a0484a74ff941f410d6b113ed7d4631d340cf4164fd95f9ce993fdd1ded512507c4cf2e19caf4c79a61d6fb2dbff207b515229ab9ea5b8ee4d663c127f8dba489e99658a893c02e92ebc46760cde02c5905945964efb3a07f5cb2b7cc0215a1d98f1f0d95c6b890cf177f500c87f18ec8aa49d415c67d30ea2fa48d861681c29bd3f2400515883a3fbf6b84a59d6d933dc0ba937856ac771c2f93acf5fa345199d0f89850cdd4aced4c7516c97443542fac2f7935e754f7bf69d12a4cbba932288d3407993f04cd6ff55da251d84e8ae301af0ea3eaeb21e6484e82eee13f27fd92a1ef10b721f9651bf18b6b83bccd8eb1932b77512ef62df08638c3daca4b2e750d8c792755af5ac2aef412d2cd4b371e683649b1a2e29da9ea4544c9b77de40f463a27d6bb8147dc67c26ed5fedcdaca5a4c0e35139baff3cfc076aad6ae00496c0c2ac5c2acd1c10a2e4fa82d87acc1c1a569d62ac28d0f4b24b27728833742e438b6ef0de53896705f3e044519fe616f579151ab06dd584e308dc9e6679c55675b5f1547e9d3d49f7375d3d56dbdba903e6fe529622d59fc61690f4d0e24d6d54455f8245308ddc6cfe227cac233df246c53204660c5ac011d4bd8939dfa0f5885a85750075fed40d75e4963a7592b1146caaf27591ec7a8a2ef19092868cf345b09d12e1c09c699cf2565d27db235fb36eb604ad21d09df17d826655e554906a44ecd511aa38c97577eeb0208da317ade2b04836fb42ada8bde56a25a85ebaab823b14f973c6d4e96a9917ce72bb6adf54aa52792d494bc2b9cd621d7eeb47d3fe87f2acda07782fb7854358a28f900530d46fedebb48af28c74d77988c3068109fabcb3b993e2339a1f8a8fcc4078448364ce9dc7e78748d4d8f2a4ddecd90882285194568b3547bef7fd19b7dbef02046baa32cc03696c66b51785f56531338d23014bc4ef2c05c2e4a3ca613b83039330999a3b0bb9592d2f7c9a35152ecb9320bb0167844fd0ea53d665b4843e36d4b25883b36037ac7ede00bff7b4b6b175c52ea6719894b4d3f5dad46e92263adb2b5484a4b9c728fc959b66b4eabce4c03bf0c381e931fa98b1c7a950a84c33b8ba2c4118374b6e412271e2a950e39131e30d1f36511cc2c642ce1865b35fa4da30fd236e08af03c78e9b87a79cca6bdac6c9f8caec62027ae59a3b08981e0f491167658be26af45d6439f630036867a7a62f659a16a3cc2fa9599afb6f466b1c2418e68e48484670359758c0b0a41ac1ef1cd30b8e63ae2634c6c0417391a9ebe3521c8393774ca26c62ed1e4e9cb1be6096775eeca65e56e99d9242018f87d0ffcf3a1cc9a1673d457cd73e9f8f1e62941eed23a201bd4971710c805c0a97e0bde118d6fc6758ad78ba402b1af9f4383930e5b10d676f09ac24dc9ba0c8adafd86b517c116ebb55d8d6bd11dbe67b8a5d6095128116c54b7931ce94a7217216c4a20d1e420b06b811fba75a5620a6b93dca923fec44b152d76cf7756a75504c34689efba0db4bb466d5549569090031ed12bdbfc7a5916a14a666baf7502911ef73ebd958dddf94e14b7f8fa8f262fc1e23019e5567e2d30d94c7a957a15b27efed2aa837bf61b189def1e9b60ad8a6211d9cad6321b2ef88040a043b9008c514684a2c47511d7b985235ab99478021ee903c23fbb33ed1f5c5157cbe53dd861e5e723be9df32d32e632655488289728da388cdfefd4b86c7c53927b6d402733121d6c4aaeae6963c264ef959549cb0424237941c342650aa92622c1a2d0e5fd26bfcf92a69de2411221a41ccd455c0b1143040a817319ff99347e8a4df89bc13e7aba0cbea33f4c81376e3b372c4a2d1d619816e22e55a8e77a02b888d056911b17e026788b38f539754ac3c1beb156adada379065bf318f3b43e6cb93d43b9671c76786f09227058b5b5167ec106512a2f5d50b5376815c8aac27dbdcbb1d186f4b48e9c3a90554f04e188cf8e33e24ff237bc4fa85a48fa234b5395ae50993548ba54c76e9317b1faba6de977adf9f1d23268e49dc0305c35addc9a8909189542c2e8ef000931bfbf518e5260b73b583e888dfb60eec2cb95e85abb3aebd9b6431c116457d811e2095f9dbc1a5f190142d653859112b5d0c77c28af34070125ec5db1b58e692b397a0b0c8dbdb7ee659cad99f88b0c7b1a3742bc144a5459feb20f9e21f54771cd0d1e767c3422dcaf11b4da27923b565d493c2fe5b537283eabd05e8b6d06e14dea2cb258cb53e9a07727b69c6926fb43032f574d9cbb380bc56fb964bbb98184c5d1fdd471e219c3b84487e5c4c0b58c4100272ea02e5071fc147d0121b888cf3e4f2588295f8e7ba9f278d9b2680625c65a89ddd352796c3fad44700beec89d437adce499cc22c4104534addd10dd7e1daa2f6f7b95a437ae68c046ddebd5e8552f3c02c94bec49ae2718671c31e37d3954cca304deb60e03c2048316798bb2ea304907469cfdb2801a4f2c92505852834c189d496ba59ea3074c655c4a97d82a8010a0b252f105e72c18e4a3adc57c9046f149661e9cd6885a4b8d26bef2ae7f8ccbe5ac732f918b92ff73d961c3c45f888cb7a46835fa1c5b638990f6fdbb4cdfd179b1b95c4cb8ec94a1f078af076facce833ec97aa86f09ce537faa381de71ffd9caaa7cd7b0fcff02d7eba53b6034f1ff66f3221947dc4032b241041edfb7d375478cd4bb20912f7ac56c99f02d2f6d7f5deba7ba65bd06b0412a7a27c708a1b478f2900270fb8b3a06424e27ddbb033192752333e3a89b43ecf4d6892333428f176ccc0d495ff1df7aff3b47fabd3ed08b49ad1e1fd3cc453f77280e75fc1245ad7e72ea845bf11adde5f73affe3ec6f757dfd1456cd5e1bebfa901520cf035904b425d77d00cece9258da7cd86071a9aaacbe733c8d01b19eed46d84cd1f995201a177db5f1656ab7be88a8897da4705d0852973ae9cf6564ceb43cc23fc45a617bd6978d16fe0f49b45c6c437748e0681b3df49a969a2220a1cb12a137b398b3a2d2f165509025a5ffbc56f5fa33448f003a67f8aaef0e674ef8860d47acc54184ce1324957eb95667b6d8b292a63ed8ca00cf683689e64b237168a2e844fa348c75af2ce126cd52a0deaa5abc7d8b703c735c596c91c6e59e6a8a84ed885a4fc4116eb83c26f79ff85daaa925b62c81fc63ebde812003eb037c3f2ced05b166743157ad3761676bcfd974741e89ef7ad50536d558a301d9ba7fcb729da235fc479a4e28aa182bece9d271ffd3c60b025ef7a0ce09153cad5fa76fdfcc209e3e59714965be037384ad151a6d99ac29e30b7b07a9e64996c24079b74b9e0e18da1ce38aa8dfdc988a6a43dc6193c9a8f12bc5b0d801dd43d3e331ef1444815415872b8c775c14d45d0cf98427005c49faad703b771a096281952a945fb2a88e0bc209431128a22ca4738b4e8e9613170bc4e46fd8eace17c8b6336b96afba315a7e8ecc5e317098fdc613f8536fd088d6dc36fcafc9c66ec80632ad2c5a963825fd043449587f69b29ac9cabf76ecff4d71ed693af86ed93894173d528cab0da966b7847d0dfbe5708503995e9a6c539d1e2e9714a3f7b281e5e7908d15c302e21ad786226092a95417e24d8685df44bb2f7b8df6c3fdf520b37305b53252dd67de6c40f0bfe8902be897921d0e9cbbe7eb67812d31f342eaacbb8b067fdf499855f60f53aaf1178cc97b79ab37fd8396d7313a57f6ebc8932a7f74ab64fcde5d270342c1a6c07f9cae500a5f85fe2c00c40a5809890db3b193d5366610a57c54121b362cec74c1111a3da401f432f5966e59342ce08e06eb58a05d7e52e07482d25c7186d6ea07cc252276e2ef90124c88731952e853a13ab8d8b5300708842ba9cdac5d3fef7c6e745d38975f9f254850550cdf3866d6b8ab20d7125c4c2e841b8511fea9b1c540ff7cc9cff8bb83c7ba261fcb06e44718e1eda681a39490e002bd5b884b714a535090425cfaa1433f556720f2c4378837ce92673b1ed01f18dc8e33ba1dbb8ded8e5e1c2b6b5ee4d9cbba3ac220c3d3939817c48f22b00330194314c89ea96f02c4213f99906f5a1ead8cdb67f6bcdad1fc94ee175d6de9cb312569e46022c8a265ac6f48616fff3d54c7c14bd6d36dcf441e2fd680243c85721d70061cfc9250d6be42d0024a8887df19b51c767347019ad18932101d1d1279f90204097918613f3511e147fbe1a058933473541acdeb0e1436cb6433a5a", 0x1000}, {&(0x7f00000018c0)="a7577ccb0be343d0fc59c50f321abe544c6669271018908acfb4fedaae741a3762571550b5a43e9af6d257347e3688b6dfcbcc18a8b746b13698a3a05f2568674513bafd20d2cea4116622c6b6d2", 0x5d}, {&(0x7f0000004100)="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", 0x1000}, {&(0x7f0000001940)="6a08842fa1291aa6353bf3ee5a2123833cc4091ba7aca23e8c15aa37e60a5c29329506f583cd8e87abe67cc47751aac5bc2c", 0x32}, {&(0x7f0000001980)="ccc892c94b0292aa034dd53bc778032171fa5285fb965b1b5daf92d4e495d39255c185e301b20bbdf851015a", 0x2c}], 0x7, &(0x7f0000001a40)=[{0x70, 0x88, 0xf253, "d22cee6d1eb6d0c2f398d5d3bd0ffecba71436a68c97c45bc64ba1f9f8db6b651b53a019749b3696f298473a2ac7dc0d906217481dc4730b65cdda87c2ceab00777cf4558779ac41c3ee30c1c1bc878b76a1595722eff34feb622d"}, {0xf0, 0x15, 0x0, "fe79e8c487181cfe037af537cc8e5efef6286af8007eb101e852d6ff92fa523f4b3f2d526bc68768adb624c5acad5da03dbc7d7e95b78ef74f1d36c80c28bcc845946c3ad80ea2e6e05999578b3b7eac119b978af8b9e6963140ed2dbbe26909b26ec61895e5d46a75f5e388df5d0f09e0cb2f1851804e194d3225b2f331dcaaf8eb4b74f45f730353f1c17a8816da0f7444462d1c04f29a57476b0e56e3f2f0767fb9e24fe71725e5763f75c866f3cb876cedc2d08a540bd9a64fb070b09d04330cd6da98da78ae62bfb97eaa70e6c9504872f8d4417508d38dff95b874a3"}, {0x40, 0x451e951bf6dccfcd, 0xfff, "34ee0fac3201c9ddf0cd9680afc1e781b90010c1b3972b1debaac25e6b96484e6ead91831fe5f2688cbb71bb71"}, {0x40, 0x157, 0x4, "6db69d4144510844a955932f009e3b0c2ce97a0d5c7972160cc843364fa17ddc99bf292c30eb68db0c21fe87"}, {0x50, 0xe8e476cd11ab3292, 0x3f, "e13aec7e7afccccafd9a21d6afef4367d85aede71f37cc1c6e8739fd7b1aaff5304e90334ec119d16e79c323fa7568e6ce16f5d3a76a422044750fdf2743f1ad"}, {0x58, 0x10f, 0x3ff, "8e767dd3f8d4ac060bb861e39eabbe2eae0b0323449d805d7ba4c2a249ccac3cc2df8755b2a5f6504dbcb117358577af403f826eb656db21ccc3e26942ff958505043c0d47864248"}, {0xe8, 0x29, 0x7f, "07ccdf4106f4cbaee6c100f8eed3bad8355f4eb7b7c32510235b737f195e4444b77a88d404941fa3cf9c2e854321e35afc35805ac84e255995e964db791b1591624dc6587d3a8515ae02257878759102ff10c4ada0730404b829abe1ed512de3209081fdb573bffaab03df3273c5defc068ee7491eb7b849499252b0cdfe0c7930e483a9af65cb38564696dbe45c74494cbb8a0edf605db15c6732a9b92bb6561389f95edc5ad80939d95be44a9d39d536e866d0d5d968ffee93a9d862dba8a386ec0589b004a3ac57930b323101fdc59dcdb4"}, {0xe8, 0x10a, 0x3, "1a26f2640989e940c43b6bfa846d8fd425b5c2e37ebcceed542fd02c128aea90deaa8cbeb737df4c38aee09427dd09e7a10a9551b13cc60b573c3ea6bb037501c261b96eedd4f2845dca502c016fc494685eca5de4ae76e4b1c6216dad8cfc1bc4d1a5427eef806a8a01bc84b2d50e9dd787abd9b1bb74e901596a07168ee1e934e67d4651f9ae4beec8b476c0c614cfaa8ffb2a32a7e55c9787d39dbaa6a7bfabd3212c75f408758b6d568a8de45af47754a0a93082bfb5dc4f4645b3c008f1f124b8809b5d07eb791f86dd8c529b85c64cb4ddbeff21"}], 0x458}}, {{&(0x7f0000001ec0)=@pppol2tpv3in6={0x18, 0x1, {0x0, r5, 0x0, 0x2, 0x1, 0x0, {0xa, 0x4e22, 0x8, @loopback, 0x8}}}, 0x80, &(0x7f0000005180)=[{&(0x7f0000001f40)="1379a221f8fd84bd1009cb976b9d6d43428ad4602b7f9f28e2803da0228a0aed1ac9c09a9f2820eb6c56a94ebe22b4e25037e2f8da90b6cc570def7b2701aadd391f28ab3496633135cfd516c2b9", 0x4e}, {&(0x7f0000001fc0)="7b496b320059a49d12853f78459ba802fb32b1ecd16ce7ce5530ca8d771b5d270a71e1363b73e1df9f896b06e0d1ddce0c0c0c9a26d8da13882c6841a6b3f079004cbf542012b9eea31e296b598d25ce5cd6447559a6db83129cb9dcf5dc89ecbeb00ed0149196b77f668618a95993533259f81a8d204eeaaf83c6d7826d2c3251cd774a51bf1808aa3cc33d7660b577a635be79415f21127c8c9661ccc8c0cd27398a17fa5e", 0xa6}, {&(0x7f0000002080)="7a8ce969f12fff83d3d9faae262a132057b98e07ab8b71f5991b03a498512e99ec14dda3380938658357b7a331bab4381fae2536a1877f410fda2a2f7400361c018947b3ac5bbdb85360d5d16ebea996", 0x50}, {&(0x7f0000005100)="50d72bf10edb89b075bd7c5add0b9de42f93b630fb84737164c4e5472b730003e2ad38181f124a92bcc1e7843cafe0386dad1b51304b1167384ff46bf46e6fda734afa8ba0eb7ef4f1cc344c8cb31e48d06f1bb696c6cf46c9a46c6678f80dc0f75e0cbe", 0x64}], 0x4, 0x0, 0x1b1}}], 0x4, 0x800) r6 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) r7 = socket$inet6(0xa, 0x2, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r7, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r7, r8, &(0x7f0000000040)=0x100000, 0x8001) ioctl$KVM_DIRTY_TLB(r8, 0x4010aeaa, &(0x7f00000052c0)={0x0, 0xff}) r9 = socket$inet6(0xa, 0x2, 0x0) r10 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r9, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r9, r10, &(0x7f0000000040)=0x100000, 0x8001) syz_open_dev$midi(&(0x7f0000005340)='/dev/midi#\x00', 0x7fffffff, 0x200) setsockopt$nfc_llcp_NFC_LLCP_RW(r10, 0x118, 0x0, &(0x7f0000005300)=0x2, 0x4) sendfile(r1, r6, &(0x7f0000000040)=0x100000, 0x8001) getdents64(r6, &(0x7f0000002100)=""/4096, 0xf0a) 00:20:58 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_idize', 0x3d, 0xa00}}], [], 0x700}) 00:20:58 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x8cffffff, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x700}) 00:20:58 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x4c00, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:20:58 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x4d00, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:20:59 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000000)={'tunl0\x00', {0x2, 0x4e24, @multicast1}}) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r1, r2, &(0x7f0000000040)=0x100000, 0x8001) getdents64(r2, &(0x7f0000002100)=""/4096, 0xfffffffffffffd4f) 00:20:59 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_iiize', 0x3d, 0xa00}}], [], 0x700}) 00:20:59 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xc0000000, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x700}) 00:20:59 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents64(r0, &(0x7f0000002100)=""/4096, 0x13c3) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) rt_sigtimedwait(&(0x7f00000000c0)={0x7}, &(0x7f0000000100), &(0x7f00000001c0)={r3, r4+10000000}, 0x8) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) fsetxattr(0xffffffffffffffff, &(0x7f0000000200)=@known='system.posix_acl_default\x00', &(0x7f0000000240)='keyringeth0-\x00', 0xd, 0x6) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) sendfile(r1, r2, &(0x7f0000000040)=0x100000, 0x8001) ioctl$SIOCAX25DELFWD(r2, 0x89eb, &(0x7f0000000000)={@default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}) [ 336.575077][T14110] validate_nla: 3 callbacks suppressed [ 336.575088][T14110] netlink: 'syz-executor.4': attribute type 15 has an invalid length. [ 336.592958][T14106] EXT4-fs: 16 callbacks suppressed [ 336.592971][T14106] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_iiize=0x0000000000000a00" or missing value 00:20:59 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x5865, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:20:59 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000001c0)={0x0, 0x0}) r1 = syz_open_procfs(r0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440), 0x0, 0x0, 0x0, &(0x7f0000000480)={0x1, 0x5}, 0x0, 0x0, &(0x7f00000005c0)={0x2, 0x6, 0x401, 0x800}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=0x4}}, 0xffffffffffffff93) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000004c0)='\x00', r9}, 0x30) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000200)=0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r6, r8, 0x0, 0x5, &(0x7f0000000240)='bdev\x00', r9}, 0x30) r11 = syz_open_procfs(r10, &(0x7f0000000480)='\x88agemat\x00\x17\xcb\x18\x06X\xf5\xae~\xbeI\x11\xe5\xf0\xd9!\xa9\xce\x81Q\xe2pJ\x97\xa5\xf4R,\xdf\xef\xfc\x94X\xd2\x89^\xab3d\xed^\x9e\xe1I_\x87{\x84\xaafp?\x1a\xb5\xe1\xb7Z\xde\xb8\x8b\x01\xca\x99\x1b\xa0\xc2S!\x9f\xd5`\xf4\xb7\x00\x19\xb8\xf8\xca\xb3STX\xe7tbKK2\xed\x10`\xe6\xb0t#\x18\x15by\x81P\t\x9c\'\xf8B\x11\x9b\x88\xec6V\xf9\xcd.\xcc\xcc>\x9f\xf9$9\x0e2\x92\xb9\xc8\xd8v\x86\x1f\xdbr\xa9\xb12\xcb\xe8\x82y\xee\x02x0\'\x80\x00\x00\x00\x00=EJT\xf6\xc9\xd4\xc1\xablo\b\xfa\x12\f\x8c\xfe\xecF\x0e\xe8\xb1\xfb\x8d\xe5\xd8\x14z\xc9\xafS\x91\xffU!o\x99\x02\bK\x0f\t\xacX\x13D\x1dDEq\x8d\xb4\xb0\xc2\x83\xc8\x81L\x1dV\x7f\xa5\xf2\xf0\x86o\x0f\xc9\x98\x82):\xe2J>\xe3\n]z\x92- \x86\xb6\xb3\x87\x16\xf6j\xa4\x96\xb8') connect$inet6(r5, &(0x7f0000000080)={0xa, 0x0, 0x8, @ipv4={[], [], @multicast2}}, 0x210) r12 = socket$inet6(0xa, 0x2, 0x0) r13 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r12, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r12, r13, &(0x7f0000000040)=0x100000, 0x8001) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r12, 0x84, 0x7, &(0x7f0000000640)={0xdc}, 0x4) sendfile(r5, r11, &(0x7f0000000040)=0x100000, 0x8001) ioctl$FS_IOC_ENABLE_VERITY(r11, 0x40806685, &(0x7f0000000140)={0x1, 0x1, 0x1000, 0x58, &(0x7f0000000040)="bfa2741ba033f037737c3a8c0825a0f70dfbbd56b1c89702c64f624f912a91ebaa1dad74c5740a9565298cc8d08715eef9fcac1f3657f96ee55f54a76d7bb970aff8e76da8aa872666cb6ab681feb942e9f4bf5bda777b75", 0x4b, 0x0, &(0x7f00000000c0)="62c1dffb05d65a49bf3a672da27f8b1d582051ce39312d4c59ecd17295e4f0dafc0fdc935109fe0756ca52af3c22d277acca6c137cc9976c1774141e784d2aa05aac2bb4b78d50a9c640b0"}) read(r1, &(0x7f0000000000)=""/17, 0xfffffcd6) [ 336.683697][T14112] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 336.794995][T14120] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 336.802344][T14124] netlink: 'syz-executor.4': attribute type 15 has an invalid length. 00:20:59 executing program 3: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f454c44065b050073118ce83feba746d2f6778c7d0be4de0842d8ab9ba8738c7592bbf57e75ef9b589bd7d0c15090b000"/59], 0xa) r6 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{}]}, 0x10) close(r2) r7 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) 00:20:59 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_ilize', 0x3d, 0xa00}}], [], 0x700}) 00:20:59 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x6000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:20:59 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xf5ffffff, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x700}) 00:20:59 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x6558, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) [ 337.084448][T14129] netlink: 'syz-executor.4': attribute type 15 has an invalid length. [ 337.117284][T14128] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_ilize=0x0000000000000a00" or missing value [ 337.183514][T14131] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 337.206478][T14137] netlink: 'syz-executor.4': attribute type 15 has an invalid length. 00:20:59 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x6800, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:20:59 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_ioize', 0x3d, 0xa00}}], [], 0x700}) [ 337.303392][T14140] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 337.348032][T14143] netlink: 'syz-executor.4': attribute type 15 has an invalid length. 00:21:00 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x6c00, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:21:00 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xf6ffffff, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x700}) [ 337.436199][T14145] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_ioize=0x0000000000000a00" or missing value [ 337.484177][T14148] netlink: 'syz-executor.4': attribute type 15 has an invalid length. 00:21:00 executing program 2: r0 = gettid() tkill(r0, 0x1002000000016) r1 = syz_open_procfs(r0, &(0x7f0000000080)='ns\x00') getdents64(r1, &(0x7f0000002100)=""/4096, 0x13c3) ioctl$DRM_IOCTL_DROP_MASTER(0xffffffffffffffff, 0x641f) 00:21:00 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x7400, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) [ 337.564017][T14150] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 337.580595][T14153] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_ioize=0x0000000000000a00" or missing value [ 337.602598][T14157] netlink: 'syz-executor.4': attribute type 15 has an invalid length. 00:21:02 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f454c44065b050073118ce83feba746d2f6778c7d0be4de0842d8ab9ba8738c7592bbf57e75ef9b589bd7d0c15090b000"/59], 0xa) r6 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{}]}, 0x10) close(r2) r7 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) [ 339.820652][T14168] netlink: 'syz-executor.4': attribute type 15 has an invalid length. [ 339.831439][T14167] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_ipize=0x0000000000000a00" or missing value 00:21:02 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x8100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:21:02 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r5, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r6, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}, 0x1110002, 0xffffffffffffffff}}}, 0x90) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x10000, @mcast1, 0x1}, {0xa, 0x4e20, 0x3f, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x6}, r6, 0xc7}}, 0x48) r7 = dup3(r2, r1, 0x0) setsockopt$RXRPC_SECURITY_KEY(r7, 0x110, 0x1, &(0x7f00000006c0)='syz', 0x3) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) fcntl$setstatus(r0, 0x4, 0xc800) read(r0, &(0x7f0000000000)=""/17, 0xfffffcd6) r8 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000400)={'syz'}, &(0x7f00000001c0)="04", 0x1, 0xfffffffffffffffd) r9 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000240)={0x6, 0x5, 0x401}) keyctl$dh_compute(0x17, &(0x7f0000000040)={r9, r8, r9}, 0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)={'sha384-generic\x00\n\x00'}}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000200)={r8, 0x92, 0xc5}, &(0x7f0000000480)={'enc=', 'oaep', ' hash=', {'nhpoly1305-sse2\x00'}}, &(0x7f0000000500)="e8096e8cca577a7b153656f80c40b0e7f6a6e043cd135a0a59a2e61d845897a584215941733bd1a086d53257a45f4525ff61a478b4643aa6de1491a18b26a9d83743383b41d659aff93ad5af03940945dd3a7304c45f9bd02b7dcafc8b0842cf365a439f587a99ce50a46780e9f43fbbdc7fcbadc7af4a8e1e3e6915864530279277ab662bbaecbaddb7fddf1b3d531873e2", &(0x7f00000005c0)=""/197) 00:21:02 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0xf000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) [ 339.959637][T14177] netlink: 'syz-executor.4': attribute type 15 has an invalid length. 00:21:02 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xfcfdffff, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x700}) [ 340.068670][T14186] netlink: 'syz-executor.4': attribute type 15 has an invalid length. 00:21:02 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_iuize', 0x3d, 0xa00}}], [], 0x700}) [ 340.267444][T14178] ucma_write: process 720 (syz-executor.1) changed security contexts after opening file descriptor, this is not allowed. 00:21:03 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents64(r0, &(0x7f0000002100)=""/4096, 0x13c3) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r1, r2, &(0x7f0000000040)=0x100000, 0x8001) ioctl$VIDIOC_G_EDID(r2, 0xc0285628, &(0x7f0000000040)={0x0, 0x7fff, 0x8001, [], &(0x7f0000000000)=0x8}) 00:21:03 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0xfeff, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:21:03 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f454c44065b050073118ce83feba746d2f6778c7d0be4de0842d8ab9ba8738c7592bbf57e75ef9b589bd7d0c15090b000"/59], 0xa) r6 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) close(0xffffffffffffffff) r7 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) 00:21:03 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0xff0f, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:21:03 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) getsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000040), &(0x7f0000000080)=0x4) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0) r7 = syz_open_procfs(r6, &(0x7f00000000c0)='net/\x13\x12A`\x92\x01\xa8-3*\xe6\xd6\xcfMt\xeb^\xf9.K\r\x96E\x01\x00_v') getdents64(r7, &(0x7f0000002100)=""/4096, 0x13c3) ioctl$SIOCX25SENDCALLACCPT(0xffffffffffffffff, 0x89e9) 00:21:03 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/exec\x00', 0x3, 0x0) r0 = gettid() tkill(r0, 0x1002000000016) r1 = syz_open_procfs(r0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f454c44065b050073118ce83feba746d2f6778c7d0be4de0842d8ab9ba8738c7592bbf57e75ef9b589bd7d0c15090b000"/59], 0xa) r6 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) close(0xffffffffffffffff) r7 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) 00:21:04 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x400300, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:21:04 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_is\\ze', 0x3d, 0xa00}}], [], 0x700}) 00:21:04 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xffffefff, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x700}) 00:21:04 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0xf0ffff, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) [ 341.686264][T14259] validate_nla: 5 callbacks suppressed [ 341.686275][T14259] netlink: 'syz-executor.4': attribute type 15 has an invalid length. [ 341.711635][T14257] EXT4-fs: 17 callbacks suppressed [ 341.711647][T14257] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_is\ze=0x0000000000000a00" or missing value [ 341.779216][T14266] netlink: 'syz-executor.4': attribute type 15 has an invalid length. [ 341.788229][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 341.788293][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 341.788398][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 341.788483][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 341.788607][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 341.788658][ C1] protocol 88fb is buggy, dev hsr_slave_1 00:21:04 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x1000000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) [ 341.827618][T14261] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 341.894562][T14268] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_is\ze=0x0000000000000a00" or missing value [ 341.926374][T14272] netlink: 'syz-executor.4': attribute type 15 has an invalid length. 00:21:04 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isi\\e', 0x3d, 0xa00}}], [], 0x700}) [ 342.119047][T14275] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isi\e=0x0000000000000a00" or missing value [ 342.233748][T14277] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isi\e=0x0000000000000a00" or missing value 00:21:06 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='comm\x00') getdents64(r0, &(0x7f0000002100)=""/4096, 0x13c3) 00:21:06 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xfffffdfc, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x700}) 00:21:06 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x2000000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:21:06 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isiz%', 0x3d, 0xa00}}], [], 0x700}) 00:21:06 executing program 3: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f454c44065b050073118ce83feba746d2f6778c7d0be4de0842d8ab9ba8738c7592bbf57e75ef9b589bd7d0c15090b000"/59], 0xa) r6 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) close(0xffffffffffffffff) r7 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) 00:21:06 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') r1 = socket$inet6(0xa, 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r1, r2, &(0x7f0000000040)=0x100000, 0x8001) lseek(r2, 0x0, 0x1) getdents64(r0, &(0x7f0000002100)=""/4096, 0x13c3) [ 344.255542][T14286] netlink: 'syz-executor.4': attribute type 15 has an invalid length. [ 344.285968][T14288] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isiz%=0x0000000000000a00" or missing value 00:21:06 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents64(r0, &(0x7f0000002100)=""/4096, 0x13c3) openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x101000, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x8, 0x80c03) recvfrom$rose(r1, &(0x7f00000000c0)=""/145, 0x91, 0x10000, &(0x7f0000000180)=@full={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x5, [@default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}, 0x40) 00:21:06 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x3000000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) [ 344.368089][T14290] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 344.459359][T14300] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 00:21:07 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents64(r0, &(0x7f0000002100)=""/4096, 0x13c3) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x1, 0x100) ioctl$KVM_KVMCLOCK_CTRL(r1, 0xaead) 00:21:07 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isiz\\', 0x3d, 0xa00}}], [], 0x700}) [ 344.504556][T14303] netlink: 'syz-executor.4': attribute type 15 has an invalid length. 00:21:07 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x700}) 00:21:07 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x4000000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:21:07 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') r1 = socket$inet6(0xa, 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = socket$inet6(0xa, 0x2, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x1c) sendfile(r3, r4, &(0x7f0000000040)=0x100000, 0x8001) ioctl$UI_SET_EVBIT(r4, 0x40045564, 0xffffffff9674adf9) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r1, r2, &(0x7f0000000040)=0x100000, 0x8001) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000000)=0x0) syz_open_procfs(r5, &(0x7f0000000040)='net/udp6\x00') getdents64(r0, &(0x7f0000002100)=""/4096, 0x13c3) [ 344.695554][T14311] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isiz\=0x0000000000000a00" or missing value [ 344.740057][T14314] netlink: 'syz-executor.4': attribute type 15 has an invalid length. [ 344.752298][T14310] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 00:21:07 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x5000000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:21:07 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x2d, 0xa00}}], [], 0x700}) 00:21:07 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/sockstat6\x00') getdents64(r0, &(0x7f0000002100)=""/4096, 0x13c3) [ 344.987199][T14323] netlink: 'syz-executor.4': attribute type 15 has an invalid length. 00:21:07 executing program 3: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f454c44065b050073118ce83feba746d2f6778c7d0be4de0842d8ab9ba8738c7592bbf57e75ef9b589bd7d0c15090b000"/59], 0xa) r6 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) close(r2) r7 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) 00:21:07 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xffffff8c, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x700}) 00:21:07 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x6000000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:21:07 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents64(r0, &(0x7f0000002100)=""/4096, 0x13c3) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r1, r2, &(0x7f0000000040)=0x100000, 0x8001) sendmsg$nl_crypto(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2a310daf8e6fcc9b}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)=@alg={0xf8, 0x10, 0x200, 0x70bd26, 0x25dfdbfe, {{'drbg_nopr_hmac_sha1\x00'}, [], [], 0x2400, 0x2600}, [{0x8, 0x1, 0x6c8}, {0x8, 0x1, 0x8}, {0x8, 0x1, 0x7ff}]}, 0xf8}, 0x1, 0x0, 0x0, 0x10}, 0x4064082) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r3, r4, &(0x7f0000000040)=0x100000, 0x8001) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r5, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r5, r6, &(0x7f0000000040)=0x100000, 0x8001) ioctl$NBD_SET_SOCK(r4, 0xab00, r6) [ 345.236946][T14336] netlink: 'syz-executor.4': attribute type 15 has an invalid length. 00:21:07 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3b, 0xa00}}], [], 0x700}) 00:21:07 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x7000000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:21:08 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xfffffff5, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x700}) [ 345.451471][T14347] netlink: 'syz-executor.4': attribute type 15 has an invalid length. 00:21:08 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents64(r0, &(0x7f0000002100)=""/4096, 0x13c3) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r1, r2, &(0x7f0000000040)=0x100000, 0x8001) ioctl$VIDIOC_G_PRIORITY(r2, 0x80045643, 0x2) 00:21:08 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0xa000000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) [ 345.642841][T14359] netlink: 'syz-executor.4': attribute type 15 has an invalid length. 00:21:08 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x300}}], [], 0x700}) 00:21:08 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents64(r0, &(0x7f0000002100)=""/4096, 0x13c3) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x141000, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x11, &(0x7f0000000200)=@assoc_value={r4}, 0x8) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f00000000c0)={r4, @in={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x84) 00:21:08 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0xc000000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:21:08 executing program 3: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f454c44065b050073118ce83feba746d2f6778c7d0be4de0842d8ab9ba8738c7592bbf57e75ef9b589bd7d0c15090b000"/59], 0xa) r6 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) close(r2) r7 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) 00:21:08 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xfffffff6, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x700}) 00:21:08 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0xe000000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:21:08 executing program 2: r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000400)={'syz'}, &(0x7f00000001c0)="04", 0x1, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000040)={r1, r0, r1}, 0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)={'sha384-generic\x00\n\x00'}}) keyctl$describe(0x6, r0, &(0x7f00000000c0)=""/225, 0xe1) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents64(r2, &(0x7f0000002100)=""/4096, 0x13c3) 00:21:08 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x500}}], [], 0x700}) 00:21:08 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0xf000000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:21:08 executing program 2: r0 = gettid() r1 = syz_open_procfs(r0, &(0x7f0000000000)='nX\x00') getdents64(r1, &(0x7f0000002100)=""/4096, 0x13c3) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r2, r3, &(0x7f0000000040)=0x100000, 0x8001) r4 = socket$isdn(0x22, 0x3, 0x1) kcmp(r0, r0, 0x2, r3, r4) 00:21:08 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x1000000000, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x700}) 00:21:08 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x600}}], [], 0x700}) 00:21:08 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x10000000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:21:09 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') r1 = dup(r0) accept4$rose(0xffffffffffffffff, &(0x7f0000000000)=@full={0xb, @dev, @default, 0x0, [@default, @null, @remote, @rose, @netrom, @rose]}, &(0x7f0000000040)=0x20, 0x81800) getdents64(r1, &(0x7f0000002100)=""/4096, 0xffffff15) 00:21:09 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x20000000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) [ 346.718157][T14411] validate_nla: 4 callbacks suppressed [ 346.718169][T14411] netlink: 'syz-executor.4': attribute type 15 has an invalid length. 00:21:09 executing program 3: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f454c44065b050073118ce83feba746d2f6778c7d0be4de0842d8ab9ba8738c7592bbf57e75ef9b589bd7d0c15090b000"/59], 0xa) r6 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) close(r2) r7 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) 00:21:09 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') r1 = gettid() tkill(r1, 0x1002000000016) getpid() syz_open_procfs(r1, &(0x7f00000000c0)='net/udp\x00') getdents64(r0, &(0x7f0000002100)=""/4096, 0x13c3) 00:21:09 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x1000000000000, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x700}) 00:21:09 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x700}}], [], 0x700}) 00:21:09 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x3f000000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) [ 347.149211][T14416] netlink: 'syz-executor.4': attribute type 15 has an invalid length. [ 347.173321][T14420] EXT4-fs: 24 callbacks suppressed [ 347.173338][T14420] EXT4-fs (sda1): required extra inode space not available 00:21:09 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x40000000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) [ 347.235289][T14420] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000700, [ 347.263216][T14419] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 347.305851][T14426] netlink: 'syz-executor.4': attribute type 15 has an invalid length. 00:21:09 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x48000000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) [ 347.366074][T14427] EXT4-fs (sda1): required extra inode space not available [ 347.392406][T14427] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000700, 00:21:10 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x900}}], [], 0x700}) 00:21:10 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x2000000000000, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x700}) [ 347.464989][T14431] netlink: 'syz-executor.4': attribute type 15 has an invalid length. 00:21:10 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x4c000000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:21:10 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, 0xfffffffffffffffe) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x80000001, @empty}, 0x1c) r4 = socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r4, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r5, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r5, r6, &(0x7f0000000040)=0x100000, 0x8001) sendfile(r2, r5, &(0x7f0000000040)=0x8, 0x7) ioctl$DRM_IOCTL_GEM_OPEN(r3, 0xc010640b, &(0x7f0000000040)={0x0, 0x0, 0x401}) r8 = socket$inet6(0xa, 0x2, 0x0) r9 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r8, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r8, r9, &(0x7f0000000040)=0x100000, 0x8001) ioctl$DRM_IOCTL_GEM_FLINK(r9, 0xc008640a, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f00000000c0)={r7, r10}) r11 = socket$inet6(0xa, 0x2, 0x0) r12 = syz_open_procfs(0x0, &(0x7f0000000440)='pagem\x96p\x02') connect$inet6(r11, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r11, r12, &(0x7f0000000040)=0x100000, 0x8001) ioctl$FS_IOC_SETFLAGS(r11, 0x40086602, &(0x7f00000001c0)=0x7) r13 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f454c44065b050073118ce83feba746d2f6778c7d0be4de0842d8ab9ba8738c7592bbf57e75ef9b589bd7d0c15090b000"/59], 0xa) r6 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) close(r2) socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) 00:21:12 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xa02}}], [], 0x700}) 00:21:12 executing program 1: ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000040)={0xaa, 0x3}) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f454c44065b050073118ce83feba746d2f6778c7d0be4de0842d8ab9ba8738c7592bbf57e75ef9b589bd7d0c15090b000"/59], 0xa) r6 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) close(r2) socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) [ 350.171452][T14456] netlink: 'syz-executor.4': attribute type 15 has an invalid length. 00:21:12 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x65580000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:21:12 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x400840) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f454c44065b050073118ce83feba746d2f6778c7d0be4de0842d8ab9ba8738c7592bbf57e75ef9b589bd7d0c15090b000"/59], 0xa) r6 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) close(r2) socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) 00:21:13 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x74000000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:21:13 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xa05}}], [], 0x700}) 00:21:13 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x7a000000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:21:13 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x100000000000000, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x700}) 00:21:14 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xa06}}], [], 0x700}) 00:21:14 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x81000000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:21:14 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x200000000000000, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x700}) 00:21:14 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x88a8ffff, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:21:14 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xa07}}], [], 0x700}) [ 351.781835][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 351.781867][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 351.787836][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 351.821308][T14540] validate_nla: 3 callbacks suppressed [ 351.821317][T14540] netlink: 'syz-executor.4': attribute type 15 has an invalid length. 00:21:14 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x9effffff, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:21:14 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x300000000000000, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x700}) 00:21:14 executing program 3: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f454c44065b050073118ce83feba746d2f6778c7d0be4de0842d8ab9ba8738c7592bbf57e75ef9b589bd7d0c15090b000"/59], 0xa) r6 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) close(r2) r7 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r7, 0x1, 0x11, 0x0, &(0x7f00000003c0)) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) [ 352.050097][T14549] netlink: 'syz-executor.4': attribute type 15 has an invalid length. 00:21:14 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xa08}}], [], 0x700}) 00:21:14 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0xf0ffffff, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) [ 352.181838][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 352.181933][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 352.187632][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 352.187736][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 352.238302][T14557] EXT4-fs: 36 callbacks suppressed [ 352.238316][T14557] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 352.299550][T14561] netlink: 'syz-executor.4': attribute type 15 has an invalid length. [ 352.332916][T14559] EXT4-fs (sda1): required extra inode space not available 00:21:14 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x700}) 00:21:14 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0xfeff0000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) [ 352.365001][T14559] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000a08, [ 352.525440][T14564] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 352.537642][T14569] netlink: 'syz-executor.4': attribute type 15 has an invalid length. [ 352.547154][T14567] EXT4-fs (sda1): required extra inode space not available [ 352.567476][T14567] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000a08, 00:21:15 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xa09}}], [], 0x700}) 00:21:15 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0xff0f0000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) [ 352.658594][T14570] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 00:21:15 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x500000000000000, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x700}) [ 352.749583][T14573] netlink: 'syz-executor.4': attribute type 15 has an invalid length. 00:21:15 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0xffffa888, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) [ 352.891182][T14575] EXT4-fs (sda1): required extra inode space not available [ 352.934891][T14575] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000a09, [ 352.960515][T14578] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 00:21:15 executing program 3: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f454c44065b050073118ce83feba746d2f6778c7d0be4de0842d8ab9ba8738c7592bbf57e75ef9b589bd7d0c15090b000"/59], 0xa) r6 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) close(r2) r7 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r7, 0x1, 0x11, 0x0, &(0x7f00000003c0)) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) [ 352.978050][T14581] netlink: 'syz-executor.4': attribute type 15 has an invalid length. 00:21:15 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0xfffff000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:21:15 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x600000000000000, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x700}) 00:21:15 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xa10}}], [], 0x700}) [ 353.154571][T14589] netlink: 'syz-executor.4': attribute type 15 has an invalid length. 00:21:15 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0xffffff7f, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) [ 353.357715][T14599] netlink: 'syz-executor.4': attribute type 15 has an invalid length. 00:21:16 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x700000000000000, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x700}) 00:21:16 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0xffffff9e, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:21:16 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xa2d}}], [], 0x700}) [ 353.532024][T14602] netlink: 'syz-executor.4': attribute type 15 has an invalid length. 00:21:16 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0xfffffff0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) [ 353.694753][T14612] netlink: 'syz-executor.4': attribute type 15 has an invalid length. 00:21:16 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x800000000000000, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x700}) 00:21:16 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x3000000000000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:21:16 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xa3b}}], [], 0x700}) [ 353.861851][ C0] net_ratelimit: 3 callbacks suppressed [ 353.861859][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 353.861884][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 353.867530][ C0] protocol 88fb is buggy, dev hsr_slave_1 00:21:16 executing program 3: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f454c44065b050073118ce83feba746d2f6778c7d0be4de0842d8ab9ba8738c7592bbf57e75ef9b589bd7d0c15090b000"/59], 0xa) r6 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) close(r2) r7 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r7, 0x1, 0x11, 0x0, &(0x7f00000003c0)) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) 00:21:16 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents64(r0, &(0x7f0000002100)=""/4096, 0x13c3) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') ioctl$KVM_DEASSIGN_DEV_IRQ(r2, 0x4040ae75, &(0x7f00000000c0)={0xbf4, 0x3, 0x7f, 0x4}) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r3, r4, &(0x7f0000000040)=0x100000, 0x8001) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r5, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r5, r6, &(0x7f0000000040)=0x100000, 0x8001) ioctl$DRM_IOCTL_AGP_ALLOC(r6, 0xc0206434, &(0x7f0000000100)={0x81, 0x0, 0x1, 0x1}) ioctl$DRM_IOCTL_AGP_BIND(r4, 0x40106436, &(0x7f0000000140)={r7, 0x1}) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendfile(r1, r2, &(0x7f0000000040)=0x100000, 0x8001) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f0000000000)=0xbe) 00:21:16 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x40030000000000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:21:16 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0xf0ffffffffffff, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:21:16 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents64(r0, &(0x7f0000002100)=""/4096, 0x13c3) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r3, r4, &(0x7f0000000040)=0x100000, 0x8001) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r0) sendfile(r1, r2, &(0x7f0000000040)=0x100000, 0x8001) ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f00000000c0)={0x0, {0x2, 0x4e23, @remote}, {0x2, 0x4e21, @loopback}, {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x2, 0x0, 0x0, 0x0, 0x20, &(0x7f0000000000)='bridge_slave_1\x00', 0x9, 0x100, 0x8}) 00:21:16 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x2500}}], [], 0x700}) 00:21:16 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x900000000000000, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x700}) 00:21:16 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x100000000000000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:21:16 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents64(r0, &(0x7f00000010c0)=""/4096, 0x1000) [ 354.261831][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 354.261860][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 354.267633][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 354.273438][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 354.284927][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 354.290802][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 354.296646][ C1] protocol 88fb is buggy, dev hsr_slave_1 00:21:16 executing program 2: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000000c0)=0x0) syz_open_procfs(r0, &(0x7f0000000000)='net/ip_mr_vif\x00') r1 = socket$inet6(0xa, 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r1, r2, &(0x7f0000000040)=0x100000, 0x8001) getdents64(r2, &(0x7f0000002100)=""/4096, 0x1000) 00:21:17 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x200000000000000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:21:17 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x2d00}}], [], 0x700}) 00:21:17 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x300000000000000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:21:17 executing program 3: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f454c44065b050073118ce83feba746d2f6778c7d0be4de0842d8ab9ba8738c7592bbf57e75ef9b589bd7d0c15090b000"/59], 0xa) r6 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) close(r2) r7 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140), 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) 00:21:17 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x3b00}}], [], 0x700}) 00:21:17 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xa00000000000000, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x700}) 00:21:17 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r2 = socket$inet6(0xa, 0x2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r2, r3, &(0x7f0000000040)=0x100000, 0x8001) r4 = accept4(r3, &(0x7f0000000280)=@pppoe, &(0x7f0000000300)=0x80, 0x80000) bind$inet(r4, &(0x7f0000000340)={0x2, 0x4e22, @rand_addr=0x2}, 0x10) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) r5 = openat$vimc0(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video0\x00', 0x2, 0x0) sendfile(r5, r1, &(0x7f0000000040)=0x100000, 0x8001) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x4, @mcast1, 0x4f8}], 0x2c) r6 = gettid() tkill(r6, 0x1002000000016) r7 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(r7, 0x80845663, &(0x7f00000001c0)) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='ns\x00') getdents64(r8, &(0x7f0000002100)=""/4096, 0x13c3) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video2\x00', 0x2, 0x0) 00:21:17 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x400000000000000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:21:17 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x500000000000000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:21:17 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x4000}}], [], 0x700}) 00:21:17 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x1000000000000000, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x700}) 00:21:17 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x600000000000000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:21:17 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x700000000000000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:21:18 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f454c44065b050073118ce83feba746d2f6778c7d0be4de0842d8ab9ba8738c7592bbf57e75ef9b589bd7d0c15090b000"/59], 0xa) r6 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) close(r2) r7 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140), 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) 00:21:18 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0xa00000000000000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:21:18 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xff00}}], [], 0x700}) 00:21:20 executing program 2: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) r0 = gettid() tkill(r0, 0x1002000000016) r1 = syz_open_procfs(r0, &(0x7f0000000080)='ns\x00') getdents64(r1, &(0x7f0000002100)=""/4096, 0x13c3) setsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000040)={0x2, 0x99}, 0x2) 00:21:20 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0xc00000000000000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:21:20 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x2000000000000000, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x700}) 00:21:20 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f454c44065b050073118ce83feba746d2f6778c7d0be4de0842d8ab9ba8738c7592bbf57e75ef9b589bd7d0c15090b000"/59], 0xa) r6 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) close(r2) r7 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140), 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) [ 357.938671][T14733] validate_nla: 11 callbacks suppressed [ 357.938681][T14733] netlink: 'syz-executor.4': attribute type 15 has an invalid length. [ 357.958620][T14735] EXT4-fs: 44 callbacks suppressed [ 357.958632][T14735] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize=0x0000000000000a00-" or missing value 00:21:20 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0xe00000000000000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) [ 358.013722][T14738] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 00:21:20 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f454c44065b050073118ce83feba746d2f6778c7d0be4de0842d8ab9ba8738c7592bbf57e75ef9b589bd7d0c15090b000"/59], 0xa) r6 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) close(r2) r7 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) 00:21:23 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f454c44065b050073118ce83feba746d2f6778c7d0be4de0842d8ab9ba8738c7592bbf57e75ef9b589bd7d0c15090b000"/59], 0xa) r6 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) close(r2) r7 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) [ 361.173437][T14778] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 00:21:23 executing program 1: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0, 0x8, 0x0, 0x100, 0x7fff}, &(0x7f0000000100)=0x18) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r7, 0x84, 0x76, &(0x7f0000000140)={r10}, &(0x7f0000000240)=0x8) r11 = socket$inet6(0xa, 0x2, 0x0) r12 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r11, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r11, r12, &(0x7f0000000040)=0x100000, 0x8001) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000001, 0x8010, r11, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r4, 0xc0945662, &(0x7f0000000180)={0x4, 0x0, [], {0x2f835d3bbe203a85, @bt={0x4ee, 0x8, 0x3, 0x1, 0x7e, 0x2, 0x9, 0xc3, 0xa509, 0x9, 0x8, 0x4, 0x9, 0x0, 0x7, 0x30}}}) getdents64(r0, &(0x7f0000002100)=""/4096, 0x13c3) 00:21:23 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xa00}}], [], 0x703}) 00:21:23 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x3f00000000000000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:21:24 executing program 3: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f454c44065b050073118ce83feba746d2f6778c7d0be4de0842d8ab9ba8738c7592bbf57e75ef9b589bd7d0c15090b000"/59], 0xa) r6 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) close(r2) r7 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) 00:21:24 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x3b00000000000000, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x700}) [ 361.406553][T14801] netlink: 'syz-executor.4': attribute type 15 has an invalid length. 00:21:24 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f454c44065b050073118ce83feba746d2f6778c7d0be4de0842d8ab9ba8738c7592bbf57e75ef9b589bd7d0c15090b000"/59], 0xa) r6 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) close(r2) r7 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) 00:21:24 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xa00}}], [], 0x704}) [ 361.591986][T14816] netlink: 'syz-executor.4': attribute type 15 has an invalid length. 00:21:24 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x4800000000000000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:21:24 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') r1 = socket$inet6(0xa, 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r1, r2, &(0x7f0000000040)=0x100000, 0x8001) bind$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x80, 0x1}}, 0x10) getdents64(r0, &(0x7f0000002100)=""/4096, 0x13c3) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, &(0x7f00000000c0)) 00:21:24 executing program 3: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f454c44065b050073118ce83feba746d2f6778c7d0be4de0842d8ab9ba8738c7592bbf57e75ef9b589bd7d0c15090b000"/59], 0xa) r6 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) close(r2) r7 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) 00:21:24 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x3f00000000000000, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x700}) [ 361.765889][T14831] netlink: 'syz-executor.4': attribute type 15 has an invalid length. 00:21:24 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/igmp6\x00') r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = msgget$private(0x0, 0x0) msgsnd(r3, &(0x7f00000000c0)={0x2, "3975e846e08547a55ef22fd80234e8ff17d822f95c6d8adc7ca68c5a14c24fd84b491f90e7015e9e5ff1393f9e53bfd86d6aa95e2ff798d311dc511df57666c7a62280f1b9df2865798daf1bd0a1703243d573b40f7772355d461709d8e6336b0e3c443036c5b28fd9f075351906e3b262ed204658d33af16c126f357c61156a8565eaffba70999a39b7fa9ce5e6c4b71af068feec30beedf06ebb244cf52a56e0c44da159e9ff66f365c65234e54235d116d7fb8ac08dd4c8e2aae6775a19a1090ac8948bc92ef9669632aba5cff7b448fc5fa482bb4c107d0903f382c354e54d35dee6e2c68c5e2f4bc98e597637768d608f935d9dbaf92819a552b908b3a5407a74e2c844546ec78c720f1aaa6920da89df89ce02a273e0d8a63808723c2b292f39efa348401163fc60da8e3e24871a40d90df760b755d4821efe7622f202927dac4826d9902558b4f4670065e57b9d37ccd9a17014e501244cd5647d5309c9d53a1124ff07a4a2daee3fb5b4bac749a10fe9e3e8a4cec41014be7b88594ba6b8f78f20f00f22da1ad936bd07c984e0a64ec1b538ff18f93d35339ff2f17880790ad8375b7c9516760f8b063e15fecbf9340c58cf22d722286f6d852a0a5b1da52dd2d6c0158486b5c144980d0941d5a675462b0c4c3cbf10bb5bbf2195514931670d445bb675dfb4852d3f68274306dbaac358f326c66cacf6214130d3a7fd4698aef5180c5deb4628029be83ea071875da85cce3bc0995aeff8cf2dd48a9a2c26abe42c5c3e76a24fc3de9b32831e952b1001a1346e0ee724fa22424415db8852d255bf588d4054e9859f408cbdb688d1ac3d10c2f8b4909cca213cb51ef1867dad5fe81573d831fc4e094d7c6be1ecce977eaedb844b2e340302048c05106931f7eb428703c0fe50b2113a61c7b64f162687b8c420ff2c38ceac23ce70a7619708a0dd9e78a6a85906d50f25344df42d194fa990d9dc2e80e8723aa9243b0f296bd20a5efcc7975e887368dc6d493dec85a610b28296f5eb3da6ad788fa6bfa52fb6c4a786f4baaca04284d8b042b22f533d0348a7e39bd8d1226abf0808547c04ac58591a2c32ff2a078365a4bed542236f82edd43f952d9f5cb58947ab391be8718bc7a256cb0695c7c6e11d87fad0a966303cd9477a95d28732807fb9fc7c0ed78d0064b9d7767d705ab8d2756a1bb06f0fb980a6e5a7a28d52e5cc372a6a9af0917f898427a0b6758b5c90a7d00f4caf015bf64b7e6905c04678a59a1bdc72dfbec03f80ab09c341278ca646ea762957a2985b86dffdc6d5033df34462983c0018de1cd4f3933834919f6ba8733a3878b5c39f9df27ebd832819ef0a88055219574e33b3cb6e359c2c01f3c54af80c5476d9230ddb56da11ccb4832640cd0c76b5338c9c6f2ca84570315935f5815a67b6dda0c4"}, 0x401, 0x0) msgctl$IPC_RMID(r3, 0x0) r4 = msgget$private(0x0, 0x0) r5 = msgget$private(0x0, 0x0) msgsnd(r5, &(0x7f00000000c0)={0x2, "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"}, 0x401, 0x0) msgctl$IPC_RMID(r5, 0x0) msgsnd(r5, &(0x7f0000000600)={0x2, "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"}, 0x401, 0x0) msgctl$IPC_RMID(r4, 0x0) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000140)=""/54) ioctl$sock_netrom_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000580)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={'rose', 0x0}, 0x10001, 'syz1\x00', @default, 0x7, 0x5, [@default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast]}) r6 = socket$inet6(0xa, 0x2, 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r6, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r6, r7, &(0x7f0000000040)=0x100000, 0x8001) setsockopt$inet6_tcp_TCP_MD5SIG(r6, 0x6, 0xe, &(0x7f0000000a40)={@in={{0x2, 0x4e23, @remote}}, 0x0, 0x0, 0x0, "b05e9aaf7c2e1d17560428dedb40f33446502df9298b5f1d5f8619f296d8a795a7d04d24320b740b2a5644ca1afe39ec74f7b280ac341de3d4c7c2d9b811ffd6541ac60790a87e6303e11063d367f694"}, 0xd8) msgctl$IPC_INFO(r3, 0x3, &(0x7f0000000540)=""/20) r8 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000040)="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") fcntl$setstatus(r0, 0x4, 0xc800) read(r0, &(0x7f0000000000)=""/17, 0xfffffcd6) r9 = socket$inet6(0xa, 0x2, 0x0) r10 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r9, r10, &(0x7f0000000040)=0x100000, 0x8001) setsockopt$TIPC_SRC_DROPPABLE(r10, 0x10f, 0x80, &(0x7f0000000500)=0x1, 0x4) 00:21:24 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x4c00000000000000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:21:24 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') r1 = socket$inet6(0xa, 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r1, r2, &(0x7f0000000040)=0x100000, 0x8001) getdents64(r2, &(0x7f00000000c0)=""/4096, 0x131e) sysfs$2(0x2, 0x9, &(0x7f00000010c0)=""/129) connect$pptp(r0, &(0x7f0000000000)={0x18, 0x2, {0x2, @rand_addr=0x2}}, 0x1e) 00:21:24 executing program 3: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5f454c44065b050073118ce83feba746d2f6778c7d0be4de0842d8ab9ba8738c7592bbf57e75ef9b589bd7d0c15090b000"/59], 0xa) r6 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) close(r2) r7 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0xa8f4, 0x0) [ 361.914112][T14847] netlink: 'syz-executor.4': attribute type 15 has an invalid length. 00:21:24 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x4d00000000000000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:21:24 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/exec\x00', 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) writev(r0, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="5f454c44065b050073118ce83feba746d2f6778c7d0be4de0842d8ab9ba8738c7592bbf57e75ef9b589bd7d0c15090b000"/59], 0xa) r5 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) close(r1) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0xa8f4, 0x0) 00:21:24 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') r1 = socket$inet6(0xa, 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r1, r2, &(0x7f0000000040)=0x100000, 0x8001) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r3, r4, &(0x7f0000000040)=0x100000, 0x8001) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r5, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="6f78bdfc", @ANYRES32=0x0], &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r5, 0x84, 0x11, &(0x7f0000000200)=@assoc_value={r7}, 0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r4, 0x84, 0x71, &(0x7f0000000180)={r7, 0x8}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000200)={r8, 0x91f}, 0x8) getdents64(r0, &(0x7f0000002100)=""/4096, 0x13c3) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) r9 = socket$inet6(0xa, 0x2, 0x0) r10 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r9, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r9, r10, &(0x7f0000000040)=0x100000, 0x8001) getpeername$llc(r10, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000280)=0x10) r11 = socket$inet6(0xa, 0x2, 0x0) r12 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r13 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x260600, 0x0) connect$inet6(r13, &(0x7f0000000080)={0xa, 0x0, 0x982, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x40}, 0xff8b) sendfile(r11, r12, &(0x7f0000000040)=0x100000, 0x8001) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r12, 0x28, &(0x7f00000000c0)}, 0x10) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x2000, 0x0) [ 362.235538][T14863] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 00:21:24 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x6558000000000000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:21:24 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents64(r0, &(0x7f0000002100)=""/4096, 0xffffffffffffff6c) 00:21:25 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0) r5 = socket$netlink(0x10, 0x3, 0x12) r6 = socket$inet6(0xa, 0x2, 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r6, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r6, r7, &(0x7f0000000040)=0x100000, 0x8001) r8 = syz_open_dev$rtc(&(0x7f00000001c0)='/dev/rtc#\x00', 0x7, 0x335100) io_submit(r4, 0x2, &(0x7f0000000240)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x3, r5, &(0x7f0000000080)="f38398b5faa2370e6c4578d4ead12be7a47db36012a0545e0025d6a46a336c9c61c02cf82050d3f57282cdf69c951270f6cb916d0ec765b4374a113c2229f4579fa6ea6dfc1b6692aa4b6436a6c96c01dbe70218b79ad64070999ec428416fccad0e752f760f44738bf0e146cc0a921a40b6e0716919895869242b9c6b640f6398e62c2835f519fc467270bf04f4d4129b228f5a5d73f60b7b55d2a06f5e9de0396f0642e17452c52507b3e009608b5ed9e2062d0e01cf55dfd06b8e76ff6b665a0d0f17c4138c6584f2cf0809f19183406b03882f8eb444784dddac47c0a7cf30e15809eec4f2dd80ec20b82e712ecd32b0a2", 0xf3, 0xffff, 0x0, 0x1, r7}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x2, 0x100, r8, &(0x7f0000000440)="a0cd4d3926c09ddef0631c7948ff6b259ecb1d3a290f6225b9b1f2fac221af3bbed84c45524ba02a6d886b8e23a8c3ebd8ac8773b7d0f5793fe813516946a3fdd8730eefac2c2bf6744d983422b477bc8a6da5ff1eae38afad813b14f4413b168b06cb1385e30b7d95f1bdb5f7ca7bce4dc125b092129369c333dbda758ab2e2ec9802776a1e0937d435bb", 0x8b, 0x8, 0x0, 0x2}]) 00:21:25 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x4800000000000000, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x700}) 00:21:25 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x6800000000000000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:21:25 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents64(r0, &(0x7f0000002100)=""/4096, 0x13c3) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r2, &(0x7f00000001c0)={0xa, 0x4e23, 0x5, @mcast1}, 0x1c) sendfile(r1, r2, &(0x7f0000000040)=0x100000, 0x8001) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r3, r4, &(0x7f0000000040)=0x100000, 0x8001) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x40000, 0x0) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r4, &(0x7f0000000180)={0x20002000}) sendfile(r2, r4, &(0x7f0000000000), 0x9) 00:21:25 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000a6, &(0x7f00000000c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xa00}}], [], 0x706}) [ 362.581832][ C0] net_ratelimit: 24 callbacks suppressed [ 362.581839][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 362.581869][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 362.587613][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 362.593426][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 362.610534][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 362.616488][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 362.622309][ C1] protocol 88fb is buggy, dev hsr_slave_1 00:21:25 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x705, 0x6c00000000000000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x3c}}, 0x0) 00:21:25 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) getsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000000), &(0x7f0000000040)=0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='~s\x00') getdents64(r2, &(0x7f0000002100)=""/4096, 0x13c3) 00:21:25 executing program 1: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self,\x93t\xf7W\xae\xee\x00', 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87 3d 00 f0 ff ff 77 55 4c 8d 24 06 49 89 c5 4c 39 e6 73 33 90 0f [ 363.165719][ T8838] RSP: 002b:00007ffdb7e10620 EFLAGS: 00000202 ORIG_RAX: 000000000000004e [ 363.174140][ T8838] RAX: ffffffffffffffda RBX: 000055555738c9b0 RCX: 0000000000457d7b [ 363.182107][ T8838] RDX: 0000000000008000 RSI: 000055555738c9b0 RDI: 0000000000000004 [ 363.190076][ T8838] RBP: 000055555738c9b0 R08: 0000000000000000 R09: 000000000000000b [ 363.198043][ T8838] R10: 0000000000000005 R11: 0000000000000202 R12: ffffffffffffffd4 [ 363.206009][ T8838] R13: 0000000000000016 R14: 0000000000000000 R15: 00007ffdb7e128b0 [ 363.214017][ T8838] [ 363.216338][ T8838] The buggy address belongs to the page: [ 363.221965][ T8838] page:ffffea0001913b80 refcount:2 mapcount:0 mapping:ffff8880a2d86b60 index:0x42c [ 363.231241][ T8838] def_blk_aops [ 363.231251][ T8838] flags: 0x1fffc000000203a(referenced|dirty|lru|active|private) [ 363.242345][ T8838] raw: 01fffc000000203a ffffea0001911688 ffffea00021417c8 ffff8880a2d86b60 [ 363.250931][ T8838] raw: 000000000000042c ffff888089b9b7e0 00000002ffffffff ffff888064922ac0 [ 363.259499][ T8838] page dumped because: kasan: bad access detected [ 363.265899][ T8838] page->mem_cgroup:ffff888064922ac0 [ 363.271082][ T8838] [ 363.273422][ T8838] Memory state around the buggy address: [ 363.279063][ T8838] ffff8880644eef00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 363.287119][ T8838] ffff8880644eef80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 363.295189][ T8838] >ffff8880644ef000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 363.303258][ T8838] ^ [ 363.307334][ T8838] ffff8880644ef080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 363.315396][ T8838] ffff8880644ef100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 363.323450][ T8838] ================================================================== [ 363.331503][ T8838] Disabling lock debugging due to kernel taint [ 363.342774][ T8838] Kernel panic - not syncing: panic_on_warn set ... [ 363.349425][ T8838] CPU: 1 PID: 8838 Comm: syz-executor.5 Tainted: G B 5.3.0+ #0 [ 363.358266][ T8838] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 363.368338][ T8838] Call Trace: [ 363.371632][ T8838] dump_stack+0x172/0x1f0 [ 363.375961][ T8838] panic+0x2dc/0x755 [ 363.379853][ T8838] ? add_taint.cold+0x16/0x16 [ 363.384529][ T8838] ? __ext4_expand_extra_isize+0x1ab/0x290 [ 363.390331][ T8838] ? preempt_schedule+0x4b/0x60 [ 363.395189][ T8838] ? ___preempt_schedule+0x16/0x20 [ 363.400297][ T8838] ? trace_hardirqs_on+0x5e/0x240 [ 363.405321][ T8838] ? __ext4_expand_extra_isize+0x1ab/0x290 [ 363.411127][ T8838] end_report+0x47/0x4f [ 363.415279][ T8838] ? __ext4_expand_extra_isize+0x1ab/0x290 [ 363.421084][ T8838] __kasan_report.cold+0xe/0x41 [ 363.425934][ T8838] ? __ext4_expand_extra_isize+0x1ab/0x290 [ 363.431753][ T8838] kasan_report+0x12/0x17 [ 363.436090][ T8838] check_memory_region+0x134/0x1a0 [ 363.441209][ T8838] memset+0x24/0x40 [ 363.445019][ T8838] __ext4_expand_extra_isize+0x1ab/0x290 [ 363.450680][ T8838] ext4_mark_inode_dirty+0x74e/0x9b0 [ 363.455965][ T8838] ? ext4_expand_extra_isize+0x590/0x590 [ 363.461700][ T8838] ? ___might_sleep+0x163/0x2c0 [ 363.466570][ T8838] ? __might_sleep+0x95/0x190 [ 363.471253][ T8838] ? ext4_journal_check_start+0x1ba/0x250 [ 363.477934][ T8838] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 363.484174][ T8838] ? __ext4_journal_start_sb+0x146/0x4d0 [ 363.489803][ T8838] ext4_dirty_inode+0x8f/0xc0 [ 363.494480][ T8838] ? ext4_setattr+0x1f90/0x1f90 [ 363.499351][ T8838] __mark_inode_dirty+0x68e/0x1300 [ 363.504460][ T8838] ? current_time+0xa8/0x110 [ 363.509048][ T8838] generic_update_time+0x21c/0x370 [ 363.514155][ T8838] ? file_modified+0xa0/0xa0 [ 363.518743][ T8838] touch_atime+0x23c/0x2a0 [ 363.523154][ T8838] ? atime_needs_update+0x5f0/0x5f0 [ 363.528352][ T8838] ? security_file_permission+0x8f/0x380 [ 363.533980][ T8838] iterate_dir+0x36d/0x5e0 [ 363.538417][ T8838] __x64_sys_getdents+0x226/0x3c0 [ 363.543438][ T8838] ? __ia32_sys_old_readdir+0x1d0/0x1d0 [ 363.548979][ T8838] ? fillonedir+0x2c0/0x2c0 [ 363.553480][ T8838] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 363.559542][ T8838] ? do_syscall_64+0x26/0x760 [ 363.564218][ T8838] ? lockdep_hardirqs_on+0x421/0x5e0 [ 363.569501][ T8838] do_syscall_64+0xfa/0x760 [ 363.574007][ T8838] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 363.579893][ T8838] RIP: 0033:0x457d7b [ 363.583784][ T8838] Code: 02 74 b6 31 f6 eb b9 0f 1f 84 00 00 00 00 00 41 57 41 56 48 63 ff 41 55 41 54 b8 4e 00 00 00 55 53 48 89 f3 48 83 ec 08 0f 05 <48> 3d 00 f0 ff ff 77 55 4c 8d 24 06 49 89 c5 4c 39 e6 73 33 90 0f [ 363.603381][ T8838] RSP: 002b:00007ffdb7e10620 EFLAGS: 00000202 ORIG_RAX: 000000000000004e [ 363.611805][ T8838] RAX: ffffffffffffffda RBX: 000055555738c9b0 RCX: 0000000000457d7b [ 363.619799][ T8838] RDX: 0000000000008000 RSI: 000055555738c9b0 RDI: 0000000000000004 [ 363.627770][ T8838] RBP: 000055555738c9b0 R08: 0000000000000000 R09: 000000000000000b [ 363.635738][ T8838] R10: 0000000000000005 R11: 0000000000000202 R12: ffffffffffffffd4 [ 363.643710][ T8838] R13: 0000000000000016 R14: 0000000000000000 R15: 00007ffdb7e128b0 [ 363.653244][ T8838] Kernel Offset: disabled [ 363.657581][ T8838] Rebooting in 86400 seconds..