D_SET_TUNSRC(r2, &(0x7f0000000600)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000800)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000827bd7000fcdbdf25030000000800030020000000050006000e000000040004000500050005000000050005000400000005000600ce00000093f1f198073347359701e9597001ab47a31266da6f292f3671200e551bf08293991a41b55e1b9b3e4e1cf47f9dda9123f38125ba19ef0fdf18ba4ec07cdf24e0153a49e9f9fdf291d868e4e75bb04ccb8ff4e20009f1e6265a9ae5d70e64fcedc9de8942e7b7ca009d98ff7c74a175dd80bfc0e6439cda7cd74b6966033d471542563f1c2ed3dd2fcaee81ecb7be444fbd4a54de26db239a7bb4696daed479759c14105df0b8db2481d840e28c6ed40143c2af3c6f04f17a24ee4c22358fce05"], 0x40}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) io_setup(0x6, &(0x7f00000003c0)=0x0) r7 = socket$phonet_pipe(0x23, 0x5, 0x2) io_submit(r6, 0x2, &(0x7f00000005c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, r7, &(0x7f00000001c0)='\"', 0x1}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r8, &(0x7f0000006440)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f0000000c40)={0x10, 0x1d, 0x20, 0x0, 0x25dfdbfd}, 0x10}, {&(0x7f0000000f80)={0x20c, 0x3d, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x1f, 0x46, 0x0, 0x1, [@generic="6b23bda57b0fcd6882aea56d992b0de112a87c9689a0ce8f3a928a"]}, @generic="931dd380ae9b76725532f39b25791247f8e1faaa5606177d1141efdf8a23daecc73d0706f82254c664a01e4c4986b42b265e8e88f8f88e8099514ce917072d6e80996cbddc81dd1014a75c1cd2e0c084d7806b82c11b8a625557f25357333f879c7f3ea978d0c62492b2b2a3437425bf3933cf6d0456ae40263ff847b9956f9f56cd1e35dd616a0dffde59", @nested={0x14d, 0x46, 0x0, 0x1, [@typed={0x8, 0x8f, 0x0, 0x0, @u32=0x4}, @generic="3fe433e9f5d2f6047805d9eb39d59742ad46c8bd198fea6b4f77d0bf577f925374abd91b16efa9a31621d58f4b1ee788ba33ce3ae89358fcbecdc28e3a8775ee6c905d5275bf5f05ca6bfc68336199389a9644323a81d22c4bd081ec9c4826b7e965a5292167778eefb5edac3e1e0fd628684a30dbac663eb65de357a891a90855f356cbe26225342cce43c8e320a777c2a1f74ab97b7e442c94", @typed={0x8, 0x41, 0x0, 0x0, @ipv4=@multicast2}, @typed={0x8, 0x6b, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @generic="79c7219fa8393ab7671b616b9cea5f59e77de2a2ea4a268fcad39d31284ee1045f7dedc0dea487845188adde6fe70f5537a0635e01c2ec0a205c1f92c2272999ec8388f9a95b4d387581056e112c58f96f686734281b5a", @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@remote}, @generic="2d7a6c2813a21aa5bc78773404596de147d491e1868776a08d604bfb6aea387b585ce5b3f7ab336df3922c65"]}]}, 0x20c}, {&(0x7f0000000e00)={0x30, 0x12, 0x800, 0x70bd27, 0x25dfdbfc, "", [@typed={0x8, 0x5b, 0x0, 0x0, @pid}, @typed={0xf, 0x8c, 0x0, 0x0, @str='syzkaller1\x00'}, @typed={0x8, 0x7, 0x0, 0x0, @u32}]}, 0x30}, {&(0x7f0000000e40)={0xc8, 0x42, 0x10, 0x70bd26, 0x25dfdbff, "", [@generic="208cd2ae6be9be", @generic="c1d6c27da633daf115873b83c8913d284239d441678e667c20444d1a1f77f48ea7cbf783d84e79a9ebc262452149fe521b40868bf3938c61c8be3cdbd7429e623c99db5ae26d9cf24ee4ef4777ff0410e8b899b18e829f387d7926641f189d2b9697e099ffb7f20f691064b7d87d04cd2e230e8df8c77a2f1e4f4fabd49cfe414b3027dd850d9a2be9547ba5f2ed09811ea9ed9b201782165a792b57afca3e3d575d0f5b4b17a8", @typed={0x8, 0x94, 0x0, 0x0, @u32=0x1}]}, 0xc8}], 0x4, 0x0, 0x0, 0x8801}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000900)={'team0\x00', 0x0}) sendmsg$nl_route(r8, &(0x7f0000000c00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000bc0)={&(0x7f00000011c0)=@dellink={0x25c, 0x11, 0x400, 0x70bd28, 0x25dfdbff, {0x0, 0x0, 0x0, r9, 0x1000}, [@IFLA_PROTO_DOWN={0x5}, @IFLA_IFNAME={0x14, 0x3, 'macvlan1\x00'}, @IFLA_MAP={0x24, 0xe, {0x9, 0xd2, 0x2e4d, 0x200, 0x3e, 0xff}}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x5}, @IFLA_IFALIAS={0x14, 0x14, 'syzkaller1\x00'}, @IFLA_MTU={0x8, 0x4, 0x101}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_VFINFO_LIST={0x1cc, 0x16, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x8fe, 0xffff}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x5, 0x1}}]}, {0x84, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN_LIST={0x54, 0xc, 0x0, 0x1, [{0x14, 0x1, {0xb5d3, 0xadc, 0x100, 0xd1c53560eb87a9fa}}, {0x14, 0x1, {0x4, 0xb6, 0x81, 0x8100}}, {0x14, 0x1, {0x0, 0x6e4, 0x1, 0x88a8}}, {0x14, 0x1, {0x14, 0xaed, 0x0, 0x8100}}]}, @IFLA_VF_TX_RATE={0xc, 0x3, {0x1000, 0x200}}, @IFLA_VF_TRUST={0xc, 0x9, {0x7, 0x800}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x8000, 0x1}}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x7f, 0x7fff}}, @IFLA_VF_TRUST={0xc, 0x9, {0x7ff, 0x8}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_RATE={0x10, 0x6, {0x9, 0x5, 0x5}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x9}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x80000000, 0x3}}]}, {0xa4, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0xfff, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1d}}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x3f, 0x43}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x65c, 0x1}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x2, 0x80000001}}, @IFLA_VF_VLAN_LIST={0x40, 0xc, 0x0, 0x1, [{0x14, 0x1, {0xcae8, 0x919, 0x9, 0x8100}}, {0x14, 0x1, {0x200, 0xb47, 0xaaa, 0x8100}}, {0x14, 0x1, {0x5, 0x53b, 0xfffffff7, 0x88a8}}]}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x3f, 0x7fff}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x930, 0x5}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x6, 0x8}}]}]}]}, 0x25c}, 0x1, 0x0, 0x0, 0x11}, 0x4c089) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r7, 0x40189429, &(0x7f0000000480)={0x1, 0x4, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r10, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x45, 0xfc, 0x6}, {0x6}]}, 0x10) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x2, 0x3, &(0x7f0000000000)=@framed={{0x18, 0xf}}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) socket$inet6_sctp(0xa, 0x801, 0x84) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) r11 = socket$igmp(0x2, 0x3, 0x2) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@private1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) ioctl$TUNSETOWNER(r3, 0x400454cc, r12) setsockopt$MRT_INIT(r11, 0x0, 0xc8, &(0x7f0000000040), 0x4) setsockopt$MRT_ADD_VIF(r11, 0x0, 0xca, &(0x7f0000000100)={0x0, 0x1, 0x0, 0x0, @vifc_lcl_addr=@dev={0xac, 0x14, 0x14, 0xb}, @multicast1}, 0x10) 07:23:02 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000380)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000008c0)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000001cc0)={{}, r2, 0x16, @inherit={0x88, &(0x7f0000001580)=ANY=[@ANYRES16=r3]}, @devid}) r4 = syz_open_dev$MSR(&(0x7f0000000140), 0x100000000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r4, 0x84009422, &(0x7f0000000ec0)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(r6, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000001840)=ANY=[@ANYRES32=r5, @ANYRES32=r3, @ANYRESOCT, @ANYRES32=r1, @ANYRES32, @ANYRES64, @ANYRESHEX], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x40025) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f0000001500)={r5, "2ce8b7e675c30c143ac940d229ad3592"}) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$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") r7 = socket$inet_udplite(0x2, 0x2, 0x88) read(r7, &(0x7f00000000c0)=""/43, 0x2b) [ 669.585785][T22306] __sys_sendto+0x246/0x300 [ 669.590323][T22306] __x64_sys_sendto+0x78/0x90 [ 669.595019][T22306] do_syscall_64+0x41/0xc0 [ 669.599462][T22306] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 669.605401][T22306] RIP: 0033:0x7f9293ef6149 [ 669.609879][T22306] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 669.629544][T22306] RSP: 002b:00007f9293269168 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 669.638055][T22306] RAX: ffffffffffffffda RBX: 00007f9294015f80 RCX: 00007f9293ef6149 [ 669.646133][T22306] RDX: 000000000001a000 RSI: 0000000020000000 RDI: 0000000000000004 [ 669.654160][T22306] RBP: 00007f92932691d0 R08: 0000000020000080 R09: 000000000000001c [ 669.662157][T22306] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 669.670149][T22306] R13: 00007ffdbda7c2df R14: 00007f9293269300 R15: 0000000000022000 [ 669.678212][T22306] 07:23:02 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0xde0a}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) 07:23:02 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, 0x0) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$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") (fail_nth: 28) [ 669.691434][T22309] (unnamed net_device) (uninitialized): option use_carrier: invalid value (6) [ 669.721825][T22309] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=22309 comm=syz-executor.5 07:23:02 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0xdf0a}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) [ 669.736964][T22312] bond957: entered allmulticast mode [ 669.753199][T22309] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=61 sclass=netlink_route_socket pid=22309 comm=syz-executor.5 07:23:02 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) (fail_nth: 65) [ 669.789551][T22315] FAULT_INJECTION: forcing a failure. [ 669.789551][T22315] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 669.802924][T22315] CPU: 1 PID: 22315 Comm: syz-executor.3 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 669.813374][T22315] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 669.823490][T22315] Call Trace: [ 669.826813][T22315] [ 669.827966][T22322] FAULT_INJECTION: forcing a failure. [ 669.827966][T22322] name failslab, interval 1, probability 0, space 0, times 0 [ 669.829745][T22315] dump_stack_lvl+0xda/0x130 [ 669.829778][T22315] dump_stack+0x15/0x20 [ 669.851183][T22315] should_fail_ex+0x21f/0x230 [ 669.855899][T22315] __alloc_pages+0x108/0x340 [ 669.860597][T22315] vma_alloc_folio+0x6a3/0x8c0 [ 669.865603][T22315] ? __vm_enough_memory+0xdf/0x2a0 [ 669.870745][T22315] shmem_get_folio_gfp+0x801/0x1200 [ 669.875982][T22315] shmem_write_begin+0xa6/0x1d0 [ 669.880884][T22315] generic_perform_write+0x1c3/0x3d0 [ 669.886195][T22315] ? shmem_write_begin+0x1d0/0x1d0 [ 669.891355][T22315] __generic_file_write_iter+0xe6/0x290 [ 669.896958][T22315] generic_file_write_iter+0x7d/0x1c0 [ 669.902400][T22315] vfs_write+0x47b/0x780 [ 669.906656][T22315] ksys_write+0xeb/0x1a0 [ 669.910967][T22315] __x64_sys_write+0x42/0x50 [ 669.915569][T22315] do_syscall_64+0x41/0xc0 [ 669.920003][T22315] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 669.925940][T22315] RIP: 0033:0x7f1567f53ecf [ 669.930365][T22315] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 669.950001][T22315] RSP: 002b:00007f1567314f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 669.958427][T22315] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007f1567f53ecf [ 669.966420][T22315] RDX: 0000000000100000 RSI: 00007f155eef5000 RDI: 0000000000000005 [ 669.974402][T22315] RBP: 00007f155eef5000 R08: 0000000000000000 R09: 0000000000000534 [ 669.982475][T22315] R10: 0000000000100000 R11: 0000000000000293 R12: 0000000000000000 [ 669.990517][T22315] R13: 00007f1567314fdc R14: 00007f1567314fe0 R15: 0000000020000fc2 [ 669.998543][T22315] [ 670.001628][T22322] CPU: 0 PID: 22322 Comm: syz-executor.2 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 670.012082][T22322] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 670.022176][T22322] Call Trace: [ 670.023617][T22319] bond958: entered promiscuous mode [ 670.025461][T22322] [ 670.025470][T22322] dump_stack_lvl+0xda/0x130 [ 670.030737][T22319] bond958: entered allmulticast mode [ 670.033641][T22322] dump_stack+0x15/0x20 [ 670.038690][T22309] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 670.043489][T22322] should_fail_ex+0x21f/0x230 [ 670.061590][T22322] __should_failslab+0x92/0xa0 [ 670.066404][T22322] should_failslab+0x9/0x20 [ 670.070972][T22322] slab_pre_alloc_hook+0x38/0x180 [ 670.076056][T22322] __kmem_cache_alloc_node+0x46/0x250 [ 670.081699][T22322] ? sctp_add_bind_addr+0x6f/0x1e0 [ 670.086868][T22322] kmalloc_trace+0x2a/0xa0 07:23:02 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) r2 = open(&(0x7f0000000040)='./file0\x00', 0x161842, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'sit0\x00'}) r4 = syz_io_uring_setup(0x73d7, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000100)=0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r6, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x10001) r8 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x8010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(r5, 0x0, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x8) syz_io_uring_submit(0x0, r8, &(0x7f00000008c0)=@IORING_OP_OPENAT2={0x1c, 0x40, 0x0, 0xffffffffffffffff, &(0x7f0000000840)={0x4ae0e0, 0x2, 0x5}, &(0x7f0000000880)='./file0\x00', 0x18, 0x0, 0x12345}, 0xff) syz_io_uring_submit(r5, 0x0, &(0x7f0000002b40)=@IORING_OP_RECVMSG={0xa, 0x2b, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000002b00)={0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/28, 0x1c}, {&(0x7f0000001540)=""/4096, 0x1000}, {&(0x7f0000002540)=""/131, 0x83}, {&(0x7f0000002600)=""/102, 0x66}, {&(0x7f0000002840)=""/203, 0xcb}], 0x6}, 0x0, 0x10040, 0x1, {0x1}}, 0x0) ftruncate(r2, 0x200002) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x200000e, 0x12, r3, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) r10 = creat(&(0x7f0000000180)='./file0\x00', 0x0) fallocate(r10, 0x0, 0x0, 0x2000402) fallocate(r9, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r9, 0xc028660f, &(0x7f0000001380)={0x110, r10}) 07:23:02 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0xe400}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) 07:23:02 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, 0x0) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$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") (fail_nth: 29) [ 670.091346][T22322] sctp_add_bind_addr+0x6f/0x1e0 [ 670.096365][T22322] sctp_copy_local_addr_list+0x19b/0x220 [ 670.102030][T22322] sctp_copy_one_addr+0x7d/0x400 [ 670.106991][T22322] sctp_bind_addr_copy+0x81/0x2b0 [ 670.112126][T22322] sctp_assoc_set_bind_addr_from_ep+0xc0/0xd0 [ 670.118234][T22322] sctp_connect_new_asoc+0x1cb/0x3a0 [ 670.123644][T22322] sctp_sendmsg+0xefc/0x1900 [ 670.128349][T22322] inet_sendmsg+0x63/0x80 [ 670.132808][T22322] __sys_sendto+0x246/0x300 [ 670.137487][T22322] __x64_sys_sendto+0x78/0x90 [ 670.142193][T22322] do_syscall_64+0x41/0xc0 [ 670.146732][T22322] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 670.152667][T22322] RIP: 0033:0x7f9293ef6149 [ 670.157221][T22322] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 670.171257][T22333] FAULT_INJECTION: forcing a failure. [ 670.171257][T22333] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 670.176989][T22322] RSP: 002b:00007f9293269168 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 670.177018][T22322] RAX: ffffffffffffffda RBX: 00007f9294015f80 RCX: 00007f9293ef6149 [ 670.177034][T22322] RDX: 000000000001a000 RSI: 0000000020000000 RDI: 0000000000000004 [ 670.214667][T22322] RBP: 00007f92932691d0 R08: 0000000020000080 R09: 000000000000001c [ 670.222666][T22322] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 670.230643][T22322] R13: 00007ffdbda7c2df R14: 00007f9293269300 R15: 0000000000022000 [ 670.238637][T22322] [ 670.241657][T22333] CPU: 1 PID: 22333 Comm: syz-executor.3 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 670.252142][T22333] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 670.262209][T22333] Call Trace: [ 670.265586][T22333] [ 670.268532][T22333] dump_stack_lvl+0xda/0x130 [ 670.273153][T22333] dump_stack+0x15/0x20 [ 670.277338][T22333] should_fail_ex+0x21f/0x230 [ 670.282049][T22333] __alloc_pages+0x108/0x340 [ 670.286705][T22333] vma_alloc_folio+0x6a3/0x8c0 [ 670.291517][T22333] ? __vm_enough_memory+0xdf/0x2a0 [ 670.296739][T22333] shmem_get_folio_gfp+0x801/0x1200 [ 670.301978][T22333] shmem_write_begin+0xa6/0x1d0 [ 670.306910][T22333] generic_perform_write+0x1c3/0x3d0 [ 670.307864][T22335] loop0: detected capacity change from 0 to 2048 [ 670.312216][T22333] ? shmem_write_begin+0x1d0/0x1d0 [ 670.323679][T22333] __generic_file_write_iter+0xe6/0x290 [ 670.329323][T22333] generic_file_write_iter+0x7d/0x1c0 [ 670.335010][T22333] vfs_write+0x47b/0x780 [ 670.339355][T22333] ksys_write+0xeb/0x1a0 [ 670.343624][T22333] __x64_sys_write+0x42/0x50 [ 670.348243][T22333] do_syscall_64+0x41/0xc0 [ 670.352678][T22333] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 670.358605][T22333] RIP: 0033:0x7f1567f53ecf [ 670.361480][T22335] FAT-fs (loop0): Unrecognized mount option "ÿÿÿÿÿÿÿÿ184467440737095516150xffffffffffffffff" or missing value [ 670.363013][T22333] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 670.394284][T22333] RSP: 002b:00007f1567314f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 670.402770][T22333] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007f1567f53ecf [ 670.410792][T22333] RDX: 0000000000100000 RSI: 00007f155eef5000 RDI: 0000000000000005 [ 670.418786][T22333] RBP: 00007f155eef5000 R08: 0000000000000000 R09: 0000000000000534 [ 670.426831][T22333] R10: 0000000000100000 R11: 0000000000000293 R12: 0000000000000000 [ 670.434913][T22333] R13: 00007f1567314fdc R14: 00007f1567314fe0 R15: 0000000020000fc2 07:23:02 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0xea03}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) [ 670.442911][T22333] [ 670.452090][T22341] validate_nla: 8 callbacks suppressed [ 670.452104][T22341] netlink: 'syz-executor.1': attribute type 6 has an invalid length. 07:23:03 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000002c0)={&(0x7f0000000c80)=ANY=[@ANYBLOB="0026bd7000ffdbdf25070000000c00068008000b00060000000c0008002302b41174de3f460a6d000000000000080003000380000008000300bd2c00ff07000400f8ffffff080003001dd30000080004006604000000000000000000"], 0x5c}, 0x1, 0x0, 0x0, 0x1884}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6, 0x6}]}}}]}, 0x3c}}, 0x0) r3 = openat(r2, &(0x7f00000000c0)='./file0\x00', 0x0, 0x31) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00./file0\x00']) connect$unix(r3, &(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000001c0), 0x200080, 0x0) ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f0000000200)={0x55, 0xb5f3, 0x2, 0x1, 0x6}) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000600)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000800)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x40}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) io_setup(0x6, &(0x7f00000003c0)=0x0) r7 = socket$phonet_pipe(0x23, 0x5, 0x2) io_submit(r6, 0x2, &(0x7f00000005c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, r7, &(0x7f00000001c0)='\"', 0x1}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r8, &(0x7f0000006440)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f0000000c40)={0x10, 0x1d, 0x20, 0x70bd28}, 0x10}, {&(0x7f0000000f80)={0x20c, 0x3d, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x1f, 0x46, 0x0, 0x1, [@generic="6b23bda57b0fcd6882aea56d992b0de112a87c9689a0ce8f3a928a"]}, @generic="931dd380ae9b76725532f39b25791247f8e1faaa5606177d1141efdf8a23daecc73d0706f82254c664a01e4c4986b42b265e8e88f8f88e8099514ce917072d6e80996cbddc81dd1014a75c1cd2e0c084d7806b82c11b8a625557f25357333f879c7f3ea978d0c62492b2b2a3437425bf3933cf6d0456ae40263ff847b9956f9f56cd1e35dd616a0dffde59", @nested={0x14d, 0x46, 0x0, 0x1, [@typed={0x8, 0x8f, 0x0, 0x0, @u32=0x4}, @generic="3fe433e9f5d2f6047805d9eb39d59742ad46c8bd198fea6b4f77d0bf577f925374abd91b16efa9a31621d58f4b1ee788ba33ce3ae89358fcbecdc28e3a8775ee6c905d5275bf5f05ca6bfc68336199389a9644323a81d22c4bd081ec9c4826b7e965a5292167778eefb5edac3e1e0fd628684a30dbac663eb65de357a891a90855f356cbe26225342cce43c8e320a777c2a1f74ab97b7e442c94", @typed={0x8, 0x41, 0x0, 0x0, @ipv4=@multicast2}, @typed={0x8, 0x6b, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @generic="79c7219fa8393ab7671b616b9cea5f59e77de2a2ea4a268fcad39d31284ee1045f7dedc0dea487845188adde6fe70f5537a0635e01c2ec0a205c1f92c2272999ec8388f9a95b4d387581056e112c58f96f686734281b5a", @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@remote}, @generic="2d7a6c2813a21aa5bc78773404596de147d491e1868776a08d604bfb6aea387b585ce5b3f7ab336df3922c65"]}]}, 0x20c}, {&(0x7f0000000e00)={0x30, 0x12, 0x800, 0x70bd27, 0x25dfdbfc, "", [@typed={0x8, 0x5b, 0x0, 0x0, @pid}, @typed={0xf, 0x8c, 0x0, 0x0, @str='syzkaller1\x00'}, @typed={0x8, 0x7, 0x0, 0x0, @u32}]}, 0x30}, {&(0x7f0000000e40)={0xc8, 0x42, 0x10, 0x70bd26, 0x25dfdbff, "", [@generic="208cd2ae6be9be", @generic="c1d6c27da633daf115873b83c8913d284239d441678e667c20444d1a1f77f48ea7cbf783d84e79a9ebc262452149fe521b40868bf3938c61c8be3cdbd7429e623c99db5ae26d9cf24ee4ef4777ff0410e8b899b18e829f387d7926641f189d2b9697e099ffb7f20f691064b7d87d04cd2e230e8df8c77a2f1e4f4fabd49cfe414b3027dd850d9a2be9547ba5f2ed09811ea9ed9b201782165a792b57afca3e3d575d0f5b4b17a8", @typed={0x8, 0x94, 0x0, 0x0, @u32=0x1}]}, 0xc8}], 0x4, 0x0, 0x0, 0x8801}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000900)={'team0\x00', 0x0}) sendmsg$nl_route(r8, &(0x7f0000000c00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000bc0)={&(0x7f00000011c0)=@dellink={0x25c, 0x11, 0x400, 0x70bd28, 0x25dfdbff, {0x0, 0x0, 0x0, r9, 0x1000}, [@IFLA_PROTO_DOWN={0x5}, @IFLA_IFNAME={0x14, 0x3, 'macvlan1\x00'}, @IFLA_MAP={0x24, 0xe, {0x9, 0xd2, 0x2e4d, 0x200, 0x3e, 0xff}}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x5}, @IFLA_IFALIAS={0x14, 0x14, 'syzkaller1\x00'}, @IFLA_MTU={0x8, 0x4, 0x101}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_VFINFO_LIST={0x1cc, 0x16, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x8fe, 0xffff}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x5, 0x1}}]}, {0x84, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN_LIST={0x54, 0xc, 0x0, 0x1, [{0x14, 0x1, {0xb5d3, 0xadc, 0x100, 0xd1c53560eb87a9fa}}, {0x14, 0x1, {0x4, 0xb6, 0x81, 0x8100}}, {0x14, 0x1, {0x0, 0x6e4, 0x1, 0x88a8}}, {0x14, 0x1, {0x14, 0xaed, 0x0, 0x8100}}]}, @IFLA_VF_TX_RATE={0xc, 0x3, {0x1000, 0x200}}, @IFLA_VF_TRUST={0xc, 0x9, {0x7, 0x800}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x8000, 0x1}}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x7f, 0x7fff}}, @IFLA_VF_TRUST={0xc, 0x9, {0x7ff, 0x8}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_RATE={0x10, 0x6, {0x9, 0x5, 0x5}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x9}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x80000000, 0x3}}]}, {0xa4, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0xfff, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1d}}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x3f, 0x43}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x65c, 0x1}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x2, 0x80000001}}, @IFLA_VF_VLAN_LIST={0x40, 0xc, 0x0, 0x1, [{0x14, 0x1, {0xcae8, 0x919, 0x9, 0x8100}}, {0x14, 0x1, {0x200, 0xb47, 0xaaa, 0x8100}}, {0x14, 0x1, {0x5, 0x53b, 0xfffffff7, 0x88a8}}]}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x3f, 0x7fff}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x930, 0x5}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x6, 0x8}}]}]}]}, 0x25c}, 0x1, 0x0, 0x0, 0x11}, 0x4c089) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r7, 0x40189429, &(0x7f0000000480)={0x1, 0x4, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r10, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x45, 0xfc, 0x6}, {0x6}]}, 0x10) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x2, 0x3, &(0x7f0000000000)=@framed={{0x18, 0xf}}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) socket$inet6_sctp(0xa, 0x801, 0x84) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) r11 = socket$igmp(0x2, 0x3, 0x2) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@private1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) ioctl$TUNSETOWNER(r3, 0x400454cc, r12) setsockopt$MRT_INIT(r11, 0x0, 0xc8, &(0x7f0000000040), 0x4) setsockopt$MRT_ADD_VIF(r11, 0x0, 0xca, &(0x7f0000000100)={0x0, 0x1, 0x0, 0x0, @vifc_lcl_addr=@dev={0xac, 0x14, 0x14, 0xb}, @multicast1}, 0x10) 07:23:03 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0xef00}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) 07:23:03 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) (fail_nth: 66) [ 670.488943][T22341] bond960: entered allmulticast mode [ 670.494458][T22341] 8021q: adding VLAN 0 to HW filter on device bond960 [ 670.548967][T22345] netlink: 'syz-executor.5': attribute type 6 has an invalid length. [ 670.579079][T22345] (unnamed net_device) (uninitialized): option use_carrier: invalid value (6) [ 670.588724][T22347] netlink: 'syz-executor.1': attribute type 6 has an invalid length. [ 670.605838][T22345] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=22345 comm=syz-executor.5 [ 670.621555][T22345] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=61 sclass=netlink_route_socket pid=22345 comm=syz-executor.5 [ 670.644124][T22347] bond961: entered promiscuous mode [ 670.649521][T22347] bond961: entered allmulticast mode [ 670.666607][T22345] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 670.704946][T22350] FAULT_INJECTION: forcing a failure. [ 670.704946][T22350] name failslab, interval 1, probability 0, space 0, times 0 [ 670.717830][T22350] CPU: 1 PID: 22350 Comm: syz-executor.2 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 670.728419][T22350] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 670.738495][T22350] Call Trace: [ 670.741874][T22350] [ 670.744823][T22350] dump_stack_lvl+0xda/0x130 [ 670.749489][T22350] dump_stack+0x15/0x20 [ 670.753671][T22350] should_fail_ex+0x21f/0x230 [ 670.758380][T22350] __should_failslab+0x92/0xa0 [ 670.763190][T22350] should_failslab+0x9/0x20 [ 670.767756][T22350] slab_pre_alloc_hook+0x38/0x180 [ 670.772802][T22350] __kmem_cache_alloc_node+0x46/0x250 [ 670.778261][T22350] ? sctp_add_bind_addr+0x6f/0x1e0 [ 670.783490][T22350] kmalloc_trace+0x2a/0xa0 [ 670.787937][T22350] sctp_add_bind_addr+0x6f/0x1e0 [ 670.792898][T22350] sctp_copy_local_addr_list+0x19b/0x220 [ 670.798645][T22350] sctp_copy_one_addr+0x7d/0x400 [ 670.803675][T22350] sctp_bind_addr_copy+0x81/0x2b0 [ 670.808725][T22350] sctp_assoc_set_bind_addr_from_ep+0xc0/0xd0 07:23:03 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0), 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000380)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000008c0)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000001cc0)={{}, r2, 0x16, @inherit={0x88, &(0x7f0000001580)=ANY=[@ANYRES16=r3]}, @devid}) r4 = syz_open_dev$MSR(&(0x7f0000000140), 0x100000000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r4, 0x84009422, &(0x7f0000000ec0)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(r6, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000001840)=ANY=[@ANYRES32=r5, @ANYRES32=r3, @ANYRESOCT, @ANYRES32=r1, @ANYRES32, @ANYRES64, @ANYRESHEX], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x40025) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f0000001500)={r5, "2ce8b7e675c30c143ac940d229ad3592"}) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$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") r7 = socket$inet_udplite(0x2, 0x2, 0x88) read(r7, &(0x7f00000000c0)=""/43, 0x2b) 07:23:03 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, 0x0) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$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") (fail_nth: 30) 07:23:03 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0xf403}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) 07:23:03 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) r2 = open(&(0x7f0000000040)='./file0\x00', 0x161842, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'sit0\x00'}) r4 = syz_io_uring_setup(0x73d7, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000100)=0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r6, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x10001) r8 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x8010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(r5, 0x0, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x8) syz_io_uring_submit(0x0, r8, &(0x7f00000008c0)=@IORING_OP_OPENAT2={0x1c, 0x40, 0x0, 0xffffffffffffffff, &(0x7f0000000840)={0x4ae0e0, 0x2, 0x5}, &(0x7f0000000880)='./file0\x00', 0x18, 0x0, 0x12345}, 0xff) syz_io_uring_submit(r5, 0x0, &(0x7f0000002b40)=@IORING_OP_RECVMSG={0xa, 0x2b, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000002b00)={0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/28, 0x1c}, {&(0x7f0000001540)=""/4096, 0x1000}, {&(0x7f0000002540)=""/131, 0x83}, {&(0x7f0000002600)=""/102, 0x66}, {&(0x7f0000002840)=""/203, 0xcb}], 0x6}, 0x0, 0x10040, 0x1, {0x1}}, 0x0) ftruncate(r2, 0x200002) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x200000e, 0x12, r3, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) r10 = creat(&(0x7f0000000180)='./file0\x00', 0x0) fallocate(r10, 0x0, 0x0, 0x2000402) fallocate(r9, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r9, 0xc028660f, &(0x7f0000001380)={0x111, r10}) [ 670.814950][T22350] sctp_connect_new_asoc+0x1cb/0x3a0 [ 670.820402][T22350] sctp_sendmsg+0xefc/0x1900 [ 670.825041][T22350] inet_sendmsg+0x63/0x80 [ 670.829479][T22350] __sys_sendto+0x246/0x300 [ 670.834078][T22350] __x64_sys_sendto+0x78/0x90 [ 670.838898][T22350] do_syscall_64+0x41/0xc0 [ 670.843351][T22350] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 670.849335][T22350] RIP: 0033:0x7f9293ef6149 [ 670.853797][T22350] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 670.873447][T22350] RSP: 002b:00007f9293269168 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 670.881885][T22350] RAX: ffffffffffffffda RBX: 00007f9294015f80 RCX: 00007f9293ef6149 [ 670.882046][T22355] FAULT_INJECTION: forcing a failure. [ 670.882046][T22355] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 670.889864][T22350] RDX: 000000000001a000 RSI: 0000000020000000 RDI: 0000000000000004 [ 670.889889][T22350] RBP: 00007f92932691d0 R08: 0000000020000080 R09: 000000000000001c [ 670.919186][T22350] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 670.927228][T22350] R13: 00007ffdbda7c2df R14: 00007f9293269300 R15: 0000000000022000 [ 670.935233][T22350] [ 670.938265][T22355] CPU: 0 PID: 22355 Comm: syz-executor.3 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 670.948747][T22355] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 670.958961][T22355] Call Trace: [ 670.962352][T22355] [ 670.965326][T22355] dump_stack_lvl+0xda/0x130 [ 670.970005][T22355] dump_stack+0x15/0x20 [ 670.974233][T22355] should_fail_ex+0x21f/0x230 [ 670.978946][T22355] __alloc_pages+0x108/0x340 [ 670.983699][T22355] vma_alloc_folio+0x6a3/0x8c0 [ 670.988513][T22355] ? __vm_enough_memory+0xdf/0x2a0 [ 670.993669][T22355] shmem_get_folio_gfp+0x801/0x1200 [ 670.998982][T22355] shmem_write_begin+0xa6/0x1d0 [ 671.003872][T22355] generic_perform_write+0x1c3/0x3d0 [ 671.009270][T22355] ? shmem_write_begin+0x1d0/0x1d0 [ 671.014437][T22355] __generic_file_write_iter+0xe6/0x290 [ 671.020174][T22355] generic_file_write_iter+0x7d/0x1c0 [ 671.025751][T22355] vfs_write+0x47b/0x780 [ 671.030110][T22355] ksys_write+0xeb/0x1a0 [ 671.034435][T22355] __x64_sys_write+0x42/0x50 [ 671.039070][T22355] do_syscall_64+0x41/0xc0 [ 671.043563][T22355] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 671.049576][T22355] RIP: 0033:0x7f1567f53ecf 07:23:03 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) (fail_nth: 67) 07:23:03 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0xf603}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) [ 671.054032][T22355] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 671.073687][T22355] RSP: 002b:00007f1567314f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 671.082131][T22355] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007f1567f53ecf [ 671.090123][T22355] RDX: 0000000000100000 RSI: 00007f155eef5000 RDI: 0000000000000005 [ 671.098112][T22355] RBP: 00007f155eef5000 R08: 0000000000000000 R09: 0000000000000534 [ 671.106111][T22355] R10: 0000000000100000 R11: 0000000000000293 R12: 0000000000000000 [ 671.114108][T22355] R13: 00007f1567314fdc R14: 00007f1567314fe0 R15: 0000000020000fc2 [ 671.122107][T22355] [ 671.137218][T22364] netlink: 'syz-executor.1': attribute type 6 has an invalid length. [ 671.154375][T22363] FAULT_INJECTION: forcing a failure. [ 671.154375][T22363] name failslab, interval 1, probability 0, space 0, times 0 [ 671.167046][T22363] CPU: 1 PID: 22363 Comm: syz-executor.2 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 671.167744][T22364] bond962: entered allmulticast mode [ 671.177472][T22363] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 671.177510][T22363] Call Trace: [ 671.177518][T22363] [ 671.177589][T22363] dump_stack_lvl+0xda/0x130 [ 671.177627][T22363] dump_stack+0x15/0x20 [ 671.177735][T22363] should_fail_ex+0x21f/0x230 [ 671.177775][T22363] __should_failslab+0x92/0xa0 [ 671.177806][T22363] should_failslab+0x9/0x20 [ 671.177834][T22363] slab_pre_alloc_hook+0x38/0x180 [ 671.177890][T22363] __kmem_cache_alloc_node+0x46/0x250 [ 671.177926][T22363] ? sctp_add_bind_addr+0x6f/0x1e0 [ 671.178009][T22363] kmalloc_trace+0x2a/0xa0 [ 671.178038][T22363] sctp_add_bind_addr+0x6f/0x1e0 [ 671.178090][T22363] sctp_copy_local_addr_list+0x19b/0x220 [ 671.178161][T22363] sctp_copy_one_addr+0x7d/0x400 [ 671.178184][T22363] sctp_bind_addr_copy+0x81/0x2b0 [ 671.183593][T22364] 8021q: adding VLAN 0 to HW filter on device bond962 [ 671.193521][T22363] sctp_assoc_set_bind_addr_from_ep+0xc0/0xd0 [ 671.193566][T22363] sctp_connect_new_asoc+0x1cb/0x3a0 [ 671.281511][T22363] sctp_sendmsg+0xefc/0x1900 [ 671.286154][T22363] inet_sendmsg+0x63/0x80 [ 671.290515][T22363] __sys_sendto+0x246/0x300 [ 671.295048][T22363] __x64_sys_sendto+0x78/0x90 [ 671.299781][T22363] do_syscall_64+0x41/0xc0 [ 671.304238][T22363] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 671.310169][T22363] RIP: 0033:0x7f9293ef6149 07:23:03 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0xfe03}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) 07:23:03 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, 0x0) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$eJzs1T9rE3EYB/AnaazRqbM4/MDFqVQ3JyOSQvFAUTLoZKBxyYmQWy6Z8hJ8Ab4wB1+EZMp2Ei5VWxSDNLnSfj7LPdz3ud+/g7v39z+OTz8VH75+/hLdXivavbjTXrbiINpxZh4AwHWyrKr4XtWaXgsAsBv+/wBw87x5++7Fsyzrv06pG7GYl4NyUF/r/Pgk6x+llf3fnlqU5WDvZ/4o1c7nt+LuOn/8x3w/Hj6o81X2/GV2Ib8dp1vfPQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA3GyHKXUiIqWUDn7dXZTlYK/OD9OZC3ldHZ9k/aN1w/m8E/c6O9sGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAcAmK6Ww8zPPR5JoVEd9ix5N210d6uSMv/tXTW097VU5+m8XTTZtfLatq05GfRMTWF9+KmK/eUvNnuGnR3DcJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABoVjGdjYd5PpoUTa8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALgqiulsPMzz0eS/i2jVI/29p+k9AgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAM34EQAA///P7Cnj") (fail_nth: 31) [ 671.314606][T22363] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 671.315946][T22369] loop0: detected capacity change from 0 to 2048 [ 671.334238][T22363] RSP: 002b:00007f9293269168 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 671.334264][T22363] RAX: ffffffffffffffda RBX: 00007f9294015f80 RCX: 00007f9293ef6149 [ 671.334338][T22363] RDX: 000000000001a000 RSI: 0000000020000000 RDI: 0000000000000004 [ 671.334354][T22363] RBP: 00007f92932691d0 R08: 0000000020000080 R09: 000000000000001c [ 671.334366][T22363] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 671.334381][T22363] R13: 00007ffdbda7c2df R14: 00007f9293269300 R15: 0000000000022000 [ 671.334398][T22363] [ 671.391349][T22374] FAULT_INJECTION: forcing a failure. [ 671.391349][T22374] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 671.406783][T22374] CPU: 1 PID: 22374 Comm: syz-executor.3 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 671.417277][T22374] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 671.427352][T22374] Call Trace: [ 671.430668][T22374] [ 671.433616][T22374] dump_stack_lvl+0xda/0x130 [ 671.438323][T22374] dump_stack+0x15/0x20 [ 671.442587][T22374] should_fail_ex+0x21f/0x230 [ 671.447382][T22374] should_fail+0xb/0x10 [ 671.451573][T22374] should_fail_usercopy+0x1a/0x20 [ 671.456634][T22374] copy_page_from_iter_atomic+0x22d/0xcf0 [ 671.462468][T22374] ? folio_test_hugetlb+0x3a/0x70 [ 671.467571][T22374] ? shmem_write_begin+0x12a/0x1d0 [ 671.472793][T22374] generic_perform_write+0x203/0x3d0 [ 671.478153][T22374] ? shmem_write_begin+0x1d0/0x1d0 [ 671.483315][T22374] __generic_file_write_iter+0xe6/0x290 [ 671.488909][T22374] generic_file_write_iter+0x7d/0x1c0 [ 671.494364][T22374] vfs_write+0x47b/0x780 [ 671.498689][T22374] ksys_write+0xeb/0x1a0 [ 671.502969][T22374] __x64_sys_write+0x42/0x50 [ 671.507612][T22374] do_syscall_64+0x41/0xc0 [ 671.512116][T22374] entry_SYSCALL_64_after_hwframe+0x63/0xcd 07:23:03 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) (fail_nth: 68) 07:23:03 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000002c0)={&(0x7f0000000c80)=ANY=[@ANYBLOB="0026bd7000ffdbdf25070000000c00068008000b00060000000c0008002302b41174de3f460a6d000000000000080003000380000008000300bd2c00ff07000400f8ffffff080003001dd30000080004006604000000000000000000"], 0x5c}, 0x1, 0x0, 0x0, 0x1884}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6, 0x6}]}}}]}, 0x3c}}, 0x0) r3 = openat(r2, &(0x7f00000000c0)='./file0\x00', 0x0, 0x31) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00./file0\x00']) connect$unix(r3, &(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000001c0), 0x200080, 0x0) ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f0000000200)={0x55, 0xb5f3, 0x2, 0x1, 0x6}) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000600)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000800)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x40}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) io_setup(0x6, &(0x7f00000003c0)=0x0) r7 = socket$phonet_pipe(0x23, 0x5, 0x2) io_submit(r6, 0x2, &(0x7f00000005c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, r7, &(0x7f00000001c0)='\"', 0x1}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r8, &(0x7f0000006440)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f0000000c40)={0x10, 0x1d, 0x20, 0x70bd28}, 0x10}, {&(0x7f0000000f80)={0x20c, 0x3d, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x1f, 0x46, 0x0, 0x1, [@generic="6b23bda57b0fcd6882aea56d992b0de112a87c9689a0ce8f3a928a"]}, @generic="931dd380ae9b76725532f39b25791247f8e1faaa5606177d1141efdf8a23daecc73d0706f82254c664a01e4c4986b42b265e8e88f8f88e8099514ce917072d6e80996cbddc81dd1014a75c1cd2e0c084d7806b82c11b8a625557f25357333f879c7f3ea978d0c62492b2b2a3437425bf3933cf6d0456ae40263ff847b9956f9f56cd1e35dd616a0dffde59", @nested={0x14d, 0x46, 0x0, 0x1, [@typed={0x8, 0x8f, 0x0, 0x0, @u32=0x4}, @generic="3fe433e9f5d2f6047805d9eb39d59742ad46c8bd198fea6b4f77d0bf577f925374abd91b16efa9a31621d58f4b1ee788ba33ce3ae89358fcbecdc28e3a8775ee6c905d5275bf5f05ca6bfc68336199389a9644323a81d22c4bd081ec9c4826b7e965a5292167778eefb5edac3e1e0fd628684a30dbac663eb65de357a891a90855f356cbe26225342cce43c8e320a777c2a1f74ab97b7e442c94", @typed={0x8, 0x41, 0x0, 0x0, @ipv4=@multicast2}, @typed={0x8, 0x6b, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @generic="79c7219fa8393ab7671b616b9cea5f59e77de2a2ea4a268fcad39d31284ee1045f7dedc0dea487845188adde6fe70f5537a0635e01c2ec0a205c1f92c2272999ec8388f9a95b4d387581056e112c58f96f686734281b5a", @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@remote}, @generic="2d7a6c2813a21aa5bc78773404596de147d491e1868776a08d604bfb6aea387b585ce5b3f7ab336df3922c65"]}]}, 0x20c}, {&(0x7f0000000e00)={0x30, 0x12, 0x800, 0x70bd27, 0x25dfdbfc, "", [@typed={0x8, 0x5b, 0x0, 0x0, @pid}, @typed={0xf, 0x8c, 0x0, 0x0, @str='syzkaller1\x00'}, @typed={0x8, 0x7, 0x0, 0x0, @u32}]}, 0x30}, {&(0x7f0000000e40)={0xc8, 0x42, 0x10, 0x70bd26, 0x25dfdbff, "", [@generic="208cd2ae6be9be", @generic="c1d6c27da633daf115873b83c8913d284239d441678e667c20444d1a1f77f48ea7cbf783d84e79a9ebc262452149fe521b40868bf3938c61c8be3cdbd7429e623c99db5ae26d9cf24ee4ef4777ff0410e8b899b18e829f387d7926641f189d2b9697e099ffb7f20f691064b7d87d04cd2e230e8df8c77a2f1e4f4fabd49cfe414b3027dd850d9a2be9547ba5f2ed09811ea9ed9b201782165a792b57afca3e3d575d0f5b4b17a8", @typed={0x8, 0x94, 0x0, 0x0, @u32=0x1}]}, 0xc8}], 0x4, 0x0, 0x0, 0x8801}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000900)={'team0\x00', 0x0}) sendmsg$nl_route(r8, &(0x7f0000000c00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000bc0)={&(0x7f00000011c0)=@dellink={0x25c, 0x11, 0x400, 0x70bd28, 0x25dfdbff, {0x0, 0x0, 0x0, r9, 0x1000}, [@IFLA_PROTO_DOWN={0x5}, @IFLA_IFNAME={0x14, 0x3, 'macvlan1\x00'}, @IFLA_MAP={0x24, 0xe, {0x9, 0xd2, 0x2e4d, 0x200, 0x3e, 0xff}}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x5}, @IFLA_IFALIAS={0x14, 0x14, 'syzkaller1\x00'}, @IFLA_MTU={0x8, 0x4, 0x101}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_VFINFO_LIST={0x1cc, 0x16, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x8fe, 0xffff}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x5, 0x1}}]}, {0x84, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN_LIST={0x54, 0xc, 0x0, 0x1, [{0x14, 0x1, {0xb5d3, 0xadc, 0x100, 0xd1c53560eb87a9fa}}, {0x14, 0x1, {0x4, 0xb6, 0x81, 0x8100}}, {0x14, 0x1, {0x0, 0x6e4, 0x1, 0x88a8}}, {0x14, 0x1, {0x14, 0xaed, 0x0, 0x8100}}]}, @IFLA_VF_TX_RATE={0xc, 0x3, {0x1000, 0x200}}, @IFLA_VF_TRUST={0xc, 0x9, {0x7, 0x800}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x8000, 0x1}}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x7f, 0x7fff}}, @IFLA_VF_TRUST={0xc, 0x9, {0x7ff, 0x8}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_RATE={0x10, 0x6, {0x9, 0x5, 0x5}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x9}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x80000000, 0x3}}]}, {0xa4, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0xfff, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1d}}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x3f, 0x43}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x65c, 0x1}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x2, 0x80000001}}, @IFLA_VF_VLAN_LIST={0x40, 0xc, 0x0, 0x1, [{0x14, 0x1, {0xcae8, 0x919, 0x9, 0x8100}}, {0x14, 0x1, {0x200, 0xb47, 0xaaa, 0x8100}}, {0x14, 0x1, {0x5, 0x53b, 0xfffffff7, 0x88a8}}]}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x3f, 0x7fff}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x930, 0x5}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x6, 0x8}}]}]}]}, 0x25c}, 0x1, 0x0, 0x0, 0x11}, 0x4c089) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r7, 0x40189429, &(0x7f0000000480)={0x1, 0x4, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r10, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x45, 0xfc, 0x6}, {0x6}]}, 0x10) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x2, 0x3, &(0x7f0000000000)=@framed={{0x18, 0xf}}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) socket$inet6_sctp(0xa, 0x801, 0x84) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) r11 = socket$igmp(0x2, 0x3, 0x2) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@private1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) ioctl$TUNSETOWNER(r3, 0x400454cc, r12) setsockopt$MRT_INIT(r11, 0x0, 0xc8, &(0x7f0000000040), 0x4) setsockopt$MRT_ADD_VIF(r11, 0x0, 0xca, &(0x7f0000000100)={0x0, 0x1, 0x0, 0x0, @vifc_lcl_addr=@dev={0xac, 0x14, 0x14, 0xb}, @multicast1}, 0x10) [ 671.518049][T22374] RIP: 0033:0x7f1567f53ecf [ 671.522487][T22374] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 671.542196][T22374] RSP: 002b:00007f1567314f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 671.550636][T22374] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007f1567f53ecf [ 671.558637][T22374] RDX: 0000000000100000 RSI: 00007f155eef5000 RDI: 0000000000000005 [ 671.566757][T22374] RBP: 00007f155eef5000 R08: 0000000000000000 R09: 0000000000000534 [ 671.574757][T22374] R10: 0000000000100000 R11: 0000000000000293 R12: 0000000000000000 [ 671.582754][T22374] R13: 00007f1567314fdc R14: 00007f1567314fe0 R15: 0000000020000fc2 [ 671.590855][T22374] [ 671.597401][T22373] netlink: 'syz-executor.1': attribute type 6 has an invalid length. [ 671.607296][T22379] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=22379 comm=syz-executor.5 [ 671.638499][T22379] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=61 sclass=netlink_route_socket pid=22379 comm=syz-executor.5 [ 671.638887][T22369] FAT-fs (loop0): Unrecognized mount option "ÿÿÿÿÿÿÿÿ184467440737095516150xffffffffffffffff" or missing value [ 671.659653][T22381] FAULT_INJECTION: forcing a failure. [ 671.659653][T22381] name failslab, interval 1, probability 0, space 0, times 0 [ 671.675774][T22381] CPU: 0 PID: 22381 Comm: syz-executor.2 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 671.686326][T22381] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 671.696406][T22381] Call Trace: [ 671.699721][T22381] [ 671.702668][T22381] dump_stack_lvl+0xda/0x130 [ 671.707331][T22381] dump_stack+0x15/0x20 [ 671.711545][T22381] should_fail_ex+0x21f/0x230 [ 671.716258][T22381] __should_failslab+0x92/0xa0 [ 671.721054][T22381] should_failslab+0x9/0x20 [ 671.725589][T22381] slab_pre_alloc_hook+0x38/0x180 [ 671.730688][T22381] __kmem_cache_alloc_node+0x46/0x250 [ 671.736160][T22381] ? sctp_add_bind_addr+0x6f/0x1e0 [ 671.741300][T22381] kmalloc_trace+0x2a/0xa0 [ 671.745745][T22381] sctp_add_bind_addr+0x6f/0x1e0 [ 671.750707][T22381] sctp_copy_local_addr_list+0x19b/0x220 [ 671.756375][T22381] sctp_copy_one_addr+0x7d/0x400 [ 671.761354][T22381] sctp_bind_addr_copy+0x81/0x2b0 [ 671.766404][T22381] sctp_assoc_set_bind_addr_from_ep+0xc0/0xd0 [ 671.772550][T22381] sctp_connect_new_asoc+0x1cb/0x3a0 [ 671.777866][T22381] sctp_sendmsg+0xefc/0x1900 [ 671.782549][T22381] inet_sendmsg+0x63/0x80 [ 671.786908][T22381] __sys_sendto+0x246/0x300 [ 671.791479][T22381] __x64_sys_sendto+0x78/0x90 [ 671.796203][T22381] do_syscall_64+0x41/0xc0 [ 671.800656][T22381] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 671.806825][T22381] RIP: 0033:0x7f9293ef6149 [ 671.811397][T22381] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 671.831122][T22381] RSP: 002b:00007f9293269168 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 671.833122][T22373] bond963: entered allmulticast mode [ 671.839534][T22381] RAX: ffffffffffffffda RBX: 00007f9294015f80 RCX: 00007f9293ef6149 [ 671.845061][T22374] loop3: detected capacity change from 0 to 2048 [ 671.852812][T22381] RDX: 000000000001a000 RSI: 0000000020000000 RDI: 0000000000000004 [ 671.852827][T22381] RBP: 00007f92932691d0 R08: 0000000020000080 R09: 000000000000001c [ 671.852842][T22381] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 07:23:04 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) r2 = open(&(0x7f0000000040)='./file0\x00', 0x161842, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'sit0\x00'}) r4 = syz_io_uring_setup(0x73d7, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000100)=0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r6, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x10001) r8 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x8010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(r5, 0x0, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x8) syz_io_uring_submit(0x0, r8, &(0x7f00000008c0)=@IORING_OP_OPENAT2={0x1c, 0x40, 0x0, 0xffffffffffffffff, &(0x7f0000000840)={0x4ae0e0, 0x2, 0x5}, &(0x7f0000000880)='./file0\x00', 0x18, 0x0, 0x12345}, 0xff) syz_io_uring_submit(r5, 0x0, &(0x7f0000002b40)=@IORING_OP_RECVMSG={0xa, 0x2b, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000002b00)={0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/28, 0x1c}, {&(0x7f0000001540)=""/4096, 0x1000}, {&(0x7f0000002540)=""/131, 0x83}, {&(0x7f0000002600)=""/102, 0x66}, {&(0x7f0000002840)=""/203, 0xcb}], 0x6}, 0x0, 0x10040, 0x1, {0x1}}, 0x0) ftruncate(r2, 0x200002) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x200000e, 0x12, r3, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) r10 = creat(&(0x7f0000000180)='./file0\x00', 0x0) fallocate(r10, 0x0, 0x0, 0x2000402) fallocate(r9, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r9, 0xc028660f, &(0x7f0000001380)={0x2000, r10}) 07:23:04 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) (fail_nth: 69) [ 671.852856][T22381] R13: 00007ffdbda7c2df R14: 00007f9293269300 R15: 0000000000022000 [ 671.868084][T22373] 8021q: adding VLAN 0 to HW filter on device bond963 [ 671.875120][T22381] [ 671.887764][T22374] FAT-fs (loop3): Unrecognized mount option "ÿÿÿÿÿÿÿÿ184467440737095516150xffffffffffffffff" or missing value [ 671.919138][T22378] netlink: 'syz-executor.5': attribute type 6 has an invalid length. [ 671.933920][T22378] (unnamed net_device) (uninitialized): option use_carrier: invalid value (6) [ 671.949829][T22379] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 671.966075][T22386] FAULT_INJECTION: forcing a failure. [ 671.966075][T22386] name failslab, interval 1, probability 0, space 0, times 0 [ 671.978811][T22386] CPU: 0 PID: 22386 Comm: syz-executor.2 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 671.989355][T22386] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 671.999527][T22386] Call Trace: [ 672.002832][T22386] [ 672.005799][T22386] dump_stack_lvl+0xda/0x130 [ 672.010430][T22386] dump_stack+0x15/0x20 [ 672.014702][T22386] should_fail_ex+0x21f/0x230 [ 672.019420][T22386] __should_failslab+0x92/0xa0 [ 672.024294][T22386] should_failslab+0x9/0x20 [ 672.028846][T22386] slab_pre_alloc_hook+0x38/0x180 [ 672.033955][T22386] __kmem_cache_alloc_node+0x46/0x250 [ 672.039377][T22386] ? sctp_add_bind_addr+0x6f/0x1e0 [ 672.044611][T22386] kmalloc_trace+0x2a/0xa0 [ 672.049087][T22386] sctp_add_bind_addr+0x6f/0x1e0 [ 672.054074][T22386] sctp_copy_local_addr_list+0x19b/0x220 [ 672.059816][T22386] sctp_copy_one_addr+0x7d/0x400 [ 672.064788][T22386] sctp_bind_addr_copy+0x81/0x2b0 [ 672.069872][T22386] sctp_assoc_set_bind_addr_from_ep+0xc0/0xd0 [ 672.075986][T22386] sctp_connect_new_asoc+0x1cb/0x3a0 [ 672.081349][T22386] sctp_sendmsg+0xefc/0x1900 [ 672.085980][T22386] inet_sendmsg+0x63/0x80 [ 672.090392][T22386] __sys_sendto+0x246/0x300 [ 672.095013][T22386] __x64_sys_sendto+0x78/0x90 [ 672.099893][T22386] do_syscall_64+0x41/0xc0 [ 672.104349][T22386] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 672.110288][T22386] RIP: 0033:0x7f9293ef6149 [ 672.114786][T22386] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 672.134426][T22386] RSP: 002b:00007f9293269168 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 672.142878][T22386] RAX: ffffffffffffffda RBX: 00007f9294015f80 RCX: 00007f9293ef6149 [ 672.150970][T22386] RDX: 000000000001a000 RSI: 0000000020000000 RDI: 0000000000000004 [ 672.158979][T22386] RBP: 00007f92932691d0 R08: 0000000020000080 R09: 000000000000001c [ 672.167039][T22386] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 672.175053][T22386] R13: 00007ffdbda7c2df R14: 00007f9293269300 R15: 0000000000022000 [ 672.183067][T22386] 07:23:04 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0), 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000380)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000008c0)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000001cc0)={{}, r2, 0x16, @inherit={0x88, &(0x7f0000001580)=ANY=[@ANYRES16=r3]}, @devid}) r4 = syz_open_dev$MSR(&(0x7f0000000140), 0x100000000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r4, 0x84009422, &(0x7f0000000ec0)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(r6, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000001840)=ANY=[@ANYRES32=r5, @ANYRES32=r3, @ANYRESOCT, @ANYRES32=r1, @ANYRES32, @ANYRES64, @ANYRESHEX], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x40025) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f0000001500)={r5, "2ce8b7e675c30c143ac940d229ad3592"}) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$eJzs1T9rE3EYB/AnaazRqbM4/MDFqVQ3JyOSQvFAUTLoZKBxyYmQWy6Z8hJ8Ab4wB1+EZMp2Ei5VWxSDNLnSfj7LPdz3ud+/g7v39z+OTz8VH75+/hLdXivavbjTXrbiINpxZh4AwHWyrKr4XtWaXgsAsBv+/wBw87x5++7Fsyzrv06pG7GYl4NyUF/r/Pgk6x+llf3fnlqU5WDvZ/4o1c7nt+LuOn/8x3w/Hj6o81X2/GV2Ib8dp1vfPQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA3GyHKXUiIqWUDn7dXZTlYK/OD9OZC3ldHZ9k/aN1w/m8E/c6O9sGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAcAmK6Ww8zPPR5JoVEd9ix5N210d6uSMv/tXTW097VU5+m8XTTZtfLatq05GfRMTWF9+KmK/eUvNnuGnR3DcJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABoVjGdjYd5PpoUTa8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALgqiulsPMzz0eS/i2jVI/29p+k9AgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAM34EQAA///P7Cnj") r7 = socket$inet_udplite(0x2, 0x2, 0x88) read(r7, &(0x7f00000000c0)=""/43, 0x2b) 07:23:04 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0xff7f}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) 07:23:04 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, 0x0) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$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") (fail_nth: 32) 07:23:04 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) (fail_nth: 70) 07:23:04 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) r2 = open(&(0x7f0000000040)='./file0\x00', 0x161842, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'sit0\x00'}) r4 = syz_io_uring_setup(0x73d7, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000100)=0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r6, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x10001) r8 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x8010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(r5, 0x0, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x8) syz_io_uring_submit(0x0, r8, &(0x7f00000008c0)=@IORING_OP_OPENAT2={0x1c, 0x40, 0x0, 0xffffffffffffffff, &(0x7f0000000840)={0x4ae0e0, 0x2, 0x5}, &(0x7f0000000880)='./file0\x00', 0x18, 0x0, 0x12345}, 0xff) syz_io_uring_submit(r5, 0x0, &(0x7f0000002b40)=@IORING_OP_RECVMSG={0xa, 0x2b, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000002b00)={0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/28, 0x1c}, {&(0x7f0000001540)=""/4096, 0x1000}, {&(0x7f0000002540)=""/131, 0x83}, {&(0x7f0000002600)=""/102, 0x66}, {&(0x7f0000002840)=""/203, 0xcb}], 0x6}, 0x0, 0x10040, 0x1, {0x1}}, 0x0) ftruncate(r2, 0x200002) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x200000e, 0x12, r3, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) r10 = creat(&(0x7f0000000180)='./file0\x00', 0x0) fallocate(r10, 0x0, 0x0, 0x2000402) fallocate(r9, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r9, 0xc028660f, &(0x7f0000001380)={0x2001, r10}) 07:23:04 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000002c0)={&(0x7f0000000c80)=ANY=[@ANYBLOB="0026bd7000ffdbdf25070000000c00068008000b00060000000c0008002302b41174de3f460a6d000000000000080003000380000008000300bd2c00ff07000400f8ffffff080003001dd30000080004006604000000000000000000"], 0x5c}, 0x1, 0x0, 0x0, 0x1884}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6, 0x6}]}}}]}, 0x3c}}, 0x0) r3 = openat(r2, &(0x7f00000000c0)='./file0\x00', 0x0, 0x31) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000680)=ANY=[@ANYBLOB="4afe65cd9f4cb96af18454a88fa8005c9fe248c0144c45e701002b7127b6679c7a64908ce701f270818888d4368d79057ee5e41b0efaa601fc1a8488a8a24cb9d947491b1bc7983e1710bb3ccc29e6d4ed4df77669e40bbfa802c600208e53ee50e98ab2cb4f50d11a9cdddd9320a5d8171c0f0c108488d0b23be195b12fc7ed967f99e71ff165310bc20d027160e20e87088c6f48a6c7210431c5a6578b11b646347984f92bc092089c964bd360a4e0b124bec92bf620edc72693f0e78f12e205659005168a8e2f60f18bcecd57f49295bfe6ca9c894f4d75798ae81020f3ff3f9d2aeb8740d2ec38db6c068f60e10f6f06172fb698e28d2dcc7deed28eee05874cc59a89b771e167c0d3da3789a3acd1af0cc89d9ff46e329a00f6d1a28794c3b3db7752189c1853e53b0aa840b887618d3d9b6038fc37865fa39328a439819e25692b3efee7a80b609f2ba10030f51469aa05f966b72dedf8991f0d", @ANYRES32=r0, @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00./file0\x00']) connect$unix(r3, &(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000001c0), 0x200080, 0x0) ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f0000000200)={0x55, 0xb5f3, 0x2, 0x1, 0x6}) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000600)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000800)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x40}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) io_setup(0x6, &(0x7f00000003c0)=0x0) r7 = socket$phonet_pipe(0x23, 0x5, 0x2) io_submit(r6, 0x2, &(0x7f00000005c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, r7, &(0x7f00000001c0)='\"', 0x1}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r8, &(0x7f0000006440)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f0000000c40)={0x10, 0x1d, 0x20, 0x70bd28}, 0x10}, {&(0x7f0000000f80)={0x20c, 0x3d, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x1f, 0x46, 0x0, 0x1, [@generic="6b23bda57b0fcd6882aea56d992b0de112a87c9689a0ce8f3a928a"]}, @generic="931dd380ae9b76725532f39b25791247f8e1faaa5606177d1141efdf8a23daecc73d0706f82254c664a01e4c4986b42b265e8e88f8f88e8099514ce917072d6e80996cbddc81dd1014a75c1cd2e0c084d7806b82c11b8a625557f25357333f879c7f3ea978d0c62492b2b2a3437425bf3933cf6d0456ae40263ff847b9956f9f56cd1e35dd616a0dffde59", @nested={0x14d, 0x46, 0x0, 0x1, [@typed={0x8, 0x8f, 0x0, 0x0, @u32=0x4}, @generic="3fe433e9f5d2f6047805d9eb39d59742ad46c8bd198fea6b4f77d0bf577f925374abd91b16efa9a31621d58f4b1ee788ba33ce3ae89358fcbecdc28e3a8775ee6c905d5275bf5f05ca6bfc68336199389a9644323a81d22c4bd081ec9c4826b7e965a5292167778eefb5edac3e1e0fd628684a30dbac663eb65de357a891a90855f356cbe26225342cce43c8e320a777c2a1f74ab97b7e442c94", @typed={0x8, 0x41, 0x0, 0x0, @ipv4=@multicast2}, @typed={0x8, 0x6b, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @generic="79c7219fa8393ab7671b616b9cea5f59e77de2a2ea4a268fcad39d31284ee1045f7dedc0dea487845188adde6fe70f5537a0635e01c2ec0a205c1f92c2272999ec8388f9a95b4d387581056e112c58f96f686734281b5a", @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@remote}, @generic="2d7a6c2813a21aa5bc78773404596de147d491e1868776a08d604bfb6aea387b585ce5b3f7ab336df3922c65"]}]}, 0x20c}, {&(0x7f0000000e00)={0x30, 0x12, 0x800, 0x70bd27, 0x25dfdbfc, "", [@typed={0x8, 0x5b, 0x0, 0x0, @pid}, @typed={0xf, 0x8c, 0x0, 0x0, @str='syzkaller1\x00'}, @typed={0x8, 0x7, 0x0, 0x0, @u32}]}, 0x30}, {&(0x7f0000000e40)={0xc8, 0x42, 0x10, 0x70bd26, 0x25dfdbff, "", [@generic="208cd2ae6be9be", @generic="c1d6c27da633daf115873b83c8913d284239d441678e667c20444d1a1f77f48ea7cbf783d84e79a9ebc262452149fe521b40868bf3938c61c8be3cdbd7429e623c99db5ae26d9cf24ee4ef4777ff0410e8b899b18e829f387d7926641f189d2b9697e099ffb7f20f691064b7d87d04cd2e230e8df8c77a2f1e4f4fabd49cfe414b3027dd850d9a2be9547ba5f2ed09811ea9ed9b201782165a792b57afca3e3d575d0f5b4b17a8", @typed={0x8, 0x94, 0x0, 0x0, @u32=0x1}]}, 0xc8}], 0x4, 0x0, 0x0, 0x8801}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000900)={'team0\x00', 0x0}) sendmsg$nl_route(r8, &(0x7f0000000c00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000bc0)={&(0x7f00000011c0)=@dellink={0x25c, 0x11, 0x400, 0x70bd28, 0x25dfdbff, {0x0, 0x0, 0x0, r9, 0x1000}, [@IFLA_PROTO_DOWN={0x5}, @IFLA_IFNAME={0x14, 0x3, 'macvlan1\x00'}, @IFLA_MAP={0x24, 0xe, {0x9, 0xd2, 0x2e4d, 0x200, 0x3e, 0xff}}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x5}, @IFLA_IFALIAS={0x14, 0x14, 'syzkaller1\x00'}, @IFLA_MTU={0x8, 0x4, 0x101}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_VFINFO_LIST={0x1cc, 0x16, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x8fe, 0xffff}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x5, 0x1}}]}, {0x84, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN_LIST={0x54, 0xc, 0x0, 0x1, [{0x14, 0x1, {0xb5d3, 0xadc, 0x100, 0xd1c53560eb87a9fa}}, {0x14, 0x1, {0x4, 0xb6, 0x81, 0x8100}}, {0x14, 0x1, {0x0, 0x6e4, 0x1, 0x88a8}}, {0x14, 0x1, {0x14, 0xaed, 0x0, 0x8100}}]}, @IFLA_VF_TX_RATE={0xc, 0x3, {0x1000, 0x200}}, @IFLA_VF_TRUST={0xc, 0x9, {0x7, 0x800}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x8000, 0x1}}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x7f, 0x7fff}}, @IFLA_VF_TRUST={0xc, 0x9, {0x7ff, 0x8}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_RATE={0x10, 0x6, {0x9, 0x5, 0x5}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x9}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x80000000, 0x3}}]}, {0xa4, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0xfff, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1d}}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x3f, 0x43}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x65c, 0x1}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x2, 0x80000001}}, @IFLA_VF_VLAN_LIST={0x40, 0xc, 0x0, 0x1, [{0x14, 0x1, {0xcae8, 0x919, 0x9, 0x8100}}, {0x14, 0x1, {0x200, 0xb47, 0xaaa, 0x8100}}, {0x14, 0x1, {0x5, 0x53b, 0xfffffff7, 0x88a8}}]}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x3f, 0x7fff}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x930, 0x5}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x6, 0x8}}]}]}]}, 0x25c}, 0x1, 0x0, 0x0, 0x11}, 0x4c089) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r7, 0x40189429, &(0x7f0000000480)={0x1, 0x4, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r10, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x45, 0xfc, 0x6}, {0x6}]}, 0x10) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x2, 0x3, &(0x7f0000000000)=@framed={{0x18, 0xf}}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) socket$inet6_sctp(0xa, 0x801, 0x84) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) r11 = socket$igmp(0x2, 0x3, 0x2) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@private1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) ioctl$TUNSETOWNER(r3, 0x400454cc, r12) setsockopt$MRT_INIT(r11, 0x0, 0xc8, &(0x7f0000000040), 0x4) setsockopt$MRT_ADD_VIF(r11, 0x0, 0xca, &(0x7f0000000100)={0x0, 0x1, 0x0, 0x0, @vifc_lcl_addr=@dev={0xac, 0x14, 0x14, 0xb}, @multicast1}, 0x10) [ 672.328464][T22392] netlink: 'syz-executor.1': attribute type 6 has an invalid length. [ 672.358542][T22395] FAULT_INJECTION: forcing a failure. [ 672.358542][T22395] name failslab, interval 1, probability 0, space 0, times 0 [ 672.371191][T22395] CPU: 1 PID: 22395 Comm: syz-executor.2 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 672.380321][T22391] FAULT_INJECTION: forcing a failure. [ 672.380321][T22391] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 672.381970][T22395] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 672.405323][T22395] Call Trace: [ 672.408638][T22395] [ 672.411574][T22395] dump_stack_lvl+0xda/0x130 [ 672.416191][T22395] dump_stack+0x15/0x20 [ 672.420507][T22395] should_fail_ex+0x21f/0x230 [ 672.425206][T22395] __should_failslab+0x92/0xa0 [ 672.429997][T22395] should_failslab+0x9/0x20 [ 672.434510][T22395] slab_pre_alloc_hook+0x38/0x180 [ 672.439593][T22395] __kmem_cache_alloc_node+0x46/0x250 [ 672.445003][T22395] ? sctp_add_bind_addr+0x6f/0x1e0 [ 672.450133][T22395] kmalloc_trace+0x2a/0xa0 [ 672.454564][T22395] sctp_add_bind_addr+0x6f/0x1e0 [ 672.459514][T22395] sctp_copy_local_addr_list+0x19b/0x220 [ 672.465191][T22395] sctp_copy_one_addr+0x7d/0x400 [ 672.470223][T22395] sctp_bind_addr_copy+0x81/0x2b0 [ 672.475259][T22395] sctp_assoc_set_bind_addr_from_ep+0xc0/0xd0 [ 672.481401][T22395] sctp_connect_new_asoc+0x1cb/0x3a0 [ 672.486732][T22395] sctp_sendmsg+0xefc/0x1900 [ 672.491406][T22395] inet_sendmsg+0x63/0x80 [ 672.495752][T22395] __sys_sendto+0x246/0x300 [ 672.500269][T22395] __x64_sys_sendto+0x78/0x90 [ 672.504995][T22395] do_syscall_64+0x41/0xc0 [ 672.509434][T22395] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 672.515363][T22395] RIP: 0033:0x7f9293ef6149 [ 672.519798][T22395] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 672.539501][T22395] RSP: 002b:00007f9293269168 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 672.547921][T22395] RAX: ffffffffffffffda RBX: 00007f9294015f80 RCX: 00007f9293ef6149 [ 672.555898][T22395] RDX: 000000000001a000 RSI: 0000000020000000 RDI: 0000000000000004 [ 672.563877][T22395] RBP: 00007f92932691d0 R08: 0000000020000080 R09: 000000000000001c [ 672.571909][T22395] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 672.579884][T22395] R13: 00007ffdbda7c2df R14: 00007f9293269300 R15: 0000000000022000 [ 672.587864][T22395] [ 672.590883][T22391] CPU: 0 PID: 22391 Comm: syz-executor.3 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 672.601375][T22391] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 672.611451][T22391] Call Trace: [ 672.614743][T22391] [ 672.617750][T22391] dump_stack_lvl+0xda/0x130 [ 672.622404][T22391] dump_stack+0x15/0x20 07:23:05 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) (fail_nth: 71) [ 672.626646][T22391] should_fail_ex+0x21f/0x230 [ 672.631368][T22391] __alloc_pages+0x108/0x340 [ 672.636011][T22391] vma_alloc_folio+0x6a3/0x8c0 [ 672.640808][T22391] ? __vm_enough_memory+0xdf/0x2a0 [ 672.645980][T22391] shmem_get_folio_gfp+0x801/0x1200 [ 672.651227][T22391] shmem_write_begin+0xa6/0x1d0 [ 672.656116][T22391] generic_perform_write+0x1c3/0x3d0 [ 672.661444][T22391] ? shmem_write_begin+0x1d0/0x1d0 [ 672.661772][T22404] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=22404 comm=syz-executor.5 [ 672.666584][T22391] __generic_file_write_iter+0xe6/0x290 [ 672.681837][T22403] FAULT_INJECTION: forcing a failure. [ 672.681837][T22403] name failslab, interval 1, probability 0, space 0, times 0 [ 672.684908][T22391] generic_file_write_iter+0x7d/0x1c0 [ 672.702922][T22391] vfs_write+0x47b/0x780 [ 672.707223][T22391] ksys_write+0xeb/0x1a0 [ 672.711565][T22391] __x64_sys_write+0x42/0x50 [ 672.716170][T22391] do_syscall_64+0x41/0xc0 [ 672.720607][T22391] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 672.726516][T22391] RIP: 0033:0x7f1567f53ecf [ 672.730947][T22391] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 672.750592][T22391] RSP: 002b:00007f1567314f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 672.759010][T22391] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007f1567f53ecf [ 672.767075][T22391] RDX: 0000000000100000 RSI: 00007f155eef5000 RDI: 0000000000000005 [ 672.775063][T22391] RBP: 00007f155eef5000 R08: 0000000000000000 R09: 0000000000000534 [ 672.783061][T22391] R10: 0000000000100000 R11: 0000000000000293 R12: 0000000000000000 [ 672.791037][T22391] R13: 00007f1567314fdc R14: 00007f1567314fe0 R15: 0000000020000fc2 [ 672.799067][T22391] [ 672.802086][T22403] CPU: 1 PID: 22403 Comm: syz-executor.2 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 672.812621][T22403] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 672.822746][T22403] Call Trace: [ 672.826044][T22403] 07:23:05 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, 0x0) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$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") (fail_nth: 33) [ 672.828993][T22403] dump_stack_lvl+0xda/0x130 [ 672.833680][T22403] dump_stack+0x15/0x20 [ 672.837868][T22403] should_fail_ex+0x21f/0x230 [ 672.842607][T22403] __should_failslab+0x92/0xa0 [ 672.847434][T22403] should_failslab+0x9/0x20 [ 672.851960][T22403] slab_pre_alloc_hook+0x38/0x180 [ 672.857069][T22403] __kmem_cache_alloc_node+0x46/0x250 [ 672.862510][T22392] bond964: entered promiscuous mode [ 672.862529][T22403] ? sctp_add_bind_addr+0x6f/0x1e0 [ 672.867772][T22392] bond964: entered allmulticast mode [ 672.872825][T22403] kmalloc_trace+0x2a/0xa0 [ 672.872855][T22403] sctp_add_bind_addr+0x6f/0x1e0 [ 672.883785][T22392] 8021q: adding VLAN 0 to HW filter on device bond964 [ 672.887495][T22403] sctp_copy_local_addr_list+0x19b/0x220 [ 672.887533][T22403] sctp_copy_one_addr+0x7d/0x400 [ 672.887571][T22403] sctp_bind_addr_copy+0x81/0x2b0 [ 672.887602][T22403] sctp_assoc_set_bind_addr_from_ep+0xc0/0xd0 [ 672.887642][T22403] sctp_connect_new_asoc+0x1cb/0x3a0 [ 672.887689][T22403] sctp_sendmsg+0xefc/0x1900 [ 672.887765][T22403] inet_sendmsg+0x63/0x80 [ 672.887796][T22403] __sys_sendto+0x246/0x300 [ 672.887823][T22403] __x64_sys_sendto+0x78/0x90 [ 672.887848][T22403] do_syscall_64+0x41/0xc0 [ 672.887879][T22403] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 672.887983][T22403] RIP: 0033:0x7f9293ef6149 [ 672.888067][T22403] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 07:23:05 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0x20000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) [ 672.888092][T22403] RSP: 002b:00007f9293269168 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 672.888164][T22403] RAX: ffffffffffffffda RBX: 00007f9294015f80 RCX: 00007f9293ef6149 [ 672.986134][T22404] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=61 sclass=netlink_route_socket pid=22404 comm=syz-executor.5 [ 672.991338][T22403] RDX: 000000000001a000 RSI: 0000000020000000 RDI: 0000000000000004 [ 672.991358][T22403] RBP: 00007f92932691d0 R08: 0000000020000080 R09: 000000000000001c [ 673.020401][T22403] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 673.028236][T22404] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 673.028421][T22403] R13: 00007ffdbda7c2df R14: 00007f9293269300 R15: 0000000000022000 [ 673.045847][T22403] [ 673.065783][T22409] loop0: detected capacity change from 0 to 2048 [ 673.073245][T22411] netlink: 'syz-executor.1': attribute type 6 has an invalid length. [ 673.085377][T22410] FAULT_INJECTION: forcing a failure. [ 673.085377][T22410] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 673.099145][T22410] CPU: 0 PID: 22410 Comm: syz-executor.3 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 673.102801][T22409] FAT-fs (loop0): Unrecognized mount option "ÿÿÿÿÿÿÿÿ184467440737095516150xffffffffffffffff" or missing value [ 673.109914][T22410] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 673.109931][T22410] Call Trace: [ 673.109938][T22410] [ 673.109947][T22410] dump_stack_lvl+0xda/0x130 [ 673.109982][T22410] dump_stack+0x15/0x20 [ 673.136069][T22396] netlink: 'syz-executor.5': attribute type 6 has an invalid length. [ 673.138028][T22410] should_fail_ex+0x21f/0x230 [ 673.142783][T22396] (unnamed net_device) (uninitialized): option use_carrier: invalid value (6) [ 673.147031][T22410] should_fail+0xb/0x10 [ 673.173386][T22410] should_fail_usercopy+0x1a/0x20 [ 673.178711][T22410] copy_page_from_iter_atomic+0x22d/0xcf0 [ 673.184537][T22410] ? folio_test_hugetlb+0x3a/0x70 [ 673.189673][T22410] ? shmem_write_begin+0x12a/0x1d0 [ 673.194828][T22410] generic_perform_write+0x203/0x3d0 [ 673.200276][T22410] ? shmem_write_begin+0x1d0/0x1d0 [ 673.205422][T22410] __generic_file_write_iter+0xe6/0x290 [ 673.211085][T22410] generic_file_write_iter+0x7d/0x1c0 [ 673.216502][T22410] vfs_write+0x47b/0x780 [ 673.220778][T22410] ksys_write+0xeb/0x1a0 [ 673.225137][T22410] __x64_sys_write+0x42/0x50 [ 673.229762][T22410] do_syscall_64+0x41/0xc0 07:23:05 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) (fail_nth: 72) 07:23:05 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0x3ffff}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) [ 673.234226][T22410] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 673.240178][T22410] RIP: 0033:0x7f1567f53ecf [ 673.244732][T22410] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 673.264381][T22410] RSP: 002b:00007f1567314f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 673.272840][T22410] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007f1567f53ecf [ 673.280908][T22410] RDX: 0000000000100000 RSI: 00007f155eef5000 RDI: 0000000000000005 [ 673.288951][T22410] RBP: 00007f155eef5000 R08: 0000000000000000 R09: 0000000000000534 [ 673.296212][T22417] FAULT_INJECTION: forcing a failure. [ 673.296212][T22417] name failslab, interval 1, probability 0, space 0, times 0 [ 673.296950][T22410] R10: 0000000000100000 R11: 0000000000000293 R12: 0000000000000000 [ 673.317634][T22410] R13: 00007f1567314fdc R14: 00007f1567314fe0 R15: 0000000020000fc2 [ 673.325695][T22410] [ 673.328755][T22417] CPU: 1 PID: 22417 Comm: syz-executor.2 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 673.339258][T22417] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 673.345825][T22418] netlink: 'syz-executor.1': attribute type 6 has an invalid length. [ 673.349319][T22417] Call Trace: [ 673.349329][T22417] [ 673.349337][T22417] dump_stack_lvl+0xda/0x130 [ 673.368338][T22417] dump_stack+0x15/0x20 [ 673.369475][T22410] loop3: detected capacity change from 0 to 2048 [ 673.372597][T22417] should_fail_ex+0x21f/0x230 [ 673.381958][T22410] FAT-fs (loop3): Unrecognized mount option "ÿÿÿÿÿÿÿÿ184467440737095516150xffffffffffffffff" or missing value [ 673.383614][T22417] __should_failslab+0x92/0xa0 [ 673.400128][T22417] should_failslab+0x9/0x20 [ 673.404720][T22417] slab_pre_alloc_hook+0x38/0x180 [ 673.409789][T22417] __kmem_cache_alloc_node+0x46/0x250 [ 673.414832][T22418] bond966: entered promiscuous mode [ 673.415183][T22417] ? sctp_add_bind_addr+0x6f/0x1e0 [ 673.421139][T22418] bond966: entered allmulticast mode [ 673.425491][T22417] kmalloc_trace+0x2a/0xa0 07:23:05 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) r2 = open(&(0x7f0000000040)='./file0\x00', 0x161842, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'sit0\x00'}) r4 = syz_io_uring_setup(0x73d7, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000100)=0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r6, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x10001) r8 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x8010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(r5, 0x0, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x8) syz_io_uring_submit(0x0, r8, &(0x7f00000008c0)=@IORING_OP_OPENAT2={0x1c, 0x40, 0x0, 0xffffffffffffffff, &(0x7f0000000840)={0x4ae0e0, 0x2, 0x5}, &(0x7f0000000880)='./file0\x00', 0x18, 0x0, 0x12345}, 0xff) syz_io_uring_submit(r5, 0x0, &(0x7f0000002b40)=@IORING_OP_RECVMSG={0xa, 0x2b, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000002b00)={0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/28, 0x1c}, {&(0x7f0000001540)=""/4096, 0x1000}, {&(0x7f0000002540)=""/131, 0x83}, {&(0x7f0000002600)=""/102, 0x66}, {&(0x7f0000002840)=""/203, 0xcb}], 0x6}, 0x0, 0x10040, 0x1, {0x1}}, 0x0) ftruncate(r2, 0x200002) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x200000e, 0x12, r3, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) r10 = creat(&(0x7f0000000180)='./file0\x00', 0x0) fallocate(r10, 0x0, 0x0, 0x2000402) fallocate(r9, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r9, 0xc028660f, &(0x7f0000001380)={0xc, r10, 0x2}) [ 673.433324][T22418] 8021q: adding VLAN 0 to HW filter on device bond966 [ 673.435162][T22417] sctp_add_bind_addr+0x6f/0x1e0 [ 673.446952][T22417] sctp_copy_local_addr_list+0x19b/0x220 [ 673.452611][T22417] sctp_copy_one_addr+0x7d/0x400 [ 673.457577][T22417] sctp_bind_addr_copy+0x81/0x2b0 [ 673.462682][T22417] sctp_assoc_set_bind_addr_from_ep+0xc0/0xd0 [ 673.468883][T22417] sctp_connect_new_asoc+0x1cb/0x3a0 [ 673.474290][T22417] sctp_sendmsg+0xefc/0x1900 [ 673.478922][T22417] inet_sendmsg+0x63/0x80 [ 673.483283][T22417] __sys_sendto+0x246/0x300 [ 673.487825][T22417] __x64_sys_sendto+0x78/0x90 [ 673.492569][T22417] do_syscall_64+0x41/0xc0 [ 673.497014][T22417] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 673.503017][T22417] RIP: 0033:0x7f9293ef6149 [ 673.507514][T22417] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 673.527263][T22417] RSP: 002b:00007f9293269168 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 673.535702][T22417] RAX: ffffffffffffffda RBX: 00007f9294015f80 RCX: 00007f9293ef6149 [ 673.543717][T22417] RDX: 000000000001a000 RSI: 0000000020000000 RDI: 0000000000000004 [ 673.551759][T22417] RBP: 00007f92932691d0 R08: 0000000020000080 R09: 000000000000001c [ 673.559761][T22417] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 673.567838][T22417] R13: 00007ffdbda7c2df R14: 00007f9293269300 R15: 0000000000022000 [ 673.575876][T22417] 07:23:06 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0), 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000380)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000008c0)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000001cc0)={{}, r2, 0x16, @inherit={0x88, &(0x7f0000001580)=ANY=[@ANYRES16=r3]}, @devid}) r4 = syz_open_dev$MSR(&(0x7f0000000140), 0x100000000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r4, 0x84009422, &(0x7f0000000ec0)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(r6, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000001840)=ANY=[@ANYRES32=r5, @ANYRES32=r3, @ANYRESOCT, @ANYRES32=r1, @ANYRES32, @ANYRES64, @ANYRESHEX], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x40025) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f0000001500)={r5, "2ce8b7e675c30c143ac940d229ad3592"}) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$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") r7 = socket$inet_udplite(0x2, 0x2, 0x88) read(r7, &(0x7f00000000c0)=""/43, 0x2b) 07:23:06 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0x40000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) 07:23:06 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) (fail_nth: 73) 07:23:06 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, 0x0) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$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") (fail_nth: 34) 07:23:06 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) r2 = open(&(0x7f0000000040)='./file0\x00', 0x161842, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'sit0\x00'}) r4 = syz_io_uring_setup(0x73d7, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000100)=0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r6, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x10001) r8 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x8010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(r5, 0x0, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x8) syz_io_uring_submit(0x0, r8, &(0x7f00000008c0)=@IORING_OP_OPENAT2={0x1c, 0x40, 0x0, 0xffffffffffffffff, &(0x7f0000000840)={0x4ae0e0, 0x2, 0x5}, &(0x7f0000000880)='./file0\x00', 0x18, 0x0, 0x12345}, 0xff) syz_io_uring_submit(r5, 0x0, &(0x7f0000002b40)=@IORING_OP_RECVMSG={0xa, 0x2b, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000002b00)={0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/28, 0x1c}, {&(0x7f0000001540)=""/4096, 0x1000}, {&(0x7f0000002540)=""/131, 0x83}, {&(0x7f0000002600)=""/102, 0x66}, {&(0x7f0000002840)=""/203, 0xcb}], 0x6}, 0x0, 0x10040, 0x1, {0x1}}, 0x0) ftruncate(r2, 0x200002) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x200000e, 0x12, r3, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) r10 = creat(&(0x7f0000000180)='./file0\x00', 0x0) fallocate(r10, 0x0, 0x0, 0x2000402) fallocate(r9, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r9, 0xc028660f, &(0x7f0000001380)={0xc, r10, 0x3}) 07:23:06 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000002c0)={&(0x7f0000000c80)=ANY=[@ANYBLOB="0026bd7000ffdbdf25070000000c00068008000b00060000000c0008002302b41174de3f460a6d000000000000080003000380000008000300bd2c00ff07000400f8ffffff080003001dd30000080004006604000000000000000000"], 0x5c}, 0x1, 0x0, 0x0, 0x1884}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6, 0x6}]}}}]}, 0x3c}}, 0x0) r3 = openat(r2, &(0x7f00000000c0)='./file0\x00', 0x0, 0x31) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00./file0\x00']) connect$unix(r3, &(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000001c0), 0x200080, 0x0) ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f0000000200)={0x55, 0xb5f3, 0x2, 0x1, 0x6}) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000600)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000800)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x40}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) io_setup(0x6, &(0x7f00000003c0)=0x0) r7 = socket$phonet_pipe(0x23, 0x5, 0x2) io_submit(r6, 0x2, &(0x7f00000005c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, r7, &(0x7f00000001c0)='\"', 0x1}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r8, &(0x7f0000006440)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f0000000c40)={0x10, 0x1d, 0x20, 0x70bd28, 0x25dfdbfd}, 0x10}, {&(0x7f0000000f80)={0x20c, 0x3d, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x1f, 0x46, 0x0, 0x1, [@generic="6b23bda57b0fcd6882aea56d992b0de112a87c9689a0ce8f3a928a"]}, @generic="931dd380ae9b76725532f39b25791247f8e1faaa5606177d1141efdf8a23daecc73d0706f82254c664a01e4c4986b42b265e8e88f8f88e8099514ce917072d6e80996cbddc81dd1014a75c1cd2e0c084d7806b82c11b8a625557f25357333f879c7f3ea978d0c62492b2b2a3437425bf3933cf6d0456ae40263ff847b9956f9f56cd1e35dd616a0dffde59", @nested={0x14d, 0x46, 0x0, 0x1, [@typed={0x8, 0x8f, 0x0, 0x0, @u32=0x4}, @generic="3fe433e9f5d2f6047805d9eb39d59742ad46c8bd198fea6b4f77d0bf577f925374abd91b16efa9a31621d58f4b1ee788ba33ce3ae89358fcbecdc28e3a8775ee6c905d5275bf5f05ca6bfc68336199389a9644323a81d22c4bd081ec9c4826b7e965a5292167778eefb5edac3e1e0fd628684a30dbac663eb65de357a891a90855f356cbe26225342cce43c8e320a777c2a1f74ab97b7e442c94", @typed={0x8, 0x41, 0x0, 0x0, @ipv4=@multicast2}, @typed={0x8, 0x6b, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @generic="79c7219fa8393ab7671b616b9cea5f59e77de2a2ea4a268fcad39d31284ee1045f7dedc0dea487845188adde6fe70f5537a0635e01c2ec0a205c1f92c2272999ec8388f9a95b4d387581056e112c58f96f686734281b5a", @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@remote}, @generic="2d7a6c2813a21aa5bc78773404596de147d491e1868776a08d604bfb6aea387b585ce5b3f7ab336df3922c65"]}]}, 0x20c}, {&(0x7f0000000e00)={0x30, 0x12, 0x800, 0x70bd27, 0x25dfdbfc, "", [@typed={0x8, 0x5b, 0x0, 0x0, @pid}, @typed={0xf, 0x8c, 0x0, 0x0, @str='syzkaller1\x00'}, @typed={0x8, 0x7, 0x0, 0x0, @u32}]}, 0x30}, {&(0x7f0000000e40)={0xc8, 0x42, 0x10, 0x70bd26, 0x25dfdbff, "", [@generic="208cd2ae6be9be", @generic="c1d6c27da633daf115873b83c8913d284239d441678e667c20444d1a1f77f48ea7cbf783d84e79a9ebc262452149fe521b40868bf3938c61c8be3cdbd7429e623c99db5ae26d9cf24ee4ef4777ff0410e8b899b18e829f387d7926641f189d2b9697e099ffb7f20f691064b7d87d04cd2e230e8df8c77a2f1e4f4fabd49cfe414b3027dd850d9a2be9547ba5f2ed09811ea9ed9b201782165a792b57afca3e3d575d0f5b4b17a8", @typed={0x8, 0x94, 0x0, 0x0, @u32=0x1}]}, 0xc8}], 0x4}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000900)={'team0\x00', 0x0}) sendmsg$nl_route(r8, &(0x7f0000000c00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000bc0)={&(0x7f00000011c0)=@dellink={0x25c, 0x11, 0x400, 0x70bd28, 0x25dfdbff, {0x0, 0x0, 0x0, r9, 0x1000}, [@IFLA_PROTO_DOWN={0x5}, @IFLA_IFNAME={0x14, 0x3, 'macvlan1\x00'}, @IFLA_MAP={0x24, 0xe, {0x9, 0xd2, 0x2e4d, 0x200, 0x3e, 0xff}}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x5}, @IFLA_IFALIAS={0x14, 0x14, 'syzkaller1\x00'}, @IFLA_MTU={0x8, 0x4, 0x101}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_VFINFO_LIST={0x1cc, 0x16, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x8fe, 0xffff}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x5, 0x1}}]}, {0x84, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN_LIST={0x54, 0xc, 0x0, 0x1, [{0x14, 0x1, {0xb5d3, 0xadc, 0x100, 0xd1c53560eb87a9fa}}, {0x14, 0x1, {0x4, 0xb6, 0x81, 0x8100}}, {0x14, 0x1, {0x0, 0x6e4, 0x1, 0x88a8}}, {0x14, 0x1, {0x14, 0xaed, 0x0, 0x8100}}]}, @IFLA_VF_TX_RATE={0xc, 0x3, {0x1000, 0x200}}, @IFLA_VF_TRUST={0xc, 0x9, {0x7, 0x800}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x8000, 0x1}}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x7f, 0x7fff}}, @IFLA_VF_TRUST={0xc, 0x9, {0x7ff, 0x8}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_RATE={0x10, 0x6, {0x9, 0x5, 0x5}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x9}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x80000000, 0x3}}]}, {0xa4, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0xfff, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1d}}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x3f, 0x43}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x65c, 0x1}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x2, 0x80000001}}, @IFLA_VF_VLAN_LIST={0x40, 0xc, 0x0, 0x1, [{0x14, 0x1, {0xcae8, 0x919, 0x9, 0x8100}}, {0x14, 0x1, {0x200, 0xb47, 0xaaa, 0x8100}}, {0x14, 0x1, {0x5, 0x53b, 0xfffffff7, 0x88a8}}]}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x3f, 0x7fff}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x930, 0x5}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x6, 0x8}}]}]}]}, 0x25c}, 0x1, 0x0, 0x0, 0x11}, 0x4c089) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r7, 0x40189429, &(0x7f0000000480)={0x1, 0x4, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r10, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x45, 0xfc, 0x6}, {0x6}]}, 0x10) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x2, 0x3, &(0x7f0000000000)=@framed={{0x18, 0xf}}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) socket$inet6_sctp(0xa, 0x801, 0x84) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) r11 = socket$igmp(0x2, 0x3, 0x2) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@private1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) ioctl$TUNSETOWNER(r3, 0x400454cc, r12) setsockopt$MRT_INIT(r11, 0x0, 0xc8, &(0x7f0000000040), 0x4) setsockopt$MRT_ADD_VIF(r11, 0x0, 0xca, &(0x7f0000000100)={0x0, 0x1, 0x0, 0x0, @vifc_lcl_addr=@dev={0xac, 0x14, 0x14, 0xb}, @multicast1}, 0x10) 07:23:06 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0x80000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) [ 673.787078][T22426] FAULT_INJECTION: forcing a failure. [ 673.787078][T22426] name failslab, interval 1, probability 0, space 0, times 0 [ 673.799914][T22426] CPU: 1 PID: 22426 Comm: syz-executor.2 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 673.808456][T22430] (unnamed net_device) (uninitialized): option use_carrier: invalid value (6) [ 673.810327][T22426] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 673.810344][T22426] Call Trace: [ 673.810351][T22426] [ 673.832099][T22430] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 673.832587][T22426] dump_stack_lvl+0xda/0x130 [ 673.850181][T22426] dump_stack+0x15/0x20 [ 673.854365][T22426] should_fail_ex+0x21f/0x230 [ 673.859160][T22426] __should_failslab+0x92/0xa0 [ 673.863998][T22426] should_failslab+0x9/0x20 [ 673.868553][T22426] slab_pre_alloc_hook+0x38/0x180 [ 673.873621][T22426] __kmem_cache_alloc_node+0x46/0x250 [ 673.879044][T22426] ? sctp_add_bind_addr+0x6f/0x1e0 [ 673.882071][T22427] FAULT_INJECTION: forcing a failure. [ 673.882071][T22427] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 673.884254][T22426] kmalloc_trace+0x2a/0xa0 [ 673.901891][T22426] sctp_add_bind_addr+0x6f/0x1e0 [ 673.906929][T22426] sctp_copy_local_addr_list+0x19b/0x220 [ 673.912683][T22426] sctp_copy_one_addr+0x7d/0x400 [ 673.917641][T22426] sctp_bind_addr_copy+0x81/0x2b0 [ 673.922683][T22426] sctp_assoc_set_bind_addr_from_ep+0xc0/0xd0 [ 673.928780][T22426] sctp_connect_new_asoc+0x1cb/0x3a0 [ 673.934082][T22426] sctp_sendmsg+0xefc/0x1900 [ 673.938767][T22426] inet_sendmsg+0x63/0x80 [ 673.943121][T22426] __sys_sendto+0x246/0x300 [ 673.947651][T22426] __x64_sys_sendto+0x78/0x90 [ 673.952339][T22426] do_syscall_64+0x41/0xc0 [ 673.956803][T22426] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 673.962793][T22426] RIP: 0033:0x7f9293ef6149 [ 673.967211][T22426] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 673.986833][T22426] RSP: 002b:00007f9293269168 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 673.995314][T22426] RAX: ffffffffffffffda RBX: 00007f9294015f80 RCX: 00007f9293ef6149 [ 674.003380][T22426] RDX: 000000000001a000 RSI: 0000000020000000 RDI: 0000000000000004 [ 674.011356][T22426] RBP: 00007f92932691d0 R08: 0000000020000080 R09: 000000000000001c [ 674.019341][T22426] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 674.027396][T22426] R13: 00007ffdbda7c2df R14: 00007f9293269300 R15: 0000000000022000 [ 674.035381][T22426] [ 674.038449][T22427] CPU: 0 PID: 22427 Comm: syz-executor.3 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 674.049817][T22427] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 674.059900][T22427] Call Trace: [ 674.063212][T22427] [ 674.066241][T22427] dump_stack_lvl+0xda/0x130 [ 674.070919][T22427] dump_stack+0x15/0x20 [ 674.075191][T22427] should_fail_ex+0x21f/0x230 [ 674.079992][T22427] __alloc_pages+0x108/0x340 [ 674.084705][T22427] vma_alloc_folio+0x6a3/0x8c0 [ 674.089512][T22427] ? __vm_enough_memory+0xdf/0x2a0 [ 674.094695][T22427] shmem_get_folio_gfp+0x801/0x1200 [ 674.099964][T22427] shmem_write_begin+0xa6/0x1d0 [ 674.104852][T22427] generic_perform_write+0x1c3/0x3d0 [ 674.110178][T22427] ? shmem_write_begin+0x1d0/0x1d0 [ 674.115371][T22427] __generic_file_write_iter+0xe6/0x290 [ 674.121029][T22427] generic_file_write_iter+0x7d/0x1c0 [ 674.126449][T22427] vfs_write+0x47b/0x780 [ 674.130724][T22427] ksys_write+0xeb/0x1a0 [ 674.134998][T22427] __x64_sys_write+0x42/0x50 [ 674.139623][T22427] do_syscall_64+0x41/0xc0 [ 674.144081][T22427] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 674.150022][T22427] RIP: 0033:0x7f1567f53ecf [ 674.154504][T22427] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 674.174247][T22427] RSP: 002b:00007f1567314f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 07:23:06 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) (fail_nth: 74) 07:23:06 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0x100000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) [ 674.182691][T22427] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007f1567f53ecf [ 674.190743][T22427] RDX: 0000000000100000 RSI: 00007f155eed4000 RDI: 0000000000000005 [ 674.198742][T22427] RBP: 00007f155eed4000 R08: 0000000000000000 R09: 0000000000000534 [ 674.206756][T22427] R10: 0000000000100000 R11: 0000000000000293 R12: 0000000000000000 [ 674.214754][T22427] R13: 00007f1567314fdc R14: 00007f1567314fe0 R15: 0000000020000fc2 [ 674.222862][T22427] [ 674.243827][T22442] FAULT_INJECTION: forcing a failure. [ 674.243827][T22442] name failslab, interval 1, probability 0, space 0, times 0 [ 674.257184][T22442] CPU: 0 PID: 22442 Comm: syz-executor.2 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 674.267632][T22442] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 674.277715][T22442] Call Trace: [ 674.281105][T22442] [ 674.284063][T22442] dump_stack_lvl+0xda/0x130 [ 674.288744][T22442] dump_stack+0x15/0x20 07:23:06 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, 0x0) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$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") (fail_nth: 35) [ 674.292934][T22442] should_fail_ex+0x21f/0x230 [ 674.297705][T22442] __should_failslab+0x92/0xa0 [ 674.302587][T22442] should_failslab+0x9/0x20 [ 674.307169][T22442] slab_pre_alloc_hook+0x38/0x180 [ 674.312240][T22442] __kmem_cache_alloc_node+0x46/0x250 [ 674.317713][T22442] ? sctp_add_bind_addr+0x6f/0x1e0 [ 674.322907][T22442] kmalloc_trace+0x2a/0xa0 [ 674.327471][T22442] sctp_add_bind_addr+0x6f/0x1e0 [ 674.332447][T22442] sctp_copy_local_addr_list+0x19b/0x220 [ 674.338124][T22442] sctp_copy_one_addr+0x7d/0x400 [ 674.343101][T22442] sctp_bind_addr_copy+0x81/0x2b0 [ 674.347174][T22451] loop0: detected capacity change from 0 to 2048 [ 674.348253][T22442] sctp_assoc_set_bind_addr_from_ep+0xc0/0xd0 [ 674.348295][T22442] sctp_connect_new_asoc+0x1cb/0x3a0 [ 674.348324][T22442] sctp_sendmsg+0xefc/0x1900 [ 674.365050][T22451] FAT-fs (loop0): Unrecognized mount option "ÿÿÿÿÿÿÿÿ184467440737095516150xffffffffffffffff" or missing value [ 674.366067][T22442] inet_sendmsg+0x63/0x80 [ 674.366145][T22442] __sys_sendto+0x246/0x300 [ 674.386633][T22453] FAULT_INJECTION: forcing a failure. [ 674.386633][T22453] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 674.387146][T22442] __x64_sys_sendto+0x78/0x90 [ 674.409429][T22442] do_syscall_64+0x41/0xc0 [ 674.413896][T22442] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 674.419851][T22442] RIP: 0033:0x7f9293ef6149 [ 674.424348][T22442] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 674.443991][T22442] RSP: 002b:00007f9293269168 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 674.452565][T22442] RAX: ffffffffffffffda RBX: 00007f9294015f80 RCX: 00007f9293ef6149 [ 674.460637][T22442] RDX: 000000000001a000 RSI: 0000000020000000 RDI: 0000000000000004 [ 674.468617][T22442] RBP: 00007f92932691d0 R08: 0000000020000080 R09: 000000000000001c [ 674.476595][T22442] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 674.484688][T22442] R13: 00007ffdbda7c2df R14: 00007f9293269300 R15: 0000000000022000 [ 674.492672][T22442] [ 674.495846][T22453] CPU: 1 PID: 22453 Comm: syz-executor.3 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 674.506289][T22453] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 674.516388][T22453] Call Trace: [ 674.519693][T22453] [ 674.522641][T22453] dump_stack_lvl+0xda/0x130 [ 674.527383][T22453] dump_stack+0x15/0x20 [ 674.531649][T22453] should_fail_ex+0x21f/0x230 [ 674.536366][T22453] should_fail+0xb/0x10 [ 674.540562][T22453] should_fail_usercopy+0x1a/0x20 [ 674.545623][T22453] copy_page_from_iter_atomic+0x22d/0xcf0 [ 674.551379][T22453] ? folio_test_hugetlb+0x3a/0x70 [ 674.556442][T22453] ? shmem_write_begin+0x12a/0x1d0 [ 674.561596][T22453] generic_perform_write+0x203/0x3d0 [ 674.567069][T22453] ? shmem_write_begin+0x1d0/0x1d0 [ 674.572296][T22453] __generic_file_write_iter+0xe6/0x290 [ 674.577900][T22453] generic_file_write_iter+0x7d/0x1c0 [ 674.583307][T22453] vfs_write+0x47b/0x780 [ 674.587595][T22453] ksys_write+0xeb/0x1a0 [ 674.591866][T22453] __x64_sys_write+0x42/0x50 [ 674.596491][T22453] do_syscall_64+0x41/0xc0 [ 674.600936][T22453] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 674.606889][T22453] RIP: 0033:0x7f1567f53ecf [ 674.611333][T22453] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 674.630998][T22453] RSP: 002b:00007f1567314f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 07:23:07 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0xe0ffff}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) [ 674.639438][T22453] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007f1567f53ecf [ 674.647447][T22453] RDX: 0000000000100000 RSI: 00007f155eef5000 RDI: 0000000000000005 [ 674.655511][T22453] RBP: 00007f155eef5000 R08: 0000000000000000 R09: 0000000000000534 [ 674.663513][T22453] R10: 0000000000100000 R11: 0000000000000293 R12: 0000000000000000 [ 674.671670][T22453] R13: 00007f1567314fdc R14: 00007f1567314fe0 R15: 0000000020000fc2 [ 674.679700][T22453] 07:23:07 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) r2 = open(&(0x7f0000000040)='./file0\x00', 0x161842, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'sit0\x00'}) r4 = syz_io_uring_setup(0x73d7, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000100)=0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r6, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x10001) r8 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x8010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(r5, 0x0, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x8) syz_io_uring_submit(0x0, r8, &(0x7f00000008c0)=@IORING_OP_OPENAT2={0x1c, 0x40, 0x0, 0xffffffffffffffff, &(0x7f0000000840)={0x4ae0e0, 0x2, 0x5}, &(0x7f0000000880)='./file0\x00', 0x18, 0x0, 0x12345}, 0xff) syz_io_uring_submit(r5, 0x0, &(0x7f0000002b40)=@IORING_OP_RECVMSG={0xa, 0x2b, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000002b00)={0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/28, 0x1c}, {&(0x7f0000001540)=""/4096, 0x1000}, {&(0x7f0000002540)=""/131, 0x83}, {&(0x7f0000002600)=""/102, 0x66}, {&(0x7f0000002840)=""/203, 0xcb}], 0x6}, 0x0, 0x10040, 0x1, {0x1}}, 0x0) ftruncate(r2, 0x200002) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x200000e, 0x12, r3, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) r10 = creat(&(0x7f0000000180)='./file0\x00', 0x0) fallocate(r10, 0x0, 0x0, 0x2000402) fallocate(r9, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r9, 0xc028660f, &(0x7f0000001380)={0xc, r10, 0x4}) [ 674.709410][T22453] loop3: detected capacity change from 0 to 2048 [ 674.735975][T22455] bond970: entered promiscuous mode [ 674.741249][T22455] bond970: entered allmulticast mode [ 674.746878][T22455] 8021q: adding VLAN 0 to HW filter on device bond970 [ 674.767114][T22453] FAT-fs (loop3): Unrecognized mount option "ÿÿÿÿÿÿÿÿ184467440737095516150xffffffffffffffff" or missing value 07:23:07 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a000000", 0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000380)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000008c0)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000001cc0)={{}, r2, 0x16, @inherit={0x88, &(0x7f0000001580)=ANY=[@ANYRES16=r3]}, @devid}) r4 = syz_open_dev$MSR(&(0x7f0000000140), 0x100000000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r4, 0x84009422, &(0x7f0000000ec0)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(r6, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000001840)=ANY=[@ANYRES32=r5, @ANYRES32=r3, @ANYRESOCT, @ANYRES32=r1, @ANYRES32, @ANYRES64, @ANYRESHEX], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x40025) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f0000001500)={r5, "2ce8b7e675c30c143ac940d229ad3592"}) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$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") r7 = socket$inet_udplite(0x2, 0x2, 0x88) read(r7, &(0x7f00000000c0)=""/43, 0x2b) 07:23:07 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) (fail_nth: 75) 07:23:07 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0x1000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) 07:23:07 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000002c0)={&(0x7f0000000c80)=ANY=[@ANYBLOB="0026bd7000ffdbdf25070000000c00068008000b00060000000c0008002302b41174de3f460a6d000000000000080003000380000008000300bd2c00ff07000400f8ffffff080003001dd30000080004006604000000000000000000"], 0x5c}, 0x1, 0x0, 0x0, 0x1884}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6, 0x6}]}}}]}, 0x3c}}, 0x0) r3 = openat(r2, &(0x7f00000000c0)='./file0\x00', 0x0, 0x31) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00./file0\x00']) connect$unix(r3, &(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000001c0), 0x200080, 0x0) ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f0000000200)={0x55, 0xb5f3, 0x2, 0x1, 0x6}) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000600)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000800)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x40}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) io_setup(0x6, &(0x7f00000003c0)=0x0) r7 = socket$phonet_pipe(0x23, 0x5, 0x2) io_submit(r6, 0x2, &(0x7f00000005c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, r7, &(0x7f00000001c0)='\"', 0x1}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r8, &(0x7f0000006440)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f0000000c40)={0x10, 0x1d, 0x20, 0x70bd28, 0x25dfdbfd}, 0x10}, {&(0x7f0000000f80)={0x20c, 0x3d, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x1f, 0x46, 0x0, 0x1, [@generic="6b23bda57b0fcd6882aea56d992b0de112a87c9689a0ce8f3a928a"]}, @generic="931dd380ae9b76725532f39b25791247f8e1faaa5606177d1141efdf8a23daecc73d0706f82254c664a01e4c4986b42b265e8e88f8f88e8099514ce917072d6e80996cbddc81dd1014a75c1cd2e0c084d7806b82c11b8a625557f25357333f879c7f3ea978d0c62492b2b2a3437425bf3933cf6d0456ae40263ff847b9956f9f56cd1e35dd616a0dffde59", @nested={0x14d, 0x46, 0x0, 0x1, [@typed={0x8, 0x8f, 0x0, 0x0, @u32=0x4}, @generic="3fe433e9f5d2f6047805d9eb39d59742ad46c8bd198fea6b4f77d0bf577f925374abd91b16efa9a31621d58f4b1ee788ba33ce3ae89358fcbecdc28e3a8775ee6c905d5275bf5f05ca6bfc68336199389a9644323a81d22c4bd081ec9c4826b7e965a5292167778eefb5edac3e1e0fd628684a30dbac663eb65de357a891a90855f356cbe26225342cce43c8e320a777c2a1f74ab97b7e442c94", @typed={0x8, 0x41, 0x0, 0x0, @ipv4=@multicast2}, @typed={0x8, 0x6b, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @generic="79c7219fa8393ab7671b616b9cea5f59e77de2a2ea4a268fcad39d31284ee1045f7dedc0dea487845188adde6fe70f5537a0635e01c2ec0a205c1f92c2272999ec8388f9a95b4d387581056e112c58f96f686734281b5a", @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@remote}, @generic="2d7a6c2813a21aa5bc78773404596de147d491e1868776a08d604bfb6aea387b585ce5b3f7ab336df3922c65"]}]}, 0x20c}, {&(0x7f0000000e00)={0x30, 0x12, 0x800, 0x70bd27, 0x25dfdbfc, "", [@typed={0x8, 0x5b, 0x0, 0x0, @pid}, @typed={0xf, 0x8c, 0x0, 0x0, @str='syzkaller1\x00'}, @typed={0x8, 0x7, 0x0, 0x0, @u32}]}, 0x30}, {&(0x7f0000000e40)={0xc8, 0x42, 0x10, 0x70bd26, 0x25dfdbff, "", [@generic="208cd2ae6be9be", @generic="c1d6c27da633daf115873b83c8913d284239d441678e667c20444d1a1f77f48ea7cbf783d84e79a9ebc262452149fe521b40868bf3938c61c8be3cdbd7429e623c99db5ae26d9cf24ee4ef4777ff0410e8b899b18e829f387d7926641f189d2b9697e099ffb7f20f691064b7d87d04cd2e230e8df8c77a2f1e4f4fabd49cfe414b3027dd850d9a2be9547ba5f2ed09811ea9ed9b201782165a792b57afca3e3d575d0f5b4b17a8", @typed={0x8, 0x94, 0x0, 0x0, @u32=0x1}]}, 0xc8}], 0x4}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000900)={'team0\x00', 0x0}) sendmsg$nl_route(r8, &(0x7f0000000c00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000bc0)={&(0x7f00000011c0)=@dellink={0x25c, 0x11, 0x400, 0x70bd28, 0x25dfdbff, {0x0, 0x0, 0x0, r9, 0x1000}, [@IFLA_PROTO_DOWN={0x5}, @IFLA_IFNAME={0x14, 0x3, 'macvlan1\x00'}, @IFLA_MAP={0x24, 0xe, {0x9, 0xd2, 0x2e4d, 0x200, 0x3e, 0xff}}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x5}, @IFLA_IFALIAS={0x14, 0x14, 'syzkaller1\x00'}, @IFLA_MTU={0x8, 0x4, 0x101}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_VFINFO_LIST={0x1cc, 0x16, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x8fe, 0xffff}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x5, 0x1}}]}, {0x84, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN_LIST={0x54, 0xc, 0x0, 0x1, [{0x14, 0x1, {0xb5d3, 0xadc, 0x100, 0xd1c53560eb87a9fa}}, {0x14, 0x1, {0x4, 0xb6, 0x81, 0x8100}}, {0x14, 0x1, {0x0, 0x6e4, 0x1, 0x88a8}}, {0x14, 0x1, {0x14, 0xaed, 0x0, 0x8100}}]}, @IFLA_VF_TX_RATE={0xc, 0x3, {0x1000, 0x200}}, @IFLA_VF_TRUST={0xc, 0x9, {0x7, 0x800}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x8000, 0x1}}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x7f, 0x7fff}}, @IFLA_VF_TRUST={0xc, 0x9, {0x7ff, 0x8}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_RATE={0x10, 0x6, {0x9, 0x5, 0x5}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x9}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x80000000, 0x3}}]}, {0xa4, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0xfff, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1d}}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x3f, 0x43}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x65c, 0x1}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x2, 0x80000001}}, @IFLA_VF_VLAN_LIST={0x40, 0xc, 0x0, 0x1, [{0x14, 0x1, {0xcae8, 0x919, 0x9, 0x8100}}, {0x14, 0x1, {0x200, 0xb47, 0xaaa, 0x8100}}, {0x14, 0x1, {0x5, 0x53b, 0xfffffff7, 0x88a8}}]}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x3f, 0x7fff}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x930, 0x5}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x6, 0x8}}]}]}]}, 0x25c}, 0x1, 0x0, 0x0, 0x11}, 0x4c089) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r7, 0x40189429, &(0x7f0000000480)={0x1, 0x4, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r10, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x45, 0xfc, 0x6}, {0x6}]}, 0x10) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x2, 0x3, &(0x7f0000000000)=@framed={{0x18, 0xf}}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) socket$inet6_sctp(0xa, 0x801, 0x84) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) r11 = socket$igmp(0x2, 0x3, 0x2) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@private1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) ioctl$TUNSETOWNER(r3, 0x400454cc, r12) setsockopt$MRT_INIT(r11, 0x0, 0xc8, &(0x7f0000000040), 0x4) setsockopt$MRT_ADD_VIF(r11, 0x0, 0xca, &(0x7f0000000100)={0x0, 0x1, 0x0, 0x0, @vifc_lcl_addr=@dev={0xac, 0x14, 0x14, 0xb}, @multicast1}, 0x10) 07:23:07 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, 0x0) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$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") (fail_nth: 36) [ 674.934690][T22463] FAULT_INJECTION: forcing a failure. [ 674.934690][T22463] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 674.948769][T22463] CPU: 0 PID: 22463 Comm: syz-executor.3 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 674.959255][T22463] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 674.969406][T22463] Call Trace: [ 674.972704][T22463] [ 674.975721][T22463] dump_stack_lvl+0xda/0x130 [ 674.976762][T22469] selinux_netlink_send: 2 callbacks suppressed [ 674.976778][T22469] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=22469 comm=syz-executor.5 [ 674.980349][T22463] dump_stack+0x15/0x20 [ 674.980382][T22463] should_fail_ex+0x21f/0x230 [ 674.980417][T22463] __alloc_pages+0x108/0x340 [ 675.002934][T22469] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=61 sclass=netlink_route_socket pid=22469 comm=syz-executor.5 [ 675.003559][T22463] vma_alloc_folio+0x6a3/0x8c0 [ 675.009582][T22462] FAULT_INJECTION: forcing a failure. [ 675.009582][T22462] name failslab, interval 1, probability 0, space 0, times 0 [ 675.012818][T22463] ? __vm_enough_memory+0xdf/0x2a0 [ 675.048230][T22463] shmem_get_folio_gfp+0x801/0x1200 [ 675.053487][T22463] shmem_write_begin+0xa6/0x1d0 [ 675.058409][T22463] generic_perform_write+0x1c3/0x3d0 [ 675.063725][T22463] ? shmem_write_begin+0x1d0/0x1d0 [ 675.068852][T22463] __generic_file_write_iter+0xe6/0x290 [ 675.074479][T22463] generic_file_write_iter+0x7d/0x1c0 [ 675.079925][T22463] vfs_write+0x47b/0x780 [ 675.084248][T22463] ksys_write+0xeb/0x1a0 [ 675.088566][T22463] __x64_sys_write+0x42/0x50 [ 675.093163][T22463] do_syscall_64+0x41/0xc0 [ 675.097591][T22463] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 675.103507][T22463] RIP: 0033:0x7f1567f53ecf [ 675.107992][T22463] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 675.127679][T22463] RSP: 002b:00007f1567314f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 675.136103][T22463] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007f1567f53ecf [ 675.144107][T22463] RDX: 0000000000100000 RSI: 00007f155eef5000 RDI: 0000000000000005 [ 675.152129][T22463] RBP: 00007f155eef5000 R08: 0000000000000000 R09: 0000000000000534 [ 675.160191][T22463] R10: 0000000000100000 R11: 0000000000000293 R12: 0000000000000000 [ 675.168248][T22463] R13: 00007f1567314fdc R14: 00007f1567314fe0 R15: 0000000020000fc2 [ 675.176306][T22463] [ 675.179331][T22462] CPU: 1 PID: 22462 Comm: syz-executor.2 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 675.189783][T22462] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 675.199876][T22462] Call Trace: [ 675.203293][T22462] [ 675.206245][T22462] dump_stack_lvl+0xda/0x130 [ 675.210888][T22462] dump_stack+0x15/0x20 [ 675.215073][T22462] should_fail_ex+0x21f/0x230 [ 675.219877][T22462] __should_failslab+0x92/0xa0 [ 675.224836][T22462] should_failslab+0x9/0x20 [ 675.229381][T22462] slab_pre_alloc_hook+0x38/0x180 07:23:07 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) r2 = open(&(0x7f0000000040)='./file0\x00', 0x161842, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'sit0\x00'}) r4 = syz_io_uring_setup(0x73d7, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000100)=0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r6, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x10001) r8 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x8010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(r5, 0x0, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x8) syz_io_uring_submit(0x0, r8, &(0x7f00000008c0)=@IORING_OP_OPENAT2={0x1c, 0x40, 0x0, 0xffffffffffffffff, &(0x7f0000000840)={0x4ae0e0, 0x2, 0x5}, &(0x7f0000000880)='./file0\x00', 0x18, 0x0, 0x12345}, 0xff) syz_io_uring_submit(r5, 0x0, &(0x7f0000002b40)=@IORING_OP_RECVMSG={0xa, 0x2b, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000002b00)={0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/28, 0x1c}, {&(0x7f0000001540)=""/4096, 0x1000}, {&(0x7f0000002540)=""/131, 0x83}, {&(0x7f0000002600)=""/102, 0x66}, {&(0x7f0000002840)=""/203, 0xcb}], 0x6}, 0x0, 0x10040, 0x1, {0x1}}, 0x0) ftruncate(r2, 0x200002) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x200000e, 0x12, r3, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) r10 = creat(&(0x7f0000000180)='./file0\x00', 0x0) fallocate(r10, 0x0, 0x0, 0x2000402) fallocate(r9, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r9, 0xc028660f, &(0x7f0000001380)={0xc, r10, 0x5}) [ 675.234464][T22462] __kmem_cache_alloc_node+0x46/0x250 [ 675.246486][T22462] ? sctp_add_bind_addr+0x6f/0x1e0 [ 675.251630][T22462] kmalloc_trace+0x2a/0xa0 [ 675.256081][T22462] sctp_add_bind_addr+0x6f/0x1e0 [ 675.261058][T22462] sctp_copy_local_addr_list+0x19b/0x220 [ 675.266736][T22462] sctp_copy_one_addr+0x7d/0x400 [ 675.271764][T22462] sctp_bind_addr_copy+0x81/0x2b0 [ 675.276829][T22462] sctp_assoc_set_bind_addr_from_ep+0xc0/0xd0 07:23:07 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, 0x0) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$eJzs1T9rE3EYB/AnaazRqbM4/MDFqVQ3JyOSQvFAUTLoZKBxyYmQWy6Z8hJ8Ab4wB1+EZMp2Ei5VWxSDNLnSfj7LPdz3ud+/g7v39z+OTz8VH75+/hLdXivavbjTXrbiINpxZh4AwHWyrKr4XtWaXgsAsBv+/wBw87x5++7Fsyzrv06pG7GYl4NyUF/r/Pgk6x+llf3fnlqU5WDvZ/4o1c7nt+LuOn/8x3w/Hj6o81X2/GV2Ib8dp1vfPQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA3GyHKXUiIqWUDn7dXZTlYK/OD9OZC3ldHZ9k/aN1w/m8E/c6O9sGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAcAmK6Ww8zPPR5JoVEd9ix5N210d6uSMv/tXTW097VU5+m8XTTZtfLatq05GfRMTWF9+KmK/eUvNnuGnR3DcJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABoVjGdjYd5PpoUTa8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALgqiulsPMzz0eS/i2jVI/29p+k9AgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAM34EQAA///P7Cnj") (fail_nth: 37) [ 675.282980][T22462] sctp_connect_new_asoc+0x1cb/0x3a0 [ 675.288302][T22462] sctp_sendmsg+0xefc/0x1900 [ 675.292997][T22462] inet_sendmsg+0x63/0x80 [ 675.297354][T22462] __sys_sendto+0x246/0x300 [ 675.301977][T22462] __x64_sys_sendto+0x78/0x90 [ 675.306684][T22462] do_syscall_64+0x41/0xc0 [ 675.311125][T22462] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 675.317050][T22462] RIP: 0033:0x7f9293ef6149 [ 675.321605][T22462] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 675.341352][T22462] RSP: 002b:00007f9293269168 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 675.349895][T22462] RAX: ffffffffffffffda RBX: 00007f9294015f80 RCX: 00007f9293ef6149 [ 675.357902][T22462] RDX: 000000000001a000 RSI: 0000000020000000 RDI: 0000000000000004 [ 675.365900][T22462] RBP: 00007f92932691d0 R08: 0000000020000080 R09: 000000000000001c [ 675.373914][T22462] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 675.381978][T22462] R13: 00007ffdbda7c2df R14: 00007f9293269300 R15: 0000000000022000 [ 675.389975][T22462] [ 675.390441][T22479] loop0: detected capacity change from 0 to 2048 07:23:07 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) (fail_nth: 76) [ 675.447984][T22466] (unnamed net_device) (uninitialized): option use_carrier: invalid value (6) [ 675.487963][T22469] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 07:23:08 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0x1020000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) [ 675.500956][T22479] FAT-fs (loop0): Unrecognized mount option "ÿÿÿÿÿÿÿÿ184467440737095516150xffffffffffffffff" or missing value [ 675.525557][T22484] FAULT_INJECTION: forcing a failure. [ 675.525557][T22484] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 675.539428][T22484] CPU: 0 PID: 22484 Comm: syz-executor.3 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 675.549964][T22484] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 675.560135][T22484] Call Trace: [ 675.563440][T22484] [ 675.566385][T22484] dump_stack_lvl+0xda/0x130 [ 675.571014][T22484] dump_stack+0x15/0x20 [ 675.575214][T22484] should_fail_ex+0x21f/0x230 [ 675.580034][T22484] should_fail+0xb/0x10 [ 675.584265][T22484] should_fail_usercopy+0x1a/0x20 [ 675.589374][T22484] copy_page_from_iter_atomic+0x22d/0xcf0 [ 675.595124][T22484] ? folio_test_hugetlb+0x3a/0x70 [ 675.600211][T22484] ? shmem_write_begin+0x12a/0x1d0 [ 675.605404][T22484] generic_perform_write+0x203/0x3d0 [ 675.610753][T22484] ? shmem_write_begin+0x1d0/0x1d0 [ 675.615902][T22484] __generic_file_write_iter+0xe6/0x290 [ 675.621541][T22484] generic_file_write_iter+0x7d/0x1c0 [ 675.626961][T22484] vfs_write+0x47b/0x780 [ 675.631228][T22484] ksys_write+0xeb/0x1a0 [ 675.635495][T22484] __x64_sys_write+0x42/0x50 [ 675.640205][T22484] do_syscall_64+0x41/0xc0 [ 675.644649][T22484] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 675.650633][T22484] RIP: 0033:0x7f1567f53ecf [ 675.655066][T22484] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 675.674825][T22484] RSP: 002b:00007f1567314f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 675.683265][T22484] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007f1567f53ecf [ 675.691300][T22484] RDX: 0000000000100000 RSI: 00007f155eef5000 RDI: 0000000000000005 [ 675.699468][T22484] RBP: 00007f155eef5000 R08: 0000000000000000 R09: 0000000000000534 [ 675.707558][T22484] R10: 0000000000100000 R11: 0000000000000293 R12: 0000000000000000 [ 675.715552][T22484] R13: 00007f1567314fdc R14: 00007f1567314fe0 R15: 0000000020000fc2 [ 675.723628][T22484] [ 675.769250][T22487] FAULT_INJECTION: forcing a failure. [ 675.769250][T22487] name failslab, interval 1, probability 0, space 0, times 0 [ 675.782038][T22487] CPU: 0 PID: 22487 Comm: syz-executor.2 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 675.792562][T22487] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 675.802704][T22487] Call Trace: [ 675.806008][T22487] [ 675.808963][T22487] dump_stack_lvl+0xda/0x130 [ 675.813594][T22487] dump_stack+0x15/0x20 [ 675.817842][T22487] should_fail_ex+0x21f/0x230 [ 675.822634][T22487] __should_failslab+0x92/0xa0 [ 675.827460][T22487] should_failslab+0x9/0x20 [ 675.832051][T22487] slab_pre_alloc_hook+0x38/0x180 [ 675.837121][T22487] __kmem_cache_alloc_node+0x46/0x250 [ 675.842553][T22487] ? sctp_add_bind_addr+0x6f/0x1e0 [ 675.847769][T22487] kmalloc_trace+0x2a/0xa0 [ 675.852324][T22487] sctp_add_bind_addr+0x6f/0x1e0 [ 675.857332][T22487] sctp_copy_local_addr_list+0x19b/0x220 [ 675.863106][T22487] sctp_copy_one_addr+0x7d/0x400 07:23:08 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000002c0)={&(0x7f0000000c80)=ANY=[@ANYBLOB="0026bd7000ffdbdf25070000000c00068008000b00060000000c0008002302b41174de3f460a6d000000000000080003000380000008000300bd2c00ff07000400f8ffffff080003001dd30000080004006604000000000000000000"], 0x5c}, 0x1, 0x0, 0x0, 0x1884}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6, 0x6}]}}}]}, 0x3c}}, 0x0) r3 = openat(r2, &(0x7f00000000c0)='./file0\x00', 0x0, 0x31) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000680)=ANY=[@ANYBLOB="4afe65cd9f4cb96af18454a88fa8005c9fe248c0144c45e701002b7127b6679c7a64908ce701f270818888d4368d79057ee5e41b0efaa601fc1a8488a8a24cb9d947491b1bc7983e1710bb3ccc29e6d4ed4df77669e40bbfa802c600208e53ee50e98ab2cb4f50d11a9cdddd9320a5d8171c0f0c108488d0b23be195b12fc7ed967f99e71ff165310bc20d027160e20e87088c6f48a6c7210431c5a6578b11b646347984f92bc092089c964bd360a4e0b124bec92bf620edc72693f0e78f12e205659005168a8e2f60f18bcecd57f49295bfe6ca9c894f4d75798ae81020f3ff3f9d2aeb8740d2ec38db6c068f60e10f6f06172fb698e28d2dcc7deed28eee05874cc59a89b771e167c0d3da3789a3acd1af0cc89d9ff46e329a00f6d1a28794c3b3db7752189c1853e53b0aa840b887618d3d9b6038fc37865fa39328a439819e25692b3efee7a80b609f2ba10030f51469aa05f966b72dedf8991f0d", @ANYRES32=r0, @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00./file0\x00']) connect$unix(r3, &(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000001c0), 0x200080, 0x0) ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f0000000200)={0x55, 0xb5f3, 0x2, 0x1, 0x6}) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000600)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000800)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x40}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) io_setup(0x6, &(0x7f00000003c0)=0x0) r7 = socket$phonet_pipe(0x23, 0x5, 0x2) io_submit(r6, 0x2, &(0x7f00000005c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, r7, &(0x7f00000001c0)='\"', 0x1}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r8, &(0x7f0000006440)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f0000000c40)={0x10, 0x1d, 0x20, 0x70bd28, 0x25dfdbfd}, 0x10}, {&(0x7f0000000f80)={0x20c, 0x3d, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x1f, 0x46, 0x0, 0x1, [@generic="6b23bda57b0fcd6882aea56d992b0de112a87c9689a0ce8f3a928a"]}, @generic="931dd380ae9b76725532f39b25791247f8e1faaa5606177d1141efdf8a23daecc73d0706f82254c664a01e4c4986b42b265e8e88f8f88e8099514ce917072d6e80996cbddc81dd1014a75c1cd2e0c084d7806b82c11b8a625557f25357333f879c7f3ea978d0c62492b2b2a3437425bf3933cf6d0456ae40263ff847b9956f9f56cd1e35dd616a0dffde59", @nested={0x14d, 0x46, 0x0, 0x1, [@typed={0x8, 0x8f, 0x0, 0x0, @u32=0x4}, @generic="3fe433e9f5d2f6047805d9eb39d59742ad46c8bd198fea6b4f77d0bf577f925374abd91b16efa9a31621d58f4b1ee788ba33ce3ae89358fcbecdc28e3a8775ee6c905d5275bf5f05ca6bfc68336199389a9644323a81d22c4bd081ec9c4826b7e965a5292167778eefb5edac3e1e0fd628684a30dbac663eb65de357a891a90855f356cbe26225342cce43c8e320a777c2a1f74ab97b7e442c94", @typed={0x8, 0x41, 0x0, 0x0, @ipv4=@multicast2}, @typed={0x8, 0x6b, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @generic="79c7219fa8393ab7671b616b9cea5f59e77de2a2ea4a268fcad39d31284ee1045f7dedc0dea487845188adde6fe70f5537a0635e01c2ec0a205c1f92c2272999ec8388f9a95b4d387581056e112c58f96f686734281b5a", @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@remote}, @generic="2d7a6c2813a21aa5bc78773404596de147d491e1868776a08d604bfb6aea387b585ce5b3f7ab336df3922c65"]}]}, 0x20c}, {&(0x7f0000000e00)={0x30, 0x12, 0x800, 0x70bd27, 0x25dfdbfc, "", [@typed={0x8, 0x5b, 0x0, 0x0, @pid}, @typed={0xf, 0x8c, 0x0, 0x0, @str='syzkaller1\x00'}, @typed={0x8, 0x7, 0x0, 0x0, @u32}]}, 0x30}, {&(0x7f0000000e40)={0xc8, 0x42, 0x10, 0x70bd26, 0x25dfdbff, "", [@generic="208cd2ae6be9be", @generic="c1d6c27da633daf115873b83c8913d284239d441678e667c20444d1a1f77f48ea7cbf783d84e79a9ebc262452149fe521b40868bf3938c61c8be3cdbd7429e623c99db5ae26d9cf24ee4ef4777ff0410e8b899b18e829f387d7926641f189d2b9697e099ffb7f20f691064b7d87d04cd2e230e8df8c77a2f1e4f4fabd49cfe414b3027dd850d9a2be9547ba5f2ed09811ea9ed9b201782165a792b57afca3e3d575d0f5b4b17a8", @typed={0x8, 0x94, 0x0, 0x0, @u32=0x1}]}, 0xc8}], 0x4}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000900)={'team0\x00', 0x0}) sendmsg$nl_route(r8, &(0x7f0000000c00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000bc0)={&(0x7f00000011c0)=@dellink={0x25c, 0x11, 0x400, 0x70bd28, 0x25dfdbff, {0x0, 0x0, 0x0, r9, 0x1000}, [@IFLA_PROTO_DOWN={0x5}, @IFLA_IFNAME={0x14, 0x3, 'macvlan1\x00'}, @IFLA_MAP={0x24, 0xe, {0x9, 0xd2, 0x2e4d, 0x200, 0x3e, 0xff}}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x5}, @IFLA_IFALIAS={0x14, 0x14, 'syzkaller1\x00'}, @IFLA_MTU={0x8, 0x4, 0x101}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_VFINFO_LIST={0x1cc, 0x16, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x8fe, 0xffff}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x5, 0x1}}]}, {0x84, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN_LIST={0x54, 0xc, 0x0, 0x1, [{0x14, 0x1, {0xb5d3, 0xadc, 0x100, 0xd1c53560eb87a9fa}}, {0x14, 0x1, {0x4, 0xb6, 0x81, 0x8100}}, {0x14, 0x1, {0x0, 0x6e4, 0x1, 0x88a8}}, {0x14, 0x1, {0x14, 0xaed, 0x0, 0x8100}}]}, @IFLA_VF_TX_RATE={0xc, 0x3, {0x1000, 0x200}}, @IFLA_VF_TRUST={0xc, 0x9, {0x7, 0x800}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x8000, 0x1}}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x7f, 0x7fff}}, @IFLA_VF_TRUST={0xc, 0x9, {0x7ff, 0x8}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_RATE={0x10, 0x6, {0x9, 0x5, 0x5}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x9}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x80000000, 0x3}}]}, {0xa4, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0xfff, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1d}}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x3f, 0x43}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x65c, 0x1}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x2, 0x80000001}}, @IFLA_VF_VLAN_LIST={0x40, 0xc, 0x0, 0x1, [{0x14, 0x1, {0xcae8, 0x919, 0x9, 0x8100}}, {0x14, 0x1, {0x200, 0xb47, 0xaaa, 0x8100}}, {0x14, 0x1, {0x5, 0x53b, 0xfffffff7, 0x88a8}}]}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x3f, 0x7fff}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x930, 0x5}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x6, 0x8}}]}]}]}, 0x25c}, 0x1, 0x0, 0x0, 0x11}, 0x4c089) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r7, 0x40189429, &(0x7f0000000480)={0x1, 0x4, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r10, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x45, 0xfc, 0x6}, {0x6}]}, 0x10) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x2, 0x3, &(0x7f0000000000)=@framed={{0x18, 0xf}}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) socket$inet6_sctp(0xa, 0x801, 0x84) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) r11 = socket$igmp(0x2, 0x3, 0x2) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@private1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) ioctl$TUNSETOWNER(r3, 0x400454cc, r12) setsockopt$MRT_INIT(r11, 0x0, 0xc8, &(0x7f0000000040), 0x4) setsockopt$MRT_ADD_VIF(r11, 0x0, 0xca, &(0x7f0000000100)={0x0, 0x1, 0x0, 0x0, @vifc_lcl_addr=@dev={0xac, 0x14, 0x14, 0xb}, @multicast1}, 0x10) [ 675.868143][T22487] sctp_bind_addr_copy+0x81/0x2b0 [ 675.873206][T22487] sctp_assoc_set_bind_addr_from_ep+0xc0/0xd0 [ 675.879316][T22487] sctp_connect_new_asoc+0x1cb/0x3a0 [ 675.884653][T22487] sctp_sendmsg+0xefc/0x1900 [ 675.889311][T22487] inet_sendmsg+0x63/0x80 [ 675.893698][T22487] __sys_sendto+0x246/0x300 [ 675.898290][T22487] __x64_sys_sendto+0x78/0x90 [ 675.902999][T22487] do_syscall_64+0x41/0xc0 [ 675.907503][T22487] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 675.913500][T22487] RIP: 0033:0x7f9293ef6149 [ 675.918007][T22487] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 675.937670][T22487] RSP: 002b:00007f9293269168 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 675.946114][T22487] RAX: ffffffffffffffda RBX: 00007f9294015f80 RCX: 00007f9293ef6149 [ 675.954137][T22487] RDX: 000000000001a000 RSI: 0000000020000000 RDI: 0000000000000004 [ 675.962213][T22487] RBP: 00007f92932691d0 R08: 0000000020000080 R09: 000000000000001c [ 675.970292][T22487] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 675.978299][T22487] R13: 00007ffdbda7c2df R14: 00007f9293269300 R15: 0000000000022000 [ 675.986446][T22487] [ 675.997274][T22492] validate_nla: 7 callbacks suppressed [ 675.997293][T22492] netlink: 'syz-executor.5': attribute type 6 has an invalid length. [ 675.999751][T22484] loop3: detected capacity change from 0 to 2048 07:23:08 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0x2000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) [ 676.003295][T22492] (unnamed net_device) (uninitialized): option use_carrier: invalid value (6) [ 676.052618][T22492] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=22492 comm=syz-executor.5 07:23:08 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a000000", 0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000380)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000008c0)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000001cc0)={{}, r2, 0x16, @inherit={0x88, &(0x7f0000001580)=ANY=[@ANYRES16=r3]}, @devid}) r4 = syz_open_dev$MSR(&(0x7f0000000140), 0x100000000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r4, 0x84009422, &(0x7f0000000ec0)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(r6, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000001840)=ANY=[@ANYRES32=r5, @ANYRES32=r3, @ANYRESOCT, @ANYRES32=r1, @ANYRES32, @ANYRES64, @ANYRESHEX], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x40025) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f0000001500)={r5, "2ce8b7e675c30c143ac940d229ad3592"}) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$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") r7 = socket$inet_udplite(0x2, 0x2, 0x88) read(r7, &(0x7f00000000c0)=""/43, 0x2b) [ 676.053422][T22495] netlink: 'syz-executor.1': attribute type 6 has an invalid length. [ 676.076407][T22484] FAT-fs (loop3): Unrecognized mount option "ÿÿÿÿÿÿÿÿ184467440737095516150xffffffffffffffff" or missing value [ 676.085856][T22492] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=61 sclass=netlink_route_socket pid=22492 comm=syz-executor.5 07:23:08 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) (fail_nth: 77) 07:23:08 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0x3000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) [ 676.161036][T22492] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 07:23:08 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, 0x0) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$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") (fail_nth: 38) 07:23:08 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) r2 = open(&(0x7f0000000040)='./file0\x00', 0x161842, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'sit0\x00'}) r4 = syz_io_uring_setup(0x73d7, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000100)=0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r6, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x10001) r8 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x8010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(r5, 0x0, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x8) syz_io_uring_submit(0x0, r8, &(0x7f00000008c0)=@IORING_OP_OPENAT2={0x1c, 0x40, 0x0, 0xffffffffffffffff, &(0x7f0000000840)={0x4ae0e0, 0x2, 0x5}, &(0x7f0000000880)='./file0\x00', 0x18, 0x0, 0x12345}, 0xff) syz_io_uring_submit(r5, 0x0, &(0x7f0000002b40)=@IORING_OP_RECVMSG={0xa, 0x2b, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000002b00)={0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/28, 0x1c}, {&(0x7f0000001540)=""/4096, 0x1000}, {&(0x7f0000002540)=""/131, 0x83}, {&(0x7f0000002600)=""/102, 0x66}, {&(0x7f0000002840)=""/203, 0xcb}], 0x6}, 0x0, 0x10040, 0x1, {0x1}}, 0x0) ftruncate(r2, 0x200002) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x200000e, 0x12, r3, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) r10 = creat(&(0x7f0000000180)='./file0\x00', 0x0) fallocate(r10, 0x0, 0x0, 0x2000402) fallocate(r9, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r9, 0xc028660f, &(0x7f0000001380)={0xc, r10, 0x6}) 07:23:08 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000002c0)={&(0x7f0000000c80)=ANY=[@ANYBLOB="0026bd7000ffdbdf25070000000c00068008000b00060000000c0008002302b41174de3f460a6d000000000000080003000380000008000300bd2c00ff07000400f8ffffff080003001dd30000080004006604000000000000000000"], 0x5c}, 0x1, 0x0, 0x0, 0x1884}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6, 0x6}]}}}]}, 0x3c}}, 0x0) r3 = openat(r2, &(0x7f00000000c0)='./file0\x00', 0x0, 0x31) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000680)=ANY=[@ANYBLOB="4afe65cd9f4cb96af18454a88fa8005c9fe248c0144c45e701002b7127b6679c7a64908ce701f270818888d4368d79057ee5e41b0efaa601fc1a8488a8a24cb9d947491b1bc7983e1710bb3ccc29e6d4ed4df77669e40bbfa802c600208e53ee50e98ab2cb4f50d11a9cdddd9320a5d8171c0f0c108488d0b23be195b12fc7ed967f99e71ff165310bc20d027160e20e87088c6f48a6c7210431c5a6578b11b646347984f92bc092089c964bd360a4e0b124bec92bf620edc72693f0e78f12e205659005168a8e2f60f18bcecd57f49295bfe6ca9c894f4d75798ae81020f3ff3f9d2aeb8740d2ec38db6c068f60e10f6f06172fb698e28d2dcc7deed28eee05874cc59a89b771e167c0d3da3789a3acd1af0cc89d9ff46e329a00f6d1a28794c3b3db7752189c1853e53b0aa840b887618d3d9b6038fc37865fa39328a439819e25692b3efee7a80b609f2ba10030f51469aa05f966b72dedf8991f0d", @ANYRES32=r0, @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00./file0\x00']) connect$unix(r3, &(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000001c0), 0x200080, 0x0) ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f0000000200)={0x55, 0xb5f3, 0x2, 0x1, 0x6}) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000600)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000800)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x40}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) io_setup(0x6, &(0x7f00000003c0)=0x0) r7 = socket$phonet_pipe(0x23, 0x5, 0x2) io_submit(r6, 0x2, &(0x7f00000005c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, r7, &(0x7f00000001c0)='\"', 0x1}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r8, &(0x7f0000006440)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f0000000c40)={0x10, 0x1d, 0x20, 0x70bd28, 0x25dfdbfd}, 0x10}, {&(0x7f0000000f80)={0x20c, 0x3d, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x1f, 0x46, 0x0, 0x1, [@generic="6b23bda57b0fcd6882aea56d992b0de112a87c9689a0ce8f3a928a"]}, @generic="931dd380ae9b76725532f39b25791247f8e1faaa5606177d1141efdf8a23daecc73d0706f82254c664a01e4c4986b42b265e8e88f8f88e8099514ce917072d6e80996cbddc81dd1014a75c1cd2e0c084d7806b82c11b8a625557f25357333f879c7f3ea978d0c62492b2b2a3437425bf3933cf6d0456ae40263ff847b9956f9f56cd1e35dd616a0dffde59", @nested={0x14d, 0x46, 0x0, 0x1, [@typed={0x8, 0x8f, 0x0, 0x0, @u32=0x4}, @generic="3fe433e9f5d2f6047805d9eb39d59742ad46c8bd198fea6b4f77d0bf577f925374abd91b16efa9a31621d58f4b1ee788ba33ce3ae89358fcbecdc28e3a8775ee6c905d5275bf5f05ca6bfc68336199389a9644323a81d22c4bd081ec9c4826b7e965a5292167778eefb5edac3e1e0fd628684a30dbac663eb65de357a891a90855f356cbe26225342cce43c8e320a777c2a1f74ab97b7e442c94", @typed={0x8, 0x41, 0x0, 0x0, @ipv4=@multicast2}, @typed={0x8, 0x6b, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @generic="79c7219fa8393ab7671b616b9cea5f59e77de2a2ea4a268fcad39d31284ee1045f7dedc0dea487845188adde6fe70f5537a0635e01c2ec0a205c1f92c2272999ec8388f9a95b4d387581056e112c58f96f686734281b5a", @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@remote}, @generic="2d7a6c2813a21aa5bc78773404596de147d491e1868776a08d604bfb6aea387b585ce5b3f7ab336df3922c65"]}]}, 0x20c}, {&(0x7f0000000e00)={0x30, 0x12, 0x800, 0x70bd27, 0x25dfdbfc, "", [@typed={0x8, 0x5b, 0x0, 0x0, @pid}, @typed={0xf, 0x8c, 0x0, 0x0, @str='syzkaller1\x00'}, @typed={0x8, 0x7, 0x0, 0x0, @u32}]}, 0x30}, {&(0x7f0000000e40)={0xc8, 0x42, 0x10, 0x70bd26, 0x25dfdbff, "", [@generic="208cd2ae6be9be", @generic="c1d6c27da633daf115873b83c8913d284239d441678e667c20444d1a1f77f48ea7cbf783d84e79a9ebc262452149fe521b40868bf3938c61c8be3cdbd7429e623c99db5ae26d9cf24ee4ef4777ff0410e8b899b18e829f387d7926641f189d2b9697e099ffb7f20f691064b7d87d04cd2e230e8df8c77a2f1e4f4fabd49cfe414b3027dd850d9a2be9547ba5f2ed09811ea9ed9b201782165a792b57afca3e3d575d0f5b4b17a8", @typed={0x8, 0x94, 0x0, 0x0, @u32=0x1}]}, 0xc8}], 0x4, 0x0, 0x0, 0x8801}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00', 0x0}) sendmsg$nl_route(r8, &(0x7f0000000c00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000bc0)={&(0x7f00000011c0)=@dellink={0x25c, 0x11, 0x400, 0x70bd28, 0x25dfdbff, {0x0, 0x0, 0x0, r9, 0x1000}, [@IFLA_PROTO_DOWN={0x5}, @IFLA_IFNAME={0x14, 0x3, 'macvlan1\x00'}, @IFLA_MAP={0x24, 0xe, {0x9, 0xd2, 0x2e4d, 0x200, 0x3e, 0xff}}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x5}, @IFLA_IFALIAS={0x14, 0x14, 'syzkaller1\x00'}, @IFLA_MTU={0x8, 0x4, 0x101}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_VFINFO_LIST={0x1cc, 0x16, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x8fe, 0xffff}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x5, 0x1}}]}, {0x84, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN_LIST={0x54, 0xc, 0x0, 0x1, [{0x14, 0x1, {0xb5d3, 0xadc, 0x100, 0xd1c53560eb87a9fa}}, {0x14, 0x1, {0x4, 0xb6, 0x81, 0x8100}}, {0x14, 0x1, {0x0, 0x6e4, 0x1, 0x88a8}}, {0x14, 0x1, {0x14, 0xaed, 0x0, 0x8100}}]}, @IFLA_VF_TX_RATE={0xc, 0x3, {0x1000, 0x200}}, @IFLA_VF_TRUST={0xc, 0x9, {0x7, 0x800}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x8000, 0x1}}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x7f, 0x7fff}}, @IFLA_VF_TRUST={0xc, 0x9, {0x7ff, 0x8}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_RATE={0x10, 0x6, {0x9, 0x5, 0x5}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x9}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x80000000, 0x3}}]}, {0xa4, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0xfff, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1d}}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x3f, 0x43}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x65c, 0x1}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x2, 0x80000001}}, @IFLA_VF_VLAN_LIST={0x40, 0xc, 0x0, 0x1, [{0x14, 0x1, {0xcae8, 0x919, 0x9, 0x8100}}, {0x14, 0x1, {0x200, 0xb47, 0xaaa, 0x8100}}, {0x14, 0x1, {0x5, 0x53b, 0xfffffff7, 0x88a8}}]}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x3f, 0x7fff}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x930, 0x5}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x6, 0x8}}]}]}]}, 0x25c}, 0x1, 0x0, 0x0, 0x11}, 0x4c089) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r7, 0x40189429, &(0x7f0000000480)={0x1, 0x4, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r10, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x45, 0xfc, 0x6}, {0x6}]}, 0x10) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x2, 0x3, &(0x7f0000000000)=@framed={{0x18, 0xf}}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) socket$inet6_sctp(0xa, 0x801, 0x84) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) r11 = socket$igmp(0x2, 0x3, 0x2) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@private1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) ioctl$TUNSETOWNER(r3, 0x400454cc, r12) setsockopt$MRT_INIT(r11, 0x0, 0xc8, &(0x7f0000000040), 0x4) setsockopt$MRT_ADD_VIF(r11, 0x0, 0xca, &(0x7f0000000100)={0x0, 0x1, 0x0, 0x0, @vifc_lcl_addr=@dev={0xac, 0x14, 0x14, 0xb}, @multicast1}, 0x10) [ 676.261352][T22504] netlink: 'syz-executor.1': attribute type 6 has an invalid length. [ 676.277689][T22507] FAULT_INJECTION: forcing a failure. [ 676.277689][T22507] name failslab, interval 1, probability 0, space 0, times 0 [ 676.290528][T22507] CPU: 0 PID: 22507 Comm: syz-executor.2 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 676.300994][T22507] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 676.311336][T22507] Call Trace: [ 676.314246][T22499] loop0: detected capacity change from 0 to 2048 [ 676.314612][T22507] [ 676.314622][T22507] dump_stack_lvl+0xda/0x130 [ 676.322396][T22499] FAT-fs (loop0): Unrecognized mount option "ÿÿÿÿÿÿÿÿ184467440737095516150xffffffffffffffff" or missing value [ 676.323859][T22507] dump_stack+0x15/0x20 [ 676.344248][T22507] should_fail_ex+0x21f/0x230 [ 676.349087][T22507] __should_failslab+0x92/0xa0 [ 676.353882][T22507] should_failslab+0x9/0x20 [ 676.358470][T22507] slab_pre_alloc_hook+0x38/0x180 [ 676.363520][T22507] __kmem_cache_alloc_node+0x46/0x250 [ 676.368928][T22507] ? sctp_add_bind_addr+0x6f/0x1e0 [ 676.374082][T22507] kmalloc_trace+0x2a/0xa0 [ 676.378550][T22507] sctp_add_bind_addr+0x6f/0x1e0 [ 676.383522][T22507] sctp_copy_local_addr_list+0x19b/0x220 [ 676.389258][T22507] sctp_copy_one_addr+0x7d/0x400 [ 676.394250][T22507] sctp_bind_addr_copy+0x81/0x2b0 [ 676.399330][T22507] sctp_assoc_set_bind_addr_from_ep+0xc0/0xd0 [ 676.405449][T22507] sctp_connect_new_asoc+0x1cb/0x3a0 [ 676.410799][T22507] sctp_sendmsg+0xefc/0x1900 [ 676.412609][T22514] FAULT_INJECTION: forcing a failure. [ 676.412609][T22514] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 676.415493][T22507] inet_sendmsg+0x63/0x80 [ 676.433017][T22507] __sys_sendto+0x246/0x300 [ 676.437611][T22507] __x64_sys_sendto+0x78/0x90 [ 676.442299][T22507] do_syscall_64+0x41/0xc0 [ 676.446853][T22507] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 676.452763][T22507] RIP: 0033:0x7f9293ef6149 [ 676.457184][T22507] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 676.476839][T22507] RSP: 002b:00007f9293269168 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 676.485457][T22507] RAX: ffffffffffffffda RBX: 00007f9294015f80 RCX: 00007f9293ef6149 [ 676.493438][T22507] RDX: 000000000001a000 RSI: 0000000020000000 RDI: 0000000000000004 [ 676.501462][T22507] RBP: 00007f92932691d0 R08: 0000000020000080 R09: 000000000000001c [ 676.509447][T22507] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 676.517510][T22507] R13: 00007ffdbda7c2df R14: 00007f9293269300 R15: 0000000000022000 [ 676.525508][T22507] [ 676.528613][T22514] CPU: 1 PID: 22514 Comm: syz-executor.3 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 676.539059][T22514] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 676.549137][T22514] Call Trace: [ 676.552485][T22514] [ 676.555440][T22514] dump_stack_lvl+0xda/0x130 07:23:09 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) (fail_nth: 78) [ 676.560071][T22514] dump_stack+0x15/0x20 [ 676.564282][T22514] should_fail_ex+0x21f/0x230 [ 676.568998][T22514] should_fail+0xb/0x10 [ 676.573191][T22514] should_fail_usercopy+0x1a/0x20 [ 676.578392][T22514] copy_page_from_iter_atomic+0x22d/0xcf0 [ 676.584138][T22514] ? folio_test_hugetlb+0x3a/0x70 [ 676.589206][T22514] ? shmem_write_begin+0x12a/0x1d0 [ 676.594351][T22514] generic_perform_write+0x203/0x3d0 [ 676.594692][T22516] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=61 sclass=netlink_route_socket pid=22516 comm=syz-executor.5 [ 676.599761][T22514] ? shmem_write_begin+0x1d0/0x1d0 [ 676.599858][T22514] __generic_file_write_iter+0xe6/0x290 [ 676.599898][T22514] generic_file_write_iter+0x7d/0x1c0 [ 676.599931][T22514] vfs_write+0x47b/0x780 [ 676.599960][T22514] ksys_write+0xeb/0x1a0 [ 676.599983][T22514] __x64_sys_write+0x42/0x50 [ 676.600045][T22514] do_syscall_64+0x41/0xc0 [ 676.600077][T22514] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 676.600247][T22514] RIP: 0033:0x7f1567f53ecf [ 676.600265][T22514] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 676.600294][T22514] RSP: 002b:00007f1567314f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 676.600328][T22514] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007f1567f53ecf [ 676.600345][T22514] RDX: 0000000000100000 RSI: 00007f155eef5000 RDI: 0000000000000005 [ 676.600384][T22514] RBP: 00007f155eef5000 R08: 0000000000000000 R09: 0000000000000534 [ 676.600400][T22514] R10: 0000000000100000 R11: 0000000000000293 R12: 0000000000000000 [ 676.600416][T22514] R13: 00007f1567314fdc R14: 00007f1567314fe0 R15: 0000000020000fc2 [ 676.600436][T22514] [ 676.622636][T22514] loop3: detected capacity change from 0 to 2048 [ 676.754811][T22514] FAT-fs (loop3): Unrecognized mount option "ÿÿÿÿÿÿÿÿ184467440737095516150xffffffffffffffff" or missing value [ 676.755446][T22518] FAULT_INJECTION: forcing a failure. [ 676.755446][T22518] name failslab, interval 1, probability 0, space 0, times 0 [ 676.780026][T22518] CPU: 1 PID: 22518 Comm: syz-executor.2 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 676.790470][T22518] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 676.800659][T22518] Call Trace: [ 676.803953][T22518] [ 676.806901][T22518] dump_stack_lvl+0xda/0x130 [ 676.811527][T22518] dump_stack+0x15/0x20 [ 676.815710][T22518] should_fail_ex+0x21f/0x230 [ 676.820468][T22518] __should_failslab+0x92/0xa0 [ 676.825273][T22518] should_failslab+0x9/0x20 [ 676.829825][T22518] slab_pre_alloc_hook+0x38/0x180 [ 676.834878][T22518] __kmem_cache_alloc_node+0x46/0x250 [ 676.840288][T22518] ? sctp_add_bind_addr+0x6f/0x1e0 [ 676.845507][T22518] kmalloc_trace+0x2a/0xa0 [ 676.850055][T22518] sctp_add_bind_addr+0x6f/0x1e0 [ 676.855045][T22518] sctp_copy_local_addr_list+0x19b/0x220 [ 676.860780][T22518] sctp_copy_one_addr+0x7d/0x400 [ 676.865791][T22518] sctp_bind_addr_copy+0x81/0x2b0 [ 676.870988][T22518] sctp_assoc_set_bind_addr_from_ep+0xc0/0xd0 [ 676.877139][T22518] sctp_connect_new_asoc+0x1cb/0x3a0 [ 676.882467][T22518] sctp_sendmsg+0xefc/0x1900 [ 676.883042][T22520] netlink: 'syz-executor.1': attribute type 6 has an invalid length. [ 676.887102][T22518] inet_sendmsg+0x63/0x80 [ 676.887151][T22518] __sys_sendto+0x246/0x300 [ 676.904120][T22518] __x64_sys_sendto+0x78/0x90 [ 676.908832][T22518] do_syscall_64+0x41/0xc0 [ 676.913382][T22518] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 676.919350][T22518] RIP: 0033:0x7f9293ef6149 [ 676.923788][T22518] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 676.943465][T22518] RSP: 002b:00007f9293269168 EFLAGS: 00000246 ORIG_RAX: 000000000000002c 07:23:09 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0x4000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) 07:23:09 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0x5000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) 07:23:09 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a000000", 0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000380)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000008c0)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000001cc0)={{}, r2, 0x16, @inherit={0x88, &(0x7f0000001580)=ANY=[@ANYRES16=r3]}, @devid}) r4 = syz_open_dev$MSR(&(0x7f0000000140), 0x100000000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r4, 0x84009422, &(0x7f0000000ec0)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(r6, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000001840)=ANY=[@ANYRES32=r5, @ANYRES32=r3, @ANYRESOCT, @ANYRES32=r1, @ANYRES32, @ANYRES64, @ANYRESHEX], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x40025) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f0000001500)={r5, "2ce8b7e675c30c143ac940d229ad3592"}) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$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") r7 = socket$inet_udplite(0x2, 0x2, 0x88) read(r7, &(0x7f00000000c0)=""/43, 0x2b) [ 676.951927][T22518] RAX: ffffffffffffffda RBX: 00007f9294015f80 RCX: 00007f9293ef6149 [ 676.960091][T22518] RDX: 000000000001a000 RSI: 0000000020000000 RDI: 0000000000000004 [ 676.968136][T22518] RBP: 00007f92932691d0 R08: 0000000020000080 R09: 000000000000001c [ 676.976136][T22518] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 676.984198][T22518] R13: 00007ffdbda7c2df R14: 00007f9293269300 R15: 0000000000022000 [ 676.992205][T22518] 07:23:09 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) (fail_nth: 79) 07:23:09 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, 0x0) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$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") (fail_nth: 39) 07:23:09 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000002c0)={&(0x7f0000000c80)=ANY=[@ANYBLOB="0026bd7000ffdbdf25070000000c00068008000b00060000000c0008002302b41174de3f460a6d000000000000080003000380000008000300bd2c00ff07000400f8ffffff080003001dd30000080004006604000000000000000000"], 0x5c}, 0x1, 0x0, 0x0, 0x1884}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6, 0x6}]}}}]}, 0x3c}}, 0x0) r3 = openat(r2, &(0x7f00000000c0)='./file0\x00', 0x0, 0x31) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00./file0\x00']) connect$unix(r3, &(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000001c0), 0x200080, 0x0) ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f0000000200)={0x55, 0xb5f3, 0x2, 0x1, 0x6}) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000600)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000800)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x40}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) io_setup(0x6, &(0x7f00000003c0)=0x0) r7 = socket$phonet_pipe(0x23, 0x5, 0x2) io_submit(r6, 0x2, &(0x7f00000005c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, r7, &(0x7f00000001c0)='\"', 0x1}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r8, &(0x7f0000006440)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f0000000c40)={0x10, 0x1d, 0x20, 0x70bd28, 0x25dfdbfd}, 0x10}, {&(0x7f0000000f80)={0x20c, 0x3d, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x1f, 0x46, 0x0, 0x1, [@generic="6b23bda57b0fcd6882aea56d992b0de112a87c9689a0ce8f3a928a"]}, @generic="931dd380ae9b76725532f39b25791247f8e1faaa5606177d1141efdf8a23daecc73d0706f82254c664a01e4c4986b42b265e8e88f8f88e8099514ce917072d6e80996cbddc81dd1014a75c1cd2e0c084d7806b82c11b8a625557f25357333f879c7f3ea978d0c62492b2b2a3437425bf3933cf6d0456ae40263ff847b9956f9f56cd1e35dd616a0dffde59", @nested={0x14d, 0x46, 0x0, 0x1, [@typed={0x8, 0x8f, 0x0, 0x0, @u32=0x4}, @generic="3fe433e9f5d2f6047805d9eb39d59742ad46c8bd198fea6b4f77d0bf577f925374abd91b16efa9a31621d58f4b1ee788ba33ce3ae89358fcbecdc28e3a8775ee6c905d5275bf5f05ca6bfc68336199389a9644323a81d22c4bd081ec9c4826b7e965a5292167778eefb5edac3e1e0fd628684a30dbac663eb65de357a891a90855f356cbe26225342cce43c8e320a777c2a1f74ab97b7e442c94", @typed={0x8, 0x41, 0x0, 0x0, @ipv4=@multicast2}, @typed={0x8, 0x6b, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @generic="79c7219fa8393ab7671b616b9cea5f59e77de2a2ea4a268fcad39d31284ee1045f7dedc0dea487845188adde6fe70f5537a0635e01c2ec0a205c1f92c2272999ec8388f9a95b4d387581056e112c58f96f686734281b5a", @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@remote}, @generic="2d7a6c2813a21aa5bc78773404596de147d491e1868776a08d604bfb6aea387b585ce5b3f7ab336df3922c65"]}]}, 0x20c}, {&(0x7f0000000e00)={0x30, 0x12, 0x800, 0x70bd27, 0x25dfdbfc, "", [@typed={0x8, 0x5b, 0x0, 0x0, @pid}, @typed={0xf, 0x8c, 0x0, 0x0, @str='syzkaller1\x00'}, @typed={0x8, 0x7, 0x0, 0x0, @u32}]}, 0x30}, {&(0x7f0000000e40)={0xc8, 0x42, 0x10, 0x70bd26, 0x25dfdbff, "", [@generic="208cd2ae6be9be", @generic="c1d6c27da633daf115873b83c8913d284239d441678e667c20444d1a1f77f48ea7cbf783d84e79a9ebc262452149fe521b40868bf3938c61c8be3cdbd7429e623c99db5ae26d9cf24ee4ef4777ff0410e8b899b18e829f387d7926641f189d2b9697e099ffb7f20f691064b7d87d04cd2e230e8df8c77a2f1e4f4fabd49cfe414b3027dd850d9a2be9547ba5f2ed09811ea9ed9b201782165a792b57afca3e3d575d0f5b4b17a8", @typed={0x8, 0x94, 0x0, 0x0, @u32=0x1}]}, 0xc8}], 0x4, 0x0, 0x0, 0x8801}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00', 0x0}) sendmsg$nl_route(r8, &(0x7f0000000c00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000bc0)={&(0x7f00000011c0)=@dellink={0x25c, 0x11, 0x400, 0x70bd28, 0x25dfdbff, {0x0, 0x0, 0x0, r9, 0x1000}, [@IFLA_PROTO_DOWN={0x5}, @IFLA_IFNAME={0x14, 0x3, 'macvlan1\x00'}, @IFLA_MAP={0x24, 0xe, {0x9, 0xd2, 0x2e4d, 0x200, 0x3e, 0xff}}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x5}, @IFLA_IFALIAS={0x14, 0x14, 'syzkaller1\x00'}, @IFLA_MTU={0x8, 0x4, 0x101}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_VFINFO_LIST={0x1cc, 0x16, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x8fe, 0xffff}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x5, 0x1}}]}, {0x84, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN_LIST={0x54, 0xc, 0x0, 0x1, [{0x14, 0x1, {0xb5d3, 0xadc, 0x100, 0xd1c53560eb87a9fa}}, {0x14, 0x1, {0x4, 0xb6, 0x81, 0x8100}}, {0x14, 0x1, {0x0, 0x6e4, 0x1, 0x88a8}}, {0x14, 0x1, {0x14, 0xaed, 0x0, 0x8100}}]}, @IFLA_VF_TX_RATE={0xc, 0x3, {0x1000, 0x200}}, @IFLA_VF_TRUST={0xc, 0x9, {0x7, 0x800}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x8000, 0x1}}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x7f, 0x7fff}}, @IFLA_VF_TRUST={0xc, 0x9, {0x7ff, 0x8}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_RATE={0x10, 0x6, {0x9, 0x5, 0x5}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x9}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x80000000, 0x3}}]}, {0xa4, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0xfff, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1d}}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x3f, 0x43}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x65c, 0x1}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x2, 0x80000001}}, @IFLA_VF_VLAN_LIST={0x40, 0xc, 0x0, 0x1, [{0x14, 0x1, {0xcae8, 0x919, 0x9, 0x8100}}, {0x14, 0x1, {0x200, 0xb47, 0xaaa, 0x8100}}, {0x14, 0x1, {0x5, 0x53b, 0xfffffff7, 0x88a8}}]}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x3f, 0x7fff}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x930, 0x5}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x6, 0x8}}]}]}]}, 0x25c}, 0x1, 0x0, 0x0, 0x11}, 0x4c089) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r7, 0x40189429, &(0x7f0000000480)={0x1, 0x4, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r10, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x45, 0xfc, 0x6}, {0x6}]}, 0x10) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x2, 0x3, &(0x7f0000000000)=@framed={{0x18, 0xf}}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) socket$inet6_sctp(0xa, 0x801, 0x84) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) r11 = socket$igmp(0x2, 0x3, 0x2) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@private1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) ioctl$TUNSETOWNER(r3, 0x400454cc, r12) setsockopt$MRT_INIT(r11, 0x0, 0xc8, &(0x7f0000000040), 0x4) setsockopt$MRT_ADD_VIF(r11, 0x0, 0xca, &(0x7f0000000100)={0x0, 0x1, 0x0, 0x0, @vifc_lcl_addr=@dev={0xac, 0x14, 0x14, 0xb}, @multicast1}, 0x10) [ 677.040923][T22523] netlink: 'syz-executor.1': attribute type 6 has an invalid length. [ 677.100322][T22529] netlink: 'syz-executor.5': attribute type 6 has an invalid length. [ 677.106230][T22532] FAULT_INJECTION: forcing a failure. [ 677.106230][T22532] name failslab, interval 1, probability 0, space 0, times 0 [ 677.115736][T22531] FAULT_INJECTION: forcing a failure. [ 677.115736][T22531] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 677.121075][T22532] CPU: 1 PID: 22532 Comm: syz-executor.2 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 677.121152][T22532] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 677.121167][T22532] Call Trace: [ 677.121175][T22532] [ 677.121183][T22532] dump_stack_lvl+0xda/0x130 [ 677.121219][T22532] dump_stack+0x15/0x20 [ 677.121312][T22532] should_fail_ex+0x21f/0x230 [ 677.121419][T22532] __should_failslab+0x92/0xa0 [ 677.121454][T22532] should_failslab+0x9/0x20 [ 677.121641][T22532] slab_pre_alloc_hook+0x38/0x180 [ 677.121675][T22532] __kmem_cache_alloc_node+0x46/0x250 [ 677.194988][T22532] ? sctp_add_bind_addr+0x6f/0x1e0 [ 677.200188][T22532] kmalloc_trace+0x2a/0xa0 [ 677.204697][T22532] sctp_add_bind_addr+0x6f/0x1e0 [ 677.209645][T22532] sctp_copy_local_addr_list+0x19b/0x220 [ 677.215346][T22532] sctp_copy_one_addr+0x7d/0x400 [ 677.220405][T22532] sctp_bind_addr_copy+0x81/0x2b0 [ 677.225529][T22532] sctp_assoc_set_bind_addr_from_ep+0xc0/0xd0 [ 677.231625][T22532] sctp_connect_new_asoc+0x1cb/0x3a0 [ 677.236932][T22532] sctp_sendmsg+0xefc/0x1900 [ 677.241573][T22532] inet_sendmsg+0x63/0x80 [ 677.245922][T22532] __sys_sendto+0x246/0x300 [ 677.250439][T22532] __x64_sys_sendto+0x78/0x90 [ 677.255253][T22532] do_syscall_64+0x41/0xc0 [ 677.259698][T22532] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 677.265806][T22532] RIP: 0033:0x7f9293ef6149 [ 677.270228][T22532] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 677.290030][T22532] RSP: 002b:00007f9293269168 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 677.298513][T22532] RAX: ffffffffffffffda RBX: 00007f9294015f80 RCX: 00007f9293ef6149 [ 677.306540][T22532] RDX: 000000000001a000 RSI: 0000000020000000 RDI: 0000000000000004 [ 677.314548][T22532] RBP: 00007f92932691d0 R08: 0000000020000080 R09: 000000000000001c [ 677.322524][T22532] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 677.330556][T22532] R13: 00007ffdbda7c2df R14: 00007f9293269300 R15: 0000000000022000 [ 677.338538][T22532] 07:23:09 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) (fail_nth: 80) 07:23:09 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) r2 = open(&(0x7f0000000040)='./file0\x00', 0x161842, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'sit0\x00'}) r4 = syz_io_uring_setup(0x73d7, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000100)=0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r6, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x10001) r8 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x8010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(r5, 0x0, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x8) syz_io_uring_submit(0x0, r8, &(0x7f00000008c0)=@IORING_OP_OPENAT2={0x1c, 0x40, 0x0, 0xffffffffffffffff, &(0x7f0000000840)={0x4ae0e0, 0x2, 0x5}, &(0x7f0000000880)='./file0\x00', 0x18, 0x0, 0x12345}, 0xff) syz_io_uring_submit(r5, 0x0, &(0x7f0000002b40)=@IORING_OP_RECVMSG={0xa, 0x2b, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000002b00)={0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/28, 0x1c}, {&(0x7f0000001540)=""/4096, 0x1000}, {&(0x7f0000002540)=""/131, 0x83}, {&(0x7f0000002600)=""/102, 0x66}, {&(0x7f0000002840)=""/203, 0xcb}], 0x6}, 0x0, 0x10040, 0x1, {0x1}}, 0x0) ftruncate(r2, 0x200002) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x200000e, 0x12, r3, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) r10 = creat(&(0x7f0000000180)='./file0\x00', 0x0) fallocate(r10, 0x0, 0x0, 0x2000402) fallocate(r9, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r9, 0xc028660f, &(0x7f0000001380)={0xc, r10, 0x7}) [ 677.341607][T22531] CPU: 0 PID: 22531 Comm: syz-executor.3 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 677.352079][T22531] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 677.362334][T22531] Call Trace: [ 677.365631][T22531] [ 677.368582][T22531] dump_stack_lvl+0xda/0x130 [ 677.373367][T22531] dump_stack+0x15/0x20 [ 677.377558][T22531] should_fail_ex+0x21f/0x230 [ 677.382304][T22531] __alloc_pages+0x108/0x340 [ 677.386692][T22529] (unnamed net_device) (uninitialized): option use_carrier: invalid value (6) [ 677.386955][T22531] vma_alloc_folio+0x6a3/0x8c0 07:23:09 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0x5010000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) [ 677.400597][T22531] ? __vm_enough_memory+0xdf/0x2a0 [ 677.405752][T22531] shmem_get_folio_gfp+0x801/0x1200 [ 677.411040][T22531] shmem_write_begin+0xa6/0x1d0 [ 677.415923][T22531] generic_perform_write+0x1c3/0x3d0 [ 677.421268][T22531] ? shmem_write_begin+0x1d0/0x1d0 [ 677.426465][T22531] __generic_file_write_iter+0xe6/0x290 [ 677.432107][T22531] generic_file_write_iter+0x7d/0x1c0 [ 677.434389][T22529] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=22529 comm=syz-executor.5 [ 677.437587][T22531] vfs_write+0x47b/0x780 [ 677.437619][T22531] ksys_write+0xeb/0x1a0 [ 677.459007][T22531] __x64_sys_write+0x42/0x50 [ 677.463645][T22531] do_syscall_64+0x41/0xc0 [ 677.468129][T22531] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 677.474065][T22531] RIP: 0033:0x7f1567f53ecf [ 677.478538][T22531] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 677.492879][T22539] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=61 sclass=netlink_route_socket pid=22539 comm=syz-executor.5 [ 677.498153][T22531] RSP: 002b:00007f1567314f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 677.498176][T22531] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007f1567f53ecf [ 677.498192][T22531] RDX: 0000000000100000 RSI: 00007f155eef5000 RDI: 0000000000000005 [ 677.498209][T22531] RBP: 00007f155eef5000 R08: 0000000000000000 R09: 0000000000000534 [ 677.543653][T22531] R10: 0000000000100000 R11: 0000000000000293 R12: 0000000000000000 [ 677.546980][T22529] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 677.551732][T22531] R13: 00007f1567314fdc R14: 00007f1567314fe0 R15: 0000000020000fc2 [ 677.551758][T22531] [ 677.572169][T22545] netlink: 'syz-executor.1': attribute type 6 has an invalid length. [ 677.582492][T22544] FAULT_INJECTION: forcing a failure. [ 677.582492][T22544] name failslab, interval 1, probability 0, space 0, times 0 [ 677.595171][T22544] CPU: 0 PID: 22544 Comm: syz-executor.2 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 677.605722][T22544] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 677.613719][T22533] loop0: detected capacity change from 0 to 2048 [ 677.615796][T22544] Call Trace: [ 677.625446][T22544] [ 677.628395][T22544] dump_stack_lvl+0xda/0x130 [ 677.633024][T22544] dump_stack+0x15/0x20 [ 677.637291][T22544] should_fail_ex+0x21f/0x230 [ 677.640849][T22533] FAT-fs (loop0): Unrecognized mount option "ÿÿÿÿÿÿÿÿ184467440737095516150xffffffffffffffff" or missing value [ 677.641991][T22544] __should_failslab+0x92/0xa0 [ 677.658460][T22544] should_failslab+0x9/0x20 [ 677.663006][T22544] slab_pre_alloc_hook+0x38/0x180 [ 677.668074][T22544] __kmem_cache_alloc_node+0x46/0x250 [ 677.673486][T22544] ? sctp_add_bind_addr+0x6f/0x1e0 [ 677.678668][T22544] kmalloc_trace+0x2a/0xa0 [ 677.683144][T22544] sctp_add_bind_addr+0x6f/0x1e0 [ 677.688188][T22544] sctp_copy_local_addr_list+0x19b/0x220 [ 677.693985][T22544] sctp_copy_one_addr+0x7d/0x400 07:23:10 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, 0x0) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$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") (fail_nth: 40) [ 677.698971][T22544] sctp_bind_addr_copy+0x81/0x2b0 [ 677.704032][T22544] sctp_assoc_set_bind_addr_from_ep+0xc0/0xd0 [ 677.710152][T22544] sctp_connect_new_asoc+0x1cb/0x3a0 [ 677.715503][T22544] sctp_sendmsg+0xefc/0x1900 [ 677.720136][T22544] inet_sendmsg+0x63/0x80 [ 677.724550][T22544] __sys_sendto+0x246/0x300 [ 677.729125][T22544] __x64_sys_sendto+0x78/0x90 [ 677.734020][T22544] do_syscall_64+0x41/0xc0 [ 677.738465][T22544] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 677.744433][T22544] RIP: 0033:0x7f9293ef6149 [ 677.748868][T22544] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 677.768541][T22544] RSP: 002b:00007f9293269168 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 677.776974][T22544] RAX: ffffffffffffffda RBX: 00007f9294015f80 RCX: 00007f9293ef6149 [ 677.784971][T22544] RDX: 000000000001a000 RSI: 0000000020000000 RDI: 0000000000000004 [ 677.793005][T22544] RBP: 00007f92932691d0 R08: 0000000020000080 R09: 000000000000001c [ 677.801000][T22544] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 677.808998][T22544] R13: 00007ffdbda7c2df R14: 00007f9293269300 R15: 0000000000022000 [ 677.817004][T22544] [ 677.839050][T22551] FAULT_INJECTION: forcing a failure. [ 677.839050][T22551] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 677.852382][T22551] CPU: 1 PID: 22551 Comm: syz-executor.3 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 677.862868][T22551] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 677.872961][T22551] Call Trace: [ 677.876256][T22551] [ 677.879201][T22551] dump_stack_lvl+0xda/0x130 [ 677.883847][T22551] dump_stack+0x15/0x20 [ 677.888055][T22551] should_fail_ex+0x21f/0x230 [ 677.892792][T22551] __alloc_pages+0x108/0x340 [ 677.897528][T22551] vma_alloc_folio+0x6a3/0x8c0 [ 677.902318][T22551] ? __vm_enough_memory+0xdf/0x2a0 [ 677.907484][T22551] shmem_get_folio_gfp+0x801/0x1200 [ 677.912772][T22551] shmem_write_begin+0xa6/0x1d0 [ 677.917719][T22551] generic_perform_write+0x1c3/0x3d0 [ 677.923106][T22551] ? shmem_write_begin+0x1d0/0x1d0 [ 677.928332][T22551] __generic_file_write_iter+0xe6/0x290 [ 677.933912][T22551] generic_file_write_iter+0x7d/0x1c0 [ 677.939408][T22551] vfs_write+0x47b/0x780 [ 677.943731][T22551] ksys_write+0xeb/0x1a0 [ 677.948034][T22551] __x64_sys_write+0x42/0x50 [ 677.952677][T22551] do_syscall_64+0x41/0xc0 [ 677.957131][T22551] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 677.963059][T22551] RIP: 0033:0x7f1567f53ecf [ 677.967501][T22551] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 677.987370][T22551] RSP: 002b:00007f15672f3f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 677.995914][T22551] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00007f1567f53ecf 07:23:10 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) (fail_nth: 81) 07:23:10 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0x5020000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) [ 678.004082][T22551] RDX: 0000000000100000 RSI: 00007f155eed4000 RDI: 0000000000000004 [ 678.012079][T22551] RBP: 00007f155eed4000 R08: 0000000000000000 R09: 0000000000000534 [ 678.020071][T22551] R10: 0000000000100000 R11: 0000000000000293 R12: 0000000000000000 [ 678.028063][T22551] R13: 00007f15672f3fdc R14: 00007f15672f3fe0 R15: 0000000020000fc2 [ 678.036058][T22551] [ 678.089015][T22556] netlink: 'syz-executor.1': attribute type 6 has an invalid length. [ 678.091629][T22555] FAULT_INJECTION: forcing a failure. [ 678.091629][T22555] name failslab, interval 1, probability 0, space 0, times 0 [ 678.110055][T22555] CPU: 1 PID: 22555 Comm: syz-executor.2 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 678.120490][T22555] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 678.130657][T22555] Call Trace: [ 678.133961][T22555] [ 678.136930][T22555] dump_stack_lvl+0xda/0x130 [ 678.141547][T22555] dump_stack+0x15/0x20 [ 678.145735][T22555] should_fail_ex+0x21f/0x230 [ 678.150497][T22555] __should_failslab+0x92/0xa0 [ 678.155343][T22555] should_failslab+0x9/0x20 [ 678.159880][T22555] slab_pre_alloc_hook+0x38/0x180 [ 678.165018][T22555] __kmem_cache_alloc_node+0x46/0x250 [ 678.170515][T22555] ? sctp_add_bind_addr+0x6f/0x1e0 [ 678.175677][T22555] kmalloc_trace+0x2a/0xa0 [ 678.180135][T22555] sctp_add_bind_addr+0x6f/0x1e0 [ 678.185106][T22555] sctp_copy_local_addr_list+0x19b/0x220 [ 678.190868][T22555] sctp_copy_one_addr+0x7d/0x400 [ 678.195935][T22555] sctp_bind_addr_copy+0x81/0x2b0 [ 678.200993][T22555] sctp_assoc_set_bind_addr_from_ep+0xc0/0xd0 [ 678.207117][T22555] sctp_connect_new_asoc+0x1cb/0x3a0 [ 678.212495][T22555] sctp_sendmsg+0xefc/0x1900 [ 678.217184][T22555] inet_sendmsg+0x63/0x80 [ 678.221548][T22555] __sys_sendto+0x246/0x300 [ 678.226084][T22555] __x64_sys_sendto+0x78/0x90 [ 678.230873][T22555] do_syscall_64+0x41/0xc0 [ 678.235338][T22555] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 678.241279][T22555] RIP: 0033:0x7f9293ef6149 [ 678.245802][T22555] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 678.265445][T22555] RSP: 002b:00007f9293269168 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 678.273886][T22555] RAX: ffffffffffffffda RBX: 00007f9294015f80 RCX: 00007f9293ef6149 [ 678.281955][T22555] RDX: 000000000001a000 RSI: 0000000020000000 RDI: 0000000000000004 07:23:10 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, 0x0) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$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") (fail_nth: 41) 07:23:10 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a0000001900", 0x6) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000380)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000008c0)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000001cc0)={{}, r2, 0x16, @inherit={0x88, &(0x7f0000001580)=ANY=[@ANYRES16=r3]}, @devid}) r4 = syz_open_dev$MSR(&(0x7f0000000140), 0x100000000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r4, 0x84009422, &(0x7f0000000ec0)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(r6, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000001840)=ANY=[@ANYRES32=r5, @ANYRES32=r3, @ANYRESOCT, @ANYRES32=r1, @ANYRES32, @ANYRES64, @ANYRESHEX], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x40025) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f0000001500)={r5, "2ce8b7e675c30c143ac940d229ad3592"}) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$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") r7 = socket$inet_udplite(0x2, 0x2, 0x88) read(r7, &(0x7f00000000c0)=""/43, 0x2b) 07:23:10 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) r2 = open(&(0x7f0000000040)='./file0\x00', 0x161842, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'sit0\x00'}) r4 = syz_io_uring_setup(0x73d7, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000100)=0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r6, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x10001) r8 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x8010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(r5, 0x0, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x8) syz_io_uring_submit(0x0, r8, &(0x7f00000008c0)=@IORING_OP_OPENAT2={0x1c, 0x40, 0x0, 0xffffffffffffffff, &(0x7f0000000840)={0x4ae0e0, 0x2, 0x5}, &(0x7f0000000880)='./file0\x00', 0x18, 0x0, 0x12345}, 0xff) syz_io_uring_submit(r5, 0x0, &(0x7f0000002b40)=@IORING_OP_RECVMSG={0xa, 0x2b, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000002b00)={0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/28, 0x1c}, {&(0x7f0000001540)=""/4096, 0x1000}, {&(0x7f0000002540)=""/131, 0x83}, {&(0x7f0000002600)=""/102, 0x66}, {&(0x7f0000002840)=""/203, 0xcb}], 0x6}, 0x0, 0x10040, 0x1, {0x1}}, 0x0) ftruncate(r2, 0x200002) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x200000e, 0x12, r3, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) r10 = creat(&(0x7f0000000180)='./file0\x00', 0x0) fallocate(r10, 0x0, 0x0, 0x2000402) fallocate(r9, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r9, 0xc028660f, &(0x7f0000001380)={0xc, r10, 0x8}) 07:23:10 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0x6000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) [ 678.289969][T22555] RBP: 00007f92932691d0 R08: 0000000020000080 R09: 000000000000001c [ 678.297968][T22555] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 678.305969][T22555] R13: 00007ffdbda7c2df R14: 00007f9293269300 R15: 0000000000022000 [ 678.314035][T22555] [ 678.335674][T22560] FAULT_INJECTION: forcing a failure. [ 678.335674][T22560] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 678.348788][T22560] CPU: 1 PID: 22560 Comm: syz-executor.3 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 678.359264][T22560] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 678.369896][T22560] Call Trace: [ 678.373187][T22560] [ 678.376201][T22560] dump_stack_lvl+0xda/0x130 [ 678.380868][T22560] dump_stack+0x15/0x20 [ 678.385098][T22560] should_fail_ex+0x21f/0x230 [ 678.389820][T22560] should_fail+0xb/0x10 [ 678.394048][T22560] should_fail_usercopy+0x1a/0x20 [ 678.399204][T22560] copy_page_from_iter_atomic+0x22d/0xcf0 [ 678.404996][T22560] ? folio_test_hugetlb+0x3a/0x70 [ 678.410061][T22560] ? shmem_write_begin+0x12a/0x1d0 [ 678.415231][T22560] generic_perform_write+0x203/0x3d0 [ 678.420637][T22560] ? shmem_write_begin+0x1d0/0x1d0 [ 678.425786][T22560] __generic_file_write_iter+0xe6/0x290 [ 678.431663][T22560] generic_file_write_iter+0x7d/0x1c0 [ 678.437076][T22560] vfs_write+0x47b/0x780 [ 678.441413][T22560] ksys_write+0xeb/0x1a0 [ 678.445681][T22560] __x64_sys_write+0x42/0x50 [ 678.450414][T22560] do_syscall_64+0x41/0xc0 [ 678.454858][T22560] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 678.460841][T22560] RIP: 0033:0x7f1567f53ecf [ 678.465305][T22560] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 07:23:11 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000002c0)={&(0x7f0000000c80)=ANY=[@ANYBLOB="0026bd7000ffdbdf25070000000c00068008000b00060000000c0008002302b41174de3f460a6d000000000000080003000380000008000300bd2c00ff07000400f8ffffff080003001dd30000080004006604000000000000000000"], 0x5c}, 0x1, 0x0, 0x0, 0x1884}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6, 0x6}]}}}]}, 0x3c}}, 0x0) r3 = openat(r2, &(0x7f00000000c0)='./file0\x00', 0x0, 0x31) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00./file0\x00']) connect$unix(r3, &(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000001c0), 0x200080, 0x0) ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f0000000200)={0x55, 0xb5f3, 0x2, 0x1, 0x6}) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000600)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000800)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x40}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) io_setup(0x6, &(0x7f00000003c0)=0x0) r7 = socket$phonet_pipe(0x23, 0x5, 0x2) io_submit(r6, 0x2, &(0x7f00000005c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, r7, &(0x7f00000001c0)='\"', 0x1}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r8, &(0x7f0000006440)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f0000000c40)={0x10, 0x1d, 0x20, 0x70bd28, 0x25dfdbfd}, 0x10}, {&(0x7f0000000f80)={0x20c, 0x3d, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x1f, 0x46, 0x0, 0x1, [@generic="6b23bda57b0fcd6882aea56d992b0de112a87c9689a0ce8f3a928a"]}, @generic="931dd380ae9b76725532f39b25791247f8e1faaa5606177d1141efdf8a23daecc73d0706f82254c664a01e4c4986b42b265e8e88f8f88e8099514ce917072d6e80996cbddc81dd1014a75c1cd2e0c084d7806b82c11b8a625557f25357333f879c7f3ea978d0c62492b2b2a3437425bf3933cf6d0456ae40263ff847b9956f9f56cd1e35dd616a0dffde59", @nested={0x14d, 0x46, 0x0, 0x1, [@typed={0x8, 0x8f, 0x0, 0x0, @u32=0x4}, @generic="3fe433e9f5d2f6047805d9eb39d59742ad46c8bd198fea6b4f77d0bf577f925374abd91b16efa9a31621d58f4b1ee788ba33ce3ae89358fcbecdc28e3a8775ee6c905d5275bf5f05ca6bfc68336199389a9644323a81d22c4bd081ec9c4826b7e965a5292167778eefb5edac3e1e0fd628684a30dbac663eb65de357a891a90855f356cbe26225342cce43c8e320a777c2a1f74ab97b7e442c94", @typed={0x8, 0x41, 0x0, 0x0, @ipv4=@multicast2}, @typed={0x8, 0x6b, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @generic="79c7219fa8393ab7671b616b9cea5f59e77de2a2ea4a268fcad39d31284ee1045f7dedc0dea487845188adde6fe70f5537a0635e01c2ec0a205c1f92c2272999ec8388f9a95b4d387581056e112c58f96f686734281b5a", @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@remote}, @generic="2d7a6c2813a21aa5bc78773404596de147d491e1868776a08d604bfb6aea387b585ce5b3f7ab336df3922c65"]}]}, 0x20c}, {&(0x7f0000000e00)={0x30, 0x12, 0x800, 0x70bd27, 0x25dfdbfc, "", [@typed={0x8, 0x5b, 0x0, 0x0, @pid}, @typed={0xf, 0x8c, 0x0, 0x0, @str='syzkaller1\x00'}, @typed={0x8, 0x7, 0x0, 0x0, @u32}]}, 0x30}, {&(0x7f0000000e40)={0xc8, 0x42, 0x10, 0x70bd26, 0x25dfdbff, "", [@generic="208cd2ae6be9be", @generic="c1d6c27da633daf115873b83c8913d284239d441678e667c20444d1a1f77f48ea7cbf783d84e79a9ebc262452149fe521b40868bf3938c61c8be3cdbd7429e623c99db5ae26d9cf24ee4ef4777ff0410e8b899b18e829f387d7926641f189d2b9697e099ffb7f20f691064b7d87d04cd2e230e8df8c77a2f1e4f4fabd49cfe414b3027dd850d9a2be9547ba5f2ed09811ea9ed9b201782165a792b57afca3e3d575d0f5b4b17a8", @typed={0x8, 0x94, 0x0, 0x0, @u32=0x1}]}, 0xc8}], 0x4, 0x0, 0x0, 0x8801}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00', 0x0}) sendmsg$nl_route(r8, &(0x7f0000000c00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000bc0)={&(0x7f00000011c0)=@dellink={0x25c, 0x11, 0x400, 0x70bd28, 0x25dfdbff, {0x0, 0x0, 0x0, r9, 0x1000}, [@IFLA_PROTO_DOWN={0x5}, @IFLA_IFNAME={0x14, 0x3, 'macvlan1\x00'}, @IFLA_MAP={0x24, 0xe, {0x9, 0xd2, 0x2e4d, 0x200, 0x3e, 0xff}}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x5}, @IFLA_IFALIAS={0x14, 0x14, 'syzkaller1\x00'}, @IFLA_MTU={0x8, 0x4, 0x101}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_VFINFO_LIST={0x1cc, 0x16, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x8fe, 0xffff}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x5, 0x1}}]}, {0x84, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN_LIST={0x54, 0xc, 0x0, 0x1, [{0x14, 0x1, {0xb5d3, 0xadc, 0x100, 0xd1c53560eb87a9fa}}, {0x14, 0x1, {0x4, 0xb6, 0x81, 0x8100}}, {0x14, 0x1, {0x0, 0x6e4, 0x1, 0x88a8}}, {0x14, 0x1, {0x14, 0xaed, 0x0, 0x8100}}]}, @IFLA_VF_TX_RATE={0xc, 0x3, {0x1000, 0x200}}, @IFLA_VF_TRUST={0xc, 0x9, {0x7, 0x800}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x8000, 0x1}}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x7f, 0x7fff}}, @IFLA_VF_TRUST={0xc, 0x9, {0x7ff, 0x8}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_RATE={0x10, 0x6, {0x9, 0x5, 0x5}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x9}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x80000000, 0x3}}]}, {0xa4, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0xfff, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1d}}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x3f, 0x43}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x65c, 0x1}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x2, 0x80000001}}, @IFLA_VF_VLAN_LIST={0x40, 0xc, 0x0, 0x1, [{0x14, 0x1, {0xcae8, 0x919, 0x9, 0x8100}}, {0x14, 0x1, {0x200, 0xb47, 0xaaa, 0x8100}}, {0x14, 0x1, {0x5, 0x53b, 0xfffffff7, 0x88a8}}]}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x3f, 0x7fff}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x930, 0x5}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x6, 0x8}}]}]}]}, 0x25c}, 0x1, 0x0, 0x0, 0x11}, 0x4c089) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r7, 0x40189429, &(0x7f0000000480)={0x1, 0x4, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r10, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x45, 0xfc, 0x6}, {0x6}]}, 0x10) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x2, 0x3, &(0x7f0000000000)=@framed={{0x18, 0xf}}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) socket$inet6_sctp(0xa, 0x801, 0x84) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) r11 = socket$igmp(0x2, 0x3, 0x2) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@private1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) ioctl$TUNSETOWNER(r3, 0x400454cc, r12) setsockopt$MRT_INIT(r11, 0x0, 0xc8, &(0x7f0000000040), 0x4) setsockopt$MRT_ADD_VIF(r11, 0x0, 0xca, &(0x7f0000000100)={0x0, 0x1, 0x0, 0x0, @vifc_lcl_addr=@dev={0xac, 0x14, 0x14, 0xb}, @multicast1}, 0x10) [ 678.484958][T22560] RSP: 002b:00007f1567314f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 678.493424][T22560] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007f1567f53ecf [ 678.501436][T22560] RDX: 0000000000100000 RSI: 00007f155eef5000 RDI: 0000000000000005 [ 678.509460][T22560] RBP: 00007f155eef5000 R08: 0000000000000000 R09: 0000000000000534 [ 678.517514][T22560] R10: 0000000000100000 R11: 0000000000000293 R12: 0000000000000000 [ 678.525517][T22560] R13: 00007f1567314fdc R14: 00007f1567314fe0 R15: 0000000020000fc2 [ 678.533601][T22560] 07:23:11 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) (fail_nth: 82) [ 678.557685][T22565] netlink: 'syz-executor.1': attribute type 6 has an invalid length. [ 678.561724][T22560] loop3: detected capacity change from 0 to 2048 [ 678.588262][T22560] FAT-fs (loop3): Unrecognized mount option "ÿÿÿÿÿÿÿÿ184467440737095516150xffffffffffffffff" or missing value [ 678.599354][T22570] FAULT_INJECTION: forcing a failure. [ 678.599354][T22570] name failslab, interval 1, probability 0, space 0, times 0 [ 678.612629][T22570] CPU: 0 PID: 22570 Comm: syz-executor.2 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 678.623064][T22570] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 678.633192][T22570] Call Trace: [ 678.636579][T22570] [ 678.639522][T22570] dump_stack_lvl+0xda/0x130 [ 678.644150][T22570] dump_stack+0x15/0x20 [ 678.648375][T22570] should_fail_ex+0x21f/0x230 [ 678.653142][T22570] __should_failslab+0x92/0xa0 [ 678.657944][T22570] should_failslab+0x9/0x20 [ 678.662482][T22570] slab_pre_alloc_hook+0x38/0x180 [ 678.667575][T22570] __kmem_cache_alloc_node+0x46/0x250 [ 678.673082][T22570] ? sctp_add_bind_addr+0x6f/0x1e0 [ 678.678296][T22570] kmalloc_trace+0x2a/0xa0 [ 678.682747][T22570] sctp_add_bind_addr+0x6f/0x1e0 [ 678.687786][T22570] sctp_copy_local_addr_list+0x19b/0x220 [ 678.693591][T22570] sctp_copy_one_addr+0x7d/0x400 [ 678.698560][T22570] sctp_bind_addr_copy+0x81/0x2b0 [ 678.703644][T22570] sctp_assoc_set_bind_addr_from_ep+0xc0/0xd0 [ 678.709839][T22570] sctp_connect_new_asoc+0x1cb/0x3a0 [ 678.715176][T22570] sctp_sendmsg+0xefc/0x1900 [ 678.719804][T22570] inet_sendmsg+0x63/0x80 [ 678.724176][T22570] __sys_sendto+0x246/0x300 [ 678.726652][T22567] netlink: 'syz-executor.5': attribute type 6 has an invalid length. [ 678.728743][T22570] __x64_sys_sendto+0x78/0x90 [ 678.741547][T22570] do_syscall_64+0x41/0xc0 [ 678.746023][T22570] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 678.748292][T22573] loop0: detected capacity change from 0 to 2048 [ 678.752031][T22570] RIP: 0033:0x7f9293ef6149 [ 678.752053][T22570] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 678.763118][T22567] (unnamed net_device) (uninitialized): option use_carrier: invalid value (6) [ 678.782430][T22570] RSP: 002b:00007f9293269168 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 678.782460][T22570] RAX: ffffffffffffffda RBX: 00007f9294015f80 RCX: 00007f9293ef6149 07:23:11 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0x7000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) 07:23:11 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) (fail_nth: 83) [ 678.782475][T22570] RDX: 000000000001a000 RSI: 0000000020000000 RDI: 0000000000000004 [ 678.782490][T22570] RBP: 00007f92932691d0 R08: 0000000020000080 R09: 000000000000001c [ 678.782505][T22570] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 678.782520][T22570] R13: 00007ffdbda7c2df R14: 00007f9293269300 R15: 0000000000022000 [ 678.782539][T22570] [ 678.785458][T22575] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=22575 comm=syz-executor.5 07:23:11 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0x8000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) 07:23:11 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, 0x0) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$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") (fail_nth: 42) [ 678.857291][T22573] FAT-fs (loop0): Unrecognized mount option "ÿÿÿÿÿÿÿÿ184467440737095516150xffffffffffffffff" or missing value [ 678.861009][T22567] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=61 sclass=netlink_route_socket pid=22567 comm=syz-executor.5 [ 678.890373][T22567] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 678.971085][T22587] FAULT_INJECTION: forcing a failure. [ 678.971085][T22587] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 678.984472][T22587] CPU: 1 PID: 22587 Comm: syz-executor.3 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 678.994919][T22587] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 679.005019][T22587] Call Trace: [ 679.007160][T22588] FAULT_INJECTION: forcing a failure. [ 679.007160][T22588] name failslab, interval 1, probability 0, space 0, times 0 [ 679.008300][T22587] [ 679.008310][T22587] dump_stack_lvl+0xda/0x130 [ 679.028493][T22587] dump_stack+0x15/0x20 [ 679.032739][T22587] should_fail_ex+0x21f/0x230 [ 679.037461][T22587] __alloc_pages+0x108/0x340 [ 679.042125][T22587] vma_alloc_folio+0x6a3/0x8c0 [ 679.046907][T22587] ? __vm_enough_memory+0xdf/0x2a0 [ 679.052113][T22587] shmem_get_folio_gfp+0x801/0x1200 [ 679.057328][T22587] shmem_write_begin+0xa6/0x1d0 [ 679.062305][T22587] generic_perform_write+0x1c3/0x3d0 [ 679.067687][T22587] ? shmem_write_begin+0x1d0/0x1d0 [ 679.072836][T22587] __generic_file_write_iter+0xe6/0x290 [ 679.078498][T22587] generic_file_write_iter+0x7d/0x1c0 [ 679.083931][T22587] vfs_write+0x47b/0x780 [ 679.088188][T22587] ksys_write+0xeb/0x1a0 [ 679.092444][T22587] __x64_sys_write+0x42/0x50 [ 679.097043][T22587] do_syscall_64+0x41/0xc0 [ 679.101497][T22587] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 679.107413][T22587] RIP: 0033:0x7f1567f53ecf [ 679.111831][T22587] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 679.131541][T22587] RSP: 002b:00007f1567314f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 679.140165][T22587] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007f1567f53ecf [ 679.150065][T22587] RDX: 0000000000100000 RSI: 00007f155eef5000 RDI: 0000000000000005 [ 679.158043][T22587] RBP: 00007f155eef5000 R08: 0000000000000000 R09: 0000000000000534 07:23:11 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0x9000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) 07:23:11 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) r2 = open(&(0x7f0000000040)='./file0\x00', 0x161842, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'sit0\x00'}) r4 = syz_io_uring_setup(0x73d7, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000100)=0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r6, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x10001) r8 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x8010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(r5, 0x0, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x8) syz_io_uring_submit(0x0, r8, &(0x7f00000008c0)=@IORING_OP_OPENAT2={0x1c, 0x40, 0x0, 0xffffffffffffffff, &(0x7f0000000840)={0x4ae0e0, 0x2, 0x5}, &(0x7f0000000880)='./file0\x00', 0x18, 0x0, 0x12345}, 0xff) syz_io_uring_submit(r5, 0x0, &(0x7f0000002b40)=@IORING_OP_RECVMSG={0xa, 0x2b, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000002b00)={0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/28, 0x1c}, {&(0x7f0000001540)=""/4096, 0x1000}, {&(0x7f0000002540)=""/131, 0x83}, {&(0x7f0000002600)=""/102, 0x66}, {&(0x7f0000002840)=""/203, 0xcb}], 0x6}, 0x0, 0x10040, 0x1, {0x1}}, 0x0) ftruncate(r2, 0x200002) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x200000e, 0x12, r3, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) r10 = creat(&(0x7f0000000180)='./file0\x00', 0x0) fallocate(r10, 0x0, 0x0, 0x2000402) fallocate(r9, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r9, 0xc028660f, &(0x7f0000001380)={0xc, r10, 0x9}) [ 679.166069][T22587] R10: 0000000000100000 R11: 0000000000000293 R12: 0000000000000000 [ 679.174060][T22587] R13: 00007f1567314fdc R14: 00007f1567314fe0 R15: 0000000020000fc2 [ 679.182076][T22587] [ 679.185107][T22588] CPU: 0 PID: 22588 Comm: syz-executor.2 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 679.195562][T22588] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 679.205659][T22588] Call Trace: [ 679.208977][T22588] [ 679.212014][T22588] dump_stack_lvl+0xda/0x130 [ 679.216645][T22588] dump_stack+0x15/0x20 07:23:11 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, 0x0) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$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") (fail_nth: 43) [ 679.220901][T22588] should_fail_ex+0x21f/0x230 [ 679.225671][T22588] __should_failslab+0x92/0xa0 [ 679.230799][T22588] should_failslab+0x9/0x20 [ 679.235366][T22588] slab_pre_alloc_hook+0x38/0x180 [ 679.240474][T22588] __kmem_cache_alloc_node+0x46/0x250 [ 679.245947][T22588] ? sctp_add_bind_addr+0x6f/0x1e0 [ 679.251103][T22588] kmalloc_trace+0x2a/0xa0 [ 679.255722][T22588] sctp_add_bind_addr+0x6f/0x1e0 [ 679.260710][T22588] sctp_copy_local_addr_list+0x19b/0x220 [ 679.266385][T22588] sctp_copy_one_addr+0x7d/0x400 [ 679.267757][T22594] FAULT_INJECTION: forcing a failure. [ 679.267757][T22594] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 679.271344][T22588] sctp_bind_addr_copy+0x81/0x2b0 [ 679.271379][T22588] sctp_assoc_set_bind_addr_from_ep+0xc0/0xd0 [ 679.295684][T22588] sctp_connect_new_asoc+0x1cb/0x3a0 [ 679.301071][T22588] sctp_sendmsg+0xefc/0x1900 [ 679.305774][T22588] inet_sendmsg+0x63/0x80 [ 679.310116][T22588] __sys_sendto+0x246/0x300 [ 679.314633][T22588] __x64_sys_sendto+0x78/0x90 [ 679.319316][T22588] do_syscall_64+0x41/0xc0 [ 679.323797][T22588] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 679.329840][T22588] RIP: 0033:0x7f9293ef6149 [ 679.334264][T22588] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 679.353898][T22588] RSP: 002b:00007f9293269168 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 679.362325][T22588] RAX: ffffffffffffffda RBX: 00007f9294015f80 RCX: 00007f9293ef6149 [ 679.370304][T22588] RDX: 000000000001a000 RSI: 0000000020000000 RDI: 0000000000000004 [ 679.378284][T22588] RBP: 00007f92932691d0 R08: 0000000020000080 R09: 000000000000001c [ 679.386271][T22588] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 679.394248][T22588] R13: 00007ffdbda7c2df R14: 00007f9293269300 R15: 0000000000022000 [ 679.402231][T22588] [ 679.405268][T22594] CPU: 1 PID: 22594 Comm: syz-executor.3 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 679.415835][T22594] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 679.426007][T22594] Call Trace: [ 679.429356][T22594] [ 679.432351][T22594] dump_stack_lvl+0xda/0x130 [ 679.436973][T22594] dump_stack+0x15/0x20 [ 679.441161][T22594] should_fail_ex+0x21f/0x230 [ 679.445995][T22594] __alloc_pages+0x108/0x340 [ 679.450653][T22594] vma_alloc_folio+0x6a3/0x8c0 [ 679.455498][T22594] ? __vm_enough_memory+0xdf/0x2a0 [ 679.460642][T22594] shmem_get_folio_gfp+0x801/0x1200 [ 679.465891][T22594] shmem_write_begin+0xa6/0x1d0 [ 679.470805][T22594] generic_perform_write+0x1c3/0x3d0 [ 679.476208][T22594] ? shmem_write_begin+0x1d0/0x1d0 [ 679.481420][T22594] __generic_file_write_iter+0xe6/0x290 [ 679.487093][T22594] generic_file_write_iter+0x7d/0x1c0 [ 679.492509][T22594] vfs_write+0x47b/0x780 [ 679.496847][T22594] ksys_write+0xeb/0x1a0 [ 679.501121][T22594] __x64_sys_write+0x42/0x50 [ 679.505858][T22594] do_syscall_64+0x41/0xc0 [ 679.510326][T22594] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 679.516258][T22594] RIP: 0033:0x7f1567f53ecf [ 679.520715][T22594] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 679.540479][T22594] RSP: 002b:00007f1567314f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 679.548925][T22594] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007f1567f53ecf [ 679.556923][T22594] RDX: 0000000000100000 RSI: 00007f155eef5000 RDI: 0000000000000005 [ 679.565007][T22594] RBP: 00007f155eef5000 R08: 0000000000000000 R09: 0000000000000534 07:23:12 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a0000001900", 0x6) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000380)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000008c0)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000001cc0)={{}, r2, 0x16, @inherit={0x88, &(0x7f0000001580)=ANY=[@ANYRES16=r3]}, @devid}) r4 = syz_open_dev$MSR(&(0x7f0000000140), 0x100000000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r4, 0x84009422, &(0x7f0000000ec0)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(r6, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000001840)=ANY=[@ANYRES32=r5, @ANYRES32=r3, @ANYRESOCT, @ANYRES32=r1, @ANYRES32, @ANYRES64, @ANYRESHEX], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x40025) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f0000001500)={r5, "2ce8b7e675c30c143ac940d229ad3592"}) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$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") r7 = socket$inet_udplite(0x2, 0x2, 0x88) read(r7, &(0x7f00000000c0)=""/43, 0x2b) 07:23:12 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) (fail_nth: 84) 07:23:12 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0xa000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) [ 679.573013][T22594] R10: 0000000000100000 R11: 0000000000000293 R12: 0000000000000000 [ 679.581013][T22594] R13: 00007f1567314fdc R14: 00007f1567314fe0 R15: 0000000020000fc2 [ 679.589053][T22594] [ 679.610254][T22600] FAULT_INJECTION: forcing a failure. [ 679.610254][T22600] name failslab, interval 1, probability 0, space 0, times 0 [ 679.623692][T22600] CPU: 0 PID: 22600 Comm: syz-executor.2 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 679.634136][T22600] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 679.644213][T22600] Call Trace: [ 679.647511][T22600] [ 679.650457][T22600] dump_stack_lvl+0xda/0x130 [ 679.655161][T22600] dump_stack+0x15/0x20 [ 679.659366][T22600] should_fail_ex+0x21f/0x230 [ 679.664146][T22600] __should_failslab+0x92/0xa0 [ 679.668960][T22600] should_failslab+0x9/0x20 [ 679.673602][T22600] slab_pre_alloc_hook+0x38/0x180 [ 679.678774][T22600] __kmem_cache_alloc_node+0x46/0x250 [ 679.684210][T22600] ? sctp_add_bind_addr+0x6f/0x1e0 [ 679.689408][T22600] kmalloc_trace+0x2a/0xa0 [ 679.693864][T22600] sctp_add_bind_addr+0x6f/0x1e0 [ 679.698880][T22600] sctp_copy_local_addr_list+0x19b/0x220 [ 679.704639][T22600] sctp_copy_one_addr+0x7d/0x400 [ 679.709642][T22600] sctp_bind_addr_copy+0x81/0x2b0 [ 679.714711][T22600] sctp_assoc_set_bind_addr_from_ep+0xc0/0xd0 [ 679.720827][T22600] sctp_connect_new_asoc+0x1cb/0x3a0 [ 679.726214][T22600] sctp_sendmsg+0xefc/0x1900 [ 679.730839][T22600] inet_sendmsg+0x63/0x80 [ 679.735191][T22600] __sys_sendto+0x246/0x300 [ 679.739791][T22600] __x64_sys_sendto+0x78/0x90 [ 679.744502][T22600] do_syscall_64+0x41/0xc0 [ 679.748942][T22600] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 679.754868][T22600] RIP: 0033:0x7f9293ef6149 [ 679.759314][T22600] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 679.779039][T22600] RSP: 002b:00007f9293269168 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 679.787546][T22600] RAX: ffffffffffffffda RBX: 00007f9294015f80 RCX: 00007f9293ef6149 [ 679.795546][T22600] RDX: 000000000001a000 RSI: 0000000020000000 RDI: 0000000000000004 [ 679.803545][T22600] RBP: 00007f92932691d0 R08: 0000000020000080 R09: 000000000000001c [ 679.811537][T22600] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 07:23:12 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, 0x0) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$eJzs1T9rE3EYB/AnaazRqbM4/MDFqVQ3JyOSQvFAUTLoZKBxyYmQWy6Z8hJ8Ab4wB1+EZMp2Ei5VWxSDNLnSfj7LPdz3ud+/g7v39z+OTz8VH75+/hLdXivavbjTXrbiINpxZh4AwHWyrKr4XtWaXgsAsBv+/wBw87x5++7Fsyzrv06pG7GYl4NyUF/r/Pgk6x+llf3fnlqU5WDvZ/4o1c7nt+LuOn/8x3w/Hj6o81X2/GV2Ib8dp1vfPQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA3GyHKXUiIqWUDn7dXZTlYK/OD9OZC3ldHZ9k/aN1w/m8E/c6O9sGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAcAmK6Ww8zPPR5JoVEd9ix5N210d6uSMv/tXTW097VU5+m8XTTZtfLatq05GfRMTWF9+KmK/eUvNnuGnR3DcJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABoVjGdjYd5PpoUTa8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALgqiulsPMzz0eS/i2jVI/29p+k9AgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAM34EQAA///P7Cnj") (fail_nth: 44) 07:23:12 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000002c0)={&(0x7f0000000c80)=ANY=[@ANYBLOB="0026bd7000ffdbdf25070000000c00068008000b00060000000c0008002302b41174de3f460a6d000000000000080003000380000008000300bd2c00ff07000400f8ffffff080003001dd30000080004006604000000000000000000"], 0x5c}, 0x1, 0x0, 0x0, 0x1884}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6, 0x6}]}}}]}, 0x3c}}, 0x0) r3 = openat(r2, &(0x7f00000000c0)='./file0\x00', 0x0, 0x31) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00./file0\x00']) connect$unix(r3, &(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000001c0), 0x200080, 0x0) ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f0000000200)={0x55, 0xb5f3, 0x2, 0x1, 0x6}) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000600)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000800)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x40}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) io_setup(0x6, &(0x7f00000003c0)=0x0) r7 = socket$phonet_pipe(0x23, 0x5, 0x2) io_submit(r6, 0x2, &(0x7f00000005c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, r7, &(0x7f00000001c0)='\"', 0x1}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r8, &(0x7f0000006440)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f0000000c40)={0x10, 0x1d, 0x20, 0x70bd28, 0x25dfdbfd}, 0x10}, {&(0x7f0000000f80)={0x20c, 0x3d, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x1f, 0x46, 0x0, 0x1, [@generic="6b23bda57b0fcd6882aea56d992b0de112a87c9689a0ce8f3a928a"]}, @generic="931dd380ae9b76725532f39b25791247f8e1faaa5606177d1141efdf8a23daecc73d0706f82254c664a01e4c4986b42b265e8e88f8f88e8099514ce917072d6e80996cbddc81dd1014a75c1cd2e0c084d7806b82c11b8a625557f25357333f879c7f3ea978d0c62492b2b2a3437425bf3933cf6d0456ae40263ff847b9956f9f56cd1e35dd616a0dffde59", @nested={0x14d, 0x46, 0x0, 0x1, [@typed={0x8, 0x8f, 0x0, 0x0, @u32=0x4}, @generic="3fe433e9f5d2f6047805d9eb39d59742ad46c8bd198fea6b4f77d0bf577f925374abd91b16efa9a31621d58f4b1ee788ba33ce3ae89358fcbecdc28e3a8775ee6c905d5275bf5f05ca6bfc68336199389a9644323a81d22c4bd081ec9c4826b7e965a5292167778eefb5edac3e1e0fd628684a30dbac663eb65de357a891a90855f356cbe26225342cce43c8e320a777c2a1f74ab97b7e442c94", @typed={0x8, 0x41, 0x0, 0x0, @ipv4=@multicast2}, @typed={0x8, 0x6b, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @generic="79c7219fa8393ab7671b616b9cea5f59e77de2a2ea4a268fcad39d31284ee1045f7dedc0dea487845188adde6fe70f5537a0635e01c2ec0a205c1f92c2272999ec8388f9a95b4d387581056e112c58f96f686734281b5a", @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@remote}, @generic="2d7a6c2813a21aa5bc78773404596de147d491e1868776a08d604bfb6aea387b585ce5b3f7ab336df3922c65"]}]}, 0x20c}, {&(0x7f0000000e00)={0x30, 0x12, 0x800, 0x70bd27, 0x25dfdbfc, "", [@typed={0x8, 0x5b, 0x0, 0x0, @pid}, @typed={0xf, 0x8c, 0x0, 0x0, @str='syzkaller1\x00'}, @typed={0x8, 0x7, 0x0, 0x0, @u32}]}, 0x30}, {&(0x7f0000000e40)={0xc8, 0x42, 0x10, 0x70bd26, 0x25dfdbff, "", [@generic="208cd2ae6be9be", @generic="c1d6c27da633daf115873b83c8913d284239d441678e667c20444d1a1f77f48ea7cbf783d84e79a9ebc262452149fe521b40868bf3938c61c8be3cdbd7429e623c99db5ae26d9cf24ee4ef4777ff0410e8b899b18e829f387d7926641f189d2b9697e099ffb7f20f691064b7d87d04cd2e230e8df8c77a2f1e4f4fabd49cfe414b3027dd850d9a2be9547ba5f2ed09811ea9ed9b201782165a792b57afca3e3d575d0f5b4b17a8", @typed={0x8, 0x94, 0x0, 0x0, @u32=0x1}]}, 0xc8}], 0x4, 0x0, 0x0, 0x8801}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, 0x0) sendmsg$nl_route(r8, &(0x7f0000000c00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000bc0)={&(0x7f00000011c0)=@dellink={0x25c, 0x11, 0x400, 0x70bd28, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, 0x1000}, [@IFLA_PROTO_DOWN={0x5}, @IFLA_IFNAME={0x14, 0x3, 'macvlan1\x00'}, @IFLA_MAP={0x24, 0xe, {0x9, 0xd2, 0x2e4d, 0x200, 0x3e, 0xff}}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x5}, @IFLA_IFALIAS={0x14, 0x14, 'syzkaller1\x00'}, @IFLA_MTU={0x8, 0x4, 0x101}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_VFINFO_LIST={0x1cc, 0x16, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x8fe, 0xffff}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x5, 0x1}}]}, {0x84, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN_LIST={0x54, 0xc, 0x0, 0x1, [{0x14, 0x1, {0xb5d3, 0xadc, 0x100, 0xd1c53560eb87a9fa}}, {0x14, 0x1, {0x4, 0xb6, 0x81, 0x8100}}, {0x14, 0x1, {0x0, 0x6e4, 0x1, 0x88a8}}, {0x14, 0x1, {0x14, 0xaed, 0x0, 0x8100}}]}, @IFLA_VF_TX_RATE={0xc, 0x3, {0x1000, 0x200}}, @IFLA_VF_TRUST={0xc, 0x9, {0x7, 0x800}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x8000, 0x1}}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x7f, 0x7fff}}, @IFLA_VF_TRUST={0xc, 0x9, {0x7ff, 0x8}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_RATE={0x10, 0x6, {0x9, 0x5, 0x5}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x9}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x80000000, 0x3}}]}, {0xa4, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0xfff, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1d}}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x3f, 0x43}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x65c, 0x1}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x2, 0x80000001}}, @IFLA_VF_VLAN_LIST={0x40, 0xc, 0x0, 0x1, [{0x14, 0x1, {0xcae8, 0x919, 0x9, 0x8100}}, {0x14, 0x1, {0x200, 0xb47, 0xaaa, 0x8100}}, {0x14, 0x1, {0x5, 0x53b, 0xfffffff7, 0x88a8}}]}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x3f, 0x7fff}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x930, 0x5}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x6, 0x8}}]}]}]}, 0x25c}, 0x1, 0x0, 0x0, 0x11}, 0x4c089) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r7, 0x40189429, &(0x7f0000000480)={0x1, 0x4, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r9, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x45, 0xfc, 0x6}, {0x6}]}, 0x10) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r9) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x2, 0x3, &(0x7f0000000000)=@framed={{0x18, 0xf}}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) socket$inet6_sctp(0xa, 0x801, 0x84) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) r10 = socket$igmp(0x2, 0x3, 0x2) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@private1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) ioctl$TUNSETOWNER(r3, 0x400454cc, r11) setsockopt$MRT_INIT(r10, 0x0, 0xc8, &(0x7f0000000040), 0x4) setsockopt$MRT_ADD_VIF(r10, 0x0, 0xca, &(0x7f0000000100)={0x0, 0x1, 0x0, 0x0, @vifc_lcl_addr=@dev={0xac, 0x14, 0x14, 0xb}, @multicast1}, 0x10) 07:23:12 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0xb000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) 07:23:12 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) (fail_nth: 85) [ 679.819538][T22600] R13: 00007ffdbda7c2df R14: 00007f9293269300 R15: 0000000000022000 [ 679.827541][T22600] [ 679.878294][T22608] FAULT_INJECTION: forcing a failure. [ 679.878294][T22608] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 679.892241][T22608] CPU: 0 PID: 22608 Comm: syz-executor.3 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 679.902690][T22608] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 679.904627][T22615] FAULT_INJECTION: forcing a failure. [ 679.904627][T22615] name failslab, interval 1, probability 0, space 0, times 0 [ 679.912742][T22608] Call Trace: [ 679.912752][T22608] [ 679.912761][T22608] dump_stack_lvl+0xda/0x130 [ 679.936292][T22608] dump_stack+0x15/0x20 [ 679.940505][T22608] should_fail_ex+0x21f/0x230 [ 679.945321][T22608] __alloc_pages+0x108/0x340 [ 679.949973][T22608] vma_alloc_folio+0x6a3/0x8c0 [ 679.954760][T22608] ? __vm_enough_memory+0xdf/0x2a0 [ 679.959986][T22608] shmem_get_folio_gfp+0x801/0x1200 [ 679.965203][T22608] shmem_write_begin+0xa6/0x1d0 [ 679.970067][T22608] generic_perform_write+0x1c3/0x3d0 [ 679.975368][T22608] ? shmem_write_begin+0x1d0/0x1d0 [ 679.980496][T22608] __generic_file_write_iter+0xe6/0x290 [ 679.986091][T22608] generic_file_write_iter+0x7d/0x1c0 [ 679.991482][T22608] vfs_write+0x47b/0x780 [ 679.995735][T22608] ksys_write+0xeb/0x1a0 [ 679.999990][T22608] __x64_sys_write+0x42/0x50 [ 680.004693][T22608] do_syscall_64+0x41/0xc0 [ 680.009123][T22608] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 680.015030][T22608] RIP: 0033:0x7f1567f53ecf [ 680.019469][T22608] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 680.039602][T22608] RSP: 002b:00007f1567314f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 680.048037][T22608] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007f1567f53ecf [ 680.056040][T22608] RDX: 0000000000100000 RSI: 00007f155eef5000 RDI: 0000000000000005 [ 680.064040][T22608] RBP: 00007f155eef5000 R08: 0000000000000000 R09: 0000000000000534 [ 680.072020][T22608] R10: 0000000000100000 R11: 0000000000000293 R12: 0000000000000000 [ 680.080005][T22608] R13: 00007f1567314fdc R14: 00007f1567314fe0 R15: 0000000020000fc2 [ 680.087991][T22608] [ 680.091018][T22615] CPU: 1 PID: 22615 Comm: syz-executor.2 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 680.101533][T22615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 680.111787][T22615] Call Trace: [ 680.115101][T22615] [ 680.118042][T22615] dump_stack_lvl+0xda/0x130 [ 680.122733][T22615] dump_stack+0x15/0x20 [ 680.126927][T22615] should_fail_ex+0x21f/0x230 [ 680.131659][T22615] __should_failslab+0x92/0xa0 [ 680.136479][T22615] should_failslab+0x9/0x20 [ 680.141012][T22615] slab_pre_alloc_hook+0x38/0x180 [ 680.146080][T22615] __kmem_cache_alloc_node+0x46/0x250 [ 680.151569][T22615] ? sctp_v4_cmp_addr+0x44/0xb0 [ 680.156477][T22615] ? sctp_add_bind_addr+0x6f/0x1e0 [ 680.161668][T22615] kmalloc_trace+0x2a/0xa0 [ 680.166114][T22615] sctp_add_bind_addr+0x6f/0x1e0 [ 680.171133][T22615] sctp_copy_local_addr_list+0x19b/0x220 [ 680.176843][T22615] sctp_copy_one_addr+0x7d/0x400 [ 680.180992][T22612] (unnamed net_device) (uninitialized): option use_carrier: invalid value (6) [ 680.181799][T22615] sctp_bind_addr_copy+0x81/0x2b0 [ 680.195764][T22615] sctp_assoc_set_bind_addr_from_ep+0xc0/0xd0 [ 680.202047][T22615] sctp_connect_new_asoc+0x1cb/0x3a0 [ 680.207396][T22615] sctp_sendmsg+0xefc/0x1900 [ 680.212025][T22615] inet_sendmsg+0x63/0x80 [ 680.215485][T22612] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=22612 comm=syz-executor.5 07:23:12 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) r2 = open(&(0x7f0000000040)='./file0\x00', 0x161842, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'sit0\x00'}) r4 = syz_io_uring_setup(0x73d7, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000100)=0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r6, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x10001) r8 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x8010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(r5, 0x0, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x8) syz_io_uring_submit(0x0, r8, &(0x7f00000008c0)=@IORING_OP_OPENAT2={0x1c, 0x40, 0x0, 0xffffffffffffffff, &(0x7f0000000840)={0x4ae0e0, 0x2, 0x5}, &(0x7f0000000880)='./file0\x00', 0x18, 0x0, 0x12345}, 0xff) syz_io_uring_submit(r5, 0x0, &(0x7f0000002b40)=@IORING_OP_RECVMSG={0xa, 0x2b, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000002b00)={0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/28, 0x1c}, {&(0x7f0000001540)=""/4096, 0x1000}, {&(0x7f0000002540)=""/131, 0x83}, {&(0x7f0000002600)=""/102, 0x66}, {&(0x7f0000002840)=""/203, 0xcb}], 0x6}, 0x0, 0x10040, 0x1, {0x1}}, 0x0) ftruncate(r2, 0x200002) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x200000e, 0x12, r3, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) r10 = creat(&(0x7f0000000180)='./file0\x00', 0x0) fallocate(r10, 0x0, 0x0, 0x2000402) fallocate(r9, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r9, 0xc028660f, &(0x7f0000001380)={0xc, r10, 0xa}) 07:23:12 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0xc000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) 07:23:12 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, 0x0) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$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") (fail_nth: 45) [ 680.216465][T22615] __sys_sendto+0x246/0x300 [ 680.216502][T22615] __x64_sys_sendto+0x78/0x90 [ 680.216528][T22615] do_syscall_64+0x41/0xc0 [ 680.243051][T22615] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 680.249015][T22615] RIP: 0033:0x7f9293ef6149 [ 680.253482][T22615] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 680.258146][T22603] loop0: detected capacity change from 0 to 2048 [ 680.273098][T22615] RSP: 002b:00007f9293269168 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 680.273136][T22615] RAX: ffffffffffffffda RBX: 00007f9294015f80 RCX: 00007f9293ef6149 [ 680.273153][T22615] RDX: 000000000001a000 RSI: 0000000020000000 RDI: 0000000000000004 [ 680.273209][T22615] RBP: 00007f92932691d0 R08: 0000000020000080 R09: 000000000000001c [ 680.273285][T22615] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 680.273297][T22615] R13: 00007ffdbda7c2df R14: 00007f9293269300 R15: 0000000000022000 [ 680.273316][T22615] [ 680.284808][T22623] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=61 sclass=netlink_route_socket pid=22623 comm=syz-executor.5 [ 680.292931][T22603] FAT-fs (loop0): Unrecognized mount option "ÿÿÿÿÿÿÿÿ184467440737095516150xffffffffffffffff" or missing value [ 680.319008][T22622] FAULT_INJECTION: forcing a failure. [ 680.319008][T22622] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 680.353303][T22628] FAULT_INJECTION: forcing a failure. [ 680.353303][T22628] name failslab, interval 1, probability 0, space 0, times 0 [ 680.357201][T22622] CPU: 1 PID: 22622 Comm: syz-executor.3 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 680.357232][T22622] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 680.357248][T22622] Call Trace: [ 680.357255][T22622] [ 680.357267][T22622] dump_stack_lvl+0xda/0x130 [ 680.357299][T22622] dump_stack+0x15/0x20 [ 680.357406][T22622] should_fail_ex+0x21f/0x230 [ 680.357451][T22622] should_fail+0xb/0x10 [ 680.357487][T22622] should_fail_usercopy+0x1a/0x20 [ 680.357528][T22622] copy_page_from_iter_atomic+0x22d/0xcf0 [ 680.357596][T22622] ? folio_test_hugetlb+0x3a/0x70 [ 680.357630][T22622] ? shmem_write_begin+0x12a/0x1d0 [ 680.357664][T22622] generic_perform_write+0x203/0x3d0 [ 680.357695][T22622] ? shmem_write_begin+0x1d0/0x1d0 [ 680.357731][T22622] __generic_file_write_iter+0xe6/0x290 [ 680.357768][T22622] generic_file_write_iter+0x7d/0x1c0 [ 680.357808][T22622] vfs_write+0x47b/0x780 [ 680.357834][T22622] ksys_write+0xeb/0x1a0 [ 680.357887][T22622] __x64_sys_write+0x42/0x50 [ 680.357928][T22622] do_syscall_64+0x41/0xc0 [ 680.487729][T22622] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 680.493699][T22622] RIP: 0033:0x7f1567f53ecf [ 680.498116][T22622] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 680.517733][T22622] RSP: 002b:00007f1567314f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 07:23:12 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) (fail_nth: 86) [ 680.526151][T22622] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007f1567f53ecf [ 680.534290][T22622] RDX: 0000000000100000 RSI: 00007f155eef5000 RDI: 0000000000000005 [ 680.542384][T22622] RBP: 00007f155eef5000 R08: 0000000000000000 R09: 0000000000000534 [ 680.550364][T22622] R10: 0000000000100000 R11: 0000000000000293 R12: 0000000000000000 [ 680.558347][T22622] R13: 00007f1567314fdc R14: 00007f1567314fe0 R15: 0000000020000fc2 [ 680.566334][T22622] [ 680.569428][T22628] CPU: 0 PID: 22628 Comm: syz-executor.2 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 680.579880][T22628] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 680.588923][T22622] loop3: detected capacity change from 0 to 2048 [ 680.589958][T22628] Call Trace: [ 680.589966][T22628] [ 680.589974][T22628] dump_stack_lvl+0xda/0x130 [ 680.597741][T22622] FAT-fs (loop3): Unrecognized mount option "ÿÿÿÿÿÿÿÿ184467440737095516150xffffffffffffffff" or missing value [ 680.599556][T22628] dump_stack+0x15/0x20 [ 680.599586][T22628] should_fail_ex+0x21f/0x230 [ 680.603949][T22629] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 680.607127][T22628] __should_failslab+0x92/0xa0 [ 680.641607][T22628] should_failslab+0x9/0x20 [ 680.646197][T22628] slab_pre_alloc_hook+0x38/0x180 [ 680.651267][T22628] __kmem_cache_alloc_node+0x46/0x250 [ 680.656696][T22628] ? sctp_add_bind_addr+0x6f/0x1e0 [ 680.661897][T22628] kmalloc_trace+0x2a/0xa0 [ 680.666379][T22628] sctp_add_bind_addr+0x6f/0x1e0 [ 680.671352][T22628] sctp_copy_local_addr_list+0x19b/0x220 [ 680.677024][T22628] sctp_copy_one_addr+0x7d/0x400 [ 680.681998][T22628] sctp_bind_addr_copy+0x81/0x2b0 [ 680.687056][T22628] sctp_assoc_set_bind_addr_from_ep+0xc0/0xd0 [ 680.693223][T22628] sctp_connect_new_asoc+0x1cb/0x3a0 [ 680.698614][T22628] sctp_sendmsg+0xefc/0x1900 [ 680.703345][T22628] inet_sendmsg+0x63/0x80 [ 680.707728][T22628] __sys_sendto+0x246/0x300 [ 680.712271][T22628] __x64_sys_sendto+0x78/0x90 [ 680.716969][T22628] do_syscall_64+0x41/0xc0 [ 680.721466][T22628] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 680.727412][T22628] RIP: 0033:0x7f9293ef6149 [ 680.731849][T22628] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 680.751485][T22628] RSP: 002b:00007f9293269168 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 680.759997][T22628] RAX: ffffffffffffffda RBX: 00007f9294015f80 RCX: 00007f9293ef6149 [ 680.767988][T22628] RDX: 000000000001a000 RSI: 0000000020000000 RDI: 0000000000000004 07:23:13 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0xd000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) [ 680.775998][T22628] RBP: 00007f92932691d0 R08: 0000000020000080 R09: 000000000000001c [ 680.784012][T22628] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 680.792038][T22628] R13: 00007ffdbda7c2df R14: 00007f9293269300 R15: 0000000000022000 [ 680.800132][T22628] 07:23:13 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a0000001900", 0x6) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000380)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000008c0)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000001cc0)={{}, r2, 0x16, @inherit={0x88, &(0x7f0000001580)=ANY=[@ANYRES16=r3]}, @devid}) r4 = syz_open_dev$MSR(&(0x7f0000000140), 0x100000000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r4, 0x84009422, &(0x7f0000000ec0)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(r6, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000001840)=ANY=[@ANYRES32=r5, @ANYRES32=r3, @ANYRESOCT, @ANYRES32=r1, @ANYRES32, @ANYRES64, @ANYRESHEX], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x40025) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f0000001500)={r5, "2ce8b7e675c30c143ac940d229ad3592"}) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$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") r7 = socket$inet_udplite(0x2, 0x2, 0x88) read(r7, &(0x7f00000000c0)=""/43, 0x2b) 07:23:13 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) (fail_nth: 87) 07:23:13 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, 0x0) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$eJzs1T9rE3EYB/AnaazRqbM4/MDFqVQ3JyOSQvFAUTLoZKBxyYmQWy6Z8hJ8Ab4wB1+EZMp2Ei5VWxSDNLnSfj7LPdz3ud+/g7v39z+OTz8VH75+/hLdXivavbjTXrbiINpxZh4AwHWyrKr4XtWaXgsAsBv+/wBw87x5++7Fsyzrv06pG7GYl4NyUF/r/Pgk6x+llf3fnlqU5WDvZ/4o1c7nt+LuOn/8x3w/Hj6o81X2/GV2Ib8dp1vfPQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA3GyHKXUiIqWUDn7dXZTlYK/OD9OZC3ldHZ9k/aN1w/m8E/c6O9sGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAcAmK6Ww8zPPR5JoVEd9ix5N210d6uSMv/tXTW097VU5+m8XTTZtfLatq05GfRMTWF9+KmK/eUvNnuGnR3DcJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABoVjGdjYd5PpoUTa8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALgqiulsPMzz0eS/i2jVI/29p+k9AgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAM34EQAA///P7Cnj") (fail_nth: 46) 07:23:13 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0xe000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) 07:23:13 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000002c0)={&(0x7f0000000c80)=ANY=[@ANYBLOB="0026bd7000ffdbdf25070000000c00068008000b00060000000c0008002302b41174de3f460a6d000000000000080003000380000008000300bd2c00ff07000400f8ffffff080003001dd30000080004006604000000000000000000"], 0x5c}, 0x1, 0x0, 0x0, 0x1884}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6, 0x6}]}}}]}, 0x3c}}, 0x0) r3 = openat(r2, &(0x7f00000000c0)='./file0\x00', 0x0, 0x31) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000680)=ANY=[@ANYBLOB="4afe65cd9f4cb96af18454a88fa8005c9fe248c0144c45e701002b7127b6679c7a64908ce701f270818888d4368d79057ee5e41b0efaa601fc1a8488a8a24cb9d947491b1bc7983e1710bb3ccc29e6d4ed4df77669e40bbfa802c600208e53ee50e98ab2cb4f50d11a9cdddd9320a5d8171c0f0c108488d0b23be195b12fc7ed967f99e71ff165310bc20d027160e20e87088c6f48a6c7210431c5a6578b11b646347984f92bc092089c964bd360a4e0b124bec92bf620edc72693f0e78f12e205659005168a8e2f60f18bcecd57f49295bfe6ca9c894f4d75798ae81020f3ff3f9d2aeb8740d2ec38db6c068f60e10f6f06172fb698e28d2dcc7deed28eee05874cc59a89b771e167c0d3da3789a3acd1af0cc89d9ff46e329a00f6d1a28794c3b3db7752189c1853e53b0aa840b887618d3d9b6038fc37865fa39328a439819e25692b3efee7a80b609f2ba10030f51469aa05f966b72dedf8991f0d", @ANYRES32=r0, @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00./file0\x00']) connect$unix(r3, &(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000001c0), 0x200080, 0x0) ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f0000000200)={0x55, 0xb5f3, 0x2, 0x1, 0x6}) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000600)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000800)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000827bd7000fcdbdf25030000000800030020000000050006000e000000040004000500050005000000050005000400000005000600ce00000093f1f198073347359701e9597001ab47a31266da6f292f3671200e551bf08293991a41b55e1b9b3e4e1cf47f9dda9123f38125ba19ef0fdf18ba4ec07cdf24e0153a49e9f9fdf291d868e4e75bb04ccb8ff4e20009f1e6265a9ae5d70e64fcedc9de8942e7b7ca009d98ff7c74a175dd80bfc0e6439cda7cd74b6966033d471542563f1c2ed3dd2fcaee81ecb7be444fbd4a54de26db239a7bb4696daed479759c14105df0b8db2481d840e28c6ed40143c2af3c6f04f17a24ee4c22358fce05"], 0x40}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) io_setup(0x6, &(0x7f00000003c0)=0x0) r7 = socket$phonet_pipe(0x23, 0x5, 0x2) io_submit(r6, 0x2, &(0x7f00000005c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, r7, &(0x7f00000001c0)='\"', 0x1}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r8, &(0x7f0000006440)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f0000000c40)={0x10, 0x1d, 0x20, 0x70bd28, 0x25dfdbfd}, 0x10}, {&(0x7f0000000f80)={0x20c, 0x3d, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x1f, 0x46, 0x0, 0x1, [@generic="6b23bda57b0fcd6882aea56d992b0de112a87c9689a0ce8f3a928a"]}, @generic="931dd380ae9b76725532f39b25791247f8e1faaa5606177d1141efdf8a23daecc73d0706f82254c664a01e4c4986b42b265e8e88f8f88e8099514ce917072d6e80996cbddc81dd1014a75c1cd2e0c084d7806b82c11b8a625557f25357333f879c7f3ea978d0c62492b2b2a3437425bf3933cf6d0456ae40263ff847b9956f9f56cd1e35dd616a0dffde59", @nested={0x14d, 0x46, 0x0, 0x1, [@typed={0x8, 0x8f, 0x0, 0x0, @u32=0x4}, @generic="3fe433e9f5d2f6047805d9eb39d59742ad46c8bd198fea6b4f77d0bf577f925374abd91b16efa9a31621d58f4b1ee788ba33ce3ae89358fcbecdc28e3a8775ee6c905d5275bf5f05ca6bfc68336199389a9644323a81d22c4bd081ec9c4826b7e965a5292167778eefb5edac3e1e0fd628684a30dbac663eb65de357a891a90855f356cbe26225342cce43c8e320a777c2a1f74ab97b7e442c94", @typed={0x8, 0x41, 0x0, 0x0, @ipv4=@multicast2}, @typed={0x8, 0x6b, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @generic="79c7219fa8393ab7671b616b9cea5f59e77de2a2ea4a268fcad39d31284ee1045f7dedc0dea487845188adde6fe70f5537a0635e01c2ec0a205c1f92c2272999ec8388f9a95b4d387581056e112c58f96f686734281b5a", @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@remote}, @generic="2d7a6c2813a21aa5bc78773404596de147d491e1868776a08d604bfb6aea387b585ce5b3f7ab336df3922c65"]}]}, 0x20c}, {&(0x7f0000000e00)={0x30, 0x12, 0x800, 0x70bd27, 0x25dfdbfc, "", [@typed={0x8, 0x5b, 0x0, 0x0, @pid}, @typed={0xf, 0x8c, 0x0, 0x0, @str='syzkaller1\x00'}, @typed={0x8, 0x7, 0x0, 0x0, @u32}]}, 0x30}, {&(0x7f0000000e40)={0xc8, 0x42, 0x10, 0x70bd26, 0x25dfdbff, "", [@generic="208cd2ae6be9be", @generic="c1d6c27da633daf115873b83c8913d284239d441678e667c20444d1a1f77f48ea7cbf783d84e79a9ebc262452149fe521b40868bf3938c61c8be3cdbd7429e623c99db5ae26d9cf24ee4ef4777ff0410e8b899b18e829f387d7926641f189d2b9697e099ffb7f20f691064b7d87d04cd2e230e8df8c77a2f1e4f4fabd49cfe414b3027dd850d9a2be9547ba5f2ed09811ea9ed9b201782165a792b57afca3e3d575d0f5b4b17a8", @typed={0x8, 0x94, 0x0, 0x0, @u32=0x1}]}, 0xc8}], 0x4, 0x0, 0x0, 0x8801}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, 0x0) sendmsg$nl_route(r8, &(0x7f0000000c00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000bc0)={&(0x7f00000011c0)=@dellink={0x25c, 0x11, 0x400, 0x70bd28, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, 0x1000}, [@IFLA_PROTO_DOWN={0x5}, @IFLA_IFNAME={0x14, 0x3, 'macvlan1\x00'}, @IFLA_MAP={0x24, 0xe, {0x9, 0xd2, 0x2e4d, 0x200, 0x3e, 0xff}}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x5}, @IFLA_IFALIAS={0x14, 0x14, 'syzkaller1\x00'}, @IFLA_MTU={0x8, 0x4, 0x101}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_VFINFO_LIST={0x1cc, 0x16, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x8fe, 0xffff}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x5, 0x1}}]}, {0x84, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN_LIST={0x54, 0xc, 0x0, 0x1, [{0x14, 0x1, {0xb5d3, 0xadc, 0x100, 0xd1c53560eb87a9fa}}, {0x14, 0x1, {0x4, 0xb6, 0x81, 0x8100}}, {0x14, 0x1, {0x0, 0x6e4, 0x1, 0x88a8}}, {0x14, 0x1, {0x14, 0xaed, 0x0, 0x8100}}]}, @IFLA_VF_TX_RATE={0xc, 0x3, {0x1000, 0x200}}, @IFLA_VF_TRUST={0xc, 0x9, {0x7, 0x800}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x8000, 0x1}}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x7f, 0x7fff}}, @IFLA_VF_TRUST={0xc, 0x9, {0x7ff, 0x8}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_RATE={0x10, 0x6, {0x9, 0x5, 0x5}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x9}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x80000000, 0x3}}]}, {0xa4, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0xfff, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1d}}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x3f, 0x43}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x65c, 0x1}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x2, 0x80000001}}, @IFLA_VF_VLAN_LIST={0x40, 0xc, 0x0, 0x1, [{0x14, 0x1, {0xcae8, 0x919, 0x9, 0x8100}}, {0x14, 0x1, {0x200, 0xb47, 0xaaa, 0x8100}}, {0x14, 0x1, {0x5, 0x53b, 0xfffffff7, 0x88a8}}]}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x3f, 0x7fff}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x930, 0x5}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x6, 0x8}}]}]}]}, 0x25c}, 0x1, 0x0, 0x0, 0x11}, 0x4c089) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r7, 0x40189429, &(0x7f0000000480)={0x1, 0x4, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r9, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x45, 0xfc, 0x6}, {0x6}]}, 0x10) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r9) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x2, 0x3, &(0x7f0000000000)=@framed={{0x18, 0xf}}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) socket$inet6_sctp(0xa, 0x801, 0x84) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) r10 = socket$igmp(0x2, 0x3, 0x2) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@private1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) ioctl$TUNSETOWNER(r3, 0x400454cc, r11) setsockopt$MRT_INIT(r10, 0x0, 0xc8, &(0x7f0000000040), 0x4) setsockopt$MRT_ADD_VIF(r10, 0x0, 0xca, &(0x7f0000000100)={0x0, 0x1, 0x0, 0x0, @vifc_lcl_addr=@dev={0xac, 0x14, 0x14, 0xb}, @multicast1}, 0x10) 07:23:13 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) r2 = open(&(0x7f0000000040)='./file0\x00', 0x161842, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'sit0\x00'}) r4 = syz_io_uring_setup(0x73d7, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000100)=0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r6, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x10001) r8 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x8010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(r5, 0x0, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x8) syz_io_uring_submit(0x0, r8, &(0x7f00000008c0)=@IORING_OP_OPENAT2={0x1c, 0x40, 0x0, 0xffffffffffffffff, &(0x7f0000000840)={0x4ae0e0, 0x2, 0x5}, &(0x7f0000000880)='./file0\x00', 0x18, 0x0, 0x12345}, 0xff) syz_io_uring_submit(r5, 0x0, &(0x7f0000002b40)=@IORING_OP_RECVMSG={0xa, 0x2b, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000002b00)={0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/28, 0x1c}, {&(0x7f0000001540)=""/4096, 0x1000}, {&(0x7f0000002540)=""/131, 0x83}, {&(0x7f0000002600)=""/102, 0x66}, {&(0x7f0000002840)=""/203, 0xcb}], 0x6}, 0x0, 0x10040, 0x1, {0x1}}, 0x0) ftruncate(r2, 0x200002) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x200000e, 0x12, r3, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) r10 = creat(&(0x7f0000000180)='./file0\x00', 0x0) fallocate(r10, 0x0, 0x0, 0x2000402) fallocate(r9, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r9, 0xc028660f, &(0x7f0000001380)={0xc, r10, 0xb}) [ 681.056050][T22640] validate_nla: 6 callbacks suppressed [ 681.056067][T22640] netlink: 'syz-executor.1': attribute type 6 has an invalid length. [ 681.075730][T22639] FAULT_INJECTION: forcing a failure. [ 681.075730][T22639] name failslab, interval 1, probability 0, space 0, times 0 [ 681.088508][T22639] CPU: 1 PID: 22639 Comm: syz-executor.2 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 681.098956][T22639] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 681.109030][T22639] Call Trace: [ 681.112350][T22639] [ 681.115315][T22639] dump_stack_lvl+0xda/0x130 [ 681.119939][T22639] dump_stack+0x15/0x20 [ 681.122698][T22638] FAULT_INJECTION: forcing a failure. [ 681.122698][T22638] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 681.124169][T22639] should_fail_ex+0x21f/0x230 [ 681.142042][T22639] __should_failslab+0x92/0xa0 [ 681.146950][T22639] should_failslab+0x9/0x20 [ 681.151543][T22639] slab_pre_alloc_hook+0x38/0x180 [ 681.156633][T22639] __kmem_cache_alloc_node+0x46/0x250 [ 681.162022][T22639] ? sctp_add_bind_addr+0x6f/0x1e0 [ 681.167157][T22639] kmalloc_trace+0x2a/0xa0 [ 681.171582][T22639] sctp_add_bind_addr+0x6f/0x1e0 [ 681.176565][T22639] sctp_copy_local_addr_list+0x19b/0x220 [ 681.182232][T22639] sctp_copy_one_addr+0x7d/0x400 [ 681.187236][T22639] sctp_bind_addr_copy+0x81/0x2b0 [ 681.192314][T22639] sctp_assoc_set_bind_addr_from_ep+0xc0/0xd0 [ 681.198409][T22639] sctp_connect_new_asoc+0x1cb/0x3a0 [ 681.203712][T22639] sctp_sendmsg+0xefc/0x1900 [ 681.208496][T22639] inet_sendmsg+0x63/0x80 [ 681.212848][T22639] __sys_sendto+0x246/0x300 [ 681.217373][T22639] __x64_sys_sendto+0x78/0x90 [ 681.222140][T22639] do_syscall_64+0x41/0xc0 [ 681.226661][T22639] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 681.232691][T22639] RIP: 0033:0x7f9293ef6149 [ 681.237168][T22639] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 681.256790][T22639] RSP: 002b:00007f9293269168 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 681.265255][T22639] RAX: ffffffffffffffda RBX: 00007f9294015f80 RCX: 00007f9293ef6149 [ 681.273235][T22639] RDX: 000000000001a000 RSI: 0000000020000000 RDI: 0000000000000004 [ 681.281212][T22639] RBP: 00007f92932691d0 R08: 0000000020000080 R09: 000000000000001c [ 681.289214][T22639] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 681.297190][T22639] R13: 00007ffdbda7c2df R14: 00007f9293269300 R15: 0000000000022000 [ 681.305195][T22639] [ 681.308257][T22638] CPU: 0 PID: 22638 Comm: syz-executor.3 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 681.309384][T22641] netlink: 'syz-executor.5': attribute type 6 has an invalid length. [ 681.318685][T22638] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 681.318703][T22638] Call Trace: [ 681.318710][T22638] [ 681.318718][T22638] dump_stack_lvl+0xda/0x130 [ 681.347685][T22638] dump_stack+0x15/0x20 [ 681.351942][T22638] should_fail_ex+0x21f/0x230 [ 681.356724][T22638] __alloc_pages+0x108/0x340 [ 681.361396][T22638] vma_alloc_folio+0x6a3/0x8c0 [ 681.366188][T22638] ? __vm_enough_memory+0xdf/0x2a0 [ 681.368948][T22648] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=22648 comm=syz-executor.5 [ 681.371369][T22638] shmem_get_folio_gfp+0x801/0x1200 [ 681.389363][T22638] shmem_write_begin+0xa6/0x1d0 [ 681.394266][T22638] generic_perform_write+0x1c3/0x3d0 [ 681.399668][T22638] ? shmem_write_begin+0x1d0/0x1d0 [ 681.404813][T22638] __generic_file_write_iter+0xe6/0x290 [ 681.406004][T22641] (unnamed net_device) (uninitialized): option use_carrier: invalid value (6) [ 681.410387][T22638] generic_file_write_iter+0x7d/0x1c0 [ 681.410425][T22638] vfs_write+0x47b/0x780 [ 681.429024][T22638] ksys_write+0xeb/0x1a0 [ 681.433298][T22638] __x64_sys_write+0x42/0x50 [ 681.437987][T22638] do_syscall_64+0x41/0xc0 [ 681.442521][T22638] entry_SYSCALL_64_after_hwframe+0x63/0xcd 07:23:13 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0xf000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) [ 681.444216][T22649] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=61 sclass=netlink_route_socket pid=22649 comm=syz-executor.5 [ 681.448481][T22638] RIP: 0033:0x7f1567f53ecf [ 681.448502][T22638] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 681.485436][T22638] RSP: 002b:00007f1567314f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 681.493880][T22638] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007f1567f53ecf [ 681.502023][T22638] RDX: 0000000000100000 RSI: 00007f155eef5000 RDI: 0000000000000005 [ 681.510036][T22638] RBP: 00007f155eef5000 R08: 0000000000000000 R09: 0000000000000534 [ 681.516938][T22648] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 681.518048][T22638] R10: 0000000000100000 R11: 0000000000000293 R12: 0000000000000000 [ 681.535296][T22638] R13: 00007f1567314fdc R14: 00007f1567314fe0 R15: 0000000020000fc2 [ 681.543307][T22638] 07:23:14 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) (fail_nth: 88) 07:23:14 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, 0x0) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$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") (fail_nth: 47) [ 681.559961][T22655] netlink: 'syz-executor.1': attribute type 6 has an invalid length. 07:23:14 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000002c0)={&(0x7f0000000c80)=ANY=[@ANYBLOB="0026bd7000ffdbdf25070000000c00068008000b00060000000c0008002302b41174de3f460a6d000000000000080003000380000008000300bd2c00ff07000400f8ffffff080003001dd30000080004006604000000000000000000"], 0x5c}, 0x1, 0x0, 0x0, 0x1884}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6, 0x6}]}}}]}, 0x3c}}, 0x0) r3 = openat(r2, &(0x7f00000000c0)='./file0\x00', 0x0, 0x31) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00./file0\x00']) connect$unix(r3, &(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000001c0), 0x200080, 0x0) ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f0000000200)={0x55, 0xb5f3, 0x2, 0x1, 0x6}) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000600)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000800)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000827bd7000fcdbdf25030000000800030020000000050006000e000000040004000500050005000000050005000400000005000600ce00000093f1f198073347359701e9597001ab47a31266da6f292f3671200e551bf08293991a41b55e1b9b3e4e1cf47f9dda9123f38125ba19ef0fdf18ba4ec07cdf24e0153a49e9f9fdf291d868e4e75bb04ccb8ff4e20009f1e6265a9ae5d70e64fcedc9de8942e7b7ca009d98ff7c74a175dd80bfc0e6439cda7cd74b6966033d471542563f1c2ed3dd2fcaee81ecb7be444fbd4a54de26db239a7bb4696daed479759c14105df0b8db2481d840e28c6ed40143c2af3c6f04f17a24ee4c22358fce05"], 0x40}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) io_setup(0x6, &(0x7f00000003c0)=0x0) r7 = socket$phonet_pipe(0x23, 0x5, 0x2) io_submit(r6, 0x2, &(0x7f00000005c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, r7, &(0x7f00000001c0)='\"', 0x1}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r8, &(0x7f0000006440)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f0000000c40)={0x10, 0x1d, 0x20, 0x70bd28, 0x25dfdbfd}, 0x10}, {&(0x7f0000000f80)={0x20c, 0x3d, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x1f, 0x46, 0x0, 0x1, [@generic="6b23bda57b0fcd6882aea56d992b0de112a87c9689a0ce8f3a928a"]}, @generic="931dd380ae9b76725532f39b25791247f8e1faaa5606177d1141efdf8a23daecc73d0706f82254c664a01e4c4986b42b265e8e88f8f88e8099514ce917072d6e80996cbddc81dd1014a75c1cd2e0c084d7806b82c11b8a625557f25357333f879c7f3ea978d0c62492b2b2a3437425bf3933cf6d0456ae40263ff847b9956f9f56cd1e35dd616a0dffde59", @nested={0x14d, 0x46, 0x0, 0x1, [@typed={0x8, 0x8f, 0x0, 0x0, @u32=0x4}, @generic="3fe433e9f5d2f6047805d9eb39d59742ad46c8bd198fea6b4f77d0bf577f925374abd91b16efa9a31621d58f4b1ee788ba33ce3ae89358fcbecdc28e3a8775ee6c905d5275bf5f05ca6bfc68336199389a9644323a81d22c4bd081ec9c4826b7e965a5292167778eefb5edac3e1e0fd628684a30dbac663eb65de357a891a90855f356cbe26225342cce43c8e320a777c2a1f74ab97b7e442c94", @typed={0x8, 0x41, 0x0, 0x0, @ipv4=@multicast2}, @typed={0x8, 0x6b, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @generic="79c7219fa8393ab7671b616b9cea5f59e77de2a2ea4a268fcad39d31284ee1045f7dedc0dea487845188adde6fe70f5537a0635e01c2ec0a205c1f92c2272999ec8388f9a95b4d387581056e112c58f96f686734281b5a", @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@remote}, @generic="2d7a6c2813a21aa5bc78773404596de147d491e1868776a08d604bfb6aea387b585ce5b3f7ab336df3922c65"]}]}, 0x20c}, {&(0x7f0000000e00)={0x30, 0x12, 0x800, 0x70bd27, 0x25dfdbfc, "", [@typed={0x8, 0x5b, 0x0, 0x0, @pid}, @typed={0xf, 0x8c, 0x0, 0x0, @str='syzkaller1\x00'}, @typed={0x8, 0x7, 0x0, 0x0, @u32}]}, 0x30}, {&(0x7f0000000e40)={0xc8, 0x42, 0x10, 0x70bd26, 0x25dfdbff, "", [@generic="208cd2ae6be9be", @generic="c1d6c27da633daf115873b83c8913d284239d441678e667c20444d1a1f77f48ea7cbf783d84e79a9ebc262452149fe521b40868bf3938c61c8be3cdbd7429e623c99db5ae26d9cf24ee4ef4777ff0410e8b899b18e829f387d7926641f189d2b9697e099ffb7f20f691064b7d87d04cd2e230e8df8c77a2f1e4f4fabd49cfe414b3027dd850d9a2be9547ba5f2ed09811ea9ed9b201782165a792b57afca3e3d575d0f5b4b17a8", @typed={0x8, 0x94, 0x0, 0x0, @u32=0x1}]}, 0xc8}], 0x4, 0x0, 0x0, 0x8801}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, 0x0) sendmsg$nl_route(r8, &(0x7f0000000c00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000bc0)={&(0x7f00000011c0)=@dellink={0x25c, 0x11, 0x400, 0x70bd28, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, 0x1000}, [@IFLA_PROTO_DOWN={0x5}, @IFLA_IFNAME={0x14, 0x3, 'macvlan1\x00'}, @IFLA_MAP={0x24, 0xe, {0x9, 0xd2, 0x2e4d, 0x200, 0x3e, 0xff}}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x5}, @IFLA_IFALIAS={0x14, 0x14, 'syzkaller1\x00'}, @IFLA_MTU={0x8, 0x4, 0x101}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_VFINFO_LIST={0x1cc, 0x16, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x8fe, 0xffff}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x5, 0x1}}]}, {0x84, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN_LIST={0x54, 0xc, 0x0, 0x1, [{0x14, 0x1, {0xb5d3, 0xadc, 0x100, 0xd1c53560eb87a9fa}}, {0x14, 0x1, {0x4, 0xb6, 0x81, 0x8100}}, {0x14, 0x1, {0x0, 0x6e4, 0x1, 0x88a8}}, {0x14, 0x1, {0x14, 0xaed, 0x0, 0x8100}}]}, @IFLA_VF_TX_RATE={0xc, 0x3, {0x1000, 0x200}}, @IFLA_VF_TRUST={0xc, 0x9, {0x7, 0x800}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x8000, 0x1}}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x7f, 0x7fff}}, @IFLA_VF_TRUST={0xc, 0x9, {0x7ff, 0x8}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_RATE={0x10, 0x6, {0x9, 0x5, 0x5}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x9}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x80000000, 0x3}}]}, {0xa4, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0xfff, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1d}}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x3f, 0x43}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x65c, 0x1}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x2, 0x80000001}}, @IFLA_VF_VLAN_LIST={0x40, 0xc, 0x0, 0x1, [{0x14, 0x1, {0xcae8, 0x919, 0x9, 0x8100}}, {0x14, 0x1, {0x200, 0xb47, 0xaaa, 0x8100}}, {0x14, 0x1, {0x5, 0x53b, 0xfffffff7, 0x88a8}}]}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x3f, 0x7fff}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x930, 0x5}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x6, 0x8}}]}]}]}, 0x25c}, 0x1, 0x0, 0x0, 0x11}, 0x4c089) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r7, 0x40189429, &(0x7f0000000480)={0x1, 0x4, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r9, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x45, 0xfc, 0x6}, {0x6}]}, 0x10) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r9) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x2, 0x3, &(0x7f0000000000)=@framed={{0x18, 0xf}}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) socket$inet6_sctp(0xa, 0x801, 0x84) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) r10 = socket$igmp(0x2, 0x3, 0x2) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@private1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) ioctl$TUNSETOWNER(r3, 0x400454cc, r11) setsockopt$MRT_INIT(r10, 0x0, 0xc8, &(0x7f0000000040), 0x4) setsockopt$MRT_ADD_VIF(r10, 0x0, 0xca, &(0x7f0000000100)={0x0, 0x1, 0x0, 0x0, @vifc_lcl_addr=@dev={0xac, 0x14, 0x14, 0xb}, @multicast1}, 0x10) [ 681.611666][T22660] FAULT_INJECTION: forcing a failure. [ 681.611666][T22660] name failslab, interval 1, probability 0, space 0, times 0 [ 681.624496][T22660] CPU: 0 PID: 22660 Comm: syz-executor.2 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 681.634937][T22660] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 681.645022][T22660] Call Trace: [ 681.648384][T22660] [ 681.651345][T22660] dump_stack_lvl+0xda/0x130 [ 681.655979][T22660] dump_stack+0x15/0x20 07:23:14 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0x10000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) [ 681.658395][T22664] netlink: 'syz-executor.5': attribute type 6 has an invalid length. [ 681.660156][T22660] should_fail_ex+0x21f/0x230 [ 681.672932][T22660] __should_failslab+0x92/0xa0 [ 681.677868][T22660] should_failslab+0x9/0x20 [ 681.682487][T22660] slab_pre_alloc_hook+0x38/0x180 [ 681.687548][T22660] __kmem_cache_alloc_node+0x46/0x250 [ 681.692955][T22660] ? sctp_add_bind_addr+0x6f/0x1e0 [ 681.698151][T22660] kmalloc_trace+0x2a/0xa0 [ 681.702612][T22660] sctp_add_bind_addr+0x6f/0x1e0 [ 681.706001][T22664] (unnamed net_device) (uninitialized): option use_carrier: invalid value (6) [ 681.707567][T22660] sctp_copy_local_addr_list+0x19b/0x220 [ 681.722094][T22660] sctp_copy_one_addr+0x7d/0x400 [ 681.725905][T22653] loop0: detected capacity change from 0 to 2048 [ 681.727086][T22660] sctp_bind_addr_copy+0x81/0x2b0 [ 681.727120][T22660] sctp_assoc_set_bind_addr_from_ep+0xc0/0xd0 [ 681.742128][T22653] FAT-fs (loop0): Unrecognized mount option "ÿÿÿÿÿÿÿÿ184467440737095516150xffffffffffffffff" or missing value [ 681.744567][T22660] sctp_connect_new_asoc+0x1cb/0x3a0 [ 681.756824][T22667] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=22667 comm=syz-executor.5 [ 681.761465][T22660] sctp_sendmsg+0xefc/0x1900 [ 681.778991][T22660] inet_sendmsg+0x63/0x80 [ 681.783359][T22660] __sys_sendto+0x246/0x300 [ 681.787936][T22660] __x64_sys_sendto+0x78/0x90 [ 681.792696][T22660] do_syscall_64+0x41/0xc0 [ 681.796189][T22666] netlink: 'syz-executor.1': attribute type 6 has an invalid length. [ 681.797144][T22660] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 681.810109][T22664] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=61 sclass=netlink_route_socket pid=22664 comm=syz-executor.5 [ 681.811116][T22660] RIP: 0033:0x7f9293ef6149 [ 681.811138][T22660] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 681.848034][T22660] RSP: 002b:00007f9293269168 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 681.856482][T22660] RAX: ffffffffffffffda RBX: 00007f9294015f80 RCX: 00007f9293ef6149 [ 681.864535][T22660] RDX: 000000000001a000 RSI: 0000000020000000 RDI: 0000000000000004 [ 681.872553][T22660] RBP: 00007f92932691d0 R08: 0000000020000080 R09: 000000000000001c [ 681.880553][T22660] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 681.888565][T22660] R13: 00007ffdbda7c2df R14: 00007f9293269300 R15: 0000000000022000 [ 681.896647][T22660] 07:23:14 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0x10020000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) [ 681.916495][T22664] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 681.925215][T22670] FAULT_INJECTION: forcing a failure. [ 681.925215][T22670] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 681.939539][T22670] CPU: 0 PID: 22670 Comm: syz-executor.3 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 681.949991][T22670] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 681.959091][T22672] netlink: 'syz-executor.1': attribute type 6 has an invalid length. [ 681.960051][T22670] Call Trace: [ 681.960059][T22670] [ 681.960067][T22670] dump_stack_lvl+0xda/0x130 [ 681.979073][T22670] dump_stack+0x15/0x20 [ 681.983270][T22670] should_fail_ex+0x21f/0x230 [ 681.988069][T22670] should_fail+0xb/0x10 [ 681.992299][T22670] should_fail_usercopy+0x1a/0x20 [ 681.997359][T22670] copy_page_from_iter_atomic+0x22d/0xcf0 [ 682.003192][T22670] ? folio_test_hugetlb+0x3a/0x70 [ 682.008269][T22670] ? shmem_write_begin+0x12a/0x1d0 [ 682.013415][T22670] generic_perform_write+0x203/0x3d0 [ 682.018764][T22670] ? shmem_write_begin+0x1d0/0x1d0 [ 682.023947][T22670] __generic_file_write_iter+0xe6/0x290 [ 682.029602][T22670] generic_file_write_iter+0x7d/0x1c0 [ 682.035053][T22670] vfs_write+0x47b/0x780 [ 682.039335][T22670] ksys_write+0xeb/0x1a0 [ 682.043609][T22670] __x64_sys_write+0x42/0x50 [ 682.048267][T22670] do_syscall_64+0x41/0xc0 [ 682.052715][T22670] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 682.058775][T22670] RIP: 0033:0x7f1567f53ecf [ 682.063230][T22670] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 682.082873][T22670] RSP: 002b:00007f1567314f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 682.091498][T22670] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007f1567f53ecf [ 682.099501][T22670] RDX: 0000000000100000 RSI: 00007f155eef5000 RDI: 0000000000000005 [ 682.107506][T22670] RBP: 00007f155eef5000 R08: 0000000000000000 R09: 0000000000000534 [ 682.115507][T22670] R10: 0000000000100000 R11: 0000000000000293 R12: 0000000000000000 [ 682.123518][T22670] R13: 00007f1567314fdc R14: 00007f1567314fe0 R15: 0000000020000fc2 [ 682.131636][T22670] [ 682.141227][T22670] loop3: detected capacity change from 0 to 2048 [ 682.148908][T22670] FAT-fs (loop3): Unrecognized mount option "ÿÿÿÿÿÿÿÿ184467440737095516150xffffffffffffffff" or missing value 07:23:14 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a000000190000", 0x7) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000380)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000008c0)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000001cc0)={{}, r2, 0x16, @inherit={0x88, &(0x7f0000001580)=ANY=[@ANYRES16=r3]}, @devid}) r4 = syz_open_dev$MSR(&(0x7f0000000140), 0x100000000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r4, 0x84009422, &(0x7f0000000ec0)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(r6, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000001840)=ANY=[@ANYRES32=r5, @ANYRES32=r3, @ANYRESOCT, @ANYRES32=r1, @ANYRES32, @ANYRES64, @ANYRESHEX], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x40025) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f0000001500)={r5, "2ce8b7e675c30c143ac940d229ad3592"}) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$eJzs1T9rE3EYB/AnaazRqbM4/MDFqVQ3JyOSQvFAUTLoZKBxyYmQWy6Z8hJ8Ab4wB1+EZMp2Ei5VWxSDNLnSfj7LPdz3ud+/g7v39z+OTz8VH75+/hLdXivavbjTXrbiINpxZh4AwHWyrKr4XtWaXgsAsBv+/wBw87x5++7Fsyzrv06pG7GYl4NyUF/r/Pgk6x+llf3fnlqU5WDvZ/4o1c7nt+LuOn/8x3w/Hj6o81X2/GV2Ib8dp1vfPQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA3GyHKXUiIqWUDn7dXZTlYK/OD9OZC3ldHZ9k/aN1w/m8E/c6O9sGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAcAmK6Ww8zPPR5JoVEd9ix5N210d6uSMv/tXTW097VU5+m8XTTZtfLatq05GfRMTWF9+KmK/eUvNnuGnR3DcJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABoVjGdjYd5PpoUTa8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALgqiulsPMzz0eS/i2jVI/29p+k9AgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAM34EQAA///P7Cnj") r7 = socket$inet_udplite(0x2, 0x2, 0x88) read(r7, &(0x7f00000000c0)=""/43, 0x2b) 07:23:14 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) (fail_nth: 89) 07:23:14 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0x11000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) 07:23:14 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) r2 = open(&(0x7f0000000040)='./file0\x00', 0x161842, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'sit0\x00'}) r4 = syz_io_uring_setup(0x73d7, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000100)=0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r6, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x10001) r8 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x8010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(r5, 0x0, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x8) syz_io_uring_submit(0x0, r8, &(0x7f00000008c0)=@IORING_OP_OPENAT2={0x1c, 0x40, 0x0, 0xffffffffffffffff, &(0x7f0000000840)={0x4ae0e0, 0x2, 0x5}, &(0x7f0000000880)='./file0\x00', 0x18, 0x0, 0x12345}, 0xff) syz_io_uring_submit(r5, 0x0, &(0x7f0000002b40)=@IORING_OP_RECVMSG={0xa, 0x2b, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000002b00)={0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/28, 0x1c}, {&(0x7f0000001540)=""/4096, 0x1000}, {&(0x7f0000002540)=""/131, 0x83}, {&(0x7f0000002600)=""/102, 0x66}, {&(0x7f0000002840)=""/203, 0xcb}], 0x6}, 0x0, 0x10040, 0x1, {0x1}}, 0x0) ftruncate(r2, 0x200002) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x200000e, 0x12, r3, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) r10 = creat(&(0x7f0000000180)='./file0\x00', 0x0) fallocate(r10, 0x0, 0x0, 0x2000402) fallocate(r9, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r9, 0xc028660f, &(0x7f0000001380)={0xc, r10, 0xc}) 07:23:14 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, 0x0) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$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") (fail_nth: 48) 07:23:14 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000002c0)={&(0x7f0000000c80)=ANY=[@ANYBLOB="0026bd7000ffdbdf25070000000c00068008000b00060000000c0008002302b41174de3f460a6d000000000000080003000380000008000300bd2c00ff07000400f8ffffff080003001dd30000080004006604000000000000000000"], 0x5c}, 0x1, 0x0, 0x0, 0x1884}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6, 0x6}]}}}]}, 0x3c}}, 0x0) r3 = openat(r2, &(0x7f00000000c0)='./file0\x00', 0x0, 0x31) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000680)=ANY=[@ANYBLOB="4afe65cd9f4cb96af18454a88fa8005c9fe248c0144c45e701002b7127b6679c7a64908ce701f270818888d4368d79057ee5e41b0efaa601fc1a8488a8a24cb9d947491b1bc7983e1710bb3ccc29e6d4ed4df77669e40bbfa802c600208e53ee50e98ab2cb4f50d11a9cdddd9320a5d8171c0f0c108488d0b23be195b12fc7ed967f99e71ff165310bc20d027160e20e87088c6f48a6c7210431c5a6578b11b646347984f92bc092089c964bd360a4e0b124bec92bf620edc72693f0e78f12e205659005168a8e2f60f18bcecd57f49295bfe6ca9c894f4d75798ae81020f3ff3f9d2aeb8740d2ec38db6c068f60e10f6f06172fb698e28d2dcc7deed28eee05874cc59a89b771e167c0d3da3789a3acd1af0cc89d9ff46e329a00f6d1a28794c3b3db7752189c1853e53b0aa840b887618d3d9b6038fc37865fa39328a439819e25692b3efee7a80b609f2ba10030f51469aa05f966b72dedf8991f0d", @ANYRES32=r0, @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00./file0\x00']) connect$unix(r3, &(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000001c0), 0x200080, 0x0) ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f0000000200)={0x55, 0xb5f3, 0x2, 0x1, 0x6}) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000600)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000800)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x40}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) io_setup(0x6, &(0x7f00000003c0)=0x0) r7 = socket$phonet_pipe(0x23, 0x5, 0x2) io_submit(r6, 0x2, &(0x7f00000005c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, r7, &(0x7f00000001c0)='\"', 0x1}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r8, &(0x7f0000006440)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f0000000c40)={0x10, 0x1d, 0x20, 0x70bd28, 0x25dfdbfd}, 0x10}, {&(0x7f0000000f80)={0x20c, 0x3d, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x1f, 0x46, 0x0, 0x1, [@generic="6b23bda57b0fcd6882aea56d992b0de112a87c9689a0ce8f3a928a"]}, @generic="931dd380ae9b76725532f39b25791247f8e1faaa5606177d1141efdf8a23daecc73d0706f82254c664a01e4c4986b42b265e8e88f8f88e8099514ce917072d6e80996cbddc81dd1014a75c1cd2e0c084d7806b82c11b8a625557f25357333f879c7f3ea978d0c62492b2b2a3437425bf3933cf6d0456ae40263ff847b9956f9f56cd1e35dd616a0dffde59", @nested={0x14d, 0x46, 0x0, 0x1, [@typed={0x8, 0x8f, 0x0, 0x0, @u32=0x4}, @generic="3fe433e9f5d2f6047805d9eb39d59742ad46c8bd198fea6b4f77d0bf577f925374abd91b16efa9a31621d58f4b1ee788ba33ce3ae89358fcbecdc28e3a8775ee6c905d5275bf5f05ca6bfc68336199389a9644323a81d22c4bd081ec9c4826b7e965a5292167778eefb5edac3e1e0fd628684a30dbac663eb65de357a891a90855f356cbe26225342cce43c8e320a777c2a1f74ab97b7e442c94", @typed={0x8, 0x41, 0x0, 0x0, @ipv4=@multicast2}, @typed={0x8, 0x6b, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @generic="79c7219fa8393ab7671b616b9cea5f59e77de2a2ea4a268fcad39d31284ee1045f7dedc0dea487845188adde6fe70f5537a0635e01c2ec0a205c1f92c2272999ec8388f9a95b4d387581056e112c58f96f686734281b5a", @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@remote}, @generic="2d7a6c2813a21aa5bc78773404596de147d491e1868776a08d604bfb6aea387b585ce5b3f7ab336df3922c65"]}]}, 0x20c}, {&(0x7f0000000e00)={0x30, 0x12, 0x800, 0x70bd27, 0x25dfdbfc, "", [@typed={0x8, 0x5b, 0x0, 0x0, @pid}, @typed={0xf, 0x8c, 0x0, 0x0, @str='syzkaller1\x00'}, @typed={0x8, 0x7, 0x0, 0x0, @u32}]}, 0x30}, {&(0x7f0000000e40)={0xc8, 0x42, 0x10, 0x70bd26, 0x25dfdbff, "", [@generic="208cd2ae6be9be", @generic="c1d6c27da633daf115873b83c8913d284239d441678e667c20444d1a1f77f48ea7cbf783d84e79a9ebc262452149fe521b40868bf3938c61c8be3cdbd7429e623c99db5ae26d9cf24ee4ef4777ff0410e8b899b18e829f387d7926641f189d2b9697e099ffb7f20f691064b7d87d04cd2e230e8df8c77a2f1e4f4fabd49cfe414b3027dd850d9a2be9547ba5f2ed09811ea9ed9b201782165a792b57afca3e3d575d0f5b4b17a8", @typed={0x8, 0x94, 0x0, 0x0, @u32=0x1}]}, 0xc8}], 0x4, 0x0, 0x0, 0x8801}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000900)={'team0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000c00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000bc0)={&(0x7f00000011c0)=@dellink={0x25c, 0x11, 0x400, 0x70bd28, 0x25dfdbff, {0x0, 0x0, 0x0, r9, 0x1000}, [@IFLA_PROTO_DOWN={0x5}, @IFLA_IFNAME={0x14, 0x3, 'macvlan1\x00'}, @IFLA_MAP={0x24, 0xe, {0x9, 0xd2, 0x2e4d, 0x200, 0x3e, 0xff}}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x5}, @IFLA_IFALIAS={0x14, 0x14, 'syzkaller1\x00'}, @IFLA_MTU={0x8, 0x4, 0x101}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_VFINFO_LIST={0x1cc, 0x16, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x8fe, 0xffff}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x5, 0x1}}]}, {0x84, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN_LIST={0x54, 0xc, 0x0, 0x1, [{0x14, 0x1, {0xb5d3, 0xadc, 0x100, 0xd1c53560eb87a9fa}}, {0x14, 0x1, {0x4, 0xb6, 0x81, 0x8100}}, {0x14, 0x1, {0x0, 0x6e4, 0x1, 0x88a8}}, {0x14, 0x1, {0x14, 0xaed, 0x0, 0x8100}}]}, @IFLA_VF_TX_RATE={0xc, 0x3, {0x1000, 0x200}}, @IFLA_VF_TRUST={0xc, 0x9, {0x7, 0x800}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x8000, 0x1}}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x7f, 0x7fff}}, @IFLA_VF_TRUST={0xc, 0x9, {0x7ff, 0x8}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_RATE={0x10, 0x6, {0x9, 0x5, 0x5}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x9}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x80000000, 0x3}}]}, {0xa4, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0xfff, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1d}}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x3f, 0x43}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x65c, 0x1}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x2, 0x80000001}}, @IFLA_VF_VLAN_LIST={0x40, 0xc, 0x0, 0x1, [{0x14, 0x1, {0xcae8, 0x919, 0x9, 0x8100}}, {0x14, 0x1, {0x200, 0xb47, 0xaaa, 0x8100}}, {0x14, 0x1, {0x5, 0x53b, 0xfffffff7, 0x88a8}}]}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x3f, 0x7fff}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x930, 0x5}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x6, 0x8}}]}]}]}, 0x25c}, 0x1, 0x0, 0x0, 0x11}, 0x4c089) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r7, 0x40189429, &(0x7f0000000480)={0x1, 0x4, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r10, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x45, 0xfc, 0x6}, {0x6}]}, 0x10) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x2, 0x3, &(0x7f0000000000)=@framed={{0x18, 0xf}}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) socket$inet6_sctp(0xa, 0x801, 0x84) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) r11 = socket$igmp(0x2, 0x3, 0x2) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@private1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) ioctl$TUNSETOWNER(r3, 0x400454cc, r12) setsockopt$MRT_INIT(r11, 0x0, 0xc8, &(0x7f0000000040), 0x4) setsockopt$MRT_ADD_VIF(r11, 0x0, 0xca, &(0x7f0000000100)={0x0, 0x1, 0x0, 0x0, @vifc_lcl_addr=@dev={0xac, 0x14, 0x14, 0xb}, @multicast1}, 0x10) [ 682.347781][T22680] FAULT_INJECTION: forcing a failure. [ 682.347781][T22680] name failslab, interval 1, probability 0, space 0, times 0 [ 682.348972][T22682] netlink: 'syz-executor.1': attribute type 6 has an invalid length. [ 682.360461][T22680] CPU: 1 PID: 22680 Comm: syz-executor.2 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 682.378994][T22680] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 682.389119][T22680] Call Trace: [ 682.392417][T22680] [ 682.395362][T22680] dump_stack_lvl+0xda/0x130 [ 682.399982][T22680] dump_stack+0x15/0x20 [ 682.404195][T22680] should_fail_ex+0x21f/0x230 [ 682.408921][T22680] __should_failslab+0x92/0xa0 [ 682.409893][T22685] FAULT_INJECTION: forcing a failure. [ 682.409893][T22685] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 682.413693][T22680] should_failslab+0x9/0x20 [ 682.431417][T22680] slab_pre_alloc_hook+0x38/0x180 [ 682.436467][T22680] __kmem_cache_alloc_node+0x46/0x250 [ 682.441899][T22680] ? sctp_add_bind_addr+0x6f/0x1e0 [ 682.447041][T22680] kmalloc_trace+0x2a/0xa0 [ 682.451505][T22680] sctp_add_bind_addr+0x6f/0x1e0 [ 682.456469][T22680] sctp_copy_local_addr_list+0x19b/0x220 [ 682.462204][T22680] sctp_copy_one_addr+0x7d/0x400 [ 682.467215][T22680] sctp_bind_addr_copy+0x81/0x2b0 [ 682.472349][T22680] sctp_assoc_set_bind_addr_from_ep+0xc0/0xd0 [ 682.478502][T22680] sctp_connect_new_asoc+0x1cb/0x3a0 [ 682.483806][T22680] sctp_sendmsg+0xefc/0x1900 [ 682.488492][T22680] inet_sendmsg+0x63/0x80 [ 682.492916][T22680] __sys_sendto+0x246/0x300 [ 682.497479][T22680] __x64_sys_sendto+0x78/0x90 [ 682.502166][T22680] do_syscall_64+0x41/0xc0 [ 682.506647][T22680] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 682.512561][T22680] RIP: 0033:0x7f9293ef6149 [ 682.516979][T22680] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 682.536603][T22680] RSP: 002b:00007f9293269168 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 682.545082][T22680] RAX: ffffffffffffffda RBX: 00007f9294015f80 RCX: 00007f9293ef6149 [ 682.553152][T22680] RDX: 000000000001a000 RSI: 0000000020000000 RDI: 0000000000000004 [ 682.561141][T22680] RBP: 00007f92932691d0 R08: 0000000020000080 R09: 000000000000001c [ 682.569124][T22680] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 682.577111][T22680] R13: 00007ffdbda7c2df R14: 00007f9293269300 R15: 0000000000022000 [ 682.585091][T22680] [ 682.588194][T22685] CPU: 0 PID: 22685 Comm: syz-executor.3 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 682.598656][T22685] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 682.608732][T22685] Call Trace: [ 682.612071][T22685] [ 682.615119][T22685] dump_stack_lvl+0xda/0x130 [ 682.619757][T22685] dump_stack+0x15/0x20 [ 682.623953][T22685] should_fail_ex+0x21f/0x230 [ 682.628725][T22685] __alloc_pages+0x108/0x340 [ 682.633368][T22685] vma_alloc_folio+0x6a3/0x8c0 [ 682.638165][T22685] ? __vm_enough_memory+0xdf/0x2a0 [ 682.643318][T22685] shmem_get_folio_gfp+0x801/0x1200 [ 682.648559][T22685] shmem_write_begin+0xa6/0x1d0 [ 682.653441][T22685] generic_perform_write+0x1c3/0x3d0 [ 682.658824][T22685] ? shmem_write_begin+0x1d0/0x1d0 [ 682.664023][T22685] __generic_file_write_iter+0xe6/0x290 [ 682.669612][T22685] generic_file_write_iter+0x7d/0x1c0 [ 682.675028][T22685] vfs_write+0x47b/0x780 [ 682.676433][T22686] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=22686 comm=syz-executor.5 [ 682.679348][T22685] ksys_write+0xeb/0x1a0 07:23:15 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) (fail_nth: 90) [ 682.696635][T22685] __x64_sys_write+0x42/0x50 [ 682.701364][T22685] do_syscall_64+0x41/0xc0 [ 682.705814][T22685] ? irqentry_exit+0x12/0x40 [ 682.707840][T22686] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=61 sclass=netlink_route_socket pid=22686 comm=syz-executor.5 [ 682.710449][T22685] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 682.729255][T22685] RIP: 0033:0x7f1567f53ecf 07:23:15 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0x12000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) [ 682.733692][T22685] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 682.753330][T22685] RSP: 002b:00007f1567314f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 682.760615][T22681] netlink: 'syz-executor.5': attribute type 6 has an invalid length. [ 682.761870][T22685] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007f1567f53ecf [ 682.761890][T22685] RDX: 0000000000100000 RSI: 00007f155eef5000 RDI: 0000000000000005 [ 682.786004][T22685] RBP: 00007f155eef5000 R08: 0000000000000000 R09: 0000000000000534 [ 682.794014][T22685] R10: 0000000000100000 R11: 0000000000000293 R12: 0000000000000000 [ 682.795909][T22681] (unnamed net_device) (uninitialized): option use_carrier: invalid value (6) [ 682.801991][T22685] R13: 00007f1567314fdc R14: 00007f1567314fe0 R15: 0000000020000fc2 [ 682.802015][T22685] [ 682.824512][T22698] FAULT_INJECTION: forcing a failure. [ 682.824512][T22698] name failslab, interval 1, probability 0, space 0, times 0 [ 682.837946][T22698] CPU: 0 PID: 22698 Comm: syz-executor.2 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 682.848451][T22698] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 682.851109][T22689] loop0: detected capacity change from 0 to 2048 [ 682.858516][T22698] Call Trace: [ 682.858525][T22698] [ 682.858551][T22698] dump_stack_lvl+0xda/0x130 [ 682.875838][T22698] dump_stack+0x15/0x20 [ 682.880034][T22698] should_fail_ex+0x21f/0x230 [ 682.880159][T22689] FAT-fs (loop0): Unrecognized mount option "ÿÿÿÿÿÿÿÿ184467440737095516150xffffffffffffffff" or missing value [ 682.884744][T22698] __should_failslab+0x92/0xa0 [ 682.898280][T22699] netlink: 'syz-executor.1': attribute type 6 has an invalid length. [ 682.901125][T22698] should_failslab+0x9/0x20 [ 682.901161][T22698] slab_pre_alloc_hook+0x38/0x180 [ 682.918856][T22698] __kmem_cache_alloc_node+0x46/0x250 [ 682.924269][T22698] ? sctp_add_bind_addr+0x6f/0x1e0 [ 682.929512][T22698] kmalloc_trace+0x2a/0xa0 [ 682.934025][T22698] sctp_add_bind_addr+0x6f/0x1e0 [ 682.939098][T22698] sctp_copy_local_addr_list+0x19b/0x220 [ 682.944847][T22698] sctp_copy_one_addr+0x7d/0x400 07:23:15 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, 0x0) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$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") (fail_nth: 49) [ 682.949817][T22698] sctp_bind_addr_copy+0x81/0x2b0 [ 682.954921][T22698] sctp_assoc_set_bind_addr_from_ep+0xc0/0xd0 [ 682.961061][T22698] sctp_connect_new_asoc+0x1cb/0x3a0 [ 682.966386][T22698] sctp_sendmsg+0xefc/0x1900 [ 682.971030][T22698] inet_sendmsg+0x63/0x80 [ 682.975444][T22698] __sys_sendto+0x246/0x300 [ 682.980032][T22698] __x64_sys_sendto+0x78/0x90 [ 682.984740][T22698] do_syscall_64+0x41/0xc0 [ 682.989296][T22698] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 682.995239][T22698] RIP: 0033:0x7f9293ef6149 [ 682.999677][T22698] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 683.013460][T22702] FAULT_INJECTION: forcing a failure. [ 683.013460][T22702] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 683.019349][T22698] RSP: 002b:00007f9293269168 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 683.019412][T22698] RAX: ffffffffffffffda RBX: 00007f9294015f80 RCX: 00007f9293ef6149 [ 683.048845][T22698] RDX: 000000000001a000 RSI: 0000000020000000 RDI: 0000000000000004 [ 683.056823][T22698] RBP: 00007f92932691d0 R08: 0000000020000080 R09: 000000000000001c [ 683.064798][T22698] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 683.072781][T22698] R13: 00007ffdbda7c2df R14: 00007f9293269300 R15: 0000000000022000 [ 683.080768][T22698] [ 683.083798][T22702] CPU: 1 PID: 22702 Comm: syz-executor.3 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 683.094291][T22702] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 683.104378][T22702] Call Trace: [ 683.107669][T22702] [ 683.110615][T22702] dump_stack_lvl+0xda/0x130 [ 683.115251][T22702] dump_stack+0x15/0x20 [ 683.119484][T22702] should_fail_ex+0x21f/0x230 [ 683.124201][T22702] should_fail+0xb/0x10 [ 683.128391][T22702] should_fail_usercopy+0x1a/0x20 [ 683.133462][T22702] copy_page_from_iter_atomic+0x22d/0xcf0 [ 683.139257][T22702] ? folio_test_hugetlb+0x3a/0x70 [ 683.144321][T22702] ? shmem_write_begin+0x12a/0x1d0 [ 683.149591][T22702] generic_perform_write+0x203/0x3d0 [ 683.154972][T22702] ? shmem_write_begin+0x1d0/0x1d0 [ 683.160117][T22702] __generic_file_write_iter+0xe6/0x290 [ 683.165845][T22702] generic_file_write_iter+0x7d/0x1c0 [ 683.171327][T22702] vfs_write+0x47b/0x780 [ 683.175667][T22702] ksys_write+0xeb/0x1a0 [ 683.179948][T22702] __x64_sys_write+0x42/0x50 [ 683.184660][T22702] do_syscall_64+0x41/0xc0 [ 683.189122][T22702] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 683.195059][T22702] RIP: 0033:0x7f1567f53ecf [ 683.199513][T22702] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 683.219160][T22702] RSP: 002b:00007f1567314f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 683.227610][T22702] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007f1567f53ecf [ 683.235655][T22702] RDX: 0000000000100000 RSI: 00007f155eef5000 RDI: 0000000000000005 07:23:15 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) (fail_nth: 91) 07:23:15 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0x1a160000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) 07:23:15 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) r2 = open(&(0x7f0000000040)='./file0\x00', 0x161842, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'sit0\x00'}) r4 = syz_io_uring_setup(0x73d7, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000100)=0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r6, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x10001) r8 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x8010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(r5, 0x0, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x8) syz_io_uring_submit(0x0, r8, &(0x7f00000008c0)=@IORING_OP_OPENAT2={0x1c, 0x40, 0x0, 0xffffffffffffffff, &(0x7f0000000840)={0x4ae0e0, 0x2, 0x5}, &(0x7f0000000880)='./file0\x00', 0x18, 0x0, 0x12345}, 0xff) syz_io_uring_submit(r5, 0x0, &(0x7f0000002b40)=@IORING_OP_RECVMSG={0xa, 0x2b, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000002b00)={0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/28, 0x1c}, {&(0x7f0000001540)=""/4096, 0x1000}, {&(0x7f0000002540)=""/131, 0x83}, {&(0x7f0000002600)=""/102, 0x66}, {&(0x7f0000002840)=""/203, 0xcb}], 0x6}, 0x0, 0x10040, 0x1, {0x1}}, 0x0) ftruncate(r2, 0x200002) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x200000e, 0x12, r3, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) r10 = creat(&(0x7f0000000180)='./file0\x00', 0x0) fallocate(r10, 0x0, 0x0, 0x2000402) fallocate(r9, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r9, 0xc028660f, &(0x7f0000001380)={0xc, r10, 0xd}) [ 683.239303][T22686] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 683.243676][T22702] RBP: 00007f155eef5000 R08: 0000000000000000 R09: 0000000000000534 [ 683.243695][T22702] R10: 0000000000100000 R11: 0000000000000293 R12: 0000000000000000 [ 683.268882][T22702] R13: 00007f1567314fdc R14: 00007f1567314fe0 R15: 0000000020000fc2 [ 683.276884][T22702] [ 683.289358][T22702] loop3: detected capacity change from 0 to 2048 [ 683.294904][T22708] FAULT_INJECTION: forcing a failure. [ 683.294904][T22708] name failslab, interval 1, probability 0, space 0, times 0 [ 683.298314][T22702] FAT-fs (loop3): Unrecognized mount option "ÿÿÿÿÿÿÿÿ184467440737095516150xffffffffffffffff" or missing value [ 683.308364][T22708] CPU: 1 PID: 22708 Comm: syz-executor.2 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 683.330651][T22708] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 683.340727][T22708] Call Trace: [ 683.344031][T22708] [ 683.347097][T22708] dump_stack_lvl+0xda/0x130 [ 683.351773][T22708] dump_stack+0x15/0x20 [ 683.355975][T22708] should_fail_ex+0x21f/0x230 [ 683.360760][T22708] __should_failslab+0x92/0xa0 [ 683.365566][T22708] should_failslab+0x9/0x20 [ 683.370113][T22708] slab_pre_alloc_hook+0x38/0x180 [ 683.375234][T22708] __kmem_cache_alloc_node+0x46/0x250 [ 683.380641][T22708] ? sctp_add_bind_addr+0x6f/0x1e0 [ 683.385932][T22708] kmalloc_trace+0x2a/0xa0 [ 683.390431][T22708] sctp_add_bind_addr+0x6f/0x1e0 [ 683.395406][T22708] sctp_copy_local_addr_list+0x19b/0x220 [ 683.401123][T22708] sctp_copy_one_addr+0x7d/0x400 [ 683.406094][T22708] sctp_bind_addr_copy+0x81/0x2b0 [ 683.411147][T22708] sctp_assoc_set_bind_addr_from_ep+0xc0/0xd0 [ 683.417269][T22708] sctp_connect_new_asoc+0x1cb/0x3a0 [ 683.422590][T22708] sctp_sendmsg+0xefc/0x1900 [ 683.427297][T22708] inet_sendmsg+0x63/0x80 [ 683.431779][T22708] __sys_sendto+0x246/0x300 [ 683.436316][T22708] __x64_sys_sendto+0x78/0x90 [ 683.441029][T22708] do_syscall_64+0x41/0xc0 [ 683.445531][T22708] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 683.451465][T22708] RIP: 0033:0x7f9293ef6149 [ 683.455902][T22708] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 683.475593][T22708] RSP: 002b:00007f9293269168 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 683.484042][T22708] RAX: ffffffffffffffda RBX: 00007f9294015f80 RCX: 00007f9293ef6149 [ 683.492064][T22708] RDX: 000000000001a000 RSI: 0000000020000000 RDI: 0000000000000004 [ 683.500129][T22708] RBP: 00007f92932691d0 R08: 0000000020000080 R09: 000000000000001c [ 683.508122][T22708] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 683.516208][T22708] R13: 00007ffdbda7c2df R14: 00007f9293269300 R15: 0000000000022000 [ 683.524201][T22708] [ 683.534381][T22707] netlink: 'syz-executor.1': attribute type 6 has an invalid length. 07:23:16 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, 0x0) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$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") (fail_nth: 50) 07:23:16 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) (fail_nth: 92) 07:23:16 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a000000190000", 0x7) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000380)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000008c0)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000001cc0)={{}, r2, 0x16, @inherit={0x88, &(0x7f0000001580)=ANY=[@ANYRES16=r3]}, @devid}) r4 = syz_open_dev$MSR(&(0x7f0000000140), 0x100000000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r4, 0x84009422, &(0x7f0000000ec0)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(r6, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000001840)=ANY=[@ANYRES32=r5, @ANYRES32=r3, @ANYRESOCT, @ANYRES32=r1, @ANYRES32, @ANYRES64, @ANYRESHEX], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x40025) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f0000001500)={r5, "2ce8b7e675c30c143ac940d229ad3592"}) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$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") r7 = socket$inet_udplite(0x2, 0x2, 0x88) read(r7, &(0x7f00000000c0)=""/43, 0x2b) 07:23:16 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000002c0)={&(0x7f0000000c80)=ANY=[@ANYBLOB="0026bd7000ffdbdf25070000000c00068008000b00060000000c0008002302b41174de3f460a6d000000000000080003000380000008000300bd2c00ff07000400f8ffffff080003001dd30000080004006604000000000000000000"], 0x5c}, 0x1, 0x0, 0x0, 0x1884}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6, 0x6}]}}}]}, 0x3c}}, 0x0) r3 = openat(r2, &(0x7f00000000c0)='./file0\x00', 0x0, 0x31) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00./file0\x00']) connect$unix(r3, &(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000001c0), 0x200080, 0x0) ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f0000000200)={0x55, 0xb5f3, 0x2, 0x1, 0x6}) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000600)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000800)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x40}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) io_setup(0x6, &(0x7f00000003c0)=0x0) r7 = socket$phonet_pipe(0x23, 0x5, 0x2) io_submit(r6, 0x2, &(0x7f00000005c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, r7, &(0x7f00000001c0)='\"', 0x1}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r8, &(0x7f0000006440)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f0000000c40)={0x10, 0x1d, 0x20, 0x70bd28, 0x25dfdbfd}, 0x10}, {&(0x7f0000000f80)={0x20c, 0x3d, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x1f, 0x46, 0x0, 0x1, [@generic="6b23bda57b0fcd6882aea56d992b0de112a87c9689a0ce8f3a928a"]}, @generic="931dd380ae9b76725532f39b25791247f8e1faaa5606177d1141efdf8a23daecc73d0706f82254c664a01e4c4986b42b265e8e88f8f88e8099514ce917072d6e80996cbddc81dd1014a75c1cd2e0c084d7806b82c11b8a625557f25357333f879c7f3ea978d0c62492b2b2a3437425bf3933cf6d0456ae40263ff847b9956f9f56cd1e35dd616a0dffde59", @nested={0x14d, 0x46, 0x0, 0x1, [@typed={0x8, 0x8f, 0x0, 0x0, @u32=0x4}, @generic="3fe433e9f5d2f6047805d9eb39d59742ad46c8bd198fea6b4f77d0bf577f925374abd91b16efa9a31621d58f4b1ee788ba33ce3ae89358fcbecdc28e3a8775ee6c905d5275bf5f05ca6bfc68336199389a9644323a81d22c4bd081ec9c4826b7e965a5292167778eefb5edac3e1e0fd628684a30dbac663eb65de357a891a90855f356cbe26225342cce43c8e320a777c2a1f74ab97b7e442c94", @typed={0x8, 0x41, 0x0, 0x0, @ipv4=@multicast2}, @typed={0x8, 0x6b, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @generic="79c7219fa8393ab7671b616b9cea5f59e77de2a2ea4a268fcad39d31284ee1045f7dedc0dea487845188adde6fe70f5537a0635e01c2ec0a205c1f92c2272999ec8388f9a95b4d387581056e112c58f96f686734281b5a", @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@remote}, @generic="2d7a6c2813a21aa5bc78773404596de147d491e1868776a08d604bfb6aea387b585ce5b3f7ab336df3922c65"]}]}, 0x20c}, {&(0x7f0000000e00)={0x30, 0x12, 0x800, 0x70bd27, 0x25dfdbfc, "", [@typed={0x8, 0x5b, 0x0, 0x0, @pid}, @typed={0xf, 0x8c, 0x0, 0x0, @str='syzkaller1\x00'}, @typed={0x8, 0x7, 0x0, 0x0, @u32}]}, 0x30}, {&(0x7f0000000e40)={0xc8, 0x42, 0x10, 0x70bd26, 0x25dfdbff, "", [@generic="208cd2ae6be9be", @generic="c1d6c27da633daf115873b83c8913d284239d441678e667c20444d1a1f77f48ea7cbf783d84e79a9ebc262452149fe521b40868bf3938c61c8be3cdbd7429e623c99db5ae26d9cf24ee4ef4777ff0410e8b899b18e829f387d7926641f189d2b9697e099ffb7f20f691064b7d87d04cd2e230e8df8c77a2f1e4f4fabd49cfe414b3027dd850d9a2be9547ba5f2ed09811ea9ed9b201782165a792b57afca3e3d575d0f5b4b17a8", @typed={0x8, 0x94, 0x0, 0x0, @u32=0x1}]}, 0xc8}], 0x4, 0x0, 0x0, 0x8801}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000900)={'team0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000c00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000bc0)={&(0x7f00000011c0)=@dellink={0x25c, 0x11, 0x400, 0x70bd28, 0x25dfdbff, {0x0, 0x0, 0x0, r9, 0x1000}, [@IFLA_PROTO_DOWN={0x5}, @IFLA_IFNAME={0x14, 0x3, 'macvlan1\x00'}, @IFLA_MAP={0x24, 0xe, {0x9, 0xd2, 0x2e4d, 0x200, 0x3e, 0xff}}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x5}, @IFLA_IFALIAS={0x14, 0x14, 'syzkaller1\x00'}, @IFLA_MTU={0x8, 0x4, 0x101}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_VFINFO_LIST={0x1cc, 0x16, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x8fe, 0xffff}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x5, 0x1}}]}, {0x84, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN_LIST={0x54, 0xc, 0x0, 0x1, [{0x14, 0x1, {0xb5d3, 0xadc, 0x100, 0xd1c53560eb87a9fa}}, {0x14, 0x1, {0x4, 0xb6, 0x81, 0x8100}}, {0x14, 0x1, {0x0, 0x6e4, 0x1, 0x88a8}}, {0x14, 0x1, {0x14, 0xaed, 0x0, 0x8100}}]}, @IFLA_VF_TX_RATE={0xc, 0x3, {0x1000, 0x200}}, @IFLA_VF_TRUST={0xc, 0x9, {0x7, 0x800}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x8000, 0x1}}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x7f, 0x7fff}}, @IFLA_VF_TRUST={0xc, 0x9, {0x7ff, 0x8}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_RATE={0x10, 0x6, {0x9, 0x5, 0x5}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x9}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x80000000, 0x3}}]}, {0xa4, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0xfff, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1d}}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x3f, 0x43}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x65c, 0x1}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x2, 0x80000001}}, @IFLA_VF_VLAN_LIST={0x40, 0xc, 0x0, 0x1, [{0x14, 0x1, {0xcae8, 0x919, 0x9, 0x8100}}, {0x14, 0x1, {0x200, 0xb47, 0xaaa, 0x8100}}, {0x14, 0x1, {0x5, 0x53b, 0xfffffff7, 0x88a8}}]}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x3f, 0x7fff}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x930, 0x5}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x6, 0x8}}]}]}]}, 0x25c}, 0x1, 0x0, 0x0, 0x11}, 0x4c089) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r7, 0x40189429, &(0x7f0000000480)={0x1, 0x4, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r10, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x45, 0xfc, 0x6}, {0x6}]}, 0x10) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x2, 0x3, &(0x7f0000000000)=@framed={{0x18, 0xf}}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) socket$inet6_sctp(0xa, 0x801, 0x84) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) r11 = socket$igmp(0x2, 0x3, 0x2) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@private1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) ioctl$TUNSETOWNER(r3, 0x400454cc, r12) setsockopt$MRT_INIT(r11, 0x0, 0xc8, &(0x7f0000000040), 0x4) setsockopt$MRT_ADD_VIF(r11, 0x0, 0xca, &(0x7f0000000100)={0x0, 0x1, 0x0, 0x0, @vifc_lcl_addr=@dev={0xac, 0x14, 0x14, 0xb}, @multicast1}, 0x10) 07:23:16 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0x20000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) 07:23:16 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) r2 = open(&(0x7f0000000040)='./file0\x00', 0x161842, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'sit0\x00'}) r4 = syz_io_uring_setup(0x73d7, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000100)=0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r6, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x10001) r8 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x8010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(r5, 0x0, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x8) syz_io_uring_submit(0x0, r8, &(0x7f00000008c0)=@IORING_OP_OPENAT2={0x1c, 0x40, 0x0, 0xffffffffffffffff, &(0x7f0000000840)={0x4ae0e0, 0x2, 0x5}, &(0x7f0000000880)='./file0\x00', 0x18, 0x0, 0x12345}, 0xff) syz_io_uring_submit(r5, 0x0, &(0x7f0000002b40)=@IORING_OP_RECVMSG={0xa, 0x2b, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000002b00)={0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/28, 0x1c}, {&(0x7f0000001540)=""/4096, 0x1000}, {&(0x7f0000002540)=""/131, 0x83}, {&(0x7f0000002600)=""/102, 0x66}, {&(0x7f0000002840)=""/203, 0xcb}], 0x6}, 0x0, 0x10040, 0x1, {0x1}}, 0x0) ftruncate(r2, 0x200002) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x200000e, 0x12, r3, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) r10 = creat(&(0x7f0000000180)='./file0\x00', 0x0) fallocate(r10, 0x0, 0x0, 0x2000402) fallocate(r9, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r9, 0xc028660f, &(0x7f0000001380)={0xc, r10, 0xe}) [ 683.762093][T22715] FAULT_INJECTION: forcing a failure. [ 683.762093][T22715] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 683.775468][T22715] CPU: 0 PID: 22715 Comm: syz-executor.3 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 683.785916][T22715] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 683.795991][T22715] Call Trace: [ 683.799357][T22715] [ 683.802314][T22715] dump_stack_lvl+0xda/0x130 [ 683.806959][T22715] dump_stack+0x15/0x20 [ 683.811147][T22715] should_fail_ex+0x21f/0x230 [ 683.815869][T22715] __alloc_pages+0x108/0x340 [ 683.820506][T22715] vma_alloc_folio+0x6a3/0x8c0 [ 683.825293][T22715] ? __vm_enough_memory+0xdf/0x2a0 [ 683.830483][T22715] shmem_get_folio_gfp+0x801/0x1200 [ 683.835789][T22715] shmem_write_begin+0xa6/0x1d0 [ 683.840660][T22715] generic_perform_write+0x1c3/0x3d0 [ 683.846010][T22715] ? shmem_write_begin+0x1d0/0x1d0 [ 683.851201][T22715] __generic_file_write_iter+0xe6/0x290 [ 683.856862][T22715] generic_file_write_iter+0x7d/0x1c0 [ 683.862358][T22715] vfs_write+0x47b/0x780 [ 683.866680][T22715] ksys_write+0xeb/0x1a0 [ 683.870960][T22715] __x64_sys_write+0x42/0x50 [ 683.875613][T22715] do_syscall_64+0x41/0xc0 [ 683.880097][T22715] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 683.886027][T22715] RIP: 0033:0x7f1567f53ecf [ 683.890464][T22715] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 683.910134][T22715] RSP: 002b:00007f1567314f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 683.918657][T22715] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007f1567f53ecf [ 683.926714][T22715] RDX: 0000000000100000 RSI: 00007f155eef5000 RDI: 0000000000000005 [ 683.933540][T22724] loop0: detected capacity change from 0 to 2048 [ 683.934696][T22715] RBP: 00007f155eef5000 R08: 0000000000000000 R09: 0000000000000534 [ 683.934715][T22715] R10: 0000000000100000 R11: 0000000000000293 R12: 0000000000000000 07:23:16 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, 0x0) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$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") (fail_nth: 51) [ 683.953984][T22724] FAT-fs (loop0): Unrecognized mount option "ÿÿÿÿÿÿÿÿ184467440737095516150xffffffffffffffff" or missing value [ 683.957083][T22715] R13: 00007f1567314fdc R14: 00007f1567314fe0 R15: 0000000020000fc2 [ 683.957107][T22715] [ 683.982247][T22722] FAULT_INJECTION: forcing a failure. [ 683.982247][T22722] name failslab, interval 1, probability 0, space 0, times 0 [ 683.995671][T22722] CPU: 0 PID: 22722 Comm: syz-executor.2 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 684.006295][T22722] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 684.016375][T22722] Call Trace: [ 684.019671][T22722] [ 684.022620][T22722] dump_stack_lvl+0xda/0x130 [ 684.027350][T22722] dump_stack+0x15/0x20 [ 684.031530][T22722] should_fail_ex+0x21f/0x230 [ 684.036259][T22722] __should_failslab+0x92/0xa0 [ 684.041068][T22722] should_failslab+0x9/0x20 [ 684.045608][T22722] slab_pre_alloc_hook+0x38/0x180 [ 684.050691][T22722] __kmem_cache_alloc_node+0x46/0x250 [ 684.052160][T22717] (unnamed net_device) (uninitialized): option use_carrier: invalid value (6) [ 684.056121][T22722] ? sctp_add_bind_addr+0x6f/0x1e0 [ 684.065931][T22717] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=22717 comm=syz-executor.5 [ 684.070085][T22722] kmalloc_trace+0x2a/0xa0 [ 684.087314][T22722] sctp_add_bind_addr+0x6f/0x1e0 [ 684.092306][T22722] sctp_copy_local_addr_list+0x19b/0x220 [ 684.098036][T22722] sctp_copy_one_addr+0x7d/0x400 [ 684.103031][T22722] sctp_bind_addr_copy+0x81/0x2b0 [ 684.106538][T22717] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=61 sclass=netlink_route_socket pid=22717 comm=syz-executor.5 [ 684.108097][T22722] sctp_assoc_set_bind_addr_from_ep+0xc0/0xd0 [ 684.108165][T22722] sctp_connect_new_asoc+0x1cb/0x3a0 [ 684.132527][T22722] sctp_sendmsg+0xefc/0x1900 [ 684.137231][T22722] inet_sendmsg+0x63/0x80 [ 684.139667][T22717] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 684.141575][T22722] __sys_sendto+0x246/0x300 [ 684.141609][T22722] __x64_sys_sendto+0x78/0x90 [ 684.159970][T22722] do_syscall_64+0x41/0xc0 [ 684.164419][T22722] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 684.170451][T22722] RIP: 0033:0x7f9293ef6149 [ 684.174926][T22722] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 684.194592][T22722] RSP: 002b:00007f9293269168 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 684.203123][T22722] RAX: ffffffffffffffda RBX: 00007f9294015f80 RCX: 00007f9293ef6149 07:23:16 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) (fail_nth: 93) [ 684.211142][T22722] RDX: 000000000001a000 RSI: 0000000020000000 RDI: 0000000000000004 [ 684.219142][T22722] RBP: 00007f92932691d0 R08: 0000000020000080 R09: 000000000000001c [ 684.227148][T22722] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 684.235150][T22722] R13: 00007ffdbda7c2df R14: 00007f9293269300 R15: 0000000000022000 [ 684.243221][T22722] [ 684.288658][T22733] FAULT_INJECTION: forcing a failure. [ 684.288658][T22733] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 684.301782][T22733] CPU: 1 PID: 22733 Comm: syz-executor.3 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 684.312265][T22733] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 684.322344][T22733] Call Trace: [ 684.325697][T22733] [ 684.328642][T22733] dump_stack_lvl+0xda/0x130 [ 684.333304][T22733] dump_stack+0x15/0x20 [ 684.337511][T22733] should_fail_ex+0x21f/0x230 [ 684.342229][T22733] should_fail+0xb/0x10 [ 684.346512][T22733] should_fail_usercopy+0x1a/0x20 [ 684.351700][T22733] copy_page_from_iter_atomic+0x22d/0xcf0 [ 684.357454][T22733] ? folio_test_hugetlb+0x3a/0x70 [ 684.362516][T22733] ? shmem_write_begin+0x12a/0x1d0 [ 684.367766][T22733] generic_perform_write+0x203/0x3d0 [ 684.373089][T22733] ? shmem_write_begin+0x1d0/0x1d0 [ 684.378330][T22733] __generic_file_write_iter+0xe6/0x290 [ 684.383913][T22733] generic_file_write_iter+0x7d/0x1c0 [ 684.389326][T22733] vfs_write+0x47b/0x780 [ 684.393667][T22733] ksys_write+0xeb/0x1a0 [ 684.397941][T22733] __x64_sys_write+0x42/0x50 [ 684.402648][T22733] do_syscall_64+0x41/0xc0 [ 684.407107][T22733] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 684.413049][T22733] RIP: 0033:0x7f1567f53ecf [ 684.417524][T22733] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 07:23:16 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0x25000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) [ 684.437223][T22733] RSP: 002b:00007f1567314f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 684.445676][T22733] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007f1567f53ecf [ 684.453843][T22733] RDX: 0000000000100000 RSI: 00007f155eef5000 RDI: 0000000000000005 [ 684.461840][T22733] RBP: 00007f155eef5000 R08: 0000000000000000 R09: 0000000000000534 [ 684.469895][T22733] R10: 0000000000100000 R11: 0000000000000293 R12: 0000000000000000 [ 684.477955][T22733] R13: 00007f1567314fdc R14: 00007f1567314fe0 R15: 0000000020000fc2 [ 684.485965][T22733] [ 684.522684][T22738] FAULT_INJECTION: forcing a failure. [ 684.522684][T22738] name failslab, interval 1, probability 0, space 0, times 0 [ 684.535380][T22738] CPU: 1 PID: 22738 Comm: syz-executor.2 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 684.545827][T22738] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 684.554219][T22733] loop3: detected capacity change from 0 to 2048 [ 684.555896][T22738] Call Trace: [ 684.555906][T22738] 07:23:17 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) r2 = open(&(0x7f0000000040)='./file0\x00', 0x161842, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'sit0\x00'}) r4 = syz_io_uring_setup(0x73d7, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000100)=0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r6, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x10001) r8 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x8010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(r5, 0x0, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x8) syz_io_uring_submit(0x0, r8, &(0x7f00000008c0)=@IORING_OP_OPENAT2={0x1c, 0x40, 0x0, 0xffffffffffffffff, &(0x7f0000000840)={0x4ae0e0, 0x2, 0x5}, &(0x7f0000000880)='./file0\x00', 0x18, 0x0, 0x12345}, 0xff) syz_io_uring_submit(r5, 0x0, &(0x7f0000002b40)=@IORING_OP_RECVMSG={0xa, 0x2b, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000002b00)={0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/28, 0x1c}, {&(0x7f0000001540)=""/4096, 0x1000}, {&(0x7f0000002540)=""/131, 0x83}, {&(0x7f0000002600)=""/102, 0x66}, {&(0x7f0000002840)=""/203, 0xcb}], 0x6}, 0x0, 0x10040, 0x1, {0x1}}, 0x0) ftruncate(r2, 0x200002) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x200000e, 0x12, r3, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) r10 = creat(&(0x7f0000000180)='./file0\x00', 0x0) fallocate(r10, 0x0, 0x0, 0x2000402) fallocate(r9, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r9, 0xc028660f, &(0x7f0000001380)={0xc, r10, 0xf}) 07:23:17 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0x2c000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) [ 684.555915][T22738] dump_stack_lvl+0xda/0x130 [ 684.555945][T22738] dump_stack+0x15/0x20 [ 684.577383][T22738] should_fail_ex+0x21f/0x230 [ 684.582114][T22738] __should_failslab+0x92/0xa0 [ 684.586925][T22738] should_failslab+0x9/0x20 [ 684.588314][T22733] FAT-fs (loop3): Unrecognized mount option "ÿÿÿÿÿÿÿÿ184467440737095516150xffffffffffffffff" or missing value [ 684.591452][T22738] slab_pre_alloc_hook+0x38/0x180 [ 684.608194][T22738] __kmem_cache_alloc_node+0x46/0x250 [ 684.613617][T22738] ? sctp_add_bind_addr+0x6f/0x1e0 [ 684.618766][T22738] kmalloc_trace+0x2a/0xa0 07:23:17 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a000000190000", 0x7) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000380)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000008c0)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000001cc0)={{}, r2, 0x16, @inherit={0x88, &(0x7f0000001580)=ANY=[@ANYRES16=r3]}, @devid}) r4 = syz_open_dev$MSR(&(0x7f0000000140), 0x100000000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r4, 0x84009422, &(0x7f0000000ec0)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(r6, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000001840)=ANY=[@ANYRES32=r5, @ANYRES32=r3, @ANYRESOCT, @ANYRES32=r1, @ANYRES32, @ANYRES64, @ANYRESHEX], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x40025) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f0000001500)={r5, "2ce8b7e675c30c143ac940d229ad3592"}) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$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") r7 = socket$inet_udplite(0x2, 0x2, 0x88) read(r7, &(0x7f00000000c0)=""/43, 0x2b) [ 684.623304][T22738] sctp_add_bind_addr+0x6f/0x1e0 [ 684.628282][T22738] sctp_copy_local_addr_list+0x19b/0x220 [ 684.633947][T22738] sctp_copy_one_addr+0x7d/0x400 [ 684.638927][T22738] sctp_bind_addr_copy+0x81/0x2b0 [ 684.644099][T22738] sctp_assoc_set_bind_addr_from_ep+0xc0/0xd0 [ 684.650221][T22738] sctp_connect_new_asoc+0x1cb/0x3a0 [ 684.655591][T22738] sctp_sendmsg+0xefc/0x1900 [ 684.660295][T22738] inet_sendmsg+0x63/0x80 [ 684.664662][T22738] __sys_sendto+0x246/0x300 07:23:17 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0x2f000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) [ 684.669200][T22738] __x64_sys_sendto+0x78/0x90 [ 684.673970][T22738] do_syscall_64+0x41/0xc0 [ 684.678432][T22738] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 684.684453][T22738] RIP: 0033:0x7f9293ef6149 [ 684.688945][T22738] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 684.708653][T22738] RSP: 002b:00007f9293269168 EFLAGS: 00000246 ORIG_RAX: 000000000000002c 07:23:17 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000002c0)={&(0x7f0000000c80)=ANY=[@ANYBLOB="0026bd7000ffdbdf25070000000c00068008000b00060000000c0008002302b41174de3f460a6d000000000000080003000380000008000300bd2c00ff07000400f8ffffff080003001dd30000080004006604000000000000000000"], 0x5c}, 0x1, 0x0, 0x0, 0x1884}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6, 0x6}]}}}]}, 0x3c}}, 0x0) r3 = openat(r2, &(0x7f00000000c0)='./file0\x00', 0x0, 0x31) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00./file0\x00']) connect$unix(r3, &(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000001c0), 0x200080, 0x0) ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f0000000200)={0x55, 0xb5f3, 0x2, 0x1, 0x6}) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000600)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000800)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x40}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) io_setup(0x6, &(0x7f00000003c0)=0x0) r7 = socket$phonet_pipe(0x23, 0x5, 0x2) io_submit(r6, 0x2, &(0x7f00000005c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, r7, &(0x7f00000001c0)='\"', 0x1}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r8, &(0x7f0000006440)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f0000000c40)={0x10, 0x1d, 0x20, 0x70bd28, 0x25dfdbfd}, 0x10}, {&(0x7f0000000f80)={0x20c, 0x3d, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x1f, 0x46, 0x0, 0x1, [@generic="6b23bda57b0fcd6882aea56d992b0de112a87c9689a0ce8f3a928a"]}, @generic="931dd380ae9b76725532f39b25791247f8e1faaa5606177d1141efdf8a23daecc73d0706f82254c664a01e4c4986b42b265e8e88f8f88e8099514ce917072d6e80996cbddc81dd1014a75c1cd2e0c084d7806b82c11b8a625557f25357333f879c7f3ea978d0c62492b2b2a3437425bf3933cf6d0456ae40263ff847b9956f9f56cd1e35dd616a0dffde59", @nested={0x14d, 0x46, 0x0, 0x1, [@typed={0x8, 0x8f, 0x0, 0x0, @u32=0x4}, @generic="3fe433e9f5d2f6047805d9eb39d59742ad46c8bd198fea6b4f77d0bf577f925374abd91b16efa9a31621d58f4b1ee788ba33ce3ae89358fcbecdc28e3a8775ee6c905d5275bf5f05ca6bfc68336199389a9644323a81d22c4bd081ec9c4826b7e965a5292167778eefb5edac3e1e0fd628684a30dbac663eb65de357a891a90855f356cbe26225342cce43c8e320a777c2a1f74ab97b7e442c94", @typed={0x8, 0x41, 0x0, 0x0, @ipv4=@multicast2}, @typed={0x8, 0x6b, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @generic="79c7219fa8393ab7671b616b9cea5f59e77de2a2ea4a268fcad39d31284ee1045f7dedc0dea487845188adde6fe70f5537a0635e01c2ec0a205c1f92c2272999ec8388f9a95b4d387581056e112c58f96f686734281b5a", @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@remote}, @generic="2d7a6c2813a21aa5bc78773404596de147d491e1868776a08d604bfb6aea387b585ce5b3f7ab336df3922c65"]}]}, 0x20c}, {&(0x7f0000000e00)={0x30, 0x12, 0x800, 0x70bd27, 0x25dfdbfc, "", [@typed={0x8, 0x5b, 0x0, 0x0, @pid}, @typed={0xf, 0x8c, 0x0, 0x0, @str='syzkaller1\x00'}, @typed={0x8, 0x7, 0x0, 0x0, @u32}]}, 0x30}, {&(0x7f0000000e40)={0xc8, 0x42, 0x10, 0x70bd26, 0x25dfdbff, "", [@generic="208cd2ae6be9be", @generic="c1d6c27da633daf115873b83c8913d284239d441678e667c20444d1a1f77f48ea7cbf783d84e79a9ebc262452149fe521b40868bf3938c61c8be3cdbd7429e623c99db5ae26d9cf24ee4ef4777ff0410e8b899b18e829f387d7926641f189d2b9697e099ffb7f20f691064b7d87d04cd2e230e8df8c77a2f1e4f4fabd49cfe414b3027dd850d9a2be9547ba5f2ed09811ea9ed9b201782165a792b57afca3e3d575d0f5b4b17a8", @typed={0x8, 0x94, 0x0, 0x0, @u32=0x1}]}, 0xc8}], 0x4, 0x0, 0x0, 0x8801}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000900)={'team0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000c00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000bc0)={&(0x7f00000011c0)=@dellink={0x25c, 0x11, 0x400, 0x70bd28, 0x25dfdbff, {0x0, 0x0, 0x0, r9, 0x1000}, [@IFLA_PROTO_DOWN={0x5}, @IFLA_IFNAME={0x14, 0x3, 'macvlan1\x00'}, @IFLA_MAP={0x24, 0xe, {0x9, 0xd2, 0x2e4d, 0x200, 0x3e, 0xff}}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x5}, @IFLA_IFALIAS={0x14, 0x14, 'syzkaller1\x00'}, @IFLA_MTU={0x8, 0x4, 0x101}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_VFINFO_LIST={0x1cc, 0x16, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x8fe, 0xffff}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x5, 0x1}}]}, {0x84, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN_LIST={0x54, 0xc, 0x0, 0x1, [{0x14, 0x1, {0xb5d3, 0xadc, 0x100, 0xd1c53560eb87a9fa}}, {0x14, 0x1, {0x4, 0xb6, 0x81, 0x8100}}, {0x14, 0x1, {0x0, 0x6e4, 0x1, 0x88a8}}, {0x14, 0x1, {0x14, 0xaed, 0x0, 0x8100}}]}, @IFLA_VF_TX_RATE={0xc, 0x3, {0x1000, 0x200}}, @IFLA_VF_TRUST={0xc, 0x9, {0x7, 0x800}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x8000, 0x1}}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x7f, 0x7fff}}, @IFLA_VF_TRUST={0xc, 0x9, {0x7ff, 0x8}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_RATE={0x10, 0x6, {0x9, 0x5, 0x5}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x9}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x80000000, 0x3}}]}, {0xa4, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0xfff, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1d}}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x3f, 0x43}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x65c, 0x1}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x2, 0x80000001}}, @IFLA_VF_VLAN_LIST={0x40, 0xc, 0x0, 0x1, [{0x14, 0x1, {0xcae8, 0x919, 0x9, 0x8100}}, {0x14, 0x1, {0x200, 0xb47, 0xaaa, 0x8100}}, {0x14, 0x1, {0x5, 0x53b, 0xfffffff7, 0x88a8}}]}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x3f, 0x7fff}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x930, 0x5}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x6, 0x8}}]}]}]}, 0x25c}, 0x1, 0x0, 0x0, 0x11}, 0x4c089) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r7, 0x40189429, &(0x7f0000000480)={0x1, 0x4, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r10, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x45, 0xfc, 0x6}, {0x6}]}, 0x10) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x2, 0x3, &(0x7f0000000000)=@framed={{0x18, 0xf}}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) socket$inet6_sctp(0xa, 0x801, 0x84) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) r11 = socket$igmp(0x2, 0x3, 0x2) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@private1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) ioctl$TUNSETOWNER(r3, 0x400454cc, r12) setsockopt$MRT_INIT(r11, 0x0, 0xc8, &(0x7f0000000040), 0x4) setsockopt$MRT_ADD_VIF(r11, 0x0, 0xca, &(0x7f0000000100)={0x0, 0x1, 0x0, 0x0, @vifc_lcl_addr=@dev={0xac, 0x14, 0x14, 0xb}, @multicast1}, 0x10) [ 684.717169][T22738] RAX: ffffffffffffffda RBX: 00007f9294015f80 RCX: 00007f9293ef6149 [ 684.725171][T22738] RDX: 000000000001a000 RSI: 0000000020000000 RDI: 0000000000000004 [ 684.733168][T22738] RBP: 00007f92932691d0 R08: 0000000020000080 R09: 000000000000001c [ 684.741218][T22738] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 684.749235][T22738] R13: 00007ffdbda7c2df R14: 00007f9293269300 R15: 0000000000022000 [ 684.757338][T22738] 07:23:17 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0x38000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) 07:23:17 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, 0x0) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$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") (fail_nth: 52) 07:23:17 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) (fail_nth: 94) [ 684.855450][T22753] (unnamed net_device) (uninitialized): option use_carrier: invalid value (6) [ 684.926892][T22761] FAULT_INJECTION: forcing a failure. [ 684.926892][T22761] name failslab, interval 1, probability 0, space 0, times 0 [ 684.932539][T22763] FAULT_INJECTION: forcing a failure. [ 684.932539][T22763] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 684.939543][T22761] CPU: 0 PID: 22761 Comm: syz-executor.2 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 684.963247][T22761] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 684.973474][T22761] Call Trace: [ 684.976775][T22761] [ 684.979706][T22761] dump_stack_lvl+0xda/0x130 [ 684.984344][T22761] dump_stack+0x15/0x20 [ 684.988574][T22761] should_fail_ex+0x21f/0x230 [ 684.993269][T22761] __should_failslab+0x92/0xa0 [ 684.998098][T22761] should_failslab+0x9/0x20 [ 685.002614][T22761] slab_pre_alloc_hook+0x38/0x180 [ 685.007680][T22761] __kmem_cache_alloc_node+0x46/0x250 [ 685.013068][T22761] ? sctp_add_bind_addr+0x6f/0x1e0 [ 685.018269][T22761] kmalloc_trace+0x2a/0xa0 [ 685.022902][T22761] sctp_add_bind_addr+0x6f/0x1e0 [ 685.027876][T22761] sctp_copy_local_addr_list+0x19b/0x220 [ 685.033531][T22761] sctp_copy_one_addr+0x7d/0x400 [ 685.038491][T22761] sctp_bind_addr_copy+0x81/0x2b0 [ 685.043548][T22761] sctp_assoc_set_bind_addr_from_ep+0xc0/0xd0 [ 685.049757][T22761] sctp_connect_new_asoc+0x1cb/0x3a0 [ 685.055110][T22761] sctp_sendmsg+0xefc/0x1900 [ 685.059821][T22761] inet_sendmsg+0x63/0x80 [ 685.064170][T22761] __sys_sendto+0x246/0x300 [ 685.068692][T22761] __x64_sys_sendto+0x78/0x90 [ 685.073392][T22761] do_syscall_64+0x41/0xc0 [ 685.077895][T22761] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 685.083825][T22761] RIP: 0033:0x7f9293ef6149 [ 685.088343][T22761] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 685.108029][T22761] RSP: 002b:00007f9293269168 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 685.116448][T22761] RAX: ffffffffffffffda RBX: 00007f9294015f80 RCX: 00007f9293ef6149 [ 685.124422][T22761] RDX: 000000000001a000 RSI: 0000000020000000 RDI: 0000000000000004 [ 685.132508][T22761] RBP: 00007f92932691d0 R08: 0000000020000080 R09: 000000000000001c [ 685.140486][T22761] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 685.148544][T22761] R13: 00007ffdbda7c2df R14: 00007f9293269300 R15: 0000000000022000 [ 685.156578][T22761] [ 685.159605][T22763] CPU: 1 PID: 22763 Comm: syz-executor.3 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 685.170063][T22763] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 685.180143][T22763] Call Trace: [ 685.183466][T22763] [ 685.183785][T22762] loop0: detected capacity change from 0 to 2048 [ 685.186406][T22763] dump_stack_lvl+0xda/0x130 [ 685.186478][T22763] dump_stack+0x15/0x20 [ 685.186512][T22763] should_fail_ex+0x21f/0x230 [ 685.186553][T22763] __alloc_pages+0x108/0x340 [ 685.186613][T22763] vma_alloc_folio+0x6a3/0x8c0 [ 685.186637][T22763] ? __vm_enough_memory+0xdf/0x2a0 [ 685.186734][T22763] shmem_get_folio_gfp+0x801/0x1200 [ 685.186764][T22763] shmem_write_begin+0xa6/0x1d0 [ 685.186789][T22763] generic_perform_write+0x1c3/0x3d0 [ 685.186852][T22763] ? shmem_write_begin+0x1d0/0x1d0 [ 685.186877][T22763] __generic_file_write_iter+0xe6/0x290 [ 685.186914][T22763] generic_file_write_iter+0x7d/0x1c0 [ 685.187009][T22763] vfs_write+0x47b/0x780 [ 685.187035][T22763] ksys_write+0xeb/0x1a0 [ 685.187062][T22763] __x64_sys_write+0x42/0x50 [ 685.200193][T22762] FAT-fs (loop0): Unrecognized mount option "ÿÿÿÿÿÿÿÿ184467440737095516150xffffffffffffffff" or missing value [ 685.202243][T22763] do_syscall_64+0x41/0xc0 [ 685.282035][T22763] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 685.287983][T22763] RIP: 0033:0x7f1567f53ecf [ 685.292421][T22763] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 685.312057][T22763] RSP: 002b:00007f1567314f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 685.320644][T22763] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007f1567f53ecf [ 685.328661][T22763] RDX: 0000000000100000 RSI: 00007f155eef5000 RDI: 0000000000000005 [ 685.336656][T22763] RBP: 00007f155eef5000 R08: 0000000000000000 R09: 0000000000000534 [ 685.344665][T22763] R10: 0000000000100000 R11: 0000000000000293 R12: 0000000000000000 [ 685.352731][T22763] R13: 00007f1567314fdc R14: 00007f1567314fe0 R15: 0000000020000fc2 [ 685.360739][T22763] 07:23:17 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, 0x0) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$eJzs1T9rE3EYB/AnaazRqbM4/MDFqVQ3JyOSQvFAUTLoZKBxyYmQWy6Z8hJ8Ab4wB1+EZMp2Ei5VWxSDNLnSfj7LPdz3ud+/g7v39z+OTz8VH75+/hLdXivavbjTXrbiINpxZh4AwHWyrKr4XtWaXgsAsBv+/wBw87x5++7Fsyzrv06pG7GYl4NyUF/r/Pgk6x+llf3fnlqU5WDvZ/4o1c7nt+LuOn/8x3w/Hj6o81X2/GV2Ib8dp1vfPQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA3GyHKXUiIqWUDn7dXZTlYK/OD9OZC3ldHZ9k/aN1w/m8E/c6O9sGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAcAmK6Ww8zPPR5JoVEd9ix5N210d6uSMv/tXTW097VU5+m8XTTZtfLatq05GfRMTWF9+KmK/eUvNnuGnR3DcJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABoVjGdjYd5PpoUTa8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALgqiulsPMzz0eS/i2jVI/29p+k9AgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAM34EQAA///P7Cnj") (fail_nth: 53) 07:23:17 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) (fail_nth: 95) [ 685.371404][T22753] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=22753 comm=syz-executor.5 [ 685.393038][T22753] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=61 sclass=netlink_route_socket pid=22753 comm=syz-executor.5 [ 685.412384][T22753] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 07:23:17 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0x3a000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) [ 685.434044][T22768] FAULT_INJECTION: forcing a failure. [ 685.434044][T22768] name failslab, interval 1, probability 0, space 0, times 0 [ 685.446717][T22768] CPU: 1 PID: 22768 Comm: syz-executor.2 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 685.457154][T22768] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 685.467354][T22768] Call Trace: [ 685.470658][T22768] [ 685.473610][T22768] dump_stack_lvl+0xda/0x130 [ 685.478244][T22768] dump_stack+0x15/0x20 [ 685.482443][T22768] should_fail_ex+0x21f/0x230 [ 685.487223][T22768] __should_failslab+0x92/0xa0 [ 685.492027][T22768] should_failslab+0x9/0x20 [ 685.496616][T22768] slab_pre_alloc_hook+0x38/0x180 [ 685.501800][T22768] __kmem_cache_alloc_node+0x46/0x250 [ 685.503289][T22770] FAULT_INJECTION: forcing a failure. [ 685.503289][T22770] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 685.507191][T22768] ? sctp_add_bind_addr+0x6f/0x1e0 [ 685.507249][T22768] kmalloc_trace+0x2a/0xa0 [ 685.529840][T22768] sctp_add_bind_addr+0x6f/0x1e0 [ 685.534802][T22768] sctp_copy_local_addr_list+0x19b/0x220 [ 685.540474][T22768] sctp_copy_one_addr+0x7d/0x400 [ 685.545471][T22768] sctp_bind_addr_copy+0x81/0x2b0 [ 685.550514][T22768] sctp_assoc_set_bind_addr_from_ep+0xc0/0xd0 [ 685.556603][T22768] sctp_connect_new_asoc+0x1cb/0x3a0 [ 685.561904][T22768] sctp_sendmsg+0xefc/0x1900 [ 685.566513][T22768] inet_sendmsg+0x63/0x80 [ 685.570895][T22768] __sys_sendto+0x246/0x300 [ 685.575446][T22768] __x64_sys_sendto+0x78/0x90 [ 685.580134][T22768] do_syscall_64+0x41/0xc0 [ 685.584604][T22768] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 685.590525][T22768] RIP: 0033:0x7f9293ef6149 [ 685.594942][T22768] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 685.614707][T22768] RSP: 002b:00007f9293269168 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 685.623130][T22768] RAX: ffffffffffffffda RBX: 00007f9294015f80 RCX: 00007f9293ef6149 [ 685.631116][T22768] RDX: 000000000001a000 RSI: 0000000020000000 RDI: 0000000000000004 [ 685.639181][T22768] RBP: 00007f92932691d0 R08: 0000000020000080 R09: 000000000000001c [ 685.647208][T22768] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 685.655271][T22768] R13: 00007ffdbda7c2df R14: 00007f9293269300 R15: 0000000000022000 [ 685.663252][T22768] [ 685.666706][T22770] CPU: 0 PID: 22770 Comm: syz-executor.3 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 685.677254][T22770] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 685.687390][T22770] Call Trace: [ 685.690686][T22770] [ 685.693634][T22770] dump_stack_lvl+0xda/0x130 [ 685.698311][T22770] dump_stack+0x15/0x20 [ 685.702507][T22770] should_fail_ex+0x21f/0x230 [ 685.707233][T22770] should_fail+0xb/0x10 [ 685.711461][T22770] should_fail_usercopy+0x1a/0x20 [ 685.716553][T22770] copy_page_from_iter_atomic+0x22d/0xcf0 [ 685.722344][T22770] ? folio_test_hugetlb+0x3a/0x70 [ 685.727480][T22770] ? shmem_write_begin+0x12a/0x1d0 07:23:18 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) (fail_nth: 96) 07:23:18 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) r2 = open(&(0x7f0000000040)='./file0\x00', 0x161842, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'sit0\x00'}) r4 = syz_io_uring_setup(0x73d7, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000100)=0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r6, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x10001) r8 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x8010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(r5, 0x0, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x8) syz_io_uring_submit(0x0, r8, &(0x7f00000008c0)=@IORING_OP_OPENAT2={0x1c, 0x40, 0x0, 0xffffffffffffffff, &(0x7f0000000840)={0x4ae0e0, 0x2, 0x5}, &(0x7f0000000880)='./file0\x00', 0x18, 0x0, 0x12345}, 0xff) syz_io_uring_submit(r5, 0x0, &(0x7f0000002b40)=@IORING_OP_RECVMSG={0xa, 0x2b, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000002b00)={0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/28, 0x1c}, {&(0x7f0000001540)=""/4096, 0x1000}, {&(0x7f0000002540)=""/131, 0x83}, {&(0x7f0000002600)=""/102, 0x66}, {&(0x7f0000002840)=""/203, 0xcb}], 0x6}, 0x0, 0x10040, 0x1, {0x1}}, 0x0) ftruncate(r2, 0x200002) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x200000e, 0x12, r3, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) r10 = creat(&(0x7f0000000180)='./file0\x00', 0x0) fallocate(r10, 0x0, 0x0, 0x2000402) fallocate(r9, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r9, 0xc028660f, &(0x7f0000001380)={0xc, r10, 0x10}) 07:23:18 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000019000000", 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000380)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000008c0)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000001cc0)={{}, r2, 0x16, @inherit={0x88, &(0x7f0000001580)=ANY=[@ANYRES16=r3]}, @devid}) r4 = syz_open_dev$MSR(&(0x7f0000000140), 0x100000000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r4, 0x84009422, &(0x7f0000000ec0)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(r6, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000001840)=ANY=[@ANYRES32=r5, @ANYRES32=r3, @ANYRESOCT, @ANYRES32=r1, @ANYRES32, @ANYRES64, @ANYRESHEX], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x40025) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f0000001500)={r5, "2ce8b7e675c30c143ac940d229ad3592"}) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$eJzs1T9rE3EYB/AnaazRqbM4/MDFqVQ3JyOSQvFAUTLoZKBxyYmQWy6Z8hJ8Ab4wB1+EZMp2Ei5VWxSDNLnSfj7LPdz3ud+/g7v39z+OTz8VH75+/hLdXivavbjTXrbiINpxZh4AwHWyrKr4XtWaXgsAsBv+/wBw87x5++7Fsyzrv06pG7GYl4NyUF/r/Pgk6x+llf3fnlqU5WDvZ/4o1c7nt+LuOn/8x3w/Hj6o81X2/GV2Ib8dp1vfPQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA3GyHKXUiIqWUDn7dXZTlYK/OD9OZC3ldHZ9k/aN1w/m8E/c6O9sGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAcAmK6Ww8zPPR5JoVEd9ix5N210d6uSMv/tXTW097VU5+m8XTTZtfLatq05GfRMTWF9+KmK/eUvNnuGnR3DcJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABoVjGdjYd5PpoUTa8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALgqiulsPMzz0eS/i2jVI/29p+k9AgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAM34EQAA///P7Cnj") r7 = socket$inet_udplite(0x2, 0x2, 0x88) read(r7, &(0x7f00000000c0)=""/43, 0x2b) 07:23:18 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0x3c010000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) [ 685.732624][T22770] generic_perform_write+0x203/0x3d0 [ 685.737958][T22770] ? shmem_write_begin+0x1d0/0x1d0 [ 685.743159][T22770] __generic_file_write_iter+0xe6/0x290 [ 685.748820][T22770] generic_file_write_iter+0x7d/0x1c0 [ 685.754238][T22770] vfs_write+0x47b/0x780 [ 685.758507][T22770] ksys_write+0xeb/0x1a0 [ 685.762861][T22770] __x64_sys_write+0x42/0x50 [ 685.767548][T22770] do_syscall_64+0x41/0xc0 [ 685.772789][T22770] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 685.778715][T22770] RIP: 0033:0x7f1567f53ecf 07:23:18 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0x3f000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) [ 685.783195][T22770] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 685.802998][T22770] RSP: 002b:00007f1567314f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 685.811433][T22770] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007f1567f53ecf [ 685.819583][T22770] RDX: 0000000000100000 RSI: 00007f155eef5000 RDI: 0000000000000005 [ 685.827603][T22770] RBP: 00007f155eef5000 R08: 0000000000000000 R09: 0000000000000534 [ 685.835637][T22770] R10: 0000000000100000 R11: 0000000000000293 R12: 0000000000000000 [ 685.843632][T22770] R13: 00007f1567314fdc R14: 00007f1567314fe0 R15: 0000000020000fc2 [ 685.851638][T22770] [ 685.859634][T22786] FAULT_INJECTION: forcing a failure. [ 685.859634][T22786] name failslab, interval 1, probability 0, space 0, times 0 [ 685.872380][T22786] CPU: 0 PID: 22786 Comm: syz-executor.2 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 685.882858][T22786] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 685.892936][T22786] Call Trace: [ 685.896315][T22786] [ 685.899280][T22786] dump_stack_lvl+0xda/0x130 [ 685.903912][T22786] dump_stack+0x15/0x20 [ 685.908225][T22786] should_fail_ex+0x21f/0x230 [ 685.912983][T22786] __should_failslab+0x92/0xa0 [ 685.917792][T22786] should_failslab+0x9/0x20 [ 685.922344][T22786] slab_pre_alloc_hook+0x38/0x180 [ 685.927486][T22786] __kmem_cache_alloc_node+0x46/0x250 [ 685.933008][T22786] ? sctp_add_bind_addr+0x6f/0x1e0 [ 685.938154][T22786] kmalloc_trace+0x2a/0xa0 [ 685.942746][T22786] sctp_add_bind_addr+0x6f/0x1e0 [ 685.947759][T22786] sctp_copy_local_addr_list+0x19b/0x220 [ 685.953493][T22786] sctp_copy_one_addr+0x7d/0x400 [ 685.958475][T22786] sctp_bind_addr_copy+0x81/0x2b0 [ 685.963575][T22786] sctp_assoc_set_bind_addr_from_ep+0xc0/0xd0 [ 685.969680][T22786] sctp_connect_new_asoc+0x1cb/0x3a0 [ 685.975077][T22786] sctp_sendmsg+0xefc/0x1900 [ 685.979840][T22786] inet_sendmsg+0x63/0x80 [ 685.984214][T22786] __sys_sendto+0x246/0x300 [ 685.988842][T22786] __x64_sys_sendto+0x78/0x90 [ 685.993665][T22786] do_syscall_64+0x41/0xc0 [ 685.998161][T22786] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 686.004098][T22786] RIP: 0033:0x7f9293ef6149 [ 686.008570][T22786] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 686.028211][T22786] RSP: 002b:00007f9293269168 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 686.036692][T22786] RAX: ffffffffffffffda RBX: 00007f9294015f80 RCX: 00007f9293ef6149 [ 686.040985][T22770] loop3: detected capacity change from 0 to 2048 [ 686.044673][T22786] RDX: 000000000001a000 RSI: 0000000020000000 RDI: 0000000000000004 [ 686.044692][T22786] RBP: 00007f92932691d0 R08: 0000000020000080 R09: 000000000000001c [ 686.067210][T22786] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 686.075215][T22786] R13: 00007ffdbda7c2df R14: 00007f9293269300 R15: 0000000000022000 07:23:18 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000002c0)={&(0x7f0000000c80)=ANY=[@ANYBLOB="0026bd7000ffdbdf25070000000c00068008000b00060000000c0008002302b41174de3f460a6d000000000000080003000380000008000300bd2c00ff07000400f8ffffff080003001dd30000080004006604000000000000000000"], 0x5c}, 0x1, 0x0, 0x0, 0x1884}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6, 0x6}]}}}]}, 0x3c}}, 0x0) r3 = openat(r2, &(0x7f00000000c0)='./file0\x00', 0x0, 0x31) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00./file0\x00']) connect$unix(r3, &(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000001c0), 0x200080, 0x0) ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f0000000200)={0x55, 0xb5f3, 0x2, 0x1, 0x6}) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000600)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000800)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x40}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) io_setup(0x6, &(0x7f00000003c0)=0x0) r7 = socket$phonet_pipe(0x23, 0x5, 0x2) io_submit(r6, 0x2, &(0x7f00000005c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, r7, &(0x7f00000001c0)='\"', 0x1}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r8, &(0x7f0000006440)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f0000000c40)={0x10, 0x1d, 0x20, 0x70bd28, 0x25dfdbfd}, 0x10}, {&(0x7f0000000f80)={0x20c, 0x3d, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x1f, 0x46, 0x0, 0x1, [@generic="6b23bda57b0fcd6882aea56d992b0de112a87c9689a0ce8f3a928a"]}, @generic="931dd380ae9b76725532f39b25791247f8e1faaa5606177d1141efdf8a23daecc73d0706f82254c664a01e4c4986b42b265e8e88f8f88e8099514ce917072d6e80996cbddc81dd1014a75c1cd2e0c084d7806b82c11b8a625557f25357333f879c7f3ea978d0c62492b2b2a3437425bf3933cf6d0456ae40263ff847b9956f9f56cd1e35dd616a0dffde59", @nested={0x14d, 0x46, 0x0, 0x1, [@typed={0x8, 0x8f, 0x0, 0x0, @u32=0x4}, @generic="3fe433e9f5d2f6047805d9eb39d59742ad46c8bd198fea6b4f77d0bf577f925374abd91b16efa9a31621d58f4b1ee788ba33ce3ae89358fcbecdc28e3a8775ee6c905d5275bf5f05ca6bfc68336199389a9644323a81d22c4bd081ec9c4826b7e965a5292167778eefb5edac3e1e0fd628684a30dbac663eb65de357a891a90855f356cbe26225342cce43c8e320a777c2a1f74ab97b7e442c94", @typed={0x8, 0x41, 0x0, 0x0, @ipv4=@multicast2}, @typed={0x8, 0x6b, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @generic="79c7219fa8393ab7671b616b9cea5f59e77de2a2ea4a268fcad39d31284ee1045f7dedc0dea487845188adde6fe70f5537a0635e01c2ec0a205c1f92c2272999ec8388f9a95b4d387581056e112c58f96f686734281b5a", @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@remote}, @generic="2d7a6c2813a21aa5bc78773404596de147d491e1868776a08d604bfb6aea387b585ce5b3f7ab336df3922c65"]}]}, 0x20c}, {&(0x7f0000000e00)={0x30, 0x12, 0x800, 0x70bd27, 0x25dfdbfc, "", [@typed={0x8, 0x5b, 0x0, 0x0, @pid}, @typed={0xf, 0x8c, 0x0, 0x0, @str='syzkaller1\x00'}, @typed={0x8, 0x7, 0x0, 0x0, @u32}]}, 0x30}, {&(0x7f0000000e40)={0xc8, 0x42, 0x10, 0x70bd26, 0x25dfdbff, "", [@generic="208cd2ae6be9be", @generic="c1d6c27da633daf115873b83c8913d284239d441678e667c20444d1a1f77f48ea7cbf783d84e79a9ebc262452149fe521b40868bf3938c61c8be3cdbd7429e623c99db5ae26d9cf24ee4ef4777ff0410e8b899b18e829f387d7926641f189d2b9697e099ffb7f20f691064b7d87d04cd2e230e8df8c77a2f1e4f4fabd49cfe414b3027dd850d9a2be9547ba5f2ed09811ea9ed9b201782165a792b57afca3e3d575d0f5b4b17a8", @typed={0x8, 0x94, 0x0, 0x0, @u32=0x1}]}, 0xc8}], 0x4, 0x0, 0x0, 0x8801}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000900)) sendmsg$nl_route(r8, 0x0, 0x4c089) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r7, 0x40189429, &(0x7f0000000480)={0x1, 0x4, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r9, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x45, 0xfc, 0x6}, {0x6}]}, 0x10) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r9) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x2, 0x3, &(0x7f0000000000)=@framed={{0x18, 0xf}}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) socket$inet6_sctp(0xa, 0x801, 0x84) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) r10 = socket$igmp(0x2, 0x3, 0x2) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@private1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) ioctl$TUNSETOWNER(r3, 0x400454cc, r11) setsockopt$MRT_INIT(r10, 0x0, 0xc8, &(0x7f0000000040), 0x4) setsockopt$MRT_ADD_VIF(r10, 0x0, 0xca, &(0x7f0000000100)={0x0, 0x1, 0x0, 0x0, @vifc_lcl_addr=@dev={0xac, 0x14, 0x14, 0xb}, @multicast1}, 0x10) 07:23:18 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0x40000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) 07:23:18 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) (fail_nth: 97) [ 686.076027][T22770] FAT-fs (loop3): Unrecognized mount option "ÿÿÿÿÿÿÿÿ184467440737095516150xffffffffffffffff" or missing value [ 686.083206][T22786] [ 686.147326][T22794] validate_nla: 10 callbacks suppressed [ 686.147354][T22794] netlink: 'syz-executor.1': attribute type 6 has an invalid length. [ 686.164318][T22797] FAULT_INJECTION: forcing a failure. [ 686.164318][T22797] name failslab, interval 1, probability 0, space 0, times 0 [ 686.175243][T22779] loop0: detected capacity change from 0 to 2048 [ 686.176989][T22797] CPU: 1 PID: 22797 Comm: syz-executor.2 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 686.193037][T22779] FAT-fs (loop0): Unrecognized mount option "ÿÿÿÿÿÿÿÿ184467440737095516150xffffffffffffffff" or missing value [ 686.194065][T22797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 686.215869][T22797] Call Trace: [ 686.219162][T22797] [ 686.222118][T22797] dump_stack_lvl+0xda/0x130 [ 686.226825][T22797] dump_stack+0x15/0x20 [ 686.231147][T22797] should_fail_ex+0x21f/0x230 [ 686.235972][T22797] __should_failslab+0x92/0xa0 [ 686.240912][T22797] should_failslab+0x9/0x20 [ 686.245459][T22797] slab_pre_alloc_hook+0x38/0x180 [ 686.250563][T22797] __kmem_cache_alloc_node+0x46/0x250 [ 686.256018][T22797] ? sctp_add_bind_addr+0x6f/0x1e0 [ 686.261224][T22797] kmalloc_trace+0x2a/0xa0 [ 686.265777][T22797] sctp_add_bind_addr+0x6f/0x1e0 [ 686.270749][T22797] sctp_copy_local_addr_list+0x19b/0x220 [ 686.276428][T22797] sctp_copy_one_addr+0x7d/0x400 [ 686.281398][T22797] sctp_bind_addr_copy+0x81/0x2b0 [ 686.286521][T22797] sctp_assoc_set_bind_addr_from_ep+0xc0/0xd0 [ 686.292628][T22797] sctp_connect_new_asoc+0x1cb/0x3a0 [ 686.298006][T22797] sctp_sendmsg+0xefc/0x1900 [ 686.302678][T22797] inet_sendmsg+0x63/0x80 [ 686.307134][T22797] __sys_sendto+0x246/0x300 [ 686.311701][T22797] __x64_sys_sendto+0x78/0x90 [ 686.316432][T22797] do_syscall_64+0x41/0xc0 [ 686.320913][T22797] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 686.326932][T22797] RIP: 0033:0x7f9293ef6149 [ 686.331367][T22797] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 686.351170][T22797] RSP: 002b:00007f9293269168 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 686.359613][T22797] RAX: ffffffffffffffda RBX: 00007f9294015f80 RCX: 00007f9293ef6149 [ 686.367651][T22797] RDX: 000000000001a000 RSI: 0000000020000000 RDI: 0000000000000004 [ 686.375657][T22797] RBP: 00007f92932691d0 R08: 0000000020000080 R09: 000000000000001c [ 686.383738][T22797] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 686.391746][T22797] R13: 00007ffdbda7c2df R14: 00007f9293269300 R15: 0000000000022000 [ 686.399922][T22797] [ 686.403770][T22799] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=22799 comm=syz-executor.5 [ 686.429320][T22799] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=61 sclass=netlink_route_socket pid=22799 comm=syz-executor.5 07:23:18 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0x41030000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) 07:23:18 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, 0x0) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$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") (fail_nth: 54) [ 686.442377][T22795] netlink: 'syz-executor.5': attribute type 6 has an invalid length. [ 686.450764][T22795] (unnamed net_device) (uninitialized): option use_carrier: invalid value (6) [ 686.462666][T22799] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 686.501724][T22803] netlink: 'syz-executor.1': attribute type 6 has an invalid length. [ 686.507859][T22801] FAULT_INJECTION: forcing a failure. [ 686.507859][T22801] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 686.523113][T22801] CPU: 1 PID: 22801 Comm: syz-executor.3 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 686.533632][T22801] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 686.543729][T22801] Call Trace: [ 686.547034][T22801] [ 686.549981][T22801] dump_stack_lvl+0xda/0x130 [ 686.554626][T22801] dump_stack+0x15/0x20 [ 686.558821][T22801] should_fail_ex+0x21f/0x230 [ 686.563634][T22801] __alloc_pages+0x108/0x340 [ 686.568293][T22801] vma_alloc_folio+0x6a3/0x8c0 [ 686.573104][T22801] ? __vm_enough_memory+0xdf/0x2a0 [ 686.578320][T22801] shmem_get_folio_gfp+0x801/0x1200 [ 686.583606][T22801] shmem_write_begin+0xa6/0x1d0 [ 686.588499][T22801] generic_perform_write+0x1c3/0x3d0 [ 686.593889][T22801] ? shmem_write_begin+0x1d0/0x1d0 [ 686.599102][T22801] __generic_file_write_iter+0xe6/0x290 [ 686.604750][T22801] generic_file_write_iter+0x7d/0x1c0 [ 686.610318][T22801] vfs_write+0x47b/0x780 [ 686.614599][T22801] ksys_write+0xeb/0x1a0 [ 686.618958][T22801] __x64_sys_write+0x42/0x50 [ 686.623716][T22801] do_syscall_64+0x41/0xc0 [ 686.628328][T22801] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 686.634330][T22801] RIP: 0033:0x7f1567f53ecf 07:23:19 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000019000000", 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000380)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000008c0)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000001cc0)={{}, r2, 0x16, @inherit={0x88, &(0x7f0000001580)=ANY=[@ANYRES16=r3]}, @devid}) r4 = syz_open_dev$MSR(&(0x7f0000000140), 0x100000000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r4, 0x84009422, &(0x7f0000000ec0)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(r6, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000001840)=ANY=[@ANYRES32=r5, @ANYRES32=r3, @ANYRESOCT, @ANYRES32=r1, @ANYRES32, @ANYRES64, @ANYRESHEX], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x40025) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f0000001500)={r5, "2ce8b7e675c30c143ac940d229ad3592"}) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$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") r7 = socket$inet_udplite(0x2, 0x2, 0x88) read(r7, &(0x7f00000000c0)=""/43, 0x2b) 07:23:19 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0x48000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) 07:23:19 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) (fail_nth: 98) 07:23:19 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) r2 = open(&(0x7f0000000040)='./file0\x00', 0x161842, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'sit0\x00'}) r4 = syz_io_uring_setup(0x73d7, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000100)=0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r6, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x10001) r8 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x8010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(r5, 0x0, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x8) syz_io_uring_submit(0x0, r8, &(0x7f00000008c0)=@IORING_OP_OPENAT2={0x1c, 0x40, 0x0, 0xffffffffffffffff, &(0x7f0000000840)={0x4ae0e0, 0x2, 0x5}, &(0x7f0000000880)='./file0\x00', 0x18, 0x0, 0x12345}, 0xff) syz_io_uring_submit(r5, 0x0, &(0x7f0000002b40)=@IORING_OP_RECVMSG={0xa, 0x2b, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000002b00)={0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/28, 0x1c}, {&(0x7f0000001540)=""/4096, 0x1000}, {&(0x7f0000002540)=""/131, 0x83}, {&(0x7f0000002600)=""/102, 0x66}, {&(0x7f0000002840)=""/203, 0xcb}], 0x6}, 0x0, 0x10040, 0x1, {0x1}}, 0x0) ftruncate(r2, 0x200002) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x200000e, 0x12, r3, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) r10 = creat(&(0x7f0000000180)='./file0\x00', 0x0) fallocate(r10, 0x0, 0x0, 0x2000402) fallocate(r9, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r9, 0xc028660f, &(0x7f0000001380)={0xc, r10, 0x11}) [ 686.639027][T22801] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 686.658698][T22801] RSP: 002b:00007f1567314f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 686.667194][T22801] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007f1567f53ecf [ 686.675191][T22801] RDX: 0000000000100000 RSI: 00007f155eef5000 RDI: 0000000000000005 [ 686.683263][T22801] RBP: 00007f155eef5000 R08: 0000000000000000 R09: 0000000000000534 [ 686.691318][T22801] R10: 0000000000100000 R11: 0000000000000293 R12: 0000000000000000 [ 686.699393][T22801] R13: 00007f1567314fdc R14: 00007f1567314fe0 R15: 0000000020000fc2 [ 686.707477][T22801] [ 686.720223][T22810] FAULT_INJECTION: forcing a failure. [ 686.720223][T22810] name failslab, interval 1, probability 0, space 0, times 0 [ 686.732946][T22810] CPU: 0 PID: 22810 Comm: syz-executor.2 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 686.743388][T22810] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 686.753471][T22810] Call Trace: [ 686.756807][T22810] [ 686.759763][T22810] dump_stack_lvl+0xda/0x130 [ 686.764390][T22810] dump_stack+0x15/0x20 [ 686.768575][T22810] should_fail_ex+0x21f/0x230 [ 686.773386][T22810] __should_failslab+0x92/0xa0 [ 686.778227][T22810] should_failslab+0x9/0x20 [ 686.782846][T22810] slab_pre_alloc_hook+0x38/0x180 [ 686.787930][T22810] __kmem_cache_alloc_node+0x46/0x250 [ 686.793349][T22810] ? sctp_add_bind_addr+0x6f/0x1e0 [ 686.798501][T22810] kmalloc_trace+0x2a/0xa0 [ 686.803003][T22810] sctp_add_bind_addr+0x6f/0x1e0 [ 686.807992][T22810] sctp_copy_local_addr_list+0x19b/0x220 [ 686.813681][T22810] sctp_copy_one_addr+0x7d/0x400 [ 686.818656][T22810] sctp_bind_addr_copy+0x81/0x2b0 [ 686.823794][T22810] sctp_assoc_set_bind_addr_from_ep+0xc0/0xd0 [ 686.829983][T22810] sctp_connect_new_asoc+0x1cb/0x3a0 [ 686.835569][T22810] sctp_sendmsg+0xefc/0x1900 [ 686.840210][T22810] inet_sendmsg+0x63/0x80 [ 686.844659][T22810] __sys_sendto+0x246/0x300 [ 686.849272][T22810] __x64_sys_sendto+0x78/0x90 [ 686.854012][T22810] do_syscall_64+0x41/0xc0 [ 686.858527][T22810] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 686.864489][T22810] RIP: 0033:0x7f9293ef6149 [ 686.868956][T22810] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 686.888837][T22810] RSP: 002b:00007f9293269168 EFLAGS: 00000246 ORIG_RAX: 000000000000002c 07:23:19 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, 0x0) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$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") (fail_nth: 55) 07:23:19 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000002c0)={&(0x7f0000000c80)=ANY=[@ANYBLOB="0026bd7000ffdbdf25070000000c00068008000b00060000000c0008002302b41174de3f460a6d000000000000080003000380000008000300bd2c00ff07000400f8ffffff080003001dd30000080004006604000000000000000000"], 0x5c}, 0x1, 0x0, 0x0, 0x1884}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6, 0x6}]}}}]}, 0x3c}}, 0x0) r3 = openat(r2, &(0x7f00000000c0)='./file0\x00', 0x0, 0x31) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00./file0\x00']) connect$unix(r3, &(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000001c0), 0x200080, 0x0) ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f0000000200)={0x55, 0xb5f3, 0x2, 0x1, 0x6}) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000600)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000800)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000827bd7000fcdbdf25030000000800030020000000050006000e000000040004000500050005000000050005000400000005000600ce00000093f1f198073347359701e9597001ab47a31266da6f292f3671200e551bf08293991a41b55e1b9b3e4e1cf47f9dda9123f38125ba19ef0fdf18ba4ec07cdf24e0153a49e9f9fdf291d868e4e75bb04ccb8ff4e20009f1e6265a9ae5d70e64fcedc9de8942e7b7ca009d98ff7c74a175dd80bfc0e6439cda7cd74b6966033d471542563f1c2ed3dd2fcaee81ecb7be444fbd4a54de26db239a7bb4696daed479759c14105df0b8db2481d840e28c6ed40143c2af3c6f04f17a24ee4c22358fce05"], 0x40}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) io_setup(0x6, &(0x7f00000003c0)=0x0) r7 = socket$phonet_pipe(0x23, 0x5, 0x2) io_submit(r6, 0x2, &(0x7f00000005c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, r7, &(0x7f00000001c0)='\"', 0x1}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r8, &(0x7f0000006440)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f0000000c40)={0x10, 0x1d, 0x20, 0x70bd28, 0x25dfdbfd}, 0x10}, {&(0x7f0000000f80)={0x20c, 0x3d, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x1f, 0x46, 0x0, 0x1, [@generic="6b23bda57b0fcd6882aea56d992b0de112a87c9689a0ce8f3a928a"]}, @generic="931dd380ae9b76725532f39b25791247f8e1faaa5606177d1141efdf8a23daecc73d0706f82254c664a01e4c4986b42b265e8e88f8f88e8099514ce917072d6e80996cbddc81dd1014a75c1cd2e0c084d7806b82c11b8a625557f25357333f879c7f3ea978d0c62492b2b2a3437425bf3933cf6d0456ae40263ff847b9956f9f56cd1e35dd616a0dffde59", @nested={0x14d, 0x46, 0x0, 0x1, [@typed={0x8, 0x8f, 0x0, 0x0, @u32=0x4}, @generic="3fe433e9f5d2f6047805d9eb39d59742ad46c8bd198fea6b4f77d0bf577f925374abd91b16efa9a31621d58f4b1ee788ba33ce3ae89358fcbecdc28e3a8775ee6c905d5275bf5f05ca6bfc68336199389a9644323a81d22c4bd081ec9c4826b7e965a5292167778eefb5edac3e1e0fd628684a30dbac663eb65de357a891a90855f356cbe26225342cce43c8e320a777c2a1f74ab97b7e442c94", @typed={0x8, 0x41, 0x0, 0x0, @ipv4=@multicast2}, @typed={0x8, 0x6b, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @generic="79c7219fa8393ab7671b616b9cea5f59e77de2a2ea4a268fcad39d31284ee1045f7dedc0dea487845188adde6fe70f5537a0635e01c2ec0a205c1f92c2272999ec8388f9a95b4d387581056e112c58f96f686734281b5a", @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@remote}, @generic="2d7a6c2813a21aa5bc78773404596de147d491e1868776a08d604bfb6aea387b585ce5b3f7ab336df3922c65"]}]}, 0x20c}, {&(0x7f0000000e00)={0x30, 0x12, 0x800, 0x70bd27, 0x25dfdbfc, "", [@typed={0x8, 0x5b, 0x0, 0x0, @pid}, @typed={0xf, 0x8c, 0x0, 0x0, @str='syzkaller1\x00'}, @typed={0x8, 0x7, 0x0, 0x0, @u32}]}, 0x30}, {&(0x7f0000000e40)={0xc8, 0x42, 0x10, 0x70bd26, 0x25dfdbff, "", [@generic="208cd2ae6be9be", @generic="c1d6c27da633daf115873b83c8913d284239d441678e667c20444d1a1f77f48ea7cbf783d84e79a9ebc262452149fe521b40868bf3938c61c8be3cdbd7429e623c99db5ae26d9cf24ee4ef4777ff0410e8b899b18e829f387d7926641f189d2b9697e099ffb7f20f691064b7d87d04cd2e230e8df8c77a2f1e4f4fabd49cfe414b3027dd850d9a2be9547ba5f2ed09811ea9ed9b201782165a792b57afca3e3d575d0f5b4b17a8", @typed={0x8, 0x94, 0x0, 0x0, @u32=0x1}]}, 0xc8}], 0x4, 0x0, 0x0, 0x8801}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000900)) sendmsg$nl_route(r8, 0x0, 0x4c089) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r7, 0x40189429, &(0x7f0000000480)={0x1, 0x4, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r9, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x45, 0xfc, 0x6}, {0x6}]}, 0x10) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r9) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x2, 0x3, &(0x7f0000000000)=@framed={{0x18, 0xf}}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) socket$inet6_sctp(0xa, 0x801, 0x84) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) r10 = socket$igmp(0x2, 0x3, 0x2) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@private1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) ioctl$TUNSETOWNER(r3, 0x400454cc, r11) setsockopt$MRT_INIT(r10, 0x0, 0xc8, &(0x7f0000000040), 0x4) setsockopt$MRT_ADD_VIF(r10, 0x0, 0xca, &(0x7f0000000100)={0x0, 0x1, 0x0, 0x0, @vifc_lcl_addr=@dev={0xac, 0x14, 0x14, 0xb}, @multicast1}, 0x10) [ 686.897390][T22810] RAX: ffffffffffffffda RBX: 00007f9294015f80 RCX: 00007f9293ef6149 [ 686.905412][T22810] RDX: 000000000001a000 RSI: 0000000020000000 RDI: 0000000000000004 [ 686.905844][T22814] loop0: detected capacity change from 0 to 2048 [ 686.913485][T22810] RBP: 00007f92932691d0 R08: 0000000020000080 R09: 000000000000001c [ 686.913503][T22810] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 686.935856][T22810] R13: 00007ffdbda7c2df R14: 00007f9293269300 R15: 0000000000022000 [ 686.943858][T22810] 07:23:19 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0x4a000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) [ 686.955519][T22814] FAT-fs (loop0): Unrecognized mount option "ÿÿÿÿÿÿÿÿ184467440737095516150xffffffffffffffff" or missing value [ 686.971980][T22821] netlink: 'syz-executor.5': attribute type 6 has an invalid length. [ 686.998140][T22821] (unnamed net_device) (uninitialized): option use_carrier: invalid value (6) [ 687.007605][T22824] netlink: 'syz-executor.1': attribute type 6 has an invalid length. [ 687.022009][T22821] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=22821 comm=syz-executor.5 [ 687.024675][T22825] FAULT_INJECTION: forcing a failure. [ 687.024675][T22825] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 687.041624][T22821] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=61 sclass=netlink_route_socket pid=22821 comm=syz-executor.5 [ 687.048675][T22825] CPU: 0 PID: 22825 Comm: syz-executor.3 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 687.071263][T22825] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 687.081371][T22825] Call Trace: [ 687.084727][T22825] [ 687.087684][T22825] dump_stack_lvl+0xda/0x130 [ 687.092306][T22825] dump_stack+0x15/0x20 [ 687.096518][T22825] should_fail_ex+0x21f/0x230 [ 687.101241][T22825] should_fail+0xb/0x10 [ 687.107474][T22825] should_fail_usercopy+0x1a/0x20 [ 687.112560][T22825] copy_page_from_iter_atomic+0x22d/0xcf0 [ 687.112950][T22827] FAULT_INJECTION: forcing a failure. [ 687.112950][T22827] name failslab, interval 1, probability 0, space 0, times 0 [ 687.118289][T22825] ? folio_test_hugetlb+0x3a/0x70 [ 687.136044][T22825] ? shmem_write_begin+0x12a/0x1d0 [ 687.141186][T22825] generic_perform_write+0x203/0x3d0 [ 687.146571][T22825] ? shmem_write_begin+0x1d0/0x1d0 [ 687.151755][T22825] __generic_file_write_iter+0xe6/0x290 [ 687.157355][T22825] generic_file_write_iter+0x7d/0x1c0 [ 687.162759][T22825] vfs_write+0x47b/0x780 [ 687.167014][T22825] ksys_write+0xeb/0x1a0 [ 687.171317][T22825] __x64_sys_write+0x42/0x50 [ 687.176055][T22825] do_syscall_64+0x41/0xc0 [ 687.180604][T22825] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 687.186677][T22825] RIP: 0033:0x7f1567f53ecf [ 687.191104][T22825] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 687.210830][T22825] RSP: 002b:00007f1567314f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 687.219381][T22825] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007f1567f53ecf [ 687.227362][T22825] RDX: 0000000000100000 RSI: 00007f155eef5000 RDI: 0000000000000005 [ 687.235387][T22825] RBP: 00007f155eef5000 R08: 0000000000000000 R09: 0000000000000534 07:23:19 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) (fail_nth: 99) [ 687.243364][T22825] R10: 0000000000100000 R11: 0000000000000293 R12: 0000000000000000 [ 687.251387][T22825] R13: 00007f1567314fdc R14: 00007f1567314fe0 R15: 0000000020000fc2 [ 687.259545][T22825] [ 687.262581][T22827] CPU: 1 PID: 22827 Comm: syz-executor.2 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 687.273154][T22827] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 687.277080][T22825] loop3: detected capacity change from 0 to 2048 [ 687.283320][T22827] Call Trace: [ 687.283329][T22827] [ 687.283338][T22827] dump_stack_lvl+0xda/0x130 [ 687.292854][T22825] FAT-fs (loop3): Unrecognized mount option "ÿÿÿÿÿÿÿÿ184467440737095516150xffffffffffffffff" or missing value [ 687.292969][T22827] dump_stack+0x15/0x20 [ 687.316494][T22827] should_fail_ex+0x21f/0x230 [ 687.321223][T22827] __should_failslab+0x92/0xa0 [ 687.326083][T22827] should_failslab+0x9/0x20 [ 687.330634][T22827] slab_pre_alloc_hook+0x38/0x180 [ 687.335781][T22827] __kmem_cache_alloc_node+0x46/0x250 [ 687.341208][T22827] ? sctp_add_bind_addr+0x6f/0x1e0 [ 687.346359][T22827] kmalloc_trace+0x2a/0xa0 [ 687.350831][T22827] sctp_add_bind_addr+0x6f/0x1e0 [ 687.355799][T22827] sctp_copy_local_addr_list+0x19b/0x220 [ 687.361553][T22827] sctp_copy_one_addr+0x7d/0x400 [ 687.366600][T22827] sctp_bind_addr_copy+0x81/0x2b0 [ 687.371700][T22827] sctp_assoc_set_bind_addr_from_ep+0xc0/0xd0 [ 687.377826][T22827] sctp_connect_new_asoc+0x1cb/0x3a0 [ 687.383148][T22827] sctp_sendmsg+0xefc/0x1900 [ 687.387850][T22827] inet_sendmsg+0x63/0x80 [ 687.392213][T22827] __sys_sendto+0x246/0x300 [ 687.396847][T22827] __x64_sys_sendto+0x78/0x90 [ 687.401577][T22827] do_syscall_64+0x41/0xc0 [ 687.406081][T22827] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 687.412077][T22827] RIP: 0033:0x7f9293ef6149 [ 687.416513][T22827] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 687.436300][T22827] RSP: 002b:00007f9293269168 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 687.446905][T22827] RAX: ffffffffffffffda RBX: 00007f9294015f80 RCX: 00007f9293ef6149 [ 687.454914][T22827] RDX: 000000000001a000 RSI: 0000000020000000 RDI: 0000000000000004 [ 687.462919][T22827] RBP: 00007f92932691d0 R08: 0000000020000080 R09: 000000000000001c [ 687.470914][T22827] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 687.479051][T22827] R13: 00007ffdbda7c2df R14: 00007f9293269300 R15: 0000000000022000 [ 687.487072][T22827] 07:23:20 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, 0x0) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$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") (fail_nth: 56) 07:23:20 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0x4a020000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) 07:23:20 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) (fail_nth: 100) [ 687.500942][T22821] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 07:23:20 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) r2 = open(&(0x7f0000000040)='./file0\x00', 0x161842, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'sit0\x00'}) r4 = syz_io_uring_setup(0x73d7, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000100)=0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r6, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x10001) r8 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x8010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(r5, 0x0, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x8) syz_io_uring_submit(0x0, r8, &(0x7f00000008c0)=@IORING_OP_OPENAT2={0x1c, 0x40, 0x0, 0xffffffffffffffff, &(0x7f0000000840)={0x4ae0e0, 0x2, 0x5}, &(0x7f0000000880)='./file0\x00', 0x18, 0x0, 0x12345}, 0xff) syz_io_uring_submit(r5, 0x0, &(0x7f0000002b40)=@IORING_OP_RECVMSG={0xa, 0x2b, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000002b00)={0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/28, 0x1c}, {&(0x7f0000001540)=""/4096, 0x1000}, {&(0x7f0000002540)=""/131, 0x83}, {&(0x7f0000002600)=""/102, 0x66}, {&(0x7f0000002840)=""/203, 0xcb}], 0x6}, 0x0, 0x10040, 0x1, {0x1}}, 0x0) ftruncate(r2, 0x200002) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x200000e, 0x12, r3, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) r10 = creat(&(0x7f0000000180)='./file0\x00', 0x0) fallocate(r10, 0x0, 0x0, 0x2000402) fallocate(r9, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r9, 0xc028660f, &(0x7f0000001380)={0xc, r10, 0x12}) 07:23:20 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000019000000", 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000380)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000008c0)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000001cc0)={{}, r2, 0x16, @inherit={0x88, &(0x7f0000001580)=ANY=[@ANYRES16=r3]}, @devid}) r4 = syz_open_dev$MSR(&(0x7f0000000140), 0x100000000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r4, 0x84009422, &(0x7f0000000ec0)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(r6, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000001840)=ANY=[@ANYRES32=r5, @ANYRES32=r3, @ANYRESOCT, @ANYRES32=r1, @ANYRES32, @ANYRES64, @ANYRESHEX], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x40025) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f0000001500)={r5, "2ce8b7e675c30c143ac940d229ad3592"}) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$eJzs1T9rE3EYB/AnaazRqbM4/MDFqVQ3JyOSQvFAUTLoZKBxyYmQWy6Z8hJ8Ab4wB1+EZMp2Ei5VWxSDNLnSfj7LPdz3ud+/g7v39z+OTz8VH75+/hLdXivavbjTXrbiINpxZh4AwHWyrKr4XtWaXgsAsBv+/wBw87x5++7Fsyzrv06pG7GYl4NyUF/r/Pgk6x+llf3fnlqU5WDvZ/4o1c7nt+LuOn/8x3w/Hj6o81X2/GV2Ib8dp1vfPQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA3GyHKXUiIqWUDn7dXZTlYK/OD9OZC3ldHZ9k/aN1w/m8E/c6O9sGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAcAmK6Ww8zPPR5JoVEd9ix5N210d6uSMv/tXTW097VU5+m8XTTZtfLatq05GfRMTWF9+KmK/eUvNnuGnR3DcJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABoVjGdjYd5PpoUTa8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALgqiulsPMzz0eS/i2jVI/29p+k9AgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAM34EQAA///P7Cnj") r7 = socket$inet_udplite(0x2, 0x2, 0x88) read(r7, &(0x7f00000000c0)=""/43, 0x2b) [ 687.575644][T22833] FAULT_INJECTION: forcing a failure. [ 687.575644][T22833] name failslab, interval 1, probability 0, space 0, times 0 [ 687.588391][T22833] CPU: 1 PID: 22833 Comm: syz-executor.2 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 687.598841][T22833] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 687.609000][T22833] Call Trace: [ 687.612381][T22833] [ 687.615322][T22833] dump_stack_lvl+0xda/0x130 [ 687.619956][T22833] dump_stack+0x15/0x20 [ 687.624167][T22833] should_fail_ex+0x21f/0x230 [ 687.624774][T22838] netlink: 'syz-executor.1': attribute type 6 has an invalid length. [ 687.628952][T22833] __should_failslab+0x92/0xa0 [ 687.641917][T22833] should_failslab+0x9/0x20 [ 687.646519][T22833] slab_pre_alloc_hook+0x38/0x180 [ 687.651586][T22833] __kmem_cache_alloc_node+0x46/0x250 [ 687.657038][T22833] ? sctp_add_bind_addr+0x6f/0x1e0 [ 687.660360][T22836] FAULT_INJECTION: forcing a failure. [ 687.660360][T22836] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 687.662234][T22833] kmalloc_trace+0x2a/0xa0 [ 687.680021][T22833] sctp_add_bind_addr+0x6f/0x1e0 [ 687.684998][T22833] sctp_copy_local_addr_list+0x19b/0x220 [ 687.690695][T22833] sctp_copy_one_addr+0x7d/0x400 [ 687.695673][T22833] sctp_bind_addr_copy+0x81/0x2b0 [ 687.700711][T22833] sctp_assoc_set_bind_addr_from_ep+0xc0/0xd0 [ 687.706882][T22833] sctp_connect_new_asoc+0x1cb/0x3a0 [ 687.712379][T22833] sctp_sendmsg+0xefc/0x1900 [ 687.717037][T22833] inet_sendmsg+0x63/0x80 [ 687.721455][T22833] __sys_sendto+0x246/0x300 [ 687.726131][T22833] __x64_sys_sendto+0x78/0x90 [ 687.730845][T22833] do_syscall_64+0x41/0xc0 [ 687.735338][T22833] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 687.741263][T22833] RIP: 0033:0x7f9293ef6149 [ 687.745682][T22833] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 687.765313][T22833] RSP: 002b:00007f9293269168 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 687.773823][T22833] RAX: ffffffffffffffda RBX: 00007f9294015f80 RCX: 00007f9293ef6149 [ 687.781846][T22833] RDX: 000000000001a000 RSI: 0000000020000000 RDI: 0000000000000004 [ 687.789862][T22833] RBP: 00007f92932691d0 R08: 0000000020000080 R09: 000000000000001c [ 687.797848][T22833] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 687.805831][T22833] R13: 00007ffdbda7c2df R14: 00007f9293269300 R15: 0000000000022000 [ 687.813866][T22833] [ 687.816897][T22836] CPU: 0 PID: 22836 Comm: syz-executor.3 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 687.827353][T22836] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 687.837491][T22836] Call Trace: [ 687.840795][T22836] [ 687.843754][T22836] dump_stack_lvl+0xda/0x130 [ 687.848403][T22836] dump_stack+0x15/0x20 [ 687.852648][T22836] should_fail_ex+0x21f/0x230 [ 687.857395][T22836] __alloc_pages+0x108/0x340 [ 687.862031][T22836] vma_alloc_folio+0x6a3/0x8c0 [ 687.866821][T22836] ? __vm_enough_memory+0xdf/0x2a0 [ 687.871970][T22836] shmem_get_folio_gfp+0x801/0x1200 [ 687.877203][T22836] shmem_write_begin+0xa6/0x1d0 [ 687.882225][T22836] generic_perform_write+0x1c3/0x3d0 [ 687.887767][T22836] ? shmem_write_begin+0x1d0/0x1d0 [ 687.892907][T22836] __generic_file_write_iter+0xe6/0x290 [ 687.898400][T22846] netlink: 'syz-executor.1': attribute type 6 has an invalid length. [ 687.898553][T22836] generic_file_write_iter+0x7d/0x1c0 [ 687.912005][T22836] vfs_write+0x47b/0x780 [ 687.916319][T22836] ksys_write+0xeb/0x1a0 [ 687.920602][T22836] __x64_sys_write+0x42/0x50 07:23:20 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:23:20 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0x4c000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) 07:23:20 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0x52030000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) [ 687.925249][T22836] do_syscall_64+0x41/0xc0 [ 687.929761][T22836] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 687.935715][T22836] RIP: 0033:0x7f1567f53ecf [ 687.940287][T22836] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 687.959959][T22836] RSP: 002b:00007f1567314f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 687.968515][T22836] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007f1567f53ecf [ 687.976512][T22836] RDX: 0000000000100000 RSI: 00007f155eef5000 RDI: 0000000000000005 [ 687.984511][T22836] RBP: 00007f155eef5000 R08: 0000000000000000 R09: 0000000000000534 [ 687.992514][T22836] R10: 0000000000100000 R11: 0000000000000293 R12: 0000000000000000 [ 687.996351][T22855] netlink: 'syz-executor.1': attribute type 6 has an invalid length. [ 688.000508][T22836] R13: 00007f1567314fdc R14: 00007f1567314fe0 R15: 0000000020000fc2 [ 688.000533][T22836] 07:23:20 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000002c0)={&(0x7f0000000c80)=ANY=[@ANYBLOB="0026bd7000ffdbdf25070000000c00068008000b00060000000c0008002302b41174de3f460a6d000000000000080003000380000008000300bd2c00ff07000400f8ffffff080003001dd30000080004006604000000000000000000"], 0x5c}, 0x1, 0x0, 0x0, 0x1884}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6, 0x6}]}}}]}, 0x3c}}, 0x0) r3 = openat(r2, &(0x7f00000000c0)='./file0\x00', 0x0, 0x31) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00./file0\x00']) connect$unix(r3, &(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000001c0), 0x200080, 0x0) ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f0000000200)={0x55, 0xb5f3, 0x2, 0x1, 0x6}) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000600)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000800)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x40}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) io_setup(0x6, &(0x7f00000003c0)=0x0) r7 = socket$phonet_pipe(0x23, 0x5, 0x2) io_submit(r6, 0x2, &(0x7f00000005c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, r7, &(0x7f00000001c0)='\"', 0x1}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r8, &(0x7f0000006440)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f0000000c40)={0x10, 0x1d, 0x20, 0x70bd28, 0x25dfdbfd}, 0x10}, {&(0x7f0000000f80)={0x20c, 0x3d, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x1f, 0x46, 0x0, 0x1, [@generic="6b23bda57b0fcd6882aea56d992b0de112a87c9689a0ce8f3a928a"]}, @generic="931dd380ae9b76725532f39b25791247f8e1faaa5606177d1141efdf8a23daecc73d0706f82254c664a01e4c4986b42b265e8e88f8f88e8099514ce917072d6e80996cbddc81dd1014a75c1cd2e0c084d7806b82c11b8a625557f25357333f879c7f3ea978d0c62492b2b2a3437425bf3933cf6d0456ae40263ff847b9956f9f56cd1e35dd616a0dffde59", @nested={0x14d, 0x46, 0x0, 0x1, [@typed={0x8, 0x8f, 0x0, 0x0, @u32=0x4}, @generic="3fe433e9f5d2f6047805d9eb39d59742ad46c8bd198fea6b4f77d0bf577f925374abd91b16efa9a31621d58f4b1ee788ba33ce3ae89358fcbecdc28e3a8775ee6c905d5275bf5f05ca6bfc68336199389a9644323a81d22c4bd081ec9c4826b7e965a5292167778eefb5edac3e1e0fd628684a30dbac663eb65de357a891a90855f356cbe26225342cce43c8e320a777c2a1f74ab97b7e442c94", @typed={0x8, 0x41, 0x0, 0x0, @ipv4=@multicast2}, @typed={0x8, 0x6b, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @generic="79c7219fa8393ab7671b616b9cea5f59e77de2a2ea4a268fcad39d31284ee1045f7dedc0dea487845188adde6fe70f5537a0635e01c2ec0a205c1f92c2272999ec8388f9a95b4d387581056e112c58f96f686734281b5a", @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@remote}, @generic="2d7a6c2813a21aa5bc78773404596de147d491e1868776a08d604bfb6aea387b585ce5b3f7ab336df3922c65"]}]}, 0x20c}, {&(0x7f0000000e00)={0x30, 0x12, 0x800, 0x70bd27, 0x25dfdbfc, "", [@typed={0x8, 0x5b, 0x0, 0x0, @pid}, @typed={0xf, 0x8c, 0x0, 0x0, @str='syzkaller1\x00'}, @typed={0x8, 0x7, 0x0, 0x0, @u32}]}, 0x30}, {&(0x7f0000000e40)={0xc8, 0x42, 0x10, 0x70bd26, 0x25dfdbff, "", [@generic="208cd2ae6be9be", @generic="c1d6c27da633daf115873b83c8913d284239d441678e667c20444d1a1f77f48ea7cbf783d84e79a9ebc262452149fe521b40868bf3938c61c8be3cdbd7429e623c99db5ae26d9cf24ee4ef4777ff0410e8b899b18e829f387d7926641f189d2b9697e099ffb7f20f691064b7d87d04cd2e230e8df8c77a2f1e4f4fabd49cfe414b3027dd850d9a2be9547ba5f2ed09811ea9ed9b201782165a792b57afca3e3d575d0f5b4b17a8", @typed={0x8, 0x94, 0x0, 0x0, @u32=0x1}]}, 0xc8}], 0x4, 0x0, 0x0, 0x8801}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000900)) sendmsg$nl_route(r8, 0x0, 0x4c089) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r7, 0x40189429, &(0x7f0000000480)={0x1, 0x4, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r9, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x45, 0xfc, 0x6}, {0x6}]}, 0x10) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r9) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x2, 0x3, &(0x7f0000000000)=@framed={{0x18, 0xf}}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) socket$inet6_sctp(0xa, 0x801, 0x84) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) r10 = socket$igmp(0x2, 0x3, 0x2) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@private1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) ioctl$TUNSETOWNER(r3, 0x400454cc, r11) setsockopt$MRT_INIT(r10, 0x0, 0xc8, &(0x7f0000000040), 0x4) setsockopt$MRT_ADD_VIF(r10, 0x0, 0xca, &(0x7f0000000100)={0x0, 0x1, 0x0, 0x0, @vifc_lcl_addr=@dev={0xac, 0x14, 0x14, 0xb}, @multicast1}, 0x10) 07:23:20 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) r2 = open(&(0x7f0000000040)='./file0\x00', 0x161842, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'sit0\x00'}) r4 = syz_io_uring_setup(0x73d7, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000100)=0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r6, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x10001) r8 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x8010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(r5, 0x0, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x8) syz_io_uring_submit(0x0, r8, &(0x7f00000008c0)=@IORING_OP_OPENAT2={0x1c, 0x40, 0x0, 0xffffffffffffffff, &(0x7f0000000840)={0x4ae0e0, 0x2, 0x5}, &(0x7f0000000880)='./file0\x00', 0x18, 0x0, 0x12345}, 0xff) syz_io_uring_submit(r5, 0x0, &(0x7f0000002b40)=@IORING_OP_RECVMSG={0xa, 0x2b, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000002b00)={0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/28, 0x1c}, {&(0x7f0000001540)=""/4096, 0x1000}, {&(0x7f0000002540)=""/131, 0x83}, {&(0x7f0000002600)=""/102, 0x66}, {&(0x7f0000002840)=""/203, 0xcb}], 0x6}, 0x0, 0x10040, 0x1, {0x1}}, 0x0) ftruncate(r2, 0x200002) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x200000e, 0x12, r3, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) r10 = creat(&(0x7f0000000180)='./file0\x00', 0x0) fallocate(r10, 0x0, 0x0, 0x2000402) fallocate(r9, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r9, 0xc028660f, &(0x7f0000001380)={0xc, r10, 0x13}) 07:23:20 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, 0x0) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$eJzs1T9rE3EYB/AnaazRqbM4/MDFqVQ3JyOSQvFAUTLoZKBxyYmQWy6Z8hJ8Ab4wB1+EZMp2Ei5VWxSDNLnSfj7LPdz3ud+/g7v39z+OTz8VH75+/hLdXivavbjTXrbiINpxZh4AwHWyrKr4XtWaXgsAsBv+/wBw87x5++7Fsyzrv06pG7GYl4NyUF/r/Pgk6x+llf3fnlqU5WDvZ/4o1c7nt+LuOn/8x3w/Hj6o81X2/GV2Ib8dp1vfPQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA3GyHKXUiIqWUDn7dXZTlYK/OD9OZC3ldHZ9k/aN1w/m8E/c6O9sGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAcAmK6Ww8zPPR5JoVEd9ix5N210d6uSMv/tXTW097VU5+m8XTTZtfLatq05GfRMTWF9+KmK/eUvNnuGnR3DcJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABoVjGdjYd5PpoUTa8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALgqiulsPMzz0eS/i2jVI/29p+k9AgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAM34EQAA///P7Cnj") (fail_nth: 57) [ 688.028329][T22854] loop0: detected capacity change from 0 to 2048 [ 688.059486][T22854] FAT-fs (loop0): Unrecognized mount option "ÿÿÿÿÿÿÿÿ184467440737095516150xffffffffffffffff" or missing value 07:23:20 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0x60000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) [ 688.095719][T22860] netlink: 'syz-executor.5': attribute type 6 has an invalid length. [ 688.119128][T22860] (unnamed net_device) (uninitialized): option use_carrier: invalid value (6) [ 688.128341][T22866] netlink: 'syz-executor.1': attribute type 6 has an invalid length. [ 688.133868][T22867] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=22867 comm=syz-executor.5 [ 688.140243][T22864] FAULT_INJECTION: forcing a failure. [ 688.140243][T22864] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 688.163383][T22864] CPU: 0 PID: 22864 Comm: syz-executor.3 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 688.173833][T22864] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 688.184073][T22864] Call Trace: [ 688.187373][T22864] [ 688.188129][T22860] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=61 sclass=netlink_route_socket pid=22860 comm=syz-executor.5 [ 688.190308][T22864] dump_stack_lvl+0xda/0x130 [ 688.190344][T22864] dump_stack+0x15/0x20 [ 688.211963][T22864] should_fail_ex+0x21f/0x230 [ 688.216747][T22864] should_fail+0xb/0x10 [ 688.220958][T22864] should_fail_usercopy+0x1a/0x20 [ 688.226080][T22864] copy_page_from_iter_atomic+0x22d/0xcf0 [ 688.231961][T22864] ? folio_test_hugetlb+0x3a/0x70 [ 688.237095][T22864] ? shmem_write_begin+0x12a/0x1d0 07:23:20 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0x65000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) [ 688.237881][T22860] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 688.242226][T22864] generic_perform_write+0x203/0x3d0 [ 688.256802][T22864] ? shmem_write_begin+0x1d0/0x1d0 [ 688.262102][T22864] __generic_file_write_iter+0xe6/0x290 [ 688.267692][T22864] generic_file_write_iter+0x7d/0x1c0 [ 688.273226][T22864] vfs_write+0x47b/0x780 [ 688.277535][T22864] ksys_write+0xeb/0x1a0 [ 688.281818][T22864] __x64_sys_write+0x42/0x50 [ 688.286531][T22864] do_syscall_64+0x41/0xc0 07:23:20 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0x65580000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) [ 688.291002][T22864] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 688.296935][T22864] RIP: 0033:0x7f1567f53ecf [ 688.301429][T22864] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 688.321514][T22864] RSP: 002b:00007f1567314f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 688.329964][T22864] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007f1567f53ecf [ 688.338054][T22864] RDX: 0000000000100000 RSI: 00007f155eef5000 RDI: 0000000000000005 [ 688.346051][T22864] RBP: 00007f155eef5000 R08: 0000000000000000 R09: 0000000000000534 [ 688.354136][T22864] R10: 0000000000100000 R11: 0000000000000293 R12: 0000000000000000 [ 688.362156][T22864] R13: 00007f1567314fdc R14: 00007f1567314fe0 R15: 0000000020000fc2 [ 688.370181][T22864] [ 688.379245][T22864] loop3: detected capacity change from 0 to 2048 07:23:20 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0x68000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) [ 688.386958][T22864] FAT-fs (loop3): Unrecognized mount option "ÿÿÿÿÿÿÿÿ184467440737095516150xffffffffffffffff" or missing value 07:23:20 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000002c0)={&(0x7f0000000c80)=ANY=[@ANYBLOB="0026bd7000ffdbdf25070000000c00068008000b00060000000c0008002302b41174de3f460a6d000000000000080003000380000008000300bd2c00ff07000400f8ffffff080003001dd30000080004006604000000000000000000"], 0x5c}, 0x1, 0x0, 0x0, 0x1884}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6, 0x6}]}}}]}, 0x3c}}, 0x0) r3 = openat(r2, &(0x7f00000000c0)='./file0\x00', 0x0, 0x31) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00./file0\x00']) connect$unix(r3, &(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000001c0), 0x200080, 0x0) ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f0000000200)={0x55, 0xb5f3, 0x2, 0x1, 0x6}) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000600)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000800)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x40}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) io_setup(0x6, &(0x7f00000003c0)=0x0) r7 = socket$phonet_pipe(0x23, 0x5, 0x2) io_submit(r6, 0x2, &(0x7f00000005c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, r7, &(0x7f00000001c0)='\"', 0x1}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r8, &(0x7f0000006440)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f0000000c40)={0x10, 0x1d, 0x20, 0x70bd28, 0x25dfdbfd}, 0x10}, {&(0x7f0000000f80)={0x20c, 0x3d, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x1f, 0x46, 0x0, 0x1, [@generic="6b23bda57b0fcd6882aea56d992b0de112a87c9689a0ce8f3a928a"]}, @generic="931dd380ae9b76725532f39b25791247f8e1faaa5606177d1141efdf8a23daecc73d0706f82254c664a01e4c4986b42b265e8e88f8f88e8099514ce917072d6e80996cbddc81dd1014a75c1cd2e0c084d7806b82c11b8a625557f25357333f879c7f3ea978d0c62492b2b2a3437425bf3933cf6d0456ae40263ff847b9956f9f56cd1e35dd616a0dffde59", @nested={0x14d, 0x46, 0x0, 0x1, [@typed={0x8, 0x8f, 0x0, 0x0, @u32=0x4}, @generic="3fe433e9f5d2f6047805d9eb39d59742ad46c8bd198fea6b4f77d0bf577f925374abd91b16efa9a31621d58f4b1ee788ba33ce3ae89358fcbecdc28e3a8775ee6c905d5275bf5f05ca6bfc68336199389a9644323a81d22c4bd081ec9c4826b7e965a5292167778eefb5edac3e1e0fd628684a30dbac663eb65de357a891a90855f356cbe26225342cce43c8e320a777c2a1f74ab97b7e442c94", @typed={0x8, 0x41, 0x0, 0x0, @ipv4=@multicast2}, @typed={0x8, 0x6b, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @generic="79c7219fa8393ab7671b616b9cea5f59e77de2a2ea4a268fcad39d31284ee1045f7dedc0dea487845188adde6fe70f5537a0635e01c2ec0a205c1f92c2272999ec8388f9a95b4d387581056e112c58f96f686734281b5a", @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@remote}, @generic="2d7a6c2813a21aa5bc78773404596de147d491e1868776a08d604bfb6aea387b585ce5b3f7ab336df3922c65"]}]}, 0x20c}, {&(0x7f0000000e00)={0x30, 0x12, 0x800, 0x70bd27, 0x25dfdbfc, "", [@typed={0x8, 0x5b, 0x0, 0x0, @pid}, @typed={0xf, 0x8c, 0x0, 0x0, @str='syzkaller1\x00'}, @typed={0x8, 0x7, 0x0, 0x0, @u32}]}, 0x30}, {&(0x7f0000000e40)={0xc8, 0x42, 0x10, 0x70bd26, 0x25dfdbff, "", [@generic="208cd2ae6be9be", @generic="c1d6c27da633daf115873b83c8913d284239d441678e667c20444d1a1f77f48ea7cbf783d84e79a9ebc262452149fe521b40868bf3938c61c8be3cdbd7429e623c99db5ae26d9cf24ee4ef4777ff0410e8b899b18e829f387d7926641f189d2b9697e099ffb7f20f691064b7d87d04cd2e230e8df8c77a2f1e4f4fabd49cfe414b3027dd850d9a2be9547ba5f2ed09811ea9ed9b201782165a792b57afca3e3d575d0f5b4b17a8", @typed={0x8, 0x94, 0x0, 0x0, @u32=0x1}]}, 0xc8}], 0x4, 0x0, 0x0, 0x8801}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000900)={'team0\x00', 0x0}) sendmsg$nl_route(r8, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={&(0x7f00000011c0)=@dellink={0x25c, 0x11, 0x400, 0x70bd28, 0x25dfdbff, {0x0, 0x0, 0x0, r9, 0x1000}, [@IFLA_PROTO_DOWN={0x5}, @IFLA_IFNAME={0x14, 0x3, 'macvlan1\x00'}, @IFLA_MAP={0x24, 0xe, {0x9, 0xd2, 0x2e4d, 0x200, 0x3e, 0xff}}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x5}, @IFLA_IFALIAS={0x14, 0x14, 'syzkaller1\x00'}, @IFLA_MTU={0x8, 0x4, 0x101}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_VFINFO_LIST={0x1cc, 0x16, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x8fe, 0xffff}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x5, 0x1}}]}, {0x84, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN_LIST={0x54, 0xc, 0x0, 0x1, [{0x14, 0x1, {0xb5d3, 0xadc, 0x100, 0xd1c53560eb87a9fa}}, {0x14, 0x1, {0x4, 0xb6, 0x81, 0x8100}}, {0x14, 0x1, {0x0, 0x6e4, 0x1, 0x88a8}}, {0x14, 0x1, {0x14, 0xaed, 0x0, 0x8100}}]}, @IFLA_VF_TX_RATE={0xc, 0x3, {0x1000, 0x200}}, @IFLA_VF_TRUST={0xc, 0x9, {0x7, 0x800}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x8000, 0x1}}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x7f, 0x7fff}}, @IFLA_VF_TRUST={0xc, 0x9, {0x7ff, 0x8}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_RATE={0x10, 0x6, {0x9, 0x5, 0x5}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x9}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x80000000, 0x3}}]}, {0xa4, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0xfff, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1d}}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x3f, 0x43}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x65c, 0x1}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x2, 0x80000001}}, @IFLA_VF_VLAN_LIST={0x40, 0xc, 0x0, 0x1, [{0x14, 0x1, {0xcae8, 0x919, 0x9, 0x8100}}, {0x14, 0x1, {0x200, 0xb47, 0xaaa, 0x8100}}, {0x14, 0x1, {0x5, 0x53b, 0xfffffff7, 0x88a8}}]}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x3f, 0x7fff}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x930, 0x5}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x6, 0x8}}]}]}]}, 0x25c}, 0x1, 0x0, 0x0, 0x11}, 0x4c089) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r7, 0x40189429, &(0x7f0000000480)={0x1, 0x4, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r10, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x45, 0xfc, 0x6}, {0x6}]}, 0x10) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x2, 0x3, &(0x7f0000000000)=@framed={{0x18, 0xf}}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) socket$inet6_sctp(0xa, 0x801, 0x84) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) r11 = socket$igmp(0x2, 0x3, 0x2) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@private1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) ioctl$TUNSETOWNER(r3, 0x400454cc, r12) setsockopt$MRT_INIT(r11, 0x0, 0xc8, &(0x7f0000000040), 0x4) setsockopt$MRT_ADD_VIF(r11, 0x0, 0xca, &(0x7f0000000100)={0x0, 0x1, 0x0, 0x0, @vifc_lcl_addr=@dev={0xac, 0x14, 0x14, 0xb}, @multicast1}, 0x10) 07:23:20 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000019000000", 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000008c0)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000001cc0)={{}, r2, 0x16, @inherit={0x88, &(0x7f0000001580)=ANY=[@ANYRES16=r3]}, @devid}) r4 = syz_open_dev$MSR(&(0x7f0000000140), 0x100000000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r4, 0x84009422, &(0x7f0000000ec0)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(r6, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000001840)=ANY=[@ANYRES32=r5, @ANYRES32=r3, @ANYRESOCT, @ANYRES32=r1, @ANYRES32, @ANYRES64, @ANYRESHEX], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x40025) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f0000001500)={r5, "2ce8b7e675c30c143ac940d229ad3592"}) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$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") r7 = socket$inet_udplite(0x2, 0x2, 0x88) read(r7, &(0x7f00000000c0)=""/43, 0x2b) [ 688.479723][T22880] (unnamed net_device) (uninitialized): option use_carrier: invalid value (6) [ 688.520834][T22880] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=22880 comm=syz-executor.5 [ 688.549462][T22880] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=61 sclass=netlink_route_socket pid=22880 comm=syz-executor.5 [ 688.565536][T22880] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 688.643871][T22883] loop0: detected capacity change from 0 to 2048 [ 688.654142][T22883] FAT-fs (loop0): Unrecognized mount option "ÿÿÿÿÿÿÿÿ184467440737095516150xffffffffffffffff" or missing value 07:23:21 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0x6c000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) 07:23:21 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a002, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:23:21 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, 0x0) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$eJzs1T9rE3EYB/AnaazRqbM4/MDFqVQ3JyOSQvFAUTLoZKBxyYmQWy6Z8hJ8Ab4wB1+EZMp2Ei5VWxSDNLnSfj7LPdz3ud+/g7v39z+OTz8VH75+/hLdXivavbjTXrbiINpxZh4AwHWyrKr4XtWaXgsAsBv+/wBw87x5++7Fsyzrv06pG7GYl4NyUF/r/Pgk6x+llf3fnlqU5WDvZ/4o1c7nt+LuOn/8x3w/Hj6o81X2/GV2Ib8dp1vfPQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA3GyHKXUiIqWUDn7dXZTlYK/OD9OZC3ldHZ9k/aN1w/m8E/c6O9sGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAcAmK6Ww8zPPR5JoVEd9ix5N210d6uSMv/tXTW097VU5+m8XTTZtfLatq05GfRMTWF9+KmK/eUvNnuGnR3DcJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABoVjGdjYd5PpoUTa8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALgqiulsPMzz0eS/i2jVI/29p+k9AgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAM34EQAA///P7Cnj") (fail_nth: 58) 07:23:21 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000002c0)={&(0x7f0000000c80)=ANY=[@ANYBLOB="0026bd7000ffdbdf25070000000c00068008000b00060000000c0008002302b41174de3f460a6d000000000000080003000380000008000300bd2c00ff07000400f8ffffff080003001dd30000080004006604000000000000000000"], 0x5c}, 0x1, 0x0, 0x0, 0x1884}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6, 0x6}]}}}]}, 0x3c}}, 0x0) r3 = openat(r2, &(0x7f00000000c0)='./file0\x00', 0x0, 0x31) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00./file0\x00']) connect$unix(r3, &(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000001c0), 0x200080, 0x0) ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f0000000200)={0x55, 0xb5f3, 0x2, 0x1, 0x6}) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000600)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000800)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x40}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) io_setup(0x6, &(0x7f00000003c0)=0x0) r7 = socket$phonet_pipe(0x23, 0x5, 0x2) io_submit(r6, 0x2, &(0x7f00000005c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, r7, &(0x7f00000001c0)='\"', 0x1}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r8, &(0x7f0000006440)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f0000000c40)={0x10, 0x1d, 0x20, 0x70bd28, 0x25dfdbfd}, 0x10}, {&(0x7f0000000f80)={0x20c, 0x3d, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x1f, 0x46, 0x0, 0x1, [@generic="6b23bda57b0fcd6882aea56d992b0de112a87c9689a0ce8f3a928a"]}, @generic="931dd380ae9b76725532f39b25791247f8e1faaa5606177d1141efdf8a23daecc73d0706f82254c664a01e4c4986b42b265e8e88f8f88e8099514ce917072d6e80996cbddc81dd1014a75c1cd2e0c084d7806b82c11b8a625557f25357333f879c7f3ea978d0c62492b2b2a3437425bf3933cf6d0456ae40263ff847b9956f9f56cd1e35dd616a0dffde59", @nested={0x14d, 0x46, 0x0, 0x1, [@typed={0x8, 0x8f, 0x0, 0x0, @u32=0x4}, @generic="3fe433e9f5d2f6047805d9eb39d59742ad46c8bd198fea6b4f77d0bf577f925374abd91b16efa9a31621d58f4b1ee788ba33ce3ae89358fcbecdc28e3a8775ee6c905d5275bf5f05ca6bfc68336199389a9644323a81d22c4bd081ec9c4826b7e965a5292167778eefb5edac3e1e0fd628684a30dbac663eb65de357a891a90855f356cbe26225342cce43c8e320a777c2a1f74ab97b7e442c94", @typed={0x8, 0x41, 0x0, 0x0, @ipv4=@multicast2}, @typed={0x8, 0x6b, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @generic="79c7219fa8393ab7671b616b9cea5f59e77de2a2ea4a268fcad39d31284ee1045f7dedc0dea487845188adde6fe70f5537a0635e01c2ec0a205c1f92c2272999ec8388f9a95b4d387581056e112c58f96f686734281b5a", @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@remote}, @generic="2d7a6c2813a21aa5bc78773404596de147d491e1868776a08d604bfb6aea387b585ce5b3f7ab336df3922c65"]}]}, 0x20c}, {&(0x7f0000000e00)={0x30, 0x12, 0x800, 0x70bd27, 0x25dfdbfc, "", [@typed={0x8, 0x5b, 0x0, 0x0, @pid}, @typed={0xf, 0x8c, 0x0, 0x0, @str='syzkaller1\x00'}, @typed={0x8, 0x7, 0x0, 0x0, @u32}]}, 0x30}, {&(0x7f0000000e40)={0xc8, 0x42, 0x10, 0x70bd26, 0x25dfdbff, "", [@generic="208cd2ae6be9be", @generic="c1d6c27da633daf115873b83c8913d284239d441678e667c20444d1a1f77f48ea7cbf783d84e79a9ebc262452149fe521b40868bf3938c61c8be3cdbd7429e623c99db5ae26d9cf24ee4ef4777ff0410e8b899b18e829f387d7926641f189d2b9697e099ffb7f20f691064b7d87d04cd2e230e8df8c77a2f1e4f4fabd49cfe414b3027dd850d9a2be9547ba5f2ed09811ea9ed9b201782165a792b57afca3e3d575d0f5b4b17a8", @typed={0x8, 0x94, 0x0, 0x0, @u32=0x1}]}, 0xc8}], 0x4, 0x0, 0x0, 0x8801}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000900)={'team0\x00', 0x0}) sendmsg$nl_route(r8, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={&(0x7f00000011c0)=@dellink={0x25c, 0x11, 0x400, 0x70bd28, 0x25dfdbff, {0x0, 0x0, 0x0, r9, 0x1000}, [@IFLA_PROTO_DOWN={0x5}, @IFLA_IFNAME={0x14, 0x3, 'macvlan1\x00'}, @IFLA_MAP={0x24, 0xe, {0x9, 0xd2, 0x2e4d, 0x200, 0x3e, 0xff}}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x5}, @IFLA_IFALIAS={0x14, 0x14, 'syzkaller1\x00'}, @IFLA_MTU={0x8, 0x4, 0x101}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_VFINFO_LIST={0x1cc, 0x16, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x8fe, 0xffff}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x5, 0x1}}]}, {0x84, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN_LIST={0x54, 0xc, 0x0, 0x1, [{0x14, 0x1, {0xb5d3, 0xadc, 0x100, 0xd1c53560eb87a9fa}}, {0x14, 0x1, {0x4, 0xb6, 0x81, 0x8100}}, {0x14, 0x1, {0x0, 0x6e4, 0x1, 0x88a8}}, {0x14, 0x1, {0x14, 0xaed, 0x0, 0x8100}}]}, @IFLA_VF_TX_RATE={0xc, 0x3, {0x1000, 0x200}}, @IFLA_VF_TRUST={0xc, 0x9, {0x7, 0x800}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x8000, 0x1}}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x7f, 0x7fff}}, @IFLA_VF_TRUST={0xc, 0x9, {0x7ff, 0x8}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_RATE={0x10, 0x6, {0x9, 0x5, 0x5}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x9}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x80000000, 0x3}}]}, {0xa4, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0xfff, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1d}}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x3f, 0x43}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x65c, 0x1}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x2, 0x80000001}}, @IFLA_VF_VLAN_LIST={0x40, 0xc, 0x0, 0x1, [{0x14, 0x1, {0xcae8, 0x919, 0x9, 0x8100}}, {0x14, 0x1, {0x200, 0xb47, 0xaaa, 0x8100}}, {0x14, 0x1, {0x5, 0x53b, 0xfffffff7, 0x88a8}}]}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x3f, 0x7fff}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x930, 0x5}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x6, 0x8}}]}]}]}, 0x25c}, 0x1, 0x0, 0x0, 0x11}, 0x4c089) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r7, 0x40189429, &(0x7f0000000480)={0x1, 0x4, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r10, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x45, 0xfc, 0x6}, {0x6}]}, 0x10) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x2, 0x3, &(0x7f0000000000)=@framed={{0x18, 0xf}}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) socket$inet6_sctp(0xa, 0x801, 0x84) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) r11 = socket$igmp(0x2, 0x3, 0x2) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@private1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) ioctl$TUNSETOWNER(r3, 0x400454cc, r12) setsockopt$MRT_INIT(r11, 0x0, 0xc8, &(0x7f0000000040), 0x4) setsockopt$MRT_ADD_VIF(r11, 0x0, 0xca, &(0x7f0000000100)={0x0, 0x1, 0x0, 0x0, @vifc_lcl_addr=@dev={0xac, 0x14, 0x14, 0xb}, @multicast1}, 0x10) 07:23:21 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) r2 = open(&(0x7f0000000040)='./file0\x00', 0x161842, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'sit0\x00'}) r4 = syz_io_uring_setup(0x73d7, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000100)=0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r6, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x10001) r8 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x8010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(r5, 0x0, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x8) syz_io_uring_submit(0x0, r8, &(0x7f00000008c0)=@IORING_OP_OPENAT2={0x1c, 0x40, 0x0, 0xffffffffffffffff, &(0x7f0000000840)={0x4ae0e0, 0x2, 0x5}, &(0x7f0000000880)='./file0\x00', 0x18, 0x0, 0x12345}, 0xff) syz_io_uring_submit(r5, 0x0, &(0x7f0000002b40)=@IORING_OP_RECVMSG={0xa, 0x2b, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000002b00)={0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/28, 0x1c}, {&(0x7f0000001540)=""/4096, 0x1000}, {&(0x7f0000002540)=""/131, 0x83}, {&(0x7f0000002600)=""/102, 0x66}, {&(0x7f0000002840)=""/203, 0xcb}], 0x6}, 0x0, 0x10040, 0x1, {0x1}}, 0x0) ftruncate(r2, 0x200002) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x200000e, 0x12, r3, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) r10 = creat(&(0x7f0000000180)='./file0\x00', 0x0) fallocate(r10, 0x0, 0x0, 0x2000402) fallocate(r9, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r9, 0xc028660f, &(0x7f0000001380)={0xc, r10, 0x14}) [ 688.835687][T22893] (unnamed net_device) (uninitialized): option use_carrier: invalid value (6) [ 688.860464][T22893] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 688.865624][T22891] FAULT_INJECTION: forcing a failure. [ 688.865624][T22891] name fail_page_alloc, interval 1, probability 0, space 0, times 0 07:23:21 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0x74000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) 07:23:21 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0x75000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) [ 688.882997][T22891] CPU: 1 PID: 22891 Comm: syz-executor.3 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 688.893878][T22891] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 688.903991][T22891] Call Trace: [ 688.907289][T22891] [ 688.910242][T22891] dump_stack_lvl+0xda/0x130 [ 688.914859][T22891] dump_stack+0x15/0x20 [ 688.919050][T22891] should_fail_ex+0x21f/0x230 [ 688.923774][T22891] __alloc_pages+0x108/0x340 [ 688.928438][T22891] vma_alloc_folio+0x6a3/0x8c0 [ 688.933254][T22891] ? __vm_enough_memory+0xdf/0x2a0 [ 688.938426][T22891] shmem_get_folio_gfp+0x801/0x1200 [ 688.943665][T22891] shmem_write_begin+0xa6/0x1d0 [ 688.948551][T22891] generic_perform_write+0x1c3/0x3d0 [ 688.953864][T22891] ? shmem_write_begin+0x1d0/0x1d0 [ 688.959170][T22891] __generic_file_write_iter+0xe6/0x290 [ 688.964759][T22891] generic_file_write_iter+0x7d/0x1c0 [ 688.970258][T22891] vfs_write+0x47b/0x780 [ 688.974533][T22891] ksys_write+0xeb/0x1a0 [ 688.978926][T22891] __x64_sys_write+0x42/0x50 [ 688.983550][T22891] do_syscall_64+0x41/0xc0 [ 688.988017][T22891] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 688.994100][T22891] RIP: 0033:0x7f1567f53ecf [ 688.998542][T22891] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 689.018297][T22891] RSP: 002b:00007f1567314f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 689.026807][T22891] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007f1567f53ecf 07:23:21 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0x7a000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) 07:23:21 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, 0x0) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$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") (fail_nth: 59) [ 689.034792][T22891] RDX: 0000000000100000 RSI: 00007f155eef5000 RDI: 0000000000000005 [ 689.042781][T22891] RBP: 00007f155eef5000 R08: 0000000000000000 R09: 0000000000000534 [ 689.050781][T22891] R10: 0000000000100000 R11: 0000000000000293 R12: 0000000000000000 [ 689.059022][T22891] R13: 00007f1567314fdc R14: 00007f1567314fe0 R15: 0000000020000fc2 [ 689.067037][T22891] 07:23:21 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000002c0)={&(0x7f0000000c80)=ANY=[@ANYBLOB="0026bd7000ffdbdf25070000000c00068008000b00060000000c0008002302b41174de3f460a6d000000000000080003000380000008000300bd2c00ff07000400f8ffffff080003001dd30000080004006604000000000000000000"], 0x5c}, 0x1, 0x0, 0x0, 0x1884}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6, 0x6}]}}}]}, 0x3c}}, 0x0) r3 = openat(r2, &(0x7f00000000c0)='./file0\x00', 0x0, 0x31) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000680)=ANY=[@ANYBLOB="4afe65cd9f4cb96af18454a88fa8005c9fe248c0144c45e701002b7127b6679c7a64908ce701f270818888d4368d79057ee5e41b0efaa601fc1a8488a8a24cb9d947491b1bc7983e1710bb3ccc29e6d4ed4df77669e40bbfa802c600208e53ee50e98ab2cb4f50d11a9cdddd9320a5d8171c0f0c108488d0b23be195b12fc7ed967f99e71ff165310bc20d027160e20e87088c6f48a6c7210431c5a6578b11b646347984f92bc092089c964bd360a4e0b124bec92bf620edc72693f0e78f12e205659005168a8e2f60f18bcecd57f49295bfe6ca9c894f4d75798ae81020f3ff3f9d2aeb8740d2ec38db6c068f60e10f6f06172fb698e28d2dcc7deed28eee05874cc59a89b771e167c0d3da3789a3acd1af0cc89d9ff46e329a00f6d1a28794c3b3db7752189c1853e53b0aa840b887618d3d9b6038fc37865fa39328a439819e25692b3efee7a80b609f2ba10030f51469aa05f966b72dedf8991f0d", @ANYRES32=r0, @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00./file0\x00']) connect$unix(r3, &(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000001c0), 0x200080, 0x0) ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f0000000200)={0x55, 0xb5f3, 0x2, 0x1, 0x6}) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000600)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000800)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x40}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) io_setup(0x6, &(0x7f00000003c0)=0x0) r7 = socket$phonet_pipe(0x23, 0x5, 0x2) io_submit(r6, 0x2, &(0x7f00000005c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, r7, &(0x7f00000001c0)='\"', 0x1}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r8, &(0x7f0000006440)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f0000000c40)={0x10, 0x1d, 0x20, 0x70bd28, 0x25dfdbfd}, 0x10}, {&(0x7f0000000f80)={0x20c, 0x3d, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x1f, 0x46, 0x0, 0x1, [@generic="6b23bda57b0fcd6882aea56d992b0de112a87c9689a0ce8f3a928a"]}, @generic="931dd380ae9b76725532f39b25791247f8e1faaa5606177d1141efdf8a23daecc73d0706f82254c664a01e4c4986b42b265e8e88f8f88e8099514ce917072d6e80996cbddc81dd1014a75c1cd2e0c084d7806b82c11b8a625557f25357333f879c7f3ea978d0c62492b2b2a3437425bf3933cf6d0456ae40263ff847b9956f9f56cd1e35dd616a0dffde59", @nested={0x14d, 0x46, 0x0, 0x1, [@typed={0x8, 0x8f, 0x0, 0x0, @u32=0x4}, @generic="3fe433e9f5d2f6047805d9eb39d59742ad46c8bd198fea6b4f77d0bf577f925374abd91b16efa9a31621d58f4b1ee788ba33ce3ae89358fcbecdc28e3a8775ee6c905d5275bf5f05ca6bfc68336199389a9644323a81d22c4bd081ec9c4826b7e965a5292167778eefb5edac3e1e0fd628684a30dbac663eb65de357a891a90855f356cbe26225342cce43c8e320a777c2a1f74ab97b7e442c94", @typed={0x8, 0x41, 0x0, 0x0, @ipv4=@multicast2}, @typed={0x8, 0x6b, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @generic="79c7219fa8393ab7671b616b9cea5f59e77de2a2ea4a268fcad39d31284ee1045f7dedc0dea487845188adde6fe70f5537a0635e01c2ec0a205c1f92c2272999ec8388f9a95b4d387581056e112c58f96f686734281b5a", @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@remote}, @generic="2d7a6c2813a21aa5bc78773404596de147d491e1868776a08d604bfb6aea387b585ce5b3f7ab336df3922c65"]}]}, 0x20c}, {&(0x7f0000000e00)={0x30, 0x12, 0x800, 0x70bd27, 0x25dfdbfc, "", [@typed={0x8, 0x5b, 0x0, 0x0, @pid}, @typed={0xf, 0x8c, 0x0, 0x0, @str='syzkaller1\x00'}, @typed={0x8, 0x7, 0x0, 0x0, @u32}]}, 0x30}, {&(0x7f0000000e40)={0xc8, 0x42, 0x10, 0x70bd26, 0x25dfdbff, "", [@generic="208cd2ae6be9be", @generic="c1d6c27da633daf115873b83c8913d284239d441678e667c20444d1a1f77f48ea7cbf783d84e79a9ebc262452149fe521b40868bf3938c61c8be3cdbd7429e623c99db5ae26d9cf24ee4ef4777ff0410e8b899b18e829f387d7926641f189d2b9697e099ffb7f20f691064b7d87d04cd2e230e8df8c77a2f1e4f4fabd49cfe414b3027dd850d9a2be9547ba5f2ed09811ea9ed9b201782165a792b57afca3e3d575d0f5b4b17a8", @typed={0x8, 0x94, 0x0, 0x0, @u32=0x1}]}, 0xc8}], 0x4, 0x0, 0x0, 0x8801}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000900)={'team0\x00', 0x0}) sendmsg$nl_route(r8, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={&(0x7f00000011c0)=@dellink={0x25c, 0x11, 0x400, 0x70bd28, 0x25dfdbff, {0x0, 0x0, 0x0, r9, 0x1000}, [@IFLA_PROTO_DOWN={0x5}, @IFLA_IFNAME={0x14, 0x3, 'macvlan1\x00'}, @IFLA_MAP={0x24, 0xe, {0x9, 0xd2, 0x2e4d, 0x200, 0x3e, 0xff}}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x5}, @IFLA_IFALIAS={0x14, 0x14, 'syzkaller1\x00'}, @IFLA_MTU={0x8, 0x4, 0x101}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_VFINFO_LIST={0x1cc, 0x16, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x8fe, 0xffff}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x5, 0x1}}]}, {0x84, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN_LIST={0x54, 0xc, 0x0, 0x1, [{0x14, 0x1, {0xb5d3, 0xadc, 0x100, 0xd1c53560eb87a9fa}}, {0x14, 0x1, {0x4, 0xb6, 0x81, 0x8100}}, {0x14, 0x1, {0x0, 0x6e4, 0x1, 0x88a8}}, {0x14, 0x1, {0x14, 0xaed, 0x0, 0x8100}}]}, @IFLA_VF_TX_RATE={0xc, 0x3, {0x1000, 0x200}}, @IFLA_VF_TRUST={0xc, 0x9, {0x7, 0x800}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x8000, 0x1}}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x7f, 0x7fff}}, @IFLA_VF_TRUST={0xc, 0x9, {0x7ff, 0x8}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_RATE={0x10, 0x6, {0x9, 0x5, 0x5}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x9}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x80000000, 0x3}}]}, {0xa4, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0xfff, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1d}}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x3f, 0x43}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x65c, 0x1}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x2, 0x80000001}}, @IFLA_VF_VLAN_LIST={0x40, 0xc, 0x0, 0x1, [{0x14, 0x1, {0xcae8, 0x919, 0x9, 0x8100}}, {0x14, 0x1, {0x200, 0xb47, 0xaaa, 0x8100}}, {0x14, 0x1, {0x5, 0x53b, 0xfffffff7, 0x88a8}}]}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x3f, 0x7fff}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x930, 0x5}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x6, 0x8}}]}]}]}, 0x25c}, 0x1, 0x0, 0x0, 0x11}, 0x4c089) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r7, 0x40189429, &(0x7f0000000480)={0x1, 0x4, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r10, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x45, 0xfc, 0x6}, {0x6}]}, 0x10) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x2, 0x3, &(0x7f0000000000)=@framed={{0x18, 0xf}}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) socket$inet6_sctp(0xa, 0x801, 0x84) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) r11 = socket$igmp(0x2, 0x3, 0x2) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@private1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) ioctl$TUNSETOWNER(r3, 0x400454cc, r12) setsockopt$MRT_INIT(r11, 0x0, 0xc8, &(0x7f0000000040), 0x4) setsockopt$MRT_ADD_VIF(r11, 0x0, 0xca, &(0x7f0000000100)={0x0, 0x1, 0x0, 0x0, @vifc_lcl_addr=@dev={0xac, 0x14, 0x14, 0xb}, @multicast1}, 0x10) [ 689.163408][T22907] FAULT_INJECTION: forcing a failure. [ 689.163408][T22907] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 689.177321][T22907] CPU: 0 PID: 22907 Comm: syz-executor.3 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 689.187834][T22907] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 689.198038][T22907] Call Trace: [ 689.201386][T22907] [ 689.204340][T22907] dump_stack_lvl+0xda/0x130 [ 689.209062][T22907] dump_stack+0x15/0x20 [ 689.213248][T22907] should_fail_ex+0x21f/0x230 [ 689.218056][T22907] should_fail+0xb/0x10 [ 689.222308][T22907] should_fail_usercopy+0x1a/0x20 [ 689.227375][T22907] copy_page_from_iter_atomic+0x22d/0xcf0 [ 689.233170][T22907] ? folio_test_hugetlb+0x3a/0x70 [ 689.238299][T22907] ? shmem_write_begin+0x12a/0x1d0 [ 689.243436][T22907] generic_perform_write+0x203/0x3d0 [ 689.248829][T22907] ? shmem_write_begin+0x1d0/0x1d0 [ 689.253965][T22907] __generic_file_write_iter+0xe6/0x290 [ 689.259583][T22907] generic_file_write_iter+0x7d/0x1c0 [ 689.265016][T22907] vfs_write+0x47b/0x780 [ 689.269317][T22907] ksys_write+0xeb/0x1a0 [ 689.273584][T22907] __x64_sys_write+0x42/0x50 [ 689.278247][T22907] do_syscall_64+0x41/0xc0 [ 689.282751][T22907] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 689.288677][T22907] RIP: 0033:0x7f1567f53ecf [ 689.293105][T22907] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 689.312823][T22907] RSP: 002b:00007f1567314f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 689.321388][T22907] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007f1567f53ecf [ 689.329389][T22907] RDX: 0000000000100000 RSI: 00007f155eef5000 RDI: 0000000000000005 [ 689.337399][T22907] RBP: 00007f155eef5000 R08: 0000000000000000 R09: 0000000000000534 [ 689.345443][T22907] R10: 0000000000100000 R11: 0000000000000293 R12: 0000000000000000 [ 689.353526][T22907] R13: 00007f1567314fdc R14: 00007f1567314fe0 R15: 0000000020000fc2 [ 689.361533][T22907] 07:23:21 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000019000000", 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000008c0)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000001cc0)={{}, r2, 0x16, @inherit={0x88, &(0x7f0000001580)=ANY=[@ANYRES16=r3]}, @devid}) r4 = syz_open_dev$MSR(&(0x7f0000000140), 0x100000000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r4, 0x84009422, &(0x7f0000000ec0)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(r6, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000001840)=ANY=[@ANYRES32=r5, @ANYRES32=r3, @ANYRESOCT, @ANYRES32=r1, @ANYRES32, @ANYRES64, @ANYRESHEX], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x40025) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f0000001500)={r5, "2ce8b7e675c30c143ac940d229ad3592"}) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$eJzs1T9rE3EYB/AnaazRqbM4/MDFqVQ3JyOSQvFAUTLoZKBxyYmQWy6Z8hJ8Ab4wB1+EZMp2Ei5VWxSDNLnSfj7LPdz3ud+/g7v39z+OTz8VH75+/hLdXivavbjTXrbiINpxZh4AwHWyrKr4XtWaXgsAsBv+/wBw87x5++7Fsyzrv06pG7GYl4NyUF/r/Pgk6x+llf3fnlqU5WDvZ/4o1c7nt+LuOn/8x3w/Hj6o81X2/GV2Ib8dp1vfPQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA3GyHKXUiIqWUDn7dXZTlYK/OD9OZC3ldHZ9k/aN1w/m8E/c6O9sGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAcAmK6Ww8zPPR5JoVEd9ix5N210d6uSMv/tXTW097VU5+m8XTTZtfLatq05GfRMTWF9+KmK/eUvNnuGnR3DcJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABoVjGdjYd5PpoUTa8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALgqiulsPMzz0eS/i2jVI/29p+k9AgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAM34EQAA///P7Cnj") r7 = socket$inet_udplite(0x2, 0x2, 0x88) read(r7, &(0x7f00000000c0)=""/43, 0x2b) 07:23:21 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0x81000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) 07:23:21 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) r2 = open(&(0x7f0000000040)='./file0\x00', 0x161842, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'sit0\x00'}) r4 = syz_io_uring_setup(0x73d7, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000100)=0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r6, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x10001) r8 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x8010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(r5, 0x0, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x8) syz_io_uring_submit(0x0, r8, &(0x7f00000008c0)=@IORING_OP_OPENAT2={0x1c, 0x40, 0x0, 0xffffffffffffffff, &(0x7f0000000840)={0x4ae0e0, 0x2, 0x5}, &(0x7f0000000880)='./file0\x00', 0x18, 0x0, 0x12345}, 0xff) syz_io_uring_submit(r5, 0x0, &(0x7f0000002b40)=@IORING_OP_RECVMSG={0xa, 0x2b, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000002b00)={0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/28, 0x1c}, {&(0x7f0000001540)=""/4096, 0x1000}, {&(0x7f0000002540)=""/131, 0x83}, {&(0x7f0000002600)=""/102, 0x66}, {&(0x7f0000002840)=""/203, 0xcb}], 0x6}, 0x0, 0x10040, 0x1, {0x1}}, 0x0) ftruncate(r2, 0x200002) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x200000e, 0x12, r3, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) r10 = creat(&(0x7f0000000180)='./file0\x00', 0x0) fallocate(r10, 0x0, 0x0, 0x2000402) fallocate(r9, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r9, 0xc028660f, &(0x7f0000001380)={0xc, r10, 0x15}) [ 689.393936][T22912] (unnamed net_device) (uninitialized): option use_carrier: invalid value (6) [ 689.411324][T22907] loop3: detected capacity change from 0 to 2048 [ 689.424592][T22912] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 689.435338][T22907] FAT-fs (loop3): Unrecognized mount option "ÿÿÿÿÿÿÿÿ184467440737095516150xffffffffffffffff" or missing value [ 689.535943][T22916] loop0: detected capacity change from 0 to 2048 [ 689.549297][T22916] FAT-fs (loop0): Unrecognized mount option "ÿÿÿÿÿÿÿÿ184467440737095516150xffffffffffffffff" or missing value 07:23:22 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a003, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:23:22 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0x81ffffff}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) 07:23:22 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000002c0)={&(0x7f0000000c80)=ANY=[@ANYBLOB="0026bd7000ffdbdf25070000000c00068008000b00060000000c0008002302b41174de3f460a6d000000000000080003000380000008000300bd2c00ff07000400f8ffffff080003001dd30000080004006604000000000000000000"], 0x5c}, 0x1, 0x0, 0x0, 0x1884}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6, 0x6}]}}}]}, 0x3c}}, 0x0) r3 = openat(r2, &(0x7f00000000c0)='./file0\x00', 0x0, 0x31) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00./file0\x00']) connect$unix(r3, &(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000001c0), 0x200080, 0x0) ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f0000000200)={0x55, 0xb5f3, 0x2, 0x1, 0x6}) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000600)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000800)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x40}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) io_setup(0x6, &(0x7f00000003c0)=0x0) r7 = socket$phonet_pipe(0x23, 0x5, 0x2) io_submit(r6, 0x2, &(0x7f00000005c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, r7, &(0x7f00000001c0)='\"', 0x1}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r8, &(0x7f0000006440)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f0000000c40)={0x10, 0x1d, 0x20, 0x70bd28, 0x25dfdbfd}, 0x10}, {&(0x7f0000000f80)={0x20c, 0x3d, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x1f, 0x46, 0x0, 0x1, [@generic="6b23bda57b0fcd6882aea56d992b0de112a87c9689a0ce8f3a928a"]}, @generic="931dd380ae9b76725532f39b25791247f8e1faaa5606177d1141efdf8a23daecc73d0706f82254c664a01e4c4986b42b265e8e88f8f88e8099514ce917072d6e80996cbddc81dd1014a75c1cd2e0c084d7806b82c11b8a625557f25357333f879c7f3ea978d0c62492b2b2a3437425bf3933cf6d0456ae40263ff847b9956f9f56cd1e35dd616a0dffde59", @nested={0x14d, 0x46, 0x0, 0x1, [@typed={0x8, 0x8f, 0x0, 0x0, @u32=0x4}, @generic="3fe433e9f5d2f6047805d9eb39d59742ad46c8bd198fea6b4f77d0bf577f925374abd91b16efa9a31621d58f4b1ee788ba33ce3ae89358fcbecdc28e3a8775ee6c905d5275bf5f05ca6bfc68336199389a9644323a81d22c4bd081ec9c4826b7e965a5292167778eefb5edac3e1e0fd628684a30dbac663eb65de357a891a90855f356cbe26225342cce43c8e320a777c2a1f74ab97b7e442c94", @typed={0x8, 0x41, 0x0, 0x0, @ipv4=@multicast2}, @typed={0x8, 0x6b, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @generic="79c7219fa8393ab7671b616b9cea5f59e77de2a2ea4a268fcad39d31284ee1045f7dedc0dea487845188adde6fe70f5537a0635e01c2ec0a205c1f92c2272999ec8388f9a95b4d387581056e112c58f96f686734281b5a", @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@remote}, @generic="2d7a6c2813a21aa5bc78773404596de147d491e1868776a08d604bfb6aea387b585ce5b3f7ab336df3922c65"]}]}, 0x20c}, {&(0x7f0000000e00)={0x30, 0x12, 0x800, 0x70bd27, 0x25dfdbfc, "", [@typed={0x8, 0x5b, 0x0, 0x0, @pid}, @typed={0xf, 0x8c, 0x0, 0x0, @str='syzkaller1\x00'}, @typed={0x8, 0x7, 0x0, 0x0, @u32}]}, 0x30}, {&(0x7f0000000e40)={0xc8, 0x42, 0x10, 0x70bd26, 0x25dfdbff, "", [@generic="208cd2ae6be9be", @generic="c1d6c27da633daf115873b83c8913d284239d441678e667c20444d1a1f77f48ea7cbf783d84e79a9ebc262452149fe521b40868bf3938c61c8be3cdbd7429e623c99db5ae26d9cf24ee4ef4777ff0410e8b899b18e829f387d7926641f189d2b9697e099ffb7f20f691064b7d87d04cd2e230e8df8c77a2f1e4f4fabd49cfe414b3027dd850d9a2be9547ba5f2ed09811ea9ed9b201782165a792b57afca3e3d575d0f5b4b17a8", @typed={0x8, 0x94, 0x0, 0x0, @u32=0x1}]}, 0xc8}], 0x4, 0x0, 0x0, 0x8801}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000900)={'team0\x00', 0x0}) sendmsg$nl_route(r8, &(0x7f0000000c00)={&(0x7f0000000640), 0xc, &(0x7f0000000bc0)={&(0x7f00000011c0)=@dellink={0x25c, 0x11, 0x400, 0x70bd28, 0x25dfdbff, {0x0, 0x0, 0x0, r9, 0x1000}, [@IFLA_PROTO_DOWN={0x5}, @IFLA_IFNAME={0x14, 0x3, 'macvlan1\x00'}, @IFLA_MAP={0x24, 0xe, {0x9, 0xd2, 0x2e4d, 0x200, 0x3e, 0xff}}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x5}, @IFLA_IFALIAS={0x14, 0x14, 'syzkaller1\x00'}, @IFLA_MTU={0x8, 0x4, 0x101}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_VFINFO_LIST={0x1cc, 0x16, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x8fe, 0xffff}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x5, 0x1}}]}, {0x84, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN_LIST={0x54, 0xc, 0x0, 0x1, [{0x14, 0x1, {0xb5d3, 0xadc, 0x100, 0xd1c53560eb87a9fa}}, {0x14, 0x1, {0x4, 0xb6, 0x81, 0x8100}}, {0x14, 0x1, {0x0, 0x6e4, 0x1, 0x88a8}}, {0x14, 0x1, {0x14, 0xaed, 0x0, 0x8100}}]}, @IFLA_VF_TX_RATE={0xc, 0x3, {0x1000, 0x200}}, @IFLA_VF_TRUST={0xc, 0x9, {0x7, 0x800}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x8000, 0x1}}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x7f, 0x7fff}}, @IFLA_VF_TRUST={0xc, 0x9, {0x7ff, 0x8}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_RATE={0x10, 0x6, {0x9, 0x5, 0x5}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x9}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x80000000, 0x3}}]}, {0xa4, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0xfff, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1d}}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x3f, 0x43}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x65c, 0x1}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x2, 0x80000001}}, @IFLA_VF_VLAN_LIST={0x40, 0xc, 0x0, 0x1, [{0x14, 0x1, {0xcae8, 0x919, 0x9, 0x8100}}, {0x14, 0x1, {0x200, 0xb47, 0xaaa, 0x8100}}, {0x14, 0x1, {0x5, 0x53b, 0xfffffff7, 0x88a8}}]}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x3f, 0x7fff}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x930, 0x5}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x6, 0x8}}]}]}]}, 0x25c}, 0x1, 0x0, 0x0, 0x11}, 0x4c089) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r7, 0x40189429, &(0x7f0000000480)={0x1, 0x4, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r10, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x45, 0xfc, 0x6}, {0x6}]}, 0x10) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x2, 0x3, &(0x7f0000000000)=@framed={{0x18, 0xf}}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) socket$inet6_sctp(0xa, 0x801, 0x84) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) r11 = socket$igmp(0x2, 0x3, 0x2) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@private1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) ioctl$TUNSETOWNER(r3, 0x400454cc, r12) setsockopt$MRT_INIT(r11, 0x0, 0xc8, &(0x7f0000000040), 0x4) setsockopt$MRT_ADD_VIF(r11, 0x0, 0xca, &(0x7f0000000100)={0x0, 0x1, 0x0, 0x0, @vifc_lcl_addr=@dev={0xac, 0x14, 0x14, 0xb}, @multicast1}, 0x10) 07:23:22 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, 0x0) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$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") (fail_nth: 60) 07:23:22 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) r2 = open(&(0x7f0000000040)='./file0\x00', 0x161842, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'sit0\x00'}) r4 = syz_io_uring_setup(0x73d7, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000100)=0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r6, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x10001) r8 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x8010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(r5, 0x0, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x8) syz_io_uring_submit(0x0, r8, &(0x7f00000008c0)=@IORING_OP_OPENAT2={0x1c, 0x40, 0x0, 0xffffffffffffffff, &(0x7f0000000840)={0x4ae0e0, 0x2, 0x5}, &(0x7f0000000880)='./file0\x00', 0x18, 0x0, 0x12345}, 0xff) syz_io_uring_submit(r5, 0x0, &(0x7f0000002b40)=@IORING_OP_RECVMSG={0xa, 0x2b, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000002b00)={0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/28, 0x1c}, {&(0x7f0000001540)=""/4096, 0x1000}, {&(0x7f0000002540)=""/131, 0x83}, {&(0x7f0000002600)=""/102, 0x66}, {&(0x7f0000002840)=""/203, 0xcb}], 0x6}, 0x0, 0x10040, 0x1, {0x1}}, 0x0) ftruncate(r2, 0x200002) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x200000e, 0x12, r3, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) r10 = creat(&(0x7f0000000180)='./file0\x00', 0x0) fallocate(r10, 0x0, 0x0, 0x2000402) fallocate(r9, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r9, 0xc028660f, &(0x7f0000001380)={0xc, r10, 0x16}) [ 689.706640][T22927] (unnamed net_device) (uninitialized): option use_carrier: invalid value (6) [ 689.741486][T22928] FAULT_INJECTION: forcing a failure. [ 689.741486][T22928] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 689.754801][T22928] CPU: 1 PID: 22928 Comm: syz-executor.3 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 689.765262][T22928] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 689.775447][T22928] Call Trace: [ 689.778743][T22928] [ 689.781690][T22928] dump_stack_lvl+0xda/0x130 [ 689.786398][T22928] dump_stack+0x15/0x20 [ 689.790661][T22928] should_fail_ex+0x21f/0x230 [ 689.795435][T22928] __alloc_pages+0x108/0x340 [ 689.800157][T22928] vma_alloc_folio+0x6a3/0x8c0 [ 689.805068][T22928] ? __vm_enough_memory+0xdf/0x2a0 [ 689.810267][T22928] shmem_get_folio_gfp+0x801/0x1200 [ 689.815527][T22928] shmem_write_begin+0xa6/0x1d0 [ 689.820460][T22928] generic_perform_write+0x1c3/0x3d0 [ 689.825778][T22928] ? shmem_write_begin+0x1d0/0x1d0 [ 689.830909][T22928] __generic_file_write_iter+0xe6/0x290 [ 689.834557][T22929] bond1014: entered promiscuous mode [ 689.836546][T22928] generic_file_write_iter+0x7d/0x1c0 [ 689.836586][T22928] vfs_write+0x47b/0x780 [ 689.836613][T22928] ksys_write+0xeb/0x1a0 [ 689.841903][T22929] bond1014: entered allmulticast mode [ 689.842965][T22929] 8021q: adding VLAN 0 to HW filter on device bond1014 [ 689.847284][T22928] __x64_sys_write+0x42/0x50 [ 689.847401][T22928] do_syscall_64+0x41/0xc0 [ 689.847435][T22928] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 689.847473][T22928] RIP: 0033:0x7f1567f53ecf [ 689.847492][T22928] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 689.847516][T22928] RSP: 002b:00007f1567314f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 689.847539][T22928] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007f1567f53ecf [ 689.847554][T22928] RDX: 0000000000100000 RSI: 00007f155eef5000 RDI: 0000000000000005 [ 689.847591][T22928] RBP: 00007f155eef5000 R08: 0000000000000000 R09: 0000000000000534 [ 689.847607][T22928] R10: 0000000000100000 R11: 0000000000000293 R12: 0000000000000000 07:23:22 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, 0x0) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$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") (fail_nth: 61) 07:23:22 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0x83000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) [ 689.847623][T22928] R13: 00007f1567314fdc R14: 00007f1567314fe0 R15: 0000000020000fc2 [ 689.847653][T22928] [ 689.964683][T22927] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 690.020036][T22940] FAULT_INJECTION: forcing a failure. [ 690.020036][T22940] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 690.033283][T22940] CPU: 1 PID: 22940 Comm: syz-executor.3 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 690.043752][T22940] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 690.053878][T22940] Call Trace: [ 690.057172][T22940] [ 690.060120][T22940] dump_stack_lvl+0xda/0x130 [ 690.064799][T22940] dump_stack+0x15/0x20 [ 690.069073][T22940] should_fail_ex+0x21f/0x230 [ 690.073868][T22940] should_fail+0xb/0x10 [ 690.078063][T22940] should_fail_usercopy+0x1a/0x20 [ 690.083143][T22940] copy_page_from_iter_atomic+0x22d/0xcf0 [ 690.089009][T22940] ? folio_test_hugetlb+0x3a/0x70 [ 690.094101][T22940] ? shmem_write_begin+0x12a/0x1d0 [ 690.099229][T22940] generic_perform_write+0x203/0x3d0 [ 690.104672][T22940] ? shmem_write_begin+0x1d0/0x1d0 [ 690.109925][T22940] __generic_file_write_iter+0xe6/0x290 [ 690.115508][T22940] generic_file_write_iter+0x7d/0x1c0 [ 690.121039][T22940] vfs_write+0x47b/0x780 [ 690.125369][T22940] ksys_write+0xeb/0x1a0 [ 690.129628][T22940] __x64_sys_write+0x42/0x50 [ 690.134241][T22940] do_syscall_64+0x41/0xc0 [ 690.138790][T22940] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 690.144741][T22940] RIP: 0033:0x7f1567f53ecf [ 690.149176][T22940] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 07:23:22 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000019000000", 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000008c0)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000001cc0)={{}, r2, 0x16, @inherit={0x88, &(0x7f0000001580)=ANY=[@ANYRES16=r3]}, @devid}) r4 = syz_open_dev$MSR(&(0x7f0000000140), 0x100000000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r4, 0x84009422, &(0x7f0000000ec0)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(r6, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000001840)=ANY=[@ANYRES32=r5, @ANYRES32=r3, @ANYRESOCT, @ANYRES32=r1, @ANYRES32, @ANYRES64, @ANYRESHEX], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x40025) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f0000001500)={r5, "2ce8b7e675c30c143ac940d229ad3592"}) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$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") r7 = socket$inet_udplite(0x2, 0x2, 0x88) read(r7, &(0x7f00000000c0)=""/43, 0x2b) [ 690.168838][T22940] RSP: 002b:00007f1567314f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 690.177288][T22940] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007f1567f53ecf [ 690.185333][T22940] RDX: 0000000000100000 RSI: 00007f155eef5000 RDI: 0000000000000005 [ 690.193431][T22940] RBP: 00007f155eef5000 R08: 0000000000000000 R09: 0000000000000534 [ 690.201494][T22940] R10: 0000000000100000 R11: 0000000000000293 R12: 0000000000000000 [ 690.209532][T22940] R13: 00007f1567314fdc R14: 00007f1567314fe0 R15: 0000000020000fc2 [ 690.217531][T22940] 07:23:22 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0x84040000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) 07:23:22 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000002c0)={&(0x7f0000000c80)=ANY=[@ANYBLOB="0026bd7000ffdbdf25070000000c00068008000b00060000000c0008002302b41174de3f460a6d000000000000080003000380000008000300bd2c00ff07000400f8ffffff080003001dd30000080004006604000000000000000000"], 0x5c}, 0x1, 0x0, 0x0, 0x1884}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6, 0x6}]}}}]}, 0x3c}}, 0x0) r3 = openat(r2, &(0x7f00000000c0)='./file0\x00', 0x0, 0x31) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000680)=ANY=[@ANYBLOB="4afe65cd9f4cb96af18454a88fa8005c9fe248c0144c45e701002b7127b6679c7a64908ce701f270818888d4368d79057ee5e41b0efaa601fc1a8488a8a24cb9d947491b1bc7983e1710bb3ccc29e6d4ed4df77669e40bbfa802c600208e53ee50e98ab2cb4f50d11a9cdddd9320a5d8171c0f0c108488d0b23be195b12fc7ed967f99e71ff165310bc20d027160e20e87088c6f48a6c7210431c5a6578b11b646347984f92bc092089c964bd360a4e0b124bec92bf620edc72693f0e78f12e205659005168a8e2f60f18bcecd57f49295bfe6ca9c894f4d75798ae81020f3ff3f9d2aeb8740d2ec38db6c068f60e10f6f06172fb698e28d2dcc7deed28eee05874cc59a89b771e167c0d3da3789a3acd1af0cc89d9ff46e329a00f6d1a28794c3b3db7752189c1853e53b0aa840b887618d3d9b6038fc37865fa39328a439819e25692b3efee7a80b609f2ba10030f51469aa05f966b72dedf8991f0d", @ANYRES32=r0, @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00./file0\x00']) connect$unix(r3, &(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000001c0), 0x200080, 0x0) ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f0000000200)={0x55, 0xb5f3, 0x2, 0x1, 0x6}) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000600)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000800)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x40}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) io_setup(0x6, &(0x7f00000003c0)=0x0) r7 = socket$phonet_pipe(0x23, 0x5, 0x2) io_submit(r6, 0x2, &(0x7f00000005c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, r7, &(0x7f00000001c0)='\"', 0x1}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r8, &(0x7f0000006440)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f0000000c40)={0x10, 0x1d, 0x20, 0x70bd28, 0x25dfdbfd}, 0x10}, {&(0x7f0000000f80)={0x20c, 0x3d, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x1f, 0x46, 0x0, 0x1, [@generic="6b23bda57b0fcd6882aea56d992b0de112a87c9689a0ce8f3a928a"]}, @generic="931dd380ae9b76725532f39b25791247f8e1faaa5606177d1141efdf8a23daecc73d0706f82254c664a01e4c4986b42b265e8e88f8f88e8099514ce917072d6e80996cbddc81dd1014a75c1cd2e0c084d7806b82c11b8a625557f25357333f879c7f3ea978d0c62492b2b2a3437425bf3933cf6d0456ae40263ff847b9956f9f56cd1e35dd616a0dffde59", @nested={0x14d, 0x46, 0x0, 0x1, [@typed={0x8, 0x8f, 0x0, 0x0, @u32=0x4}, @generic="3fe433e9f5d2f6047805d9eb39d59742ad46c8bd198fea6b4f77d0bf577f925374abd91b16efa9a31621d58f4b1ee788ba33ce3ae89358fcbecdc28e3a8775ee6c905d5275bf5f05ca6bfc68336199389a9644323a81d22c4bd081ec9c4826b7e965a5292167778eefb5edac3e1e0fd628684a30dbac663eb65de357a891a90855f356cbe26225342cce43c8e320a777c2a1f74ab97b7e442c94", @typed={0x8, 0x41, 0x0, 0x0, @ipv4=@multicast2}, @typed={0x8, 0x6b, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @generic="79c7219fa8393ab7671b616b9cea5f59e77de2a2ea4a268fcad39d31284ee1045f7dedc0dea487845188adde6fe70f5537a0635e01c2ec0a205c1f92c2272999ec8388f9a95b4d387581056e112c58f96f686734281b5a", @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@remote}, @generic="2d7a6c2813a21aa5bc78773404596de147d491e1868776a08d604bfb6aea387b585ce5b3f7ab336df3922c65"]}]}, 0x20c}, {&(0x7f0000000e00)={0x30, 0x12, 0x800, 0x70bd27, 0x25dfdbfc, "", [@typed={0x8, 0x5b, 0x0, 0x0, @pid}, @typed={0xf, 0x8c, 0x0, 0x0, @str='syzkaller1\x00'}, @typed={0x8, 0x7, 0x0, 0x0, @u32}]}, 0x30}, {&(0x7f0000000e40)={0xc8, 0x42, 0x10, 0x70bd26, 0x25dfdbff, "", [@generic="208cd2ae6be9be", @generic="c1d6c27da633daf115873b83c8913d284239d441678e667c20444d1a1f77f48ea7cbf783d84e79a9ebc262452149fe521b40868bf3938c61c8be3cdbd7429e623c99db5ae26d9cf24ee4ef4777ff0410e8b899b18e829f387d7926641f189d2b9697e099ffb7f20f691064b7d87d04cd2e230e8df8c77a2f1e4f4fabd49cfe414b3027dd850d9a2be9547ba5f2ed09811ea9ed9b201782165a792b57afca3e3d575d0f5b4b17a8", @typed={0x8, 0x94, 0x0, 0x0, @u32=0x1}]}, 0xc8}], 0x4, 0x0, 0x0, 0x8801}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000900)={'team0\x00', 0x0}) sendmsg$nl_route(r8, &(0x7f0000000c00)={&(0x7f0000000640), 0xc, &(0x7f0000000bc0)={&(0x7f00000011c0)=@dellink={0x25c, 0x11, 0x400, 0x70bd28, 0x25dfdbff, {0x0, 0x0, 0x0, r9, 0x1000}, [@IFLA_PROTO_DOWN={0x5}, @IFLA_IFNAME={0x14, 0x3, 'macvlan1\x00'}, @IFLA_MAP={0x24, 0xe, {0x9, 0xd2, 0x2e4d, 0x200, 0x3e, 0xff}}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x5}, @IFLA_IFALIAS={0x14, 0x14, 'syzkaller1\x00'}, @IFLA_MTU={0x8, 0x4, 0x101}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_VFINFO_LIST={0x1cc, 0x16, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x8fe, 0xffff}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x5, 0x1}}]}, {0x84, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN_LIST={0x54, 0xc, 0x0, 0x1, [{0x14, 0x1, {0xb5d3, 0xadc, 0x100, 0xd1c53560eb87a9fa}}, {0x14, 0x1, {0x4, 0xb6, 0x81, 0x8100}}, {0x14, 0x1, {0x0, 0x6e4, 0x1, 0x88a8}}, {0x14, 0x1, {0x14, 0xaed, 0x0, 0x8100}}]}, @IFLA_VF_TX_RATE={0xc, 0x3, {0x1000, 0x200}}, @IFLA_VF_TRUST={0xc, 0x9, {0x7, 0x800}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x8000, 0x1}}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x7f, 0x7fff}}, @IFLA_VF_TRUST={0xc, 0x9, {0x7ff, 0x8}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_RATE={0x10, 0x6, {0x9, 0x5, 0x5}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x9}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x80000000, 0x3}}]}, {0xa4, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0xfff, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1d}}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x3f, 0x43}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x65c, 0x1}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x2, 0x80000001}}, @IFLA_VF_VLAN_LIST={0x40, 0xc, 0x0, 0x1, [{0x14, 0x1, {0xcae8, 0x919, 0x9, 0x8100}}, {0x14, 0x1, {0x200, 0xb47, 0xaaa, 0x8100}}, {0x14, 0x1, {0x5, 0x53b, 0xfffffff7, 0x88a8}}]}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x3f, 0x7fff}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x930, 0x5}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x6, 0x8}}]}]}]}, 0x25c}, 0x1, 0x0, 0x0, 0x11}, 0x4c089) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r7, 0x40189429, &(0x7f0000000480)={0x1, 0x4, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r10, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x45, 0xfc, 0x6}, {0x6}]}, 0x10) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x2, 0x3, &(0x7f0000000000)=@framed={{0x18, 0xf}}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) socket$inet6_sctp(0xa, 0x801, 0x84) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) r11 = socket$igmp(0x2, 0x3, 0x2) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@private1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) ioctl$TUNSETOWNER(r3, 0x400454cc, r12) setsockopt$MRT_INIT(r11, 0x0, 0xc8, &(0x7f0000000040), 0x4) setsockopt$MRT_ADD_VIF(r11, 0x0, 0xca, &(0x7f0000000100)={0x0, 0x1, 0x0, 0x0, @vifc_lcl_addr=@dev={0xac, 0x14, 0x14, 0xb}, @multicast1}, 0x10) [ 690.245695][T22940] loop3: detected capacity change from 0 to 2048 [ 690.275686][T22940] FAT-fs (loop3): Unrecognized mount option "ÿÿÿÿÿÿÿÿ184467440737095516150xffffffffffffffff" or missing value 07:23:22 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0x88470000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) 07:23:22 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, 0x0) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$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") (fail_nth: 62) [ 690.292387][T22946] (unnamed net_device) (uninitialized): option use_carrier: invalid value (6) [ 690.314088][T22946] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 690.394560][T22949] loop0: detected capacity change from 0 to 2048 [ 690.404011][T22949] FAT-fs (loop0): Unrecognized mount option "ÿÿÿÿÿÿÿÿ184467440737095516150xffffffffffffffff" or missing value [ 690.413913][T22958] FAULT_INJECTION: forcing a failure. [ 690.413913][T22958] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 690.429748][T22958] CPU: 0 PID: 22958 Comm: syz-executor.3 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 690.440198][T22958] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 690.450266][T22958] Call Trace: [ 690.453544][T22958] [ 690.456521][T22958] dump_stack_lvl+0xda/0x130 [ 690.461148][T22958] dump_stack+0x15/0x20 [ 690.465310][T22958] should_fail_ex+0x21f/0x230 [ 690.470083][T22958] __alloc_pages+0x108/0x340 [ 690.474701][T22958] vma_alloc_folio+0x6a3/0x8c0 [ 690.479525][T22958] ? __vm_enough_memory+0xdf/0x2a0 [ 690.484709][T22958] shmem_get_folio_gfp+0x801/0x1200 [ 690.489936][T22958] shmem_write_begin+0xa6/0x1d0 [ 690.494828][T22958] generic_perform_write+0x1c3/0x3d0 [ 690.500156][T22958] ? shmem_write_begin+0x1d0/0x1d0 [ 690.505267][T22958] __generic_file_write_iter+0xe6/0x290 [ 690.510860][T22958] generic_file_write_iter+0x7d/0x1c0 [ 690.516238][T22958] vfs_write+0x47b/0x780 [ 690.520523][T22958] ksys_write+0xeb/0x1a0 [ 690.524763][T22958] __x64_sys_write+0x42/0x50 [ 690.529389][T22958] do_syscall_64+0x41/0xc0 [ 690.533809][T22958] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 690.539758][T22958] RIP: 0033:0x7f1567f53ecf 07:23:23 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a004, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:23:23 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) r2 = open(&(0x7f0000000040)='./file0\x00', 0x161842, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'sit0\x00'}) r4 = syz_io_uring_setup(0x73d7, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000100)=0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r6, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x10001) r8 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x8010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(r5, 0x0, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x8) syz_io_uring_submit(0x0, r8, &(0x7f00000008c0)=@IORING_OP_OPENAT2={0x1c, 0x40, 0x0, 0xffffffffffffffff, &(0x7f0000000840)={0x4ae0e0, 0x2, 0x5}, &(0x7f0000000880)='./file0\x00', 0x18, 0x0, 0x12345}, 0xff) syz_io_uring_submit(r5, 0x0, &(0x7f0000002b40)=@IORING_OP_RECVMSG={0xa, 0x2b, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000002b00)={0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/28, 0x1c}, {&(0x7f0000001540)=""/4096, 0x1000}, {&(0x7f0000002540)=""/131, 0x83}, {&(0x7f0000002600)=""/102, 0x66}, {&(0x7f0000002840)=""/203, 0xcb}], 0x6}, 0x0, 0x10040, 0x1, {0x1}}, 0x0) ftruncate(r2, 0x200002) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x200000e, 0x12, r3, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) r10 = creat(&(0x7f0000000180)='./file0\x00', 0x0) fallocate(r10, 0x0, 0x0, 0x2000402) fallocate(r9, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r9, 0xc028660f, &(0x7f0000001380)={0xc, r10, 0x17}) 07:23:23 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000002c0)={&(0x7f0000000c80)=ANY=[@ANYBLOB="0026bd7000ffdbdf25070000000c00068008000b00060000000c0008002302b41174de3f460a6d000000000000080003000380000008000300bd2c00ff07000400f8ffffff080003001dd30000080004006604000000000000000000"], 0x5c}, 0x1, 0x0, 0x0, 0x1884}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6, 0x6}]}}}]}, 0x3c}}, 0x0) r3 = openat(r2, &(0x7f00000000c0)='./file0\x00', 0x0, 0x31) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00./file0\x00']) connect$unix(r3, &(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000001c0), 0x200080, 0x0) ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f0000000200)={0x55, 0xb5f3, 0x2, 0x1, 0x6}) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000600)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000800)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x40}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) io_setup(0x6, &(0x7f00000003c0)=0x0) r7 = socket$phonet_pipe(0x23, 0x5, 0x2) io_submit(r6, 0x2, &(0x7f00000005c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, r7, &(0x7f00000001c0)='\"', 0x1}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r8, &(0x7f0000006440)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f0000000c40)={0x10, 0x1d, 0x20, 0x70bd28, 0x25dfdbfd}, 0x10}, {&(0x7f0000000f80)={0x20c, 0x3d, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x1f, 0x46, 0x0, 0x1, [@generic="6b23bda57b0fcd6882aea56d992b0de112a87c9689a0ce8f3a928a"]}, @generic="931dd380ae9b76725532f39b25791247f8e1faaa5606177d1141efdf8a23daecc73d0706f82254c664a01e4c4986b42b265e8e88f8f88e8099514ce917072d6e80996cbddc81dd1014a75c1cd2e0c084d7806b82c11b8a625557f25357333f879c7f3ea978d0c62492b2b2a3437425bf3933cf6d0456ae40263ff847b9956f9f56cd1e35dd616a0dffde59", @nested={0x14d, 0x46, 0x0, 0x1, [@typed={0x8, 0x8f, 0x0, 0x0, @u32=0x4}, @generic="3fe433e9f5d2f6047805d9eb39d59742ad46c8bd198fea6b4f77d0bf577f925374abd91b16efa9a31621d58f4b1ee788ba33ce3ae89358fcbecdc28e3a8775ee6c905d5275bf5f05ca6bfc68336199389a9644323a81d22c4bd081ec9c4826b7e965a5292167778eefb5edac3e1e0fd628684a30dbac663eb65de357a891a90855f356cbe26225342cce43c8e320a777c2a1f74ab97b7e442c94", @typed={0x8, 0x41, 0x0, 0x0, @ipv4=@multicast2}, @typed={0x8, 0x6b, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @generic="79c7219fa8393ab7671b616b9cea5f59e77de2a2ea4a268fcad39d31284ee1045f7dedc0dea487845188adde6fe70f5537a0635e01c2ec0a205c1f92c2272999ec8388f9a95b4d387581056e112c58f96f686734281b5a", @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@remote}, @generic="2d7a6c2813a21aa5bc78773404596de147d491e1868776a08d604bfb6aea387b585ce5b3f7ab336df3922c65"]}]}, 0x20c}, {&(0x7f0000000e00)={0x30, 0x12, 0x800, 0x70bd27, 0x25dfdbfc, "", [@typed={0x8, 0x5b, 0x0, 0x0, @pid}, @typed={0xf, 0x8c, 0x0, 0x0, @str='syzkaller1\x00'}, @typed={0x8, 0x7, 0x0, 0x0, @u32}]}, 0x30}, {&(0x7f0000000e40)={0xc8, 0x42, 0x10, 0x70bd26, 0x25dfdbff, "", [@generic="208cd2ae6be9be", @generic="c1d6c27da633daf115873b83c8913d284239d441678e667c20444d1a1f77f48ea7cbf783d84e79a9ebc262452149fe521b40868bf3938c61c8be3cdbd7429e623c99db5ae26d9cf24ee4ef4777ff0410e8b899b18e829f387d7926641f189d2b9697e099ffb7f20f691064b7d87d04cd2e230e8df8c77a2f1e4f4fabd49cfe414b3027dd850d9a2be9547ba5f2ed09811ea9ed9b201782165a792b57afca3e3d575d0f5b4b17a8", @typed={0x8, 0x94, 0x0, 0x0, @u32=0x1}]}, 0xc8}], 0x4, 0x0, 0x0, 0x8801}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000900)={'team0\x00', 0x0}) sendmsg$nl_route(r8, &(0x7f0000000c00)={&(0x7f0000000640), 0xc, &(0x7f0000000bc0)={&(0x7f00000011c0)=@dellink={0x25c, 0x11, 0x400, 0x70bd28, 0x25dfdbff, {0x0, 0x0, 0x0, r9, 0x1000}, [@IFLA_PROTO_DOWN={0x5}, @IFLA_IFNAME={0x14, 0x3, 'macvlan1\x00'}, @IFLA_MAP={0x24, 0xe, {0x9, 0xd2, 0x2e4d, 0x200, 0x3e, 0xff}}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x5}, @IFLA_IFALIAS={0x14, 0x14, 'syzkaller1\x00'}, @IFLA_MTU={0x8, 0x4, 0x101}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_VFINFO_LIST={0x1cc, 0x16, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x8fe, 0xffff}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x5, 0x1}}]}, {0x84, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN_LIST={0x54, 0xc, 0x0, 0x1, [{0x14, 0x1, {0xb5d3, 0xadc, 0x100, 0xd1c53560eb87a9fa}}, {0x14, 0x1, {0x4, 0xb6, 0x81, 0x8100}}, {0x14, 0x1, {0x0, 0x6e4, 0x1, 0x88a8}}, {0x14, 0x1, {0x14, 0xaed, 0x0, 0x8100}}]}, @IFLA_VF_TX_RATE={0xc, 0x3, {0x1000, 0x200}}, @IFLA_VF_TRUST={0xc, 0x9, {0x7, 0x800}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x8000, 0x1}}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x7f, 0x7fff}}, @IFLA_VF_TRUST={0xc, 0x9, {0x7ff, 0x8}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_RATE={0x10, 0x6, {0x9, 0x5, 0x5}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x9}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x80000000, 0x3}}]}, {0xa4, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0xfff, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1d}}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x3f, 0x43}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x65c, 0x1}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x2, 0x80000001}}, @IFLA_VF_VLAN_LIST={0x40, 0xc, 0x0, 0x1, [{0x14, 0x1, {0xcae8, 0x919, 0x9, 0x8100}}, {0x14, 0x1, {0x200, 0xb47, 0xaaa, 0x8100}}, {0x14, 0x1, {0x5, 0x53b, 0xfffffff7, 0x88a8}}]}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x3f, 0x7fff}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x930, 0x5}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x6, 0x8}}]}]}]}, 0x25c}, 0x1, 0x0, 0x0, 0x11}, 0x4c089) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r7, 0x40189429, &(0x7f0000000480)={0x1, 0x4, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r10, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x45, 0xfc, 0x6}, {0x6}]}, 0x10) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x2, 0x3, &(0x7f0000000000)=@framed={{0x18, 0xf}}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) socket$inet6_sctp(0xa, 0x801, 0x84) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) r11 = socket$igmp(0x2, 0x3, 0x2) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@private1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) ioctl$TUNSETOWNER(r3, 0x400454cc, r12) setsockopt$MRT_INIT(r11, 0x0, 0xc8, &(0x7f0000000040), 0x4) setsockopt$MRT_ADD_VIF(r11, 0x0, 0xca, &(0x7f0000000100)={0x0, 0x1, 0x0, 0x0, @vifc_lcl_addr=@dev={0xac, 0x14, 0x14, 0xb}, @multicast1}, 0x10) 07:23:23 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0x88480000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) [ 690.544249][T22958] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 690.563870][T22958] RSP: 002b:00007f1567314f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 690.572329][T22958] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007f1567f53ecf [ 690.580329][T22958] RDX: 0000000000100000 RSI: 00007f155eef5000 RDI: 0000000000000005 [ 690.588319][T22958] RBP: 00007f155eef5000 R08: 0000000000000000 R09: 0000000000000534 [ 690.596308][T22958] R10: 0000000000100000 R11: 0000000000000293 R12: 0000000000000000 [ 690.604299][T22958] R13: 00007f1567314fdc R14: 00007f1567314fe0 R15: 0000000020000fc2 [ 690.612346][T22958] [ 690.631137][T22964] (unnamed net_device) (uninitialized): option use_carrier: invalid value (6) 07:23:23 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0x88a8ffff}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) [ 690.642595][T22964] selinux_netlink_send: 8 callbacks suppressed [ 690.642612][T22964] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=22964 comm=syz-executor.5 07:23:23 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, 0x0) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$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") (fail_nth: 63) [ 690.697876][T22964] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=61 sclass=netlink_route_socket pid=22964 comm=syz-executor.5 [ 690.768704][T22972] FAULT_INJECTION: forcing a failure. [ 690.768704][T22972] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 690.782059][T22972] CPU: 1 PID: 22972 Comm: syz-executor.3 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 690.792510][T22972] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 690.802603][T22972] Call Trace: [ 690.805900][T22972] [ 690.808847][T22972] dump_stack_lvl+0xda/0x130 [ 690.813591][T22972] dump_stack+0x15/0x20 [ 690.817875][T22972] should_fail_ex+0x21f/0x230 [ 690.822654][T22972] __alloc_pages+0x108/0x340 [ 690.827288][T22972] vma_alloc_folio+0x6a3/0x8c0 [ 690.832085][T22972] ? __vm_enough_memory+0xdf/0x2a0 [ 690.837227][T22972] shmem_get_folio_gfp+0x801/0x1200 [ 690.842530][T22972] shmem_write_begin+0xa6/0x1d0 [ 690.847465][T22972] generic_perform_write+0x1c3/0x3d0 [ 690.852793][T22972] ? shmem_write_begin+0x1d0/0x1d0 [ 690.857927][T22972] __generic_file_write_iter+0xe6/0x290 [ 690.863546][T22972] generic_file_write_iter+0x7d/0x1c0 [ 690.869026][T22972] vfs_write+0x47b/0x780 [ 690.873654][T22972] ksys_write+0xeb/0x1a0 [ 690.877923][T22972] __x64_sys_write+0x42/0x50 [ 690.882701][T22972] do_syscall_64+0x41/0xc0 [ 690.887154][T22972] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 690.893111][T22972] RIP: 0033:0x7f1567f53ecf [ 690.897580][T22972] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 690.917221][T22972] RSP: 002b:00007f1567314f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 690.925681][T22972] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007f1567f53ecf [ 690.934432][T22972] RDX: 0000000000100000 RSI: 00007f155eef5000 RDI: 0000000000000005 [ 690.942458][T22972] RBP: 00007f155eef5000 R08: 0000000000000000 R09: 0000000000000534 [ 690.950446][T22972] R10: 0000000000100000 R11: 0000000000000293 R12: 0000000000000000 [ 690.957179][T22969] bond1019: entered promiscuous mode 07:23:23 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, 0x0) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$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") (fail_nth: 64) [ 690.958421][T22972] R13: 00007f1567314fdc R14: 00007f1567314fe0 R15: 0000000020000fc2 [ 690.958445][T22972] [ 690.963709][T22969] bond1019: entered allmulticast mode [ 690.984523][T22969] 8021q: adding VLAN 0 to HW filter on device bond1019 [ 690.996973][T22964] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 691.031111][T22975] FAULT_INJECTION: forcing a failure. [ 691.031111][T22975] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 691.044975][T22975] CPU: 0 PID: 22975 Comm: syz-executor.3 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 691.055433][T22975] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 691.065525][T22975] Call Trace: [ 691.068811][T22975] [ 691.071753][T22975] dump_stack_lvl+0xda/0x130 [ 691.076489][T22975] dump_stack+0x15/0x20 07:23:23 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000019000000", 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000380), 0x0) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000008c0)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000001cc0)={{}, r2, 0x16, @inherit={0x88, &(0x7f0000001580)=ANY=[@ANYRES16=r3]}, @devid}) r4 = syz_open_dev$MSR(&(0x7f0000000140), 0x100000000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r4, 0x84009422, &(0x7f0000000ec0)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(r6, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000001840)=ANY=[@ANYRES32=r5, @ANYRES32=r3, @ANYRESOCT, @ANYRES32=r1, @ANYRES32, @ANYRES64, @ANYRESHEX], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x40025) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f0000001500)={r5, "2ce8b7e675c30c143ac940d229ad3592"}) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$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") r7 = socket$inet_udplite(0x2, 0x2, 0x88) read(r7, &(0x7f00000000c0)=""/43, 0x2b) 07:23:23 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0x8a010000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) 07:23:23 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) r2 = open(&(0x7f0000000040)='./file0\x00', 0x161842, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'sit0\x00'}) r4 = syz_io_uring_setup(0x73d7, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000100)=0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r6, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x10001) r8 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x8010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(r5, 0x0, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x8) syz_io_uring_submit(0x0, r8, &(0x7f00000008c0)=@IORING_OP_OPENAT2={0x1c, 0x40, 0x0, 0xffffffffffffffff, &(0x7f0000000840)={0x4ae0e0, 0x2, 0x5}, &(0x7f0000000880)='./file0\x00', 0x18, 0x0, 0x12345}, 0xff) syz_io_uring_submit(r5, 0x0, &(0x7f0000002b40)=@IORING_OP_RECVMSG={0xa, 0x2b, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000002b00)={0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/28, 0x1c}, {&(0x7f0000001540)=""/4096, 0x1000}, {&(0x7f0000002540)=""/131, 0x83}, {&(0x7f0000002600)=""/102, 0x66}, {&(0x7f0000002840)=""/203, 0xcb}], 0x6}, 0x0, 0x10040, 0x1, {0x1}}, 0x0) ftruncate(r2, 0x200002) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x200000e, 0x12, r3, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) r10 = creat(&(0x7f0000000180)='./file0\x00', 0x0) fallocate(r10, 0x0, 0x0, 0x2000402) fallocate(r9, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r9, 0xc028660f, &(0x7f0000001380)={0xc, r10, 0x18}) [ 691.080682][T22975] should_fail_ex+0x21f/0x230 [ 691.085425][T22975] __alloc_pages+0x108/0x340 [ 691.090053][T22975] vma_alloc_folio+0x6a3/0x8c0 [ 691.094847][T22975] ? __vm_enough_memory+0xdf/0x2a0 [ 691.100146][T22975] shmem_get_folio_gfp+0x801/0x1200 [ 691.105372][T22975] shmem_write_begin+0xa6/0x1d0 [ 691.110243][T22975] generic_perform_write+0x1c3/0x3d0 [ 691.115587][T22975] ? shmem_write_begin+0x1d0/0x1d0 [ 691.120738][T22975] __generic_file_write_iter+0xe6/0x290 [ 691.126372][T22975] generic_file_write_iter+0x7d/0x1c0 [ 691.131879][T22975] vfs_write+0x47b/0x780 [ 691.136243][T22975] ksys_write+0xeb/0x1a0 [ 691.140510][T22975] __x64_sys_write+0x42/0x50 [ 691.145130][T22975] do_syscall_64+0x41/0xc0 [ 691.149608][T22975] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 691.155552][T22975] RIP: 0033:0x7f1567f53ecf [ 691.160042][T22975] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 07:23:23 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0x9d030000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) 07:23:23 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, 0x0) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$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") (fail_nth: 65) [ 691.179690][T22975] RSP: 002b:00007f1567314f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 691.188144][T22975] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007f1567f53ecf [ 691.196162][T22975] RDX: 0000000000100000 RSI: 00007f155eef5000 RDI: 0000000000000005 [ 691.204248][T22975] RBP: 00007f155eef5000 R08: 0000000000000000 R09: 0000000000000534 [ 691.212297][T22975] R10: 0000000000100000 R11: 0000000000000293 R12: 0000000000000000 [ 691.220330][T22975] R13: 00007f1567314fdc R14: 00007f1567314fe0 R15: 0000000020000fc2 [ 691.228368][T22975] [ 691.265141][T22987] validate_nla: 20 callbacks suppressed [ 691.265156][T22987] netlink: 'syz-executor.1': attribute type 6 has an invalid length. [ 691.308014][T22991] FAULT_INJECTION: forcing a failure. [ 691.308014][T22991] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 691.321108][T22991] CPU: 1 PID: 22991 Comm: syz-executor.3 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 691.331591][T22991] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 691.341679][T22991] Call Trace: [ 691.344990][T22991] [ 691.347941][T22991] dump_stack_lvl+0xda/0x130 [ 691.352658][T22991] dump_stack+0x15/0x20 [ 691.356847][T22991] should_fail_ex+0x21f/0x230 [ 691.361684][T22991] should_fail+0xb/0x10 [ 691.366131][T22991] should_fail_usercopy+0x1a/0x20 [ 691.371217][T22991] copy_page_from_iter_atomic+0x22d/0xcf0 [ 691.376987][T22991] ? folio_test_hugetlb+0x3a/0x70 [ 691.382052][T22991] ? shmem_write_begin+0x12a/0x1d0 [ 691.387275][T22991] generic_perform_write+0x203/0x3d0 [ 691.392683][T22991] ? shmem_write_begin+0x1d0/0x1d0 [ 691.397839][T22991] __generic_file_write_iter+0xe6/0x290 [ 691.403510][T22991] generic_file_write_iter+0x7d/0x1c0 [ 691.408945][T22991] vfs_write+0x47b/0x780 [ 691.413458][T22991] ksys_write+0xeb/0x1a0 [ 691.417743][T22991] __x64_sys_write+0x42/0x50 [ 691.422468][T22991] do_syscall_64+0x41/0xc0 [ 691.427380][T22991] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 691.433356][T22991] RIP: 0033:0x7f1567f53ecf [ 691.437990][T22991] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 691.457659][T22991] RSP: 002b:00007f1567314f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 691.466145][T22991] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007f1567f53ecf [ 691.474164][T22991] RDX: 0000000000100000 RSI: 00007f155eef5000 RDI: 0000000000000005 [ 691.482159][T22991] RBP: 00007f155eef5000 R08: 0000000000000000 R09: 0000000000000534 [ 691.490155][T22991] R10: 0000000000100000 R11: 0000000000000293 R12: 0000000000000000 [ 691.498224][T22991] R13: 00007f1567314fdc R14: 00007f1567314fe0 R15: 0000000020000fc2 07:23:24 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a00a, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:23:24 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000002c0)={&(0x7f0000000c80)=ANY=[@ANYBLOB="0026bd7000ffdbdf25070000000c00068008000b00060000000c0008002302b41174de3f460a6d000000000000080003000380000008000300bd2c00ff07000400f8ffffff080003001dd30000080004006604000000000000000000"], 0x5c}, 0x1, 0x0, 0x0, 0x1884}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6, 0x6}]}}}]}, 0x3c}}, 0x0) r3 = openat(r2, &(0x7f00000000c0)='./file0\x00', 0x0, 0x31) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00./file0\x00']) connect$unix(r3, &(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000001c0), 0x200080, 0x0) ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f0000000200)={0x55, 0xb5f3, 0x2, 0x1, 0x6}) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000600)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000800)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000827bd7000fcdbdf25030000000800030020000000050006000e000000040004000500050005000000050005000400000005000600ce00000093f1f198073347359701e9597001ab47a31266da6f292f3671200e551bf08293991a41b55e1b9b3e4e1cf47f9dda9123f38125ba19ef0fdf18ba4ec07cdf24e0153a49e9f9fdf291d868e4e75bb04ccb8ff4e20009f1e6265a9ae5d70e64fcedc9de8942e7b7ca009d98ff7c74a175dd80bfc0e6439cda7cd74b6966033d471542563f1c2ed3dd2fcaee81ecb7be444fbd4a54de26db239a7bb4696daed479759c14105df0b8db2481d840e28c6ed40143c2af3c6f04f17a24ee4c22358fce05"], 0x40}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) io_setup(0x6, &(0x7f00000003c0)=0x0) r7 = socket$phonet_pipe(0x23, 0x5, 0x2) io_submit(r6, 0x2, &(0x7f00000005c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, r7, &(0x7f00000001c0)='\"', 0x1}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r8, &(0x7f0000006440)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f0000000c40)={0x10, 0x1d, 0x20, 0x70bd28, 0x25dfdbfd}, 0x10}, {&(0x7f0000000f80)={0x20c, 0x3d, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x1f, 0x46, 0x0, 0x1, [@generic="6b23bda57b0fcd6882aea56d992b0de112a87c9689a0ce8f3a928a"]}, @generic="931dd380ae9b76725532f39b25791247f8e1faaa5606177d1141efdf8a23daecc73d0706f82254c664a01e4c4986b42b265e8e88f8f88e8099514ce917072d6e80996cbddc81dd1014a75c1cd2e0c084d7806b82c11b8a625557f25357333f879c7f3ea978d0c62492b2b2a3437425bf3933cf6d0456ae40263ff847b9956f9f56cd1e35dd616a0dffde59", @nested={0x14d, 0x46, 0x0, 0x1, [@typed={0x8, 0x8f, 0x0, 0x0, @u32=0x4}, @generic="3fe433e9f5d2f6047805d9eb39d59742ad46c8bd198fea6b4f77d0bf577f925374abd91b16efa9a31621d58f4b1ee788ba33ce3ae89358fcbecdc28e3a8775ee6c905d5275bf5f05ca6bfc68336199389a9644323a81d22c4bd081ec9c4826b7e965a5292167778eefb5edac3e1e0fd628684a30dbac663eb65de357a891a90855f356cbe26225342cce43c8e320a777c2a1f74ab97b7e442c94", @typed={0x8, 0x41, 0x0, 0x0, @ipv4=@multicast2}, @typed={0x8, 0x6b, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @generic="79c7219fa8393ab7671b616b9cea5f59e77de2a2ea4a268fcad39d31284ee1045f7dedc0dea487845188adde6fe70f5537a0635e01c2ec0a205c1f92c2272999ec8388f9a95b4d387581056e112c58f96f686734281b5a", @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@remote}, @generic="2d7a6c2813a21aa5bc78773404596de147d491e1868776a08d604bfb6aea387b585ce5b3f7ab336df3922c65"]}]}, 0x20c}, {&(0x7f0000000e00)={0x30, 0x12, 0x800, 0x70bd27, 0x25dfdbfc, "", [@typed={0x8, 0x5b, 0x0, 0x0, @pid}, @typed={0xf, 0x8c, 0x0, 0x0, @str='syzkaller1\x00'}, @typed={0x8, 0x7, 0x0, 0x0, @u32}]}, 0x30}, {&(0x7f0000000e40)={0xc8, 0x42, 0x10, 0x70bd26, 0x25dfdbff, "", [@generic="208cd2ae6be9be", @generic="c1d6c27da633daf115873b83c8913d284239d441678e667c20444d1a1f77f48ea7cbf783d84e79a9ebc262452149fe521b40868bf3938c61c8be3cdbd7429e623c99db5ae26d9cf24ee4ef4777ff0410e8b899b18e829f387d7926641f189d2b9697e099ffb7f20f691064b7d87d04cd2e230e8df8c77a2f1e4f4fabd49cfe414b3027dd850d9a2be9547ba5f2ed09811ea9ed9b201782165a792b57afca3e3d575d0f5b4b17a8", @typed={0x8, 0x94, 0x0, 0x0, @u32=0x1}]}, 0xc8}], 0x4, 0x0, 0x0, 0x8801}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000900)) sendmsg$nl_route(r8, &(0x7f0000000c00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x11}, 0x4c089) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r7, 0x40189429, &(0x7f0000000480)={0x1, 0x4, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r9, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x45, 0xfc, 0x6}, {0x6}]}, 0x10) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r9) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x2, 0x3, &(0x7f0000000000)=@framed={{0x18, 0xf}}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) socket$inet6_sctp(0xa, 0x801, 0x84) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) r10 = socket$igmp(0x2, 0x3, 0x2) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@private1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) ioctl$TUNSETOWNER(r3, 0x400454cc, r11) setsockopt$MRT_INIT(r10, 0x0, 0xc8, &(0x7f0000000040), 0x4) setsockopt$MRT_ADD_VIF(r10, 0x0, 0xca, &(0x7f0000000100)={0x0, 0x1, 0x0, 0x0, @vifc_lcl_addr=@dev={0xac, 0x14, 0x14, 0xb}, @multicast1}, 0x10) 07:23:24 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0xad030000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) [ 691.506232][T22991] [ 691.519019][T22991] loop3: detected capacity change from 0 to 2048 [ 691.533489][T22996] netlink: 'syz-executor.5': attribute type 6 has an invalid length. [ 691.542476][T22996] (unnamed net_device) (uninitialized): option use_carrier: invalid value (6) [ 691.554633][T22991] FAT-fs (loop3): Unrecognized mount option "ÿÿÿÿÿÿÿÿ184467440737095516150xffffffffffffffff" or missing value [ 691.558037][T22982] loop0: detected capacity change from 0 to 2048 [ 691.570092][T22997] netlink: 'syz-executor.1': attribute type 6 has an invalid length. [ 691.582023][T22996] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=22996 comm=syz-executor.5 [ 691.588938][T22982] FAT-fs (loop0): Unrecognized mount option "ÿÿÿÿÿÿÿÿ184467440737095516150xffffffffffffffff" or missing value 07:23:24 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0xb6010000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) 07:23:24 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, 0x0) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$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") (fail_nth: 66) [ 691.604204][T22996] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=61 sclass=netlink_route_socket pid=22996 comm=syz-executor.5 [ 691.639536][T22996] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 07:23:24 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0xb80a0000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) 07:23:24 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000002c0)={&(0x7f0000000c80)=ANY=[@ANYBLOB="0026bd7000ffdbdf25070000000c00068008000b00060000000c0008002302b41174de3f460a6d000000000000080003000380000008000300bd2c00ff07000400f8ffffff080003001dd30000080004006604000000000000000000"], 0x5c}, 0x1, 0x0, 0x0, 0x1884}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6, 0x6}]}}}]}, 0x3c}}, 0x0) r3 = openat(r2, &(0x7f00000000c0)='./file0\x00', 0x0, 0x31) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00./file0\x00']) connect$unix(r3, &(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000001c0), 0x200080, 0x0) ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f0000000200)={0x55, 0xb5f3, 0x2, 0x1, 0x6}) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000600)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000800)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000827bd7000fcdbdf25030000000800030020000000050006000e000000040004000500050005000000050005000400000005000600ce00000093f1f198073347359701e9597001ab47a31266da6f292f3671200e551bf08293991a41b55e1b9b3e4e1cf47f9dda9123f38125ba19ef0fdf18ba4ec07cdf24e0153a49e9f9fdf291d868e4e75bb04ccb8ff4e20009f1e6265a9ae5d70e64fcedc9de8942e7b7ca009d98ff7c74a175dd80bfc0e6439cda7cd74b6966033d471542563f1c2ed3dd2fcaee81ecb7be444fbd4a54de26db239a7bb4696daed479759c14105df0b8db2481d840e28c6ed40143c2af3c6f04f17a24ee4c22358fce05"], 0x40}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) io_setup(0x6, &(0x7f00000003c0)=0x0) r7 = socket$phonet_pipe(0x23, 0x5, 0x2) io_submit(r6, 0x2, &(0x7f00000005c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, r7, &(0x7f00000001c0)='\"', 0x1}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r8, &(0x7f0000006440)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f0000000c40)={0x10, 0x1d, 0x20, 0x70bd28, 0x25dfdbfd}, 0x10}, {&(0x7f0000000f80)={0x20c, 0x3d, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x1f, 0x46, 0x0, 0x1, [@generic="6b23bda57b0fcd6882aea56d992b0de112a87c9689a0ce8f3a928a"]}, @generic="931dd380ae9b76725532f39b25791247f8e1faaa5606177d1141efdf8a23daecc73d0706f82254c664a01e4c4986b42b265e8e88f8f88e8099514ce917072d6e80996cbddc81dd1014a75c1cd2e0c084d7806b82c11b8a625557f25357333f879c7f3ea978d0c62492b2b2a3437425bf3933cf6d0456ae40263ff847b9956f9f56cd1e35dd616a0dffde59", @nested={0x14d, 0x46, 0x0, 0x1, [@typed={0x8, 0x8f, 0x0, 0x0, @u32=0x4}, @generic="3fe433e9f5d2f6047805d9eb39d59742ad46c8bd198fea6b4f77d0bf577f925374abd91b16efa9a31621d58f4b1ee788ba33ce3ae89358fcbecdc28e3a8775ee6c905d5275bf5f05ca6bfc68336199389a9644323a81d22c4bd081ec9c4826b7e965a5292167778eefb5edac3e1e0fd628684a30dbac663eb65de357a891a90855f356cbe26225342cce43c8e320a777c2a1f74ab97b7e442c94", @typed={0x8, 0x41, 0x0, 0x0, @ipv4=@multicast2}, @typed={0x8, 0x6b, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @generic="79c7219fa8393ab7671b616b9cea5f59e77de2a2ea4a268fcad39d31284ee1045f7dedc0dea487845188adde6fe70f5537a0635e01c2ec0a205c1f92c2272999ec8388f9a95b4d387581056e112c58f96f686734281b5a", @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@remote}, @generic="2d7a6c2813a21aa5bc78773404596de147d491e1868776a08d604bfb6aea387b585ce5b3f7ab336df3922c65"]}]}, 0x20c}, {&(0x7f0000000e00)={0x30, 0x12, 0x800, 0x70bd27, 0x25dfdbfc, "", [@typed={0x8, 0x5b, 0x0, 0x0, @pid}, @typed={0xf, 0x8c, 0x0, 0x0, @str='syzkaller1\x00'}, @typed={0x8, 0x7, 0x0, 0x0, @u32}]}, 0x30}, {&(0x7f0000000e40)={0xc8, 0x42, 0x10, 0x70bd26, 0x25dfdbff, "", [@generic="208cd2ae6be9be", @generic="c1d6c27da633daf115873b83c8913d284239d441678e667c20444d1a1f77f48ea7cbf783d84e79a9ebc262452149fe521b40868bf3938c61c8be3cdbd7429e623c99db5ae26d9cf24ee4ef4777ff0410e8b899b18e829f387d7926641f189d2b9697e099ffb7f20f691064b7d87d04cd2e230e8df8c77a2f1e4f4fabd49cfe414b3027dd850d9a2be9547ba5f2ed09811ea9ed9b201782165a792b57afca3e3d575d0f5b4b17a8", @typed={0x8, 0x94, 0x0, 0x0, @u32=0x1}]}, 0xc8}], 0x4, 0x0, 0x0, 0x8801}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000900)) sendmsg$nl_route(r8, &(0x7f0000000c00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x11}, 0x4c089) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r7, 0x40189429, &(0x7f0000000480)={0x1, 0x4, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r9, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x45, 0xfc, 0x6}, {0x6}]}, 0x10) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r9) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x2, 0x3, &(0x7f0000000000)=@framed={{0x18, 0xf}}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) socket$inet6_sctp(0xa, 0x801, 0x84) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) r10 = socket$igmp(0x2, 0x3, 0x2) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@private1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) ioctl$TUNSETOWNER(r3, 0x400454cc, r11) setsockopt$MRT_INIT(r10, 0x0, 0xc8, &(0x7f0000000040), 0x4) setsockopt$MRT_ADD_VIF(r10, 0x0, 0xca, &(0x7f0000000100)={0x0, 0x1, 0x0, 0x0, @vifc_lcl_addr=@dev={0xac, 0x14, 0x14, 0xb}, @multicast1}, 0x10) [ 691.690470][T23002] netlink: 'syz-executor.1': attribute type 6 has an invalid length. [ 691.762397][T23007] netlink: 'syz-executor.1': attribute type 6 has an invalid length. [ 691.779952][T23005] FAULT_INJECTION: forcing a failure. [ 691.779952][T23005] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 691.793132][T23009] netlink: 'syz-executor.5': attribute type 6 has an invalid length. [ 691.793093][T23005] CPU: 0 PID: 23005 Comm: syz-executor.3 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 691.804811][T23009] (unnamed net_device) (uninitialized): option use_carrier: invalid value (6) [ 691.811606][T23005] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 691.811624][T23005] Call Trace: [ 691.811631][T23005] [ 691.811639][T23005] dump_stack_lvl+0xda/0x130 [ 691.837516][T23009] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=23009 comm=syz-executor.5 [ 691.841345][T23005] dump_stack+0x15/0x20 [ 691.856036][T23009] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=61 sclass=netlink_route_socket pid=23009 comm=syz-executor.5 [ 691.858246][T23005] should_fail_ex+0x21f/0x230 [ 691.872727][T23009] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 691.875773][T23005] should_fail+0xb/0x10 [ 691.889290][T23005] should_fail_usercopy+0x1a/0x20 [ 691.894404][T23005] copy_page_from_iter_atomic+0x22d/0xcf0 [ 691.900429][T23005] ? folio_test_hugetlb+0x3a/0x70 [ 691.905650][T23005] ? shmem_write_begin+0x12a/0x1d0 [ 691.910831][T23005] generic_perform_write+0x203/0x3d0 [ 691.916152][T23005] ? shmem_write_begin+0x1d0/0x1d0 [ 691.921286][T23005] __generic_file_write_iter+0xe6/0x290 [ 691.926845][T23005] generic_file_write_iter+0x7d/0x1c0 [ 691.932259][T23005] vfs_write+0x47b/0x780 [ 691.936505][T23005] ksys_write+0xeb/0x1a0 [ 691.940762][T23005] __x64_sys_write+0x42/0x50 [ 691.945352][T23005] do_syscall_64+0x41/0xc0 [ 691.949792][T23005] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 691.955697][T23005] RIP: 0033:0x7f1567f53ecf 07:23:24 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000019000000", 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000380), 0x0) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000008c0)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000001cc0)={{}, r2, 0x16, @inherit={0x88, &(0x7f0000001580)=ANY=[@ANYRES16=r3]}, @devid}) r4 = syz_open_dev$MSR(&(0x7f0000000140), 0x100000000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r4, 0x84009422, &(0x7f0000000ec0)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(r6, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000001840)=ANY=[@ANYRES32=r5, @ANYRES32=r3, @ANYRESOCT, @ANYRES32=r1, @ANYRES32, @ANYRES64, @ANYRESHEX], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x40025) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f0000001500)={r5, "2ce8b7e675c30c143ac940d229ad3592"}) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$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") r7 = socket$inet_udplite(0x2, 0x2, 0x88) read(r7, &(0x7f00000000c0)=""/43, 0x2b) 07:23:24 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0xbc010000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) 07:23:24 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) r2 = open(&(0x7f0000000040)='./file0\x00', 0x161842, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'sit0\x00'}) r4 = syz_io_uring_setup(0x73d7, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000100)=0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r6, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x10001) r8 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x8010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(r5, 0x0, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x8) syz_io_uring_submit(0x0, r8, &(0x7f00000008c0)=@IORING_OP_OPENAT2={0x1c, 0x40, 0x0, 0xffffffffffffffff, &(0x7f0000000840)={0x4ae0e0, 0x2, 0x5}, &(0x7f0000000880)='./file0\x00', 0x18, 0x0, 0x12345}, 0xff) syz_io_uring_submit(r5, 0x0, &(0x7f0000002b40)=@IORING_OP_RECVMSG={0xa, 0x2b, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000002b00)={0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/28, 0x1c}, {&(0x7f0000001540)=""/4096, 0x1000}, {&(0x7f0000002540)=""/131, 0x83}, {&(0x7f0000002600)=""/102, 0x66}, {&(0x7f0000002840)=""/203, 0xcb}], 0x6}, 0x0, 0x10040, 0x1, {0x1}}, 0x0) ftruncate(r2, 0x200002) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x200000e, 0x12, r3, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) r10 = creat(&(0x7f0000000180)='./file0\x00', 0x0) fallocate(r10, 0x0, 0x0, 0x2000402) fallocate(r9, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r9, 0xc028660f, &(0x7f0000001380)={0xc, r10, 0x19}) [ 691.960119][T23005] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 691.979761][T23005] RSP: 002b:00007f1567314f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 691.988294][T23005] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007f1567f53ecf [ 691.996292][T23005] RDX: 0000000000100000 RSI: 00007f155eef5000 RDI: 0000000000000005 [ 692.001990][T23012] netlink: 'syz-executor.1': attribute type 6 has an invalid length. 07:23:24 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0xbd000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) [ 692.004266][T23005] RBP: 00007f155eef5000 R08: 0000000000000000 R09: 0000000000000534 [ 692.004285][T23005] R10: 0000000000100000 R11: 0000000000000293 R12: 0000000000000000 [ 692.004301][T23005] R13: 00007f1567314fdc R14: 00007f1567314fe0 R15: 0000000020000fc2 [ 692.036367][T23005] [ 692.045290][T23005] loop3: detected capacity change from 0 to 2048 07:23:24 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0xd9ffffff}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) 07:23:24 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000002c0)={&(0x7f0000000c80)=ANY=[@ANYBLOB="0026bd7000ffdbdf25070000000c00068008000b00060000000c0008002302b41174de3f460a6d000000000000080003000380000008000300bd2c00ff07000400f8ffffff080003001dd30000080004006604000000000000000000"], 0x5c}, 0x1, 0x0, 0x0, 0x1884}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6, 0x6}]}}}]}, 0x3c}}, 0x0) r3 = openat(r2, &(0x7f00000000c0)='./file0\x00', 0x0, 0x31) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00./file0\x00']) connect$unix(r3, &(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000001c0), 0x200080, 0x0) ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f0000000200)={0x55, 0xb5f3, 0x2, 0x1, 0x6}) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000600)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000800)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x40}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) io_setup(0x6, &(0x7f00000003c0)=0x0) r7 = socket$phonet_pipe(0x23, 0x5, 0x2) io_submit(r6, 0x2, &(0x7f00000005c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, r7, &(0x7f00000001c0)='\"', 0x1}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r8, &(0x7f0000006440)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f0000000c40)={0x10, 0x1d, 0x20, 0x70bd28, 0x25dfdbfd}, 0x10}, {&(0x7f0000000f80)={0x20c, 0x3d, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x1f, 0x46, 0x0, 0x1, [@generic="6b23bda57b0fcd6882aea56d992b0de112a87c9689a0ce8f3a928a"]}, @generic="931dd380ae9b76725532f39b25791247f8e1faaa5606177d1141efdf8a23daecc73d0706f82254c664a01e4c4986b42b265e8e88f8f88e8099514ce917072d6e80996cbddc81dd1014a75c1cd2e0c084d7806b82c11b8a625557f25357333f879c7f3ea978d0c62492b2b2a3437425bf3933cf6d0456ae40263ff847b9956f9f56cd1e35dd616a0dffde59", @nested={0x14d, 0x46, 0x0, 0x1, [@typed={0x8, 0x8f, 0x0, 0x0, @u32=0x4}, @generic="3fe433e9f5d2f6047805d9eb39d59742ad46c8bd198fea6b4f77d0bf577f925374abd91b16efa9a31621d58f4b1ee788ba33ce3ae89358fcbecdc28e3a8775ee6c905d5275bf5f05ca6bfc68336199389a9644323a81d22c4bd081ec9c4826b7e965a5292167778eefb5edac3e1e0fd628684a30dbac663eb65de357a891a90855f356cbe26225342cce43c8e320a777c2a1f74ab97b7e442c94", @typed={0x8, 0x41, 0x0, 0x0, @ipv4=@multicast2}, @typed={0x8, 0x6b, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @generic="79c7219fa8393ab7671b616b9cea5f59e77de2a2ea4a268fcad39d31284ee1045f7dedc0dea487845188adde6fe70f5537a0635e01c2ec0a205c1f92c2272999ec8388f9a95b4d387581056e112c58f96f686734281b5a", @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@remote}, @generic="2d7a6c2813a21aa5bc78773404596de147d491e1868776a08d604bfb6aea387b585ce5b3f7ab336df3922c65"]}]}, 0x20c}, {&(0x7f0000000e00)={0x30, 0x12, 0x800, 0x70bd27, 0x25dfdbfc, "", [@typed={0x8, 0x5b, 0x0, 0x0, @pid}, @typed={0xf, 0x8c, 0x0, 0x0, @str='syzkaller1\x00'}, @typed={0x8, 0x7, 0x0, 0x0, @u32}]}, 0x30}, {&(0x7f0000000e40)={0xc8, 0x42, 0x10, 0x70bd26, 0x25dfdbff, "", [@generic="208cd2ae6be9be", @generic="c1d6c27da633daf115873b83c8913d284239d441678e667c20444d1a1f77f48ea7cbf783d84e79a9ebc262452149fe521b40868bf3938c61c8be3cdbd7429e623c99db5ae26d9cf24ee4ef4777ff0410e8b899b18e829f387d7926641f189d2b9697e099ffb7f20f691064b7d87d04cd2e230e8df8c77a2f1e4f4fabd49cfe414b3027dd850d9a2be9547ba5f2ed09811ea9ed9b201782165a792b57afca3e3d575d0f5b4b17a8", @typed={0x8, 0x94, 0x0, 0x0, @u32=0x1}]}, 0xc8}], 0x4, 0x0, 0x0, 0x8801}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000900)) sendmsg$nl_route(r8, &(0x7f0000000c00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x11}, 0x4c089) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r7, 0x40189429, &(0x7f0000000480)={0x1, 0x4, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r9, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x45, 0xfc, 0x6}, {0x6}]}, 0x10) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r9) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x2, 0x3, &(0x7f0000000000)=@framed={{0x18, 0xf}}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) socket$inet6_sctp(0xa, 0x801, 0x84) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) r10 = socket$igmp(0x2, 0x3, 0x2) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@private1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) ioctl$TUNSETOWNER(r3, 0x400454cc, r11) setsockopt$MRT_INIT(r10, 0x0, 0xc8, &(0x7f0000000040), 0x4) setsockopt$MRT_ADD_VIF(r10, 0x0, 0xca, &(0x7f0000000100)={0x0, 0x1, 0x0, 0x0, @vifc_lcl_addr=@dev={0xac, 0x14, 0x14, 0xb}, @multicast1}, 0x10) [ 692.053457][T23005] FAT-fs (loop3): Unrecognized mount option "ÿÿÿÿÿÿÿÿ184467440737095516150xffffffffffffffff" or missing value [ 692.078186][T23022] netlink: 'syz-executor.1': attribute type 6 has an invalid length. [ 692.150123][T23028] netlink: 'syz-executor.1': attribute type 6 has an invalid length. [ 692.169375][T23018] loop0: detected capacity change from 0 to 2048 [ 692.184159][T23018] FAT-fs (loop0): Unrecognized mount option "ÿÿÿÿÿÿÿÿ184467440737095516150xffffffffffffffff" or missing value [ 692.203151][T23031] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=23031 comm=syz-executor.5 [ 692.218713][T23028] bond1026: entered promiscuous mode [ 692.224035][T23028] bond1026: entered allmulticast mode [ 692.229816][T23028] 8021q: adding VLAN 0 to HW filter on device bond1026 [ 692.238571][T23031] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=61 sclass=netlink_route_socket pid=23031 comm=syz-executor.5 [ 692.239130][T23029] netlink: 'syz-executor.5': attribute type 6 has an invalid length. [ 692.260960][T23029] (unnamed net_device) (uninitialized): option use_carrier: invalid value (6) [ 692.284889][T23029] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 07:23:24 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a00f, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:23:24 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, 0x0) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$eJzs1T9rE3EYB/AnaazRqbM4/MDFqVQ3JyOSQvFAUTLoZKBxyYmQWy6Z8hJ8Ab4wB1+EZMp2Ei5VWxSDNLnSfj7LPdz3ud+/g7v39z+OTz8VH75+/hLdXivavbjTXrbiINpxZh4AwHWyrKr4XtWaXgsAsBv+/wBw87x5++7Fsyzrv06pG7GYl4NyUF/r/Pgk6x+llf3fnlqU5WDvZ/4o1c7nt+LuOn/8x3w/Hj6o81X2/GV2Ib8dp1vfPQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA3GyHKXUiIqWUDn7dXZTlYK/OD9OZC3ldHZ9k/aN1w/m8E/c6O9sGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAcAmK6Ww8zPPR5JoVEd9ix5N210d6uSMv/tXTW097VU5+m8XTTZtfLatq05GfRMTWF9+KmK/eUvNnuGnR3DcJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABoVjGdjYd5PpoUTa8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALgqiulsPMzz0eS/i2jVI/29p+k9AgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAM34EQAA///P7Cnj") (fail_nth: 67) 07:23:24 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) r2 = open(&(0x7f0000000040)='./file0\x00', 0x161842, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'sit0\x00'}) r4 = syz_io_uring_setup(0x73d7, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000100)=0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r6, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x10001) r8 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x8010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(r5, 0x0, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x8) syz_io_uring_submit(0x0, r8, &(0x7f00000008c0)=@IORING_OP_OPENAT2={0x1c, 0x40, 0x0, 0xffffffffffffffff, &(0x7f0000000840)={0x4ae0e0, 0x2, 0x5}, &(0x7f0000000880)='./file0\x00', 0x18, 0x0, 0x12345}, 0xff) syz_io_uring_submit(r5, 0x0, &(0x7f0000002b40)=@IORING_OP_RECVMSG={0xa, 0x2b, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000002b00)={0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/28, 0x1c}, {&(0x7f0000001540)=""/4096, 0x1000}, {&(0x7f0000002540)=""/131, 0x83}, {&(0x7f0000002600)=""/102, 0x66}, {&(0x7f0000002840)=""/203, 0xcb}], 0x6}, 0x0, 0x10040, 0x1, {0x1}}, 0x0) ftruncate(r2, 0x200002) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x200000e, 0x12, r3, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) r10 = creat(&(0x7f0000000180)='./file0\x00', 0x0) fallocate(r10, 0x0, 0x0, 0x2000402) fallocate(r9, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r9, 0xc028660f, &(0x7f0000001380)={0xc, r10, 0x1a}) 07:23:24 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0xde010000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) 07:23:24 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000002c0)={&(0x7f0000000c80)=ANY=[@ANYBLOB="0026bd7000ffdbdf25070000000c00068008000b00060000000c0008002302b41174de3f460a6d000000000000080003000380000008000300bd2c00ff07000400f8ffffff080003001dd30000080004006604000000000000000000"], 0x5c}, 0x1, 0x0, 0x0, 0x1884}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6, 0x6}]}}}]}, 0x3c}}, 0x0) r3 = openat(r2, &(0x7f00000000c0)='./file0\x00', 0x0, 0x31) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000680)=ANY=[@ANYBLOB="4afe65cd9f4cb96af18454a88fa8005c9fe248c0144c45e701002b7127b6679c7a64908ce701f270818888d4368d79057ee5e41b0efaa601fc1a8488a8a24cb9d947491b1bc7983e1710bb3ccc29e6d4ed4df77669e40bbfa802c600208e53ee50e98ab2cb4f50d11a9cdddd9320a5d8171c0f0c108488d0b23be195b12fc7ed967f99e71ff165310bc20d027160e20e87088c6f48a6c7210431c5a6578b11b646347984f92bc092089c964bd360a4e0b124bec92bf620edc72693f0e78f12e205659005168a8e2f60f18bcecd57f49295bfe6ca9c894f4d75798ae81020f3ff3f9d2aeb8740d2ec38db6c068f60e10f6f06172fb698e28d2dcc7deed28eee05874cc59a89b771e167c0d3da3789a3acd1af0cc89d9ff46e329a00f6d1a28794c3b3db7752189c1853e53b0aa840b887618d3d9b6038fc37865fa39328a439819e25692b3efee7a80b609f2ba10030f51469aa05f966b72dedf8991f0d", @ANYRES32=r0, @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00./file0\x00']) connect$unix(r3, &(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000001c0), 0x200080, 0x0) ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f0000000200)={0x55, 0xb5f3, 0x2, 0x1, 0x6}) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000600)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000800)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x40}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) io_setup(0x6, &(0x7f00000003c0)=0x0) r7 = socket$phonet_pipe(0x23, 0x5, 0x2) io_submit(r6, 0x2, &(0x7f00000005c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, r7, &(0x7f00000001c0)='\"', 0x1}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r8, &(0x7f0000006440)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f0000000c40)={0x10, 0x1d, 0x20, 0x70bd28, 0x25dfdbfd}, 0x10}, {&(0x7f0000000f80)={0x20c, 0x3d, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x1f, 0x46, 0x0, 0x1, [@generic="6b23bda57b0fcd6882aea56d992b0de112a87c9689a0ce8f3a928a"]}, @generic="931dd380ae9b76725532f39b25791247f8e1faaa5606177d1141efdf8a23daecc73d0706f82254c664a01e4c4986b42b265e8e88f8f88e8099514ce917072d6e80996cbddc81dd1014a75c1cd2e0c084d7806b82c11b8a625557f25357333f879c7f3ea978d0c62492b2b2a3437425bf3933cf6d0456ae40263ff847b9956f9f56cd1e35dd616a0dffde59", @nested={0x14d, 0x46, 0x0, 0x1, [@typed={0x8, 0x8f, 0x0, 0x0, @u32=0x4}, @generic="3fe433e9f5d2f6047805d9eb39d59742ad46c8bd198fea6b4f77d0bf577f925374abd91b16efa9a31621d58f4b1ee788ba33ce3ae89358fcbecdc28e3a8775ee6c905d5275bf5f05ca6bfc68336199389a9644323a81d22c4bd081ec9c4826b7e965a5292167778eefb5edac3e1e0fd628684a30dbac663eb65de357a891a90855f356cbe26225342cce43c8e320a777c2a1f74ab97b7e442c94", @typed={0x8, 0x41, 0x0, 0x0, @ipv4=@multicast2}, @typed={0x8, 0x6b, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @generic="79c7219fa8393ab7671b616b9cea5f59e77de2a2ea4a268fcad39d31284ee1045f7dedc0dea487845188adde6fe70f5537a0635e01c2ec0a205c1f92c2272999ec8388f9a95b4d387581056e112c58f96f686734281b5a", @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@remote}, @generic="2d7a6c2813a21aa5bc78773404596de147d491e1868776a08d604bfb6aea387b585ce5b3f7ab336df3922c65"]}]}, 0x20c}, {&(0x7f0000000e00)={0x30, 0x12, 0x800, 0x70bd27, 0x25dfdbfc, "", [@typed={0x8, 0x5b, 0x0, 0x0, @pid}, @typed={0xf, 0x8c, 0x0, 0x0, @str='syzkaller1\x00'}, @typed={0x8, 0x7, 0x0, 0x0, @u32}]}, 0x30}, {&(0x7f0000000e40)={0xc8, 0x42, 0x10, 0x70bd26, 0x25dfdbff, "", [@generic="208cd2ae6be9be", @generic="c1d6c27da633daf115873b83c8913d284239d441678e667c20444d1a1f77f48ea7cbf783d84e79a9ebc262452149fe521b40868bf3938c61c8be3cdbd7429e623c99db5ae26d9cf24ee4ef4777ff0410e8b899b18e829f387d7926641f189d2b9697e099ffb7f20f691064b7d87d04cd2e230e8df8c77a2f1e4f4fabd49cfe414b3027dd850d9a2be9547ba5f2ed09811ea9ed9b201782165a792b57afca3e3d575d0f5b4b17a8", @typed={0x8, 0x94, 0x0, 0x0, @u32=0x1}]}, 0xc8}], 0x4, 0x0, 0x0, 0x8801}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000900)) sendmsg$nl_route(r8, &(0x7f0000000c00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000bc0)={0x0}, 0x1, 0x0, 0x0, 0x11}, 0x4c089) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r7, 0x40189429, &(0x7f0000000480)={0x1, 0x4, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r9, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x45, 0xfc, 0x6}, {0x6}]}, 0x10) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r9) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x2, 0x3, &(0x7f0000000000)=@framed={{0x18, 0xf}}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) socket$inet6_sctp(0xa, 0x801, 0x84) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) r10 = socket$igmp(0x2, 0x3, 0x2) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@private1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) ioctl$TUNSETOWNER(r3, 0x400454cc, r11) setsockopt$MRT_INIT(r10, 0x0, 0xc8, &(0x7f0000000040), 0x4) setsockopt$MRT_ADD_VIF(r10, 0x0, 0xca, &(0x7f0000000100)={0x0, 0x1, 0x0, 0x0, @vifc_lcl_addr=@dev={0xac, 0x14, 0x14, 0xb}, @multicast1}, 0x10) [ 692.442843][T23033] FAULT_INJECTION: forcing a failure. [ 692.442843][T23033] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 692.455990][T23033] CPU: 1 PID: 23033 Comm: syz-executor.3 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 692.466499][T23033] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 692.476577][T23033] Call Trace: [ 692.479881][T23033] [ 692.482824][T23033] dump_stack_lvl+0xda/0x130 [ 692.487523][T23033] dump_stack+0x15/0x20 [ 692.491011][T23043] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=23043 comm=syz-executor.5 [ 692.491693][T23033] should_fail_ex+0x21f/0x230 [ 692.509204][T23033] should_fail+0xb/0x10 [ 692.513451][T23033] should_fail_usercopy+0x1a/0x20 [ 692.518691][T23033] copy_page_from_iter_atomic+0x22d/0xcf0 [ 692.524609][T23033] ? folio_test_hugetlb+0x3a/0x70 [ 692.529684][T23033] ? shmem_write_begin+0x12a/0x1d0 [ 692.531541][T23043] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=61 sclass=netlink_route_socket pid=23043 comm=syz-executor.5 [ 692.534908][T23033] generic_perform_write+0x203/0x3d0 [ 692.553059][T23033] ? shmem_write_begin+0x1d0/0x1d0 [ 692.558274][T23033] __generic_file_write_iter+0xe6/0x290 [ 692.563873][T23033] generic_file_write_iter+0x7d/0x1c0 [ 692.569323][T23033] vfs_write+0x47b/0x780 [ 692.573613][T23033] ksys_write+0xeb/0x1a0 [ 692.577897][T23033] __x64_sys_write+0x42/0x50 [ 692.582526][T23033] do_syscall_64+0x41/0xc0 [ 692.587020][T23033] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 692.593021][T23033] RIP: 0033:0x7f1567f53ecf [ 692.597463][T23033] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 692.617121][T23033] RSP: 002b:00007f1567314f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 692.625617][T23033] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007f1567f53ecf [ 692.633724][T23033] RDX: 0000000000100000 RSI: 00007f155eef5000 RDI: 0000000000000005 07:23:25 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a044, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 692.641719][T23033] RBP: 00007f155eef5000 R08: 0000000000000000 R09: 0000000000000534 [ 692.649714][T23033] R10: 0000000000100000 R11: 0000000000000293 R12: 0000000000000000 [ 692.657721][T23033] R13: 00007f1567314fdc R14: 00007f1567314fe0 R15: 0000000020000fc2 [ 692.665720][T23033] [ 692.685950][T23033] loop3: detected capacity change from 0 to 2048 [ 692.693804][T23033] FAT-fs (loop3): Unrecognized mount option "ÿÿÿÿÿÿÿÿ184467440737095516150xffffffffffffffff" or missing value [ 692.712929][T23037] (unnamed net_device) (uninitialized): option use_carrier: invalid value (6) [ 692.722794][T23045] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 07:23:25 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000019000000", 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000380), 0x0) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000008c0)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000001cc0)={{}, r2, 0x16, @inherit={0x88, &(0x7f0000001580)=ANY=[@ANYRES16=r3]}, @devid}) r4 = syz_open_dev$MSR(&(0x7f0000000140), 0x100000000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r4, 0x84009422, &(0x7f0000000ec0)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(r6, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000001840)=ANY=[@ANYRES32=r5, @ANYRES32=r3, @ANYRESOCT, @ANYRES32=r1, @ANYRES32, @ANYRES64, @ANYRESHEX], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x40025) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f0000001500)={r5, "2ce8b7e675c30c143ac940d229ad3592"}) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$eJzs1T9rE3EYB/AnaazRqbM4/MDFqVQ3JyOSQvFAUTLoZKBxyYmQWy6Z8hJ8Ab4wB1+EZMp2Ei5VWxSDNLnSfj7LPdz3ud+/g7v39z+OTz8VH75+/hLdXivavbjTXrbiINpxZh4AwHWyrKr4XtWaXgsAsBv+/wBw87x5++7Fsyzrv06pG7GYl4NyUF/r/Pgk6x+llf3fnlqU5WDvZ/4o1c7nt+LuOn/8x3w/Hj6o81X2/GV2Ib8dp1vfPQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA3GyHKXUiIqWUDn7dXZTlYK/OD9OZC3ldHZ9k/aN1w/m8E/c6O9sGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAcAmK6Ww8zPPR5JoVEd9ix5N210d6uSMv/tXTW097VU5+m8XTTZtfLatq05GfRMTWF9+KmK/eUvNnuGnR3DcJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABoVjGdjYd5PpoUTa8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALgqiulsPMzz0eS/i2jVI/29p+k9AgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAM34EQAA///P7Cnj") r7 = socket$inet_udplite(0x2, 0x2, 0x88) read(r7, &(0x7f00000000c0)=""/43, 0x2b) 07:23:25 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0xde0a0000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) 07:23:25 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, 0x0) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$eJzs1T9rE3EYB/AnaazRqbM4/MDFqVQ3JyOSQvFAUTLoZKBxyYmQWy6Z8hJ8Ab4wB1+EZMp2Ei5VWxSDNLnSfj7LPdz3ud+/g7v39z+OTz8VH75+/hLdXivavbjTXrbiINpxZh4AwHWyrKr4XtWaXgsAsBv+/wBw87x5++7Fsyzrv06pG7GYl4NyUF/r/Pgk6x+llf3fnlqU5WDvZ/4o1c7nt+LuOn/8x3w/Hj6o81X2/GV2Ib8dp1vfPQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA3GyHKXUiIqWUDn7dXZTlYK/OD9OZC3ldHZ9k/aN1w/m8E/c6O9sGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAcAmK6Ww8zPPR5JoVEd9ix5N210d6uSMv/tXTW097VU5+m8XTTZtfLatq05GfRMTWF9+KmK/eUvNnuGnR3DcJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABoVjGdjYd5PpoUTa8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALgqiulsPMzz0eS/i2jVI/29p+k9AgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAM34EQAA///P7Cnj") (fail_nth: 68) 07:23:25 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) r2 = open(&(0x7f0000000040)='./file0\x00', 0x161842, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'sit0\x00'}) r4 = syz_io_uring_setup(0x73d7, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000100)=0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r6, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x10001) r8 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x8010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(r5, 0x0, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x8) syz_io_uring_submit(0x0, r8, &(0x7f00000008c0)=@IORING_OP_OPENAT2={0x1c, 0x40, 0x0, 0xffffffffffffffff, &(0x7f0000000840)={0x4ae0e0, 0x2, 0x5}, &(0x7f0000000880)='./file0\x00', 0x18, 0x0, 0x12345}, 0xff) syz_io_uring_submit(r5, 0x0, &(0x7f0000002b40)=@IORING_OP_RECVMSG={0xa, 0x2b, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000002b00)={0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/28, 0x1c}, {&(0x7f0000001540)=""/4096, 0x1000}, {&(0x7f0000002540)=""/131, 0x83}, {&(0x7f0000002600)=""/102, 0x66}, {&(0x7f0000002840)=""/203, 0xcb}], 0x6}, 0x0, 0x10040, 0x1, {0x1}}, 0x0) ftruncate(r2, 0x200002) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x200000e, 0x12, r3, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) r10 = creat(&(0x7f0000000180)='./file0\x00', 0x0) fallocate(r10, 0x0, 0x0, 0x2000402) fallocate(r9, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r9, 0xc028660f, &(0x7f0000001380)={0xc, r10, 0x1b}) 07:23:25 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000002c0)={&(0x7f0000000c80)=ANY=[@ANYBLOB="0026bd7000ffdbdf25070000000c00068008000b00060000000c0008002302b41174de3f460a6d000000000000080003000380000008000300bd2c00ff07000400f8ffffff080003001dd30000080004006604000000000000000000"], 0x5c}, 0x1, 0x0, 0x0, 0x1884}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6, 0x6}]}}}]}, 0x3c}}, 0x0) r3 = openat(r2, &(0x7f00000000c0)='./file0\x00', 0x0, 0x31) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00./file0\x00']) connect$unix(r3, &(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000001c0), 0x200080, 0x0) ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f0000000200)={0x55, 0xb5f3, 0x2, 0x1, 0x6}) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000600)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000800)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x40}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) io_setup(0x6, &(0x7f00000003c0)=0x0) r7 = socket$phonet_pipe(0x23, 0x5, 0x2) io_submit(r6, 0x2, &(0x7f00000005c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, r7, &(0x7f00000001c0)='\"', 0x1}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r8, &(0x7f0000006440)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f0000000c40)={0x10, 0x1d, 0x20, 0x70bd28, 0x25dfdbfd}, 0x10}, {&(0x7f0000000f80)={0x20c, 0x3d, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x1f, 0x46, 0x0, 0x1, [@generic="6b23bda57b0fcd6882aea56d992b0de112a87c9689a0ce8f3a928a"]}, @generic="931dd380ae9b76725532f39b25791247f8e1faaa5606177d1141efdf8a23daecc73d0706f82254c664a01e4c4986b42b265e8e88f8f88e8099514ce917072d6e80996cbddc81dd1014a75c1cd2e0c084d7806b82c11b8a625557f25357333f879c7f3ea978d0c62492b2b2a3437425bf3933cf6d0456ae40263ff847b9956f9f56cd1e35dd616a0dffde59", @nested={0x14d, 0x46, 0x0, 0x1, [@typed={0x8, 0x8f, 0x0, 0x0, @u32=0x4}, @generic="3fe433e9f5d2f6047805d9eb39d59742ad46c8bd198fea6b4f77d0bf577f925374abd91b16efa9a31621d58f4b1ee788ba33ce3ae89358fcbecdc28e3a8775ee6c905d5275bf5f05ca6bfc68336199389a9644323a81d22c4bd081ec9c4826b7e965a5292167778eefb5edac3e1e0fd628684a30dbac663eb65de357a891a90855f356cbe26225342cce43c8e320a777c2a1f74ab97b7e442c94", @typed={0x8, 0x41, 0x0, 0x0, @ipv4=@multicast2}, @typed={0x8, 0x6b, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @generic="79c7219fa8393ab7671b616b9cea5f59e77de2a2ea4a268fcad39d31284ee1045f7dedc0dea487845188adde6fe70f5537a0635e01c2ec0a205c1f92c2272999ec8388f9a95b4d387581056e112c58f96f686734281b5a", @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@remote}, @generic="2d7a6c2813a21aa5bc78773404596de147d491e1868776a08d604bfb6aea387b585ce5b3f7ab336df3922c65"]}]}, 0x20c}, {&(0x7f0000000e00)={0x30, 0x12, 0x800, 0x70bd27, 0x25dfdbfc, "", [@typed={0x8, 0x5b, 0x0, 0x0, @pid}, @typed={0xf, 0x8c, 0x0, 0x0, @str='syzkaller1\x00'}, @typed={0x8, 0x7, 0x0, 0x0, @u32}]}, 0x30}, {&(0x7f0000000e40)={0xc8, 0x42, 0x10, 0x70bd26, 0x25dfdbff, "", [@generic="208cd2ae6be9be", @generic="c1d6c27da633daf115873b83c8913d284239d441678e667c20444d1a1f77f48ea7cbf783d84e79a9ebc262452149fe521b40868bf3938c61c8be3cdbd7429e623c99db5ae26d9cf24ee4ef4777ff0410e8b899b18e829f387d7926641f189d2b9697e099ffb7f20f691064b7d87d04cd2e230e8df8c77a2f1e4f4fabd49cfe414b3027dd850d9a2be9547ba5f2ed09811ea9ed9b201782165a792b57afca3e3d575d0f5b4b17a8", @typed={0x8, 0x94, 0x0, 0x0, @u32=0x1}]}, 0xc8}], 0x4, 0x0, 0x0, 0x8801}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000900)) sendmsg$nl_route(r8, &(0x7f0000000c00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000bc0)={0x0}, 0x1, 0x0, 0x0, 0x11}, 0x4c089) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r7, 0x40189429, &(0x7f0000000480)={0x1, 0x4, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r9, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x45, 0xfc, 0x6}, {0x6}]}, 0x10) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r9) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x2, 0x3, &(0x7f0000000000)=@framed={{0x18, 0xf}}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) socket$inet6_sctp(0xa, 0x801, 0x84) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) r10 = socket$igmp(0x2, 0x3, 0x2) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@private1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) ioctl$TUNSETOWNER(r3, 0x400454cc, r11) setsockopt$MRT_INIT(r10, 0x0, 0xc8, &(0x7f0000000040), 0x4) setsockopt$MRT_ADD_VIF(r10, 0x0, 0xca, &(0x7f0000000100)={0x0, 0x1, 0x0, 0x0, @vifc_lcl_addr=@dev={0xac, 0x14, 0x14, 0xb}, @multicast1}, 0x10) [ 692.873001][T23055] (unnamed net_device) (uninitialized): option use_carrier: invalid value (6) [ 692.876743][T23051] FAULT_INJECTION: forcing a failure. [ 692.876743][T23051] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 692.895117][T23051] CPU: 1 PID: 23051 Comm: syz-executor.3 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 692.905624][T23051] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 692.915712][T23051] Call Trace: [ 692.919008][T23051] 07:23:25 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0xdf0a0000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) [ 692.921951][T23051] dump_stack_lvl+0xda/0x130 [ 692.926624][T23051] dump_stack+0x15/0x20 [ 692.930808][T23051] should_fail_ex+0x21f/0x230 [ 692.935606][T23051] should_fail+0xb/0x10 [ 692.939823][T23051] should_fail_usercopy+0x1a/0x20 [ 692.944937][T23051] copy_page_from_iter_atomic+0x22d/0xcf0 [ 692.950838][T23051] ? folio_test_hugetlb+0x3a/0x70 [ 692.951674][T23055] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 692.955886][T23051] ? shmem_write_begin+0x12a/0x1d0 [ 692.955965][T23051] generic_perform_write+0x203/0x3d0 [ 692.975561][T23051] ? shmem_write_begin+0x1d0/0x1d0 [ 692.980732][T23051] __generic_file_write_iter+0xe6/0x290 [ 692.986325][T23051] generic_file_write_iter+0x7d/0x1c0 [ 692.991791][T23051] vfs_write+0x47b/0x780 [ 692.996077][T23051] ksys_write+0xeb/0x1a0 [ 693.000343][T23051] __x64_sys_write+0x42/0x50 [ 693.004958][T23051] do_syscall_64+0x41/0xc0 [ 693.009427][T23051] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 693.015365][T23051] RIP: 0033:0x7f1567f53ecf 07:23:25 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0xe4000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) [ 693.019796][T23051] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 693.039583][T23051] RSP: 002b:00007f1567314f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 693.048028][T23051] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007f1567f53ecf [ 693.056033][T23051] RDX: 0000000000100000 RSI: 00007f155eef5000 RDI: 0000000000000005 [ 693.064075][T23051] RBP: 00007f155eef5000 R08: 0000000000000000 R09: 0000000000000534 [ 693.072152][T23051] R10: 0000000000100000 R11: 0000000000000293 R12: 0000000000000000 [ 693.080146][T23051] R13: 00007f1567314fdc R14: 00007f1567314fe0 R15: 0000000020000fc2 [ 693.088235][T23051] [ 693.094196][T23071] loop0: detected capacity change from 0 to 2048 [ 693.105749][T23071] FAT-fs (loop0): Unrecognized mount option "ÿÿÿÿÿÿÿÿ184467440737095516150xffffffffffffffff" or missing value 07:23:25 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0xea030000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) 07:23:25 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) r2 = open(&(0x7f0000000040)='./file0\x00', 0x161842, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'sit0\x00'}) r4 = syz_io_uring_setup(0x73d7, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000100)=0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r6, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x10001) r8 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x8010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(r5, 0x0, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x8) syz_io_uring_submit(0x0, r8, &(0x7f00000008c0)=@IORING_OP_OPENAT2={0x1c, 0x40, 0x0, 0xffffffffffffffff, &(0x7f0000000840)={0x4ae0e0, 0x2, 0x5}, &(0x7f0000000880)='./file0\x00', 0x18, 0x0, 0x12345}, 0xff) syz_io_uring_submit(r5, 0x0, &(0x7f0000002b40)=@IORING_OP_RECVMSG={0xa, 0x2b, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000002b00)={0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/28, 0x1c}, {&(0x7f0000001540)=""/4096, 0x1000}, {&(0x7f0000002540)=""/131, 0x83}, {&(0x7f0000002600)=""/102, 0x66}, {&(0x7f0000002840)=""/203, 0xcb}], 0x6}, 0x0, 0x10040, 0x1, {0x1}}, 0x0) ftruncate(r2, 0x200002) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x200000e, 0x12, r3, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) r10 = creat(&(0x7f0000000180)='./file0\x00', 0x0) fallocate(r10, 0x0, 0x0, 0x2000402) fallocate(r9, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r9, 0xc028660f, &(0x7f0000001380)={0xc, r10, 0x1c}) [ 693.121610][T23051] loop3: detected capacity change from 0 to 2048 [ 693.129248][T23051] FAT-fs (loop3): Unrecognized mount option "ÿÿÿÿÿÿÿÿ184467440737095516150xffffffffffffffff" or missing value 07:23:25 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000002c0)={&(0x7f0000000c80)=ANY=[@ANYBLOB="0026bd7000ffdbdf25070000000c00068008000b00060000000c0008002302b41174de3f460a6d000000000000080003000380000008000300bd2c00ff07000400f8ffffff080003001dd30000080004006604000000000000000000"], 0x5c}, 0x1, 0x0, 0x0, 0x1884}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6, 0x6}]}}}]}, 0x3c}}, 0x0) r3 = openat(r2, &(0x7f00000000c0)='./file0\x00', 0x0, 0x31) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00./file0\x00']) connect$unix(r3, &(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000001c0), 0x200080, 0x0) ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f0000000200)={0x55, 0xb5f3, 0x2, 0x1, 0x6}) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000600)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000800)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x40}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) io_setup(0x6, &(0x7f00000003c0)=0x0) r7 = socket$phonet_pipe(0x23, 0x5, 0x2) io_submit(r6, 0x2, &(0x7f00000005c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, r7, &(0x7f00000001c0)='\"', 0x1}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r8, &(0x7f0000006440)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f0000000c40)={0x10, 0x1d, 0x20, 0x70bd28, 0x25dfdbfd}, 0x10}, {&(0x7f0000000f80)={0x20c, 0x3d, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x1f, 0x46, 0x0, 0x1, [@generic="6b23bda57b0fcd6882aea56d992b0de112a87c9689a0ce8f3a928a"]}, @generic="931dd380ae9b76725532f39b25791247f8e1faaa5606177d1141efdf8a23daecc73d0706f82254c664a01e4c4986b42b265e8e88f8f88e8099514ce917072d6e80996cbddc81dd1014a75c1cd2e0c084d7806b82c11b8a625557f25357333f879c7f3ea978d0c62492b2b2a3437425bf3933cf6d0456ae40263ff847b9956f9f56cd1e35dd616a0dffde59", @nested={0x14d, 0x46, 0x0, 0x1, [@typed={0x8, 0x8f, 0x0, 0x0, @u32=0x4}, @generic="3fe433e9f5d2f6047805d9eb39d59742ad46c8bd198fea6b4f77d0bf577f925374abd91b16efa9a31621d58f4b1ee788ba33ce3ae89358fcbecdc28e3a8775ee6c905d5275bf5f05ca6bfc68336199389a9644323a81d22c4bd081ec9c4826b7e965a5292167778eefb5edac3e1e0fd628684a30dbac663eb65de357a891a90855f356cbe26225342cce43c8e320a777c2a1f74ab97b7e442c94", @typed={0x8, 0x41, 0x0, 0x0, @ipv4=@multicast2}, @typed={0x8, 0x6b, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @generic="79c7219fa8393ab7671b616b9cea5f59e77de2a2ea4a268fcad39d31284ee1045f7dedc0dea487845188adde6fe70f5537a0635e01c2ec0a205c1f92c2272999ec8388f9a95b4d387581056e112c58f96f686734281b5a", @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@remote}, @generic="2d7a6c2813a21aa5bc78773404596de147d491e1868776a08d604bfb6aea387b585ce5b3f7ab336df3922c65"]}]}, 0x20c}, {&(0x7f0000000e00)={0x30, 0x12, 0x800, 0x70bd27, 0x25dfdbfc, "", [@typed={0x8, 0x5b, 0x0, 0x0, @pid}, @typed={0xf, 0x8c, 0x0, 0x0, @str='syzkaller1\x00'}, @typed={0x8, 0x7, 0x0, 0x0, @u32}]}, 0x30}, {&(0x7f0000000e40)={0xc8, 0x42, 0x10, 0x70bd26, 0x25dfdbff, "", [@generic="208cd2ae6be9be", @generic="c1d6c27da633daf115873b83c8913d284239d441678e667c20444d1a1f77f48ea7cbf783d84e79a9ebc262452149fe521b40868bf3938c61c8be3cdbd7429e623c99db5ae26d9cf24ee4ef4777ff0410e8b899b18e829f387d7926641f189d2b9697e099ffb7f20f691064b7d87d04cd2e230e8df8c77a2f1e4f4fabd49cfe414b3027dd850d9a2be9547ba5f2ed09811ea9ed9b201782165a792b57afca3e3d575d0f5b4b17a8", @typed={0x8, 0x94, 0x0, 0x0, @u32=0x1}]}, 0xc8}], 0x4, 0x0, 0x0, 0x8801}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000900)) sendmsg$nl_route(r8, &(0x7f0000000c00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000bc0)={0x0}, 0x1, 0x0, 0x0, 0x11}, 0x4c089) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r7, 0x40189429, &(0x7f0000000480)={0x1, 0x4, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r9, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x45, 0xfc, 0x6}, {0x6}]}, 0x10) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r9) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x2, 0x3, &(0x7f0000000000)=@framed={{0x18, 0xf}}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) socket$inet6_sctp(0xa, 0x801, 0x84) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) r10 = socket$igmp(0x2, 0x3, 0x2) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@private1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) ioctl$TUNSETOWNER(r3, 0x400454cc, r11) setsockopt$MRT_INIT(r10, 0x0, 0xc8, &(0x7f0000000040), 0x4) setsockopt$MRT_ADD_VIF(r10, 0x0, 0xca, &(0x7f0000000100)={0x0, 0x1, 0x0, 0x0, @vifc_lcl_addr=@dev={0xac, 0x14, 0x14, 0xb}, @multicast1}, 0x10) 07:23:25 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, 0x0) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$eJzs1T9rE3EYB/AnaazRqbM4/MDFqVQ3JyOSQvFAUTLoZKBxyYmQWy6Z8hJ8Ab4wB1+EZMp2Ei5VWxSDNLnSfj7LPdz3ud+/g7v39z+OTz8VH75+/hLdXivavbjTXrbiINpxZh4AwHWyrKr4XtWaXgsAsBv+/wBw87x5++7Fsyzrv06pG7GYl4NyUF/r/Pgk6x+llf3fnlqU5WDvZ/4o1c7nt+LuOn/8x3w/Hj6o81X2/GV2Ib8dp1vfPQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA3GyHKXUiIqWUDn7dXZTlYK/OD9OZC3ldHZ9k/aN1w/m8E/c6O9sGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAcAmK6Ww8zPPR5JoVEd9ix5N210d6uSMv/tXTW097VU5+m8XTTZtfLatq05GfRMTWF9+KmK/eUvNnuGnR3DcJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABoVjGdjYd5PpoUTa8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALgqiulsPMzz0eS/i2jVI/29p+k9AgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAM34EQAA///P7Cnj") (fail_nth: 69) [ 693.255926][T23082] (unnamed net_device) (uninitialized): option use_carrier: invalid value (6) [ 693.277915][T23083] FAULT_INJECTION: forcing a failure. [ 693.277915][T23083] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 693.291791][T23083] CPU: 0 PID: 23083 Comm: syz-executor.3 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 693.302459][T23083] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 693.312537][T23083] Call Trace: [ 693.315832][T23083] [ 693.318818][T23083] dump_stack_lvl+0xda/0x130 [ 693.323483][T23083] dump_stack+0x15/0x20 [ 693.327749][T23083] should_fail_ex+0x21f/0x230 [ 693.332508][T23083] should_fail+0xb/0x10 [ 693.336762][T23083] should_fail_usercopy+0x1a/0x20 [ 693.341853][T23083] copy_page_from_iter_atomic+0x22d/0xcf0 [ 693.347639][T23083] ? folio_test_hugetlb+0x3a/0x70 [ 693.352700][T23083] ? shmem_write_begin+0x12a/0x1d0 [ 693.357855][T23083] generic_perform_write+0x203/0x3d0 [ 693.363352][T23083] ? shmem_write_begin+0x1d0/0x1d0 [ 693.368496][T23083] __generic_file_write_iter+0xe6/0x290 [ 693.374163][T23083] generic_file_write_iter+0x7d/0x1c0 [ 693.379608][T23083] vfs_write+0x47b/0x780 [ 693.383890][T23083] ksys_write+0xeb/0x1a0 [ 693.388192][T23083] __x64_sys_write+0x42/0x50 [ 693.392875][T23083] do_syscall_64+0x41/0xc0 [ 693.397379][T23083] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 693.398375][T23082] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 693.403362][T23083] RIP: 0033:0x7f1567f53ecf [ 693.403384][T23083] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 693.436786][T23083] RSP: 002b:00007f1567314f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 693.445301][T23083] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007f1567f53ecf [ 693.453304][T23083] RDX: 0000000000100000 RSI: 00007f155eef5000 RDI: 0000000000000005 [ 693.461352][T23083] RBP: 00007f155eef5000 R08: 0000000000000000 R09: 0000000000000534 [ 693.469380][T23083] R10: 0000000000100000 R11: 0000000000000293 R12: 0000000000000000 [ 693.477397][T23083] R13: 00007f1567314fdc R14: 00007f1567314fe0 R15: 0000000020000fc2 [ 693.485399][T23083] 07:23:26 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a0fc, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 693.501914][T23083] loop3: detected capacity change from 0 to 2048 [ 693.509842][T23083] FAT-fs (loop3): Unrecognized mount option "ÿÿÿÿÿÿÿÿ184467440737095516150xffffffffffffffff" or missing value 07:23:26 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000019000000", 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000380)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000008c0)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000001cc0)={{}, r2, 0x16, @inherit={0x88, &(0x7f0000001580)=ANY=[@ANYRES16=r3]}, @devid}) r4 = syz_open_dev$MSR(&(0x7f0000000140), 0x100000000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r4, 0x84009422, &(0x7f0000000ec0)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(r6, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000001840)=ANY=[@ANYRES32=r5, @ANYRES32=r3, @ANYRESOCT, @ANYRES32=r1, @ANYRES32, @ANYRES64, @ANYRESHEX], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x40025) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f0000001500)={r5, "2ce8b7e675c30c143ac940d229ad3592"}) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$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") r7 = socket$inet_udplite(0x2, 0x2, 0x88) read(r7, &(0x7f00000000c0)=""/43, 0x2b) 07:23:26 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0xeaffffff}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) 07:23:26 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) r2 = open(&(0x7f0000000040)='./file0\x00', 0x161842, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'sit0\x00'}) r4 = syz_io_uring_setup(0x73d7, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000100)=0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r6, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x10001) r8 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x8010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(r5, 0x0, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x8) syz_io_uring_submit(0x0, r8, &(0x7f00000008c0)=@IORING_OP_OPENAT2={0x1c, 0x40, 0x0, 0xffffffffffffffff, &(0x7f0000000840)={0x4ae0e0, 0x2, 0x5}, &(0x7f0000000880)='./file0\x00', 0x18, 0x0, 0x12345}, 0xff) syz_io_uring_submit(r5, 0x0, &(0x7f0000002b40)=@IORING_OP_RECVMSG={0xa, 0x2b, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000002b00)={0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/28, 0x1c}, {&(0x7f0000001540)=""/4096, 0x1000}, {&(0x7f0000002540)=""/131, 0x83}, {&(0x7f0000002600)=""/102, 0x66}, {&(0x7f0000002840)=""/203, 0xcb}], 0x6}, 0x0, 0x10040, 0x1, {0x1}}, 0x0) ftruncate(r2, 0x200002) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x200000e, 0x12, r3, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) r10 = creat(&(0x7f0000000180)='./file0\x00', 0x0) fallocate(r10, 0x0, 0x0, 0x2000402) fallocate(r9, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r9, 0xc028660f, &(0x7f0000001380)={0xc, r10, 0x1d}) 07:23:26 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000002c0)={&(0x7f0000000c80)=ANY=[@ANYBLOB="0026bd7000ffdbdf25070000000c00068008000b00060000000c0008002302b41174de3f460a6d000000000000080003000380000008000300bd2c00ff07000400f8ffffff080003001dd30000080004006604000000000000000000"], 0x5c}, 0x1, 0x0, 0x0, 0x1884}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6, 0x6}]}}}]}, 0x3c}}, 0x0) r3 = openat(r2, &(0x7f00000000c0)='./file0\x00', 0x0, 0x31) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00./file0\x00']) connect$unix(r3, &(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000001c0), 0x200080, 0x0) ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f0000000200)={0x55, 0xb5f3, 0x2, 0x1, 0x6}) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000600)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000800)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x40}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) io_setup(0x6, &(0x7f00000003c0)=0x0) r7 = socket$phonet_pipe(0x23, 0x5, 0x2) io_submit(r6, 0x2, &(0x7f00000005c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, r7, &(0x7f00000001c0)='\"', 0x1}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r8, &(0x7f0000006440)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f0000000c40)={0x10, 0x1d, 0x20, 0x70bd28, 0x25dfdbfd}, 0x10}, {&(0x7f0000000f80)={0x20c, 0x3d, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x1f, 0x46, 0x0, 0x1, [@generic="6b23bda57b0fcd6882aea56d992b0de112a87c9689a0ce8f3a928a"]}, @generic="931dd380ae9b76725532f39b25791247f8e1faaa5606177d1141efdf8a23daecc73d0706f82254c664a01e4c4986b42b265e8e88f8f88e8099514ce917072d6e80996cbddc81dd1014a75c1cd2e0c084d7806b82c11b8a625557f25357333f879c7f3ea978d0c62492b2b2a3437425bf3933cf6d0456ae40263ff847b9956f9f56cd1e35dd616a0dffde59", @nested={0x14d, 0x46, 0x0, 0x1, [@typed={0x8, 0x8f, 0x0, 0x0, @u32=0x4}, @generic="3fe433e9f5d2f6047805d9eb39d59742ad46c8bd198fea6b4f77d0bf577f925374abd91b16efa9a31621d58f4b1ee788ba33ce3ae89358fcbecdc28e3a8775ee6c905d5275bf5f05ca6bfc68336199389a9644323a81d22c4bd081ec9c4826b7e965a5292167778eefb5edac3e1e0fd628684a30dbac663eb65de357a891a90855f356cbe26225342cce43c8e320a777c2a1f74ab97b7e442c94", @typed={0x8, 0x41, 0x0, 0x0, @ipv4=@multicast2}, @typed={0x8, 0x6b, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @generic="79c7219fa8393ab7671b616b9cea5f59e77de2a2ea4a268fcad39d31284ee1045f7dedc0dea487845188adde6fe70f5537a0635e01c2ec0a205c1f92c2272999ec8388f9a95b4d387581056e112c58f96f686734281b5a", @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@remote}, @generic="2d7a6c2813a21aa5bc78773404596de147d491e1868776a08d604bfb6aea387b585ce5b3f7ab336df3922c65"]}]}, 0x20c}, {&(0x7f0000000e00)={0x30, 0x12, 0x800, 0x70bd27, 0x25dfdbfc, "", [@typed={0x8, 0x5b, 0x0, 0x0, @pid}, @typed={0xf, 0x8c, 0x0, 0x0, @str='syzkaller1\x00'}, @typed={0x8, 0x7, 0x0, 0x0, @u32}]}, 0x30}, {&(0x7f0000000e40)={0xc8, 0x42, 0x10, 0x70bd26, 0x25dfdbff, "", [@generic="208cd2ae6be9be", @generic="c1d6c27da633daf115873b83c8913d284239d441678e667c20444d1a1f77f48ea7cbf783d84e79a9ebc262452149fe521b40868bf3938c61c8be3cdbd7429e623c99db5ae26d9cf24ee4ef4777ff0410e8b899b18e829f387d7926641f189d2b9697e099ffb7f20f691064b7d87d04cd2e230e8df8c77a2f1e4f4fabd49cfe414b3027dd850d9a2be9547ba5f2ed09811ea9ed9b201782165a792b57afca3e3d575d0f5b4b17a8", @typed={0x8, 0x94, 0x0, 0x0, @u32=0x1}]}, 0xc8}], 0x4, 0x0, 0x0, 0x8801}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000900)={'team0\x00', 0x0}) sendmsg$nl_route(r8, &(0x7f0000000c00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000bc0)={&(0x7f00000011c0)=@dellink={0x25c, 0x11, 0x0, 0x70bd28, 0x25dfdbff, {0x0, 0x0, 0x0, r9, 0x1000}, [@IFLA_PROTO_DOWN={0x5}, @IFLA_IFNAME={0x14, 0x3, 'macvlan1\x00'}, @IFLA_MAP={0x24, 0xe, {0x9, 0xd2, 0x2e4d, 0x200, 0x3e, 0xff}}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x5}, @IFLA_IFALIAS={0x14, 0x14, 'syzkaller1\x00'}, @IFLA_MTU={0x8, 0x4, 0x101}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_VFINFO_LIST={0x1cc, 0x16, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x8fe, 0xffff}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x5, 0x1}}]}, {0x84, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN_LIST={0x54, 0xc, 0x0, 0x1, [{0x14, 0x1, {0xb5d3, 0xadc, 0x100, 0xd1c53560eb87a9fa}}, {0x14, 0x1, {0x4, 0xb6, 0x81, 0x8100}}, {0x14, 0x1, {0x0, 0x6e4, 0x1, 0x88a8}}, {0x14, 0x1, {0x14, 0xaed, 0x0, 0x8100}}]}, @IFLA_VF_TX_RATE={0xc, 0x3, {0x1000, 0x200}}, @IFLA_VF_TRUST={0xc, 0x9, {0x7, 0x800}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x8000, 0x1}}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x7f, 0x7fff}}, @IFLA_VF_TRUST={0xc, 0x9, {0x7ff, 0x8}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_RATE={0x10, 0x6, {0x9, 0x5, 0x5}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x9}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x80000000, 0x3}}]}, {0xa4, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0xfff, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1d}}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x3f, 0x43}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x65c, 0x1}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x2, 0x80000001}}, @IFLA_VF_VLAN_LIST={0x40, 0xc, 0x0, 0x1, [{0x14, 0x1, {0xcae8, 0x919, 0x9, 0x8100}}, {0x14, 0x1, {0x200, 0xb47, 0xaaa, 0x8100}}, {0x14, 0x1, {0x5, 0x53b, 0xfffffff7, 0x88a8}}]}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x3f, 0x7fff}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x930, 0x5}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x6, 0x8}}]}]}]}, 0x25c}, 0x1, 0x0, 0x0, 0x11}, 0x4c089) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r7, 0x40189429, &(0x7f0000000480)={0x1, 0x4, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r10, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x45, 0xfc, 0x6}, {0x6}]}, 0x10) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x2, 0x3, &(0x7f0000000000)=@framed={{0x18, 0xf}}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) socket$inet6_sctp(0xa, 0x801, 0x84) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) r11 = socket$igmp(0x2, 0x3, 0x2) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@private1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) ioctl$TUNSETOWNER(r3, 0x400454cc, r12) setsockopt$MRT_INIT(r11, 0x0, 0xc8, &(0x7f0000000040), 0x4) setsockopt$MRT_ADD_VIF(r11, 0x0, 0xca, &(0x7f0000000100)={0x0, 0x1, 0x0, 0x0, @vifc_lcl_addr=@dev={0xac, 0x14, 0x14, 0xb}, @multicast1}, 0x10) 07:23:26 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, 0x0) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$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") (fail_nth: 70) [ 693.741996][T23093] FAULT_INJECTION: forcing a failure. [ 693.741996][T23093] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 693.755288][T23093] CPU: 0 PID: 23093 Comm: syz-executor.3 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 693.765760][T23093] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 693.773394][T23089] bond1032: entered promiscuous mode [ 693.775815][T23093] Call Trace: [ 693.775824][T23093] [ 693.781129][T23089] bond1032: entered allmulticast mode [ 693.784385][T23093] dump_stack_lvl+0xda/0x130 [ 693.787706][T23089] 8021q: adding VLAN 0 to HW filter on device bond1032 [ 693.792658][T23093] dump_stack+0x15/0x20 [ 693.808353][T23093] should_fail_ex+0x21f/0x230 [ 693.813107][T23093] __alloc_pages+0x108/0x340 [ 693.817749][T23093] vma_alloc_folio+0x6a3/0x8c0 [ 693.822677][T23093] ? __vm_enough_memory+0xdf/0x2a0 [ 693.827824][T23093] shmem_get_folio_gfp+0x801/0x1200 [ 693.833114][T23093] shmem_write_begin+0xa6/0x1d0 [ 693.838004][T23093] generic_perform_write+0x1c3/0x3d0 [ 693.843403][T23093] ? shmem_write_begin+0x1d0/0x1d0 [ 693.848571][T23093] __generic_file_write_iter+0xe6/0x290 [ 693.854194][T23093] generic_file_write_iter+0x7d/0x1c0 [ 693.859604][T23093] vfs_write+0x47b/0x780 [ 693.863908][T23093] ksys_write+0xeb/0x1a0 [ 693.868217][T23093] __x64_sys_write+0x42/0x50 [ 693.872939][T23093] do_syscall_64+0x41/0xc0 [ 693.877502][T23093] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 693.883442][T23093] RIP: 0033:0x7f1567f53ecf [ 693.884579][T23099] bond1033: entered promiscuous mode [ 693.887920][T23093] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 693.887945][T23093] RSP: 002b:00007f1567314f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 693.893227][T23099] bond1033: entered allmulticast mode [ 693.912814][T23093] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007f1567f53ecf [ 693.912833][T23093] RDX: 0000000000100000 RSI: 00007f155eef5000 RDI: 0000000000000005 07:23:26 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0xedffffff}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) [ 693.912848][T23093] RBP: 00007f155eef5000 R08: 0000000000000000 R09: 0000000000000534 [ 693.912878][T23093] R10: 0000000000100000 R11: 0000000000000293 R12: 0000000000000000 [ 693.912890][T23093] R13: 00007f1567314fdc R14: 00007f1567314fe0 R15: 0000000020000fc2 [ 693.966932][T23093] [ 693.970318][T23099] 8021q: adding VLAN 0 to HW filter on device bond1033 07:23:26 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0xef000000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) [ 693.988878][T23090] (unnamed net_device) (uninitialized): option use_carrier: invalid value (6) 07:23:26 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, 0x0) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$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") (fail_nth: 71) [ 694.015626][T23097] loop0: detected capacity change from 0 to 2048 [ 694.025471][T23097] FAT-fs (loop0): Unrecognized mount option "ÿÿÿÿÿÿÿÿ184467440737095516150xffffffffffffffff" or missing value 07:23:26 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0xf0ffffff}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) [ 694.091785][T23113] FAULT_INJECTION: forcing a failure. [ 694.091785][T23113] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 694.104931][T23113] CPU: 1 PID: 23113 Comm: syz-executor.3 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 694.115490][T23113] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 694.125593][T23113] Call Trace: [ 694.128952][T23113] [ 694.131953][T23113] dump_stack_lvl+0xda/0x130 [ 694.136589][T23113] dump_stack+0x15/0x20 [ 694.140785][T23113] should_fail_ex+0x21f/0x230 [ 694.145516][T23113] should_fail+0xb/0x10 [ 694.149710][T23113] should_fail_usercopy+0x1a/0x20 [ 694.154774][T23113] copy_page_from_iter_atomic+0x22d/0xcf0 [ 694.160533][T23113] ? folio_test_hugetlb+0x3a/0x70 [ 694.165710][T23113] ? shmem_write_begin+0x12a/0x1d0 [ 694.170910][T23113] generic_perform_write+0x203/0x3d0 [ 694.176237][T23113] ? shmem_write_begin+0x1d0/0x1d0 [ 694.181511][T23113] __generic_file_write_iter+0xe6/0x290 [ 694.187151][T23113] generic_file_write_iter+0x7d/0x1c0 [ 694.192621][T23113] vfs_write+0x47b/0x780 [ 694.196934][T23113] ksys_write+0xeb/0x1a0 [ 694.201293][T23113] __x64_sys_write+0x42/0x50 [ 694.205916][T23113] do_syscall_64+0x41/0xc0 [ 694.210363][T23113] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 694.216348][T23113] RIP: 0033:0x7f1567f53ecf [ 694.220875][T23113] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 694.240515][T23113] RSP: 002b:00007f1567314f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 694.248963][T23113] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007f1567f53ecf [ 694.257022][T23113] RDX: 0000000000100000 RSI: 00007f155eef5000 RDI: 0000000000000005 [ 694.265100][T23113] RBP: 00007f155eef5000 R08: 0000000000000000 R09: 0000000000000534 [ 694.273123][T23113] R10: 0000000000100000 R11: 0000000000000293 R12: 0000000000000000 [ 694.281140][T23113] R13: 00007f1567314fdc R14: 00007f1567314fe0 R15: 0000000020000fc2 [ 694.289157][T23113] 07:23:26 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000002c0)={&(0x7f0000000c80)=ANY=[@ANYBLOB="0026bd7000ffdbdf25070000000c00068008000b00060000000c0008002302b41174de3f460a6d000000000000080003000380000008000300bd2c00ff07000400f8ffffff080003001dd30000080004006604000000000000000000"], 0x5c}, 0x1, 0x0, 0x0, 0x1884}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6, 0x6}]}}}]}, 0x3c}}, 0x0) r3 = openat(r2, &(0x7f00000000c0)='./file0\x00', 0x0, 0x31) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000680)=ANY=[@ANYBLOB="4afe65cd9f4cb96af18454a88fa8005c9fe248c0144c45e701002b7127b6679c7a64908ce701f270818888d4368d79057ee5e41b0efaa601fc1a8488a8a24cb9d947491b1bc7983e1710bb3ccc29e6d4ed4df77669e40bbfa802c600208e53ee50e98ab2cb4f50d11a9cdddd9320a5d8171c0f0c108488d0b23be195b12fc7ed967f99e71ff165310bc20d027160e20e87088c6f48a6c7210431c5a6578b11b646347984f92bc092089c964bd360a4e0b124bec92bf620edc72693f0e78f12e205659005168a8e2f60f18bcecd57f49295bfe6ca9c894f4d75798ae81020f3ff3f9d2aeb8740d2ec38db6c068f60e10f6f06172fb698e28d2dcc7deed28eee05874cc59a89b771e167c0d3da3789a3acd1af0cc89d9ff46e329a00f6d1a28794c3b3db7752189c1853e53b0aa840b887618d3d9b6038fc37865fa39328a439819e25692b3efee7a80b609f2ba10030f51469aa05f966b72dedf8991f0d", @ANYRES32=r0, @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00./file0\x00']) connect$unix(r3, &(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000001c0), 0x200080, 0x0) ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f0000000200)={0x55, 0xb5f3, 0x2, 0x1, 0x6}) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000600)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000800)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x40}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) io_setup(0x6, &(0x7f00000003c0)=0x0) r7 = socket$phonet_pipe(0x23, 0x5, 0x2) io_submit(r6, 0x2, &(0x7f00000005c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, r7, &(0x7f00000001c0)='\"', 0x1}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r8, &(0x7f0000006440)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f0000000c40)={0x10, 0x1d, 0x20, 0x70bd28, 0x25dfdbfd}, 0x10}, {&(0x7f0000000f80)={0x20c, 0x3d, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x1f, 0x46, 0x0, 0x1, [@generic="6b23bda57b0fcd6882aea56d992b0de112a87c9689a0ce8f3a928a"]}, @generic="931dd380ae9b76725532f39b25791247f8e1faaa5606177d1141efdf8a23daecc73d0706f82254c664a01e4c4986b42b265e8e88f8f88e8099514ce917072d6e80996cbddc81dd1014a75c1cd2e0c084d7806b82c11b8a625557f25357333f879c7f3ea978d0c62492b2b2a3437425bf3933cf6d0456ae40263ff847b9956f9f56cd1e35dd616a0dffde59", @nested={0x14d, 0x46, 0x0, 0x1, [@typed={0x8, 0x8f, 0x0, 0x0, @u32=0x4}, @generic="3fe433e9f5d2f6047805d9eb39d59742ad46c8bd198fea6b4f77d0bf577f925374abd91b16efa9a31621d58f4b1ee788ba33ce3ae89358fcbecdc28e3a8775ee6c905d5275bf5f05ca6bfc68336199389a9644323a81d22c4bd081ec9c4826b7e965a5292167778eefb5edac3e1e0fd628684a30dbac663eb65de357a891a90855f356cbe26225342cce43c8e320a777c2a1f74ab97b7e442c94", @typed={0x8, 0x41, 0x0, 0x0, @ipv4=@multicast2}, @typed={0x8, 0x6b, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @generic="79c7219fa8393ab7671b616b9cea5f59e77de2a2ea4a268fcad39d31284ee1045f7dedc0dea487845188adde6fe70f5537a0635e01c2ec0a205c1f92c2272999ec8388f9a95b4d387581056e112c58f96f686734281b5a", @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@remote}, @generic="2d7a6c2813a21aa5bc78773404596de147d491e1868776a08d604bfb6aea387b585ce5b3f7ab336df3922c65"]}]}, 0x20c}, {&(0x7f0000000e00)={0x30, 0x12, 0x800, 0x70bd27, 0x25dfdbfc, "", [@typed={0x8, 0x5b, 0x0, 0x0, @pid}, @typed={0xf, 0x8c, 0x0, 0x0, @str='syzkaller1\x00'}, @typed={0x8, 0x7, 0x0, 0x0, @u32}]}, 0x30}, {&(0x7f0000000e40)={0xc8, 0x42, 0x10, 0x70bd26, 0x25dfdbff, "", [@generic="208cd2ae6be9be", @generic="c1d6c27da633daf115873b83c8913d284239d441678e667c20444d1a1f77f48ea7cbf783d84e79a9ebc262452149fe521b40868bf3938c61c8be3cdbd7429e623c99db5ae26d9cf24ee4ef4777ff0410e8b899b18e829f387d7926641f189d2b9697e099ffb7f20f691064b7d87d04cd2e230e8df8c77a2f1e4f4fabd49cfe414b3027dd850d9a2be9547ba5f2ed09811ea9ed9b201782165a792b57afca3e3d575d0f5b4b17a8", @typed={0x8, 0x94, 0x0, 0x0, @u32=0x1}]}, 0xc8}], 0x4, 0x0, 0x0, 0x8801}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000900)={'team0\x00', 0x0}) sendmsg$nl_route(r8, &(0x7f0000000c00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000bc0)={&(0x7f00000011c0)=@dellink={0x25c, 0x11, 0x0, 0x70bd28, 0x25dfdbff, {0x0, 0x0, 0x0, r9, 0x1000}, [@IFLA_PROTO_DOWN={0x5}, @IFLA_IFNAME={0x14, 0x3, 'macvlan1\x00'}, @IFLA_MAP={0x24, 0xe, {0x9, 0xd2, 0x2e4d, 0x200, 0x3e, 0xff}}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x5}, @IFLA_IFALIAS={0x14, 0x14, 'syzkaller1\x00'}, @IFLA_MTU={0x8, 0x4, 0x101}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_VFINFO_LIST={0x1cc, 0x16, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x8fe, 0xffff}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x5, 0x1}}]}, {0x84, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN_LIST={0x54, 0xc, 0x0, 0x1, [{0x14, 0x1, {0xb5d3, 0xadc, 0x100, 0xd1c53560eb87a9fa}}, {0x14, 0x1, {0x4, 0xb6, 0x81, 0x8100}}, {0x14, 0x1, {0x0, 0x6e4, 0x1, 0x88a8}}, {0x14, 0x1, {0x14, 0xaed, 0x0, 0x8100}}]}, @IFLA_VF_TX_RATE={0xc, 0x3, {0x1000, 0x200}}, @IFLA_VF_TRUST={0xc, 0x9, {0x7, 0x800}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x8000, 0x1}}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x7f, 0x7fff}}, @IFLA_VF_TRUST={0xc, 0x9, {0x7ff, 0x8}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_RATE={0x10, 0x6, {0x9, 0x5, 0x5}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x9}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x80000000, 0x3}}]}, {0xa4, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0xfff, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1d}}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x3f, 0x43}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x65c, 0x1}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x2, 0x80000001}}, @IFLA_VF_VLAN_LIST={0x40, 0xc, 0x0, 0x1, [{0x14, 0x1, {0xcae8, 0x919, 0x9, 0x8100}}, {0x14, 0x1, {0x200, 0xb47, 0xaaa, 0x8100}}, {0x14, 0x1, {0x5, 0x53b, 0xfffffff7, 0x88a8}}]}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x3f, 0x7fff}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x930, 0x5}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x6, 0x8}}]}]}]}, 0x25c}, 0x1, 0x0, 0x0, 0x11}, 0x4c089) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r7, 0x40189429, &(0x7f0000000480)={0x1, 0x4, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r10, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x45, 0xfc, 0x6}, {0x6}]}, 0x10) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x2, 0x3, &(0x7f0000000000)=@framed={{0x18, 0xf}}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) socket$inet6_sctp(0xa, 0x801, 0x84) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) r11 = socket$igmp(0x2, 0x3, 0x2) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@private1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) ioctl$TUNSETOWNER(r3, 0x400454cc, r12) setsockopt$MRT_INIT(r11, 0x0, 0xc8, &(0x7f0000000040), 0x4) setsockopt$MRT_ADD_VIF(r11, 0x0, 0xca, &(0x7f0000000100)={0x0, 0x1, 0x0, 0x0, @vifc_lcl_addr=@dev={0xac, 0x14, 0x14, 0xb}, @multicast1}, 0x10) 07:23:26 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1e000, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 694.309518][T23113] loop3: detected capacity change from 0 to 2048 [ 694.314741][T23115] bond1035: entered promiscuous mode [ 694.317210][T23113] FAT-fs (loop3): Unrecognized mount option "ÿÿÿÿÿÿÿÿ184467440737095516150xffffffffffffffff" or missing value [ 694.321276][T23115] bond1035: entered allmulticast mode [ 694.341462][T23115] 8021q: adding VLAN 0 to HW filter on device bond1035 07:23:26 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, 0x0) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$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") (fail_nth: 72) [ 694.414179][T23118] (unnamed net_device) (uninitialized): option use_carrier: invalid value (6) [ 694.445689][T23120] FAULT_INJECTION: forcing a failure. [ 694.445689][T23120] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 694.458969][T23120] CPU: 1 PID: 23120 Comm: syz-executor.3 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 694.469459][T23120] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 694.475140][T23118] __nla_validate_parse: 1 callbacks suppressed [ 694.475158][T23118] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 694.479586][T23120] Call Trace: [ 694.479595][T23120] [ 694.479603][T23120] dump_stack_lvl+0xda/0x130 [ 694.479721][T23120] dump_stack+0x15/0x20 [ 694.479746][T23120] should_fail_ex+0x21f/0x230 [ 694.479784][T23120] __alloc_pages+0x108/0x340 [ 694.479893][T23120] vma_alloc_folio+0x6a3/0x8c0 [ 694.479959][T23120] ? __vm_enough_memory+0xdf/0x2a0 [ 694.479988][T23120] shmem_get_folio_gfp+0x801/0x1200 [ 694.480023][T23120] shmem_write_begin+0xa6/0x1d0 [ 694.480108][T23120] generic_perform_write+0x1c3/0x3d0 [ 694.480167][T23120] ? shmem_write_begin+0x1d0/0x1d0 [ 694.480193][T23120] __generic_file_write_iter+0xe6/0x290 [ 694.480230][T23120] generic_file_write_iter+0x7d/0x1c0 07:23:27 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000019000000", 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000380)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000008c0)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000001cc0)={{}, r2, 0x16, @inherit={0x88, &(0x7f0000001580)=ANY=[@ANYRES16=r3]}, @devid}) r4 = syz_open_dev$MSR(&(0x7f0000000140), 0x100000000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r4, 0x84009422, &(0x7f0000000ec0)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(r6, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000001840)=ANY=[@ANYRES32=r5, @ANYRES32=r3, @ANYRESOCT, @ANYRES32=r1, @ANYRES32, @ANYRES64, @ANYRESHEX], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x40025) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f0000001500)={r5, "2ce8b7e675c30c143ac940d229ad3592"}) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$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") r7 = socket$inet_udplite(0x2, 0x2, 0x88) read(r7, &(0x7f00000000c0)=""/43, 0x2b) 07:23:27 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0xf3ffffff}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) 07:23:27 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) r2 = open(&(0x7f0000000040)='./file0\x00', 0x161842, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'sit0\x00'}) r4 = syz_io_uring_setup(0x73d7, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000100)=0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r6, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x10001) r8 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x8010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(r5, 0x0, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x8) syz_io_uring_submit(0x0, r8, &(0x7f00000008c0)=@IORING_OP_OPENAT2={0x1c, 0x40, 0x0, 0xffffffffffffffff, &(0x7f0000000840)={0x4ae0e0, 0x2, 0x5}, &(0x7f0000000880)='./file0\x00', 0x18, 0x0, 0x12345}, 0xff) syz_io_uring_submit(r5, 0x0, &(0x7f0000002b40)=@IORING_OP_RECVMSG={0xa, 0x2b, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000002b00)={0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/28, 0x1c}, {&(0x7f0000001540)=""/4096, 0x1000}, {&(0x7f0000002540)=""/131, 0x83}, {&(0x7f0000002600)=""/102, 0x66}, {&(0x7f0000002840)=""/203, 0xcb}], 0x6}, 0x0, 0x10040, 0x1, {0x1}}, 0x0) ftruncate(r2, 0x200002) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x200000e, 0x12, r3, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) r10 = creat(&(0x7f0000000180)='./file0\x00', 0x0) fallocate(r10, 0x0, 0x0, 0x2000402) fallocate(r9, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r9, 0xc028660f, &(0x7f0000001380)={0xc, r10, 0x1e}) [ 694.561195][T23120] vfs_write+0x47b/0x780 [ 694.565497][T23120] ksys_write+0xeb/0x1a0 [ 694.569828][T23120] __x64_sys_write+0x42/0x50 [ 694.574473][T23120] do_syscall_64+0x41/0xc0 [ 694.578899][T23120] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 694.584873][T23120] RIP: 0033:0x7f1567f53ecf [ 694.589294][T23120] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 07:23:27 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, 0x0) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$eJzs1T9rE3EYB/AnaazRqbM4/MDFqVQ3JyOSQvFAUTLoZKBxyYmQWy6Z8hJ8Ab4wB1+EZMp2Ei5VWxSDNLnSfj7LPdz3ud+/g7v39z+OTz8VH75+/hLdXivavbjTXrbiINpxZh4AwHWyrKr4XtWaXgsAsBv+/wBw87x5++7Fsyzrv06pG7GYl4NyUF/r/Pgk6x+llf3fnlqU5WDvZ/4o1c7nt+LuOn/8x3w/Hj6o81X2/GV2Ib8dp1vfPQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA3GyHKXUiIqWUDn7dXZTlYK/OD9OZC3ldHZ9k/aN1w/m8E/c6O9sGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAcAmK6Ww8zPPR5JoVEd9ix5N210d6uSMv/tXTW097VU5+m8XTTZtfLatq05GfRMTWF9+KmK/eUvNnuGnR3DcJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABoVjGdjYd5PpoUTa8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALgqiulsPMzz0eS/i2jVI/29p+k9AgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAM34EQAA///P7Cnj") (fail_nth: 73) [ 694.608986][T23120] RSP: 002b:00007f1567314f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 694.617441][T23120] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007f1567f53ecf [ 694.625438][T23120] RDX: 0000000000100000 RSI: 00007f155eef5000 RDI: 0000000000000005 [ 694.633436][T23120] RBP: 00007f155eef5000 R08: 0000000000000000 R09: 0000000000000534 [ 694.641434][T23120] R10: 0000000000100000 R11: 0000000000000293 R12: 0000000000000000 [ 694.649433][T23120] R13: 00007f1567314fdc R14: 00007f1567314fe0 R15: 0000000020000fc2 [ 694.657525][T23120] [ 694.690906][T23124] bond1036: entered promiscuous mode [ 694.696459][T23124] bond1036: entered allmulticast mode [ 694.711119][T23124] 8021q: adding VLAN 0 to HW filter on device bond1036 [ 694.719232][T23131] FAULT_INJECTION: forcing a failure. [ 694.719232][T23131] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 694.732500][T23131] CPU: 0 PID: 23131 Comm: syz-executor.3 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 694.743005][T23131] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 694.753088][T23131] Call Trace: [ 694.756395][T23131] [ 694.759439][T23131] dump_stack_lvl+0xda/0x130 [ 694.764086][T23131] dump_stack+0x15/0x20 [ 694.768307][T23131] should_fail_ex+0x21f/0x230 [ 694.773036][T23131] should_fail+0xb/0x10 [ 694.777240][T23131] should_fail_usercopy+0x1a/0x20 [ 694.782316][T23131] copy_page_from_iter_atomic+0x22d/0xcf0 [ 694.788136][T23131] ? folio_test_hugetlb+0x3a/0x70 [ 694.793250][T23131] ? shmem_write_begin+0x12a/0x1d0 [ 694.798462][T23131] generic_perform_write+0x203/0x3d0 [ 694.803871][T23131] ? shmem_write_begin+0x1d0/0x1d0 [ 694.809047][T23131] __generic_file_write_iter+0xe6/0x290 [ 694.814697][T23131] generic_file_write_iter+0x7d/0x1c0 [ 694.820100][T23131] vfs_write+0x47b/0x780 [ 694.822833][T23138] loop0: detected capacity change from 0 to 2048 [ 694.824435][T23131] ksys_write+0xeb/0x1a0 [ 694.824497][T23131] __x64_sys_write+0x42/0x50 [ 694.824519][T23131] do_syscall_64+0x41/0xc0 [ 694.843286][T23138] FAT-fs (loop0): Unrecognized mount option "ÿÿÿÿÿÿÿÿ184467440737095516150xffffffffffffffff" or missing value [ 694.844067][T23131] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 694.844106][T23131] RIP: 0033:0x7f1567f53ecf [ 694.844120][T23131] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 07:23:27 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0xf4030000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) [ 694.885901][T23131] RSP: 002b:00007f1567314f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 694.894345][T23131] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007f1567f53ecf [ 694.902360][T23131] RDX: 0000000000100000 RSI: 00007f155eef5000 RDI: 0000000000000005 [ 694.910387][T23131] RBP: 00007f155eef5000 R08: 0000000000000000 R09: 0000000000000534 [ 694.918437][T23131] R10: 0000000000100000 R11: 0000000000000293 R12: 0000000000000000 [ 694.926437][T23131] R13: 00007f1567314fdc R14: 00007f1567314fe0 R15: 0000000020000fc2 [ 694.934438][T23131] 07:23:27 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0xf6030000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) 07:23:27 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0xfe030000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) [ 694.954484][T23131] loop3: detected capacity change from 0 to 2048 [ 694.969053][T23131] FAT-fs (loop3): Unrecognized mount option "ÿÿÿÿÿÿÿÿ184467440737095516150xffffffffffffffff" or missing value 07:23:27 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000002c0)={&(0x7f0000000c80)=ANY=[@ANYBLOB="0026bd7000ffdbdf25070000000c00068008000b00060000000c0008002302b41174de3f460a6d000000000000080003000380000008000300bd2c00ff07000400f8ffffff080003001dd30000080004006604000000000000000000"], 0x5c}, 0x1, 0x0, 0x0, 0x1884}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6, 0x6}]}}}]}, 0x3c}}, 0x0) r3 = openat(r2, &(0x7f00000000c0)='./file0\x00', 0x0, 0x31) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00./file0\x00']) connect$unix(r3, &(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000001c0), 0x200080, 0x0) ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f0000000200)={0x55, 0xb5f3, 0x2, 0x1, 0x6}) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000600)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000800)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x40}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) io_setup(0x6, &(0x7f00000003c0)=0x0) r7 = socket$phonet_pipe(0x23, 0x5, 0x2) io_submit(r6, 0x2, &(0x7f00000005c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, r7, &(0x7f00000001c0)='\"', 0x1}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r8, &(0x7f0000006440)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f0000000c40)={0x10, 0x1d, 0x20, 0x70bd28, 0x25dfdbfd}, 0x10}, {&(0x7f0000000f80)={0x20c, 0x3d, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x1f, 0x46, 0x0, 0x1, [@generic="6b23bda57b0fcd6882aea56d992b0de112a87c9689a0ce8f3a928a"]}, @generic="931dd380ae9b76725532f39b25791247f8e1faaa5606177d1141efdf8a23daecc73d0706f82254c664a01e4c4986b42b265e8e88f8f88e8099514ce917072d6e80996cbddc81dd1014a75c1cd2e0c084d7806b82c11b8a625557f25357333f879c7f3ea978d0c62492b2b2a3437425bf3933cf6d0456ae40263ff847b9956f9f56cd1e35dd616a0dffde59", @nested={0x14d, 0x46, 0x0, 0x1, [@typed={0x8, 0x8f, 0x0, 0x0, @u32=0x4}, @generic="3fe433e9f5d2f6047805d9eb39d59742ad46c8bd198fea6b4f77d0bf577f925374abd91b16efa9a31621d58f4b1ee788ba33ce3ae89358fcbecdc28e3a8775ee6c905d5275bf5f05ca6bfc68336199389a9644323a81d22c4bd081ec9c4826b7e965a5292167778eefb5edac3e1e0fd628684a30dbac663eb65de357a891a90855f356cbe26225342cce43c8e320a777c2a1f74ab97b7e442c94", @typed={0x8, 0x41, 0x0, 0x0, @ipv4=@multicast2}, @typed={0x8, 0x6b, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @generic="79c7219fa8393ab7671b616b9cea5f59e77de2a2ea4a268fcad39d31284ee1045f7dedc0dea487845188adde6fe70f5537a0635e01c2ec0a205c1f92c2272999ec8388f9a95b4d387581056e112c58f96f686734281b5a", @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@remote}, @generic="2d7a6c2813a21aa5bc78773404596de147d491e1868776a08d604bfb6aea387b585ce5b3f7ab336df3922c65"]}]}, 0x20c}, {&(0x7f0000000e00)={0x30, 0x12, 0x800, 0x70bd27, 0x25dfdbfc, "", [@typed={0x8, 0x5b, 0x0, 0x0, @pid}, @typed={0xf, 0x8c, 0x0, 0x0, @str='syzkaller1\x00'}, @typed={0x8, 0x7, 0x0, 0x0, @u32}]}, 0x30}, {&(0x7f0000000e40)={0xc8, 0x42, 0x10, 0x70bd26, 0x25dfdbff, "", [@generic="208cd2ae6be9be", @generic="c1d6c27da633daf115873b83c8913d284239d441678e667c20444d1a1f77f48ea7cbf783d84e79a9ebc262452149fe521b40868bf3938c61c8be3cdbd7429e623c99db5ae26d9cf24ee4ef4777ff0410e8b899b18e829f387d7926641f189d2b9697e099ffb7f20f691064b7d87d04cd2e230e8df8c77a2f1e4f4fabd49cfe414b3027dd850d9a2be9547ba5f2ed09811ea9ed9b201782165a792b57afca3e3d575d0f5b4b17a8", @typed={0x8, 0x94, 0x0, 0x0, @u32=0x1}]}, 0xc8}], 0x4, 0x0, 0x0, 0x8801}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000900)={'team0\x00', 0x0}) sendmsg$nl_route(r8, &(0x7f0000000c00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000bc0)={&(0x7f00000011c0)=@dellink={0x25c, 0x11, 0x0, 0x70bd28, 0x25dfdbff, {0x0, 0x0, 0x0, r9, 0x1000}, [@IFLA_PROTO_DOWN={0x5}, @IFLA_IFNAME={0x14, 0x3, 'macvlan1\x00'}, @IFLA_MAP={0x24, 0xe, {0x9, 0xd2, 0x2e4d, 0x200, 0x3e, 0xff}}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x5}, @IFLA_IFALIAS={0x14, 0x14, 'syzkaller1\x00'}, @IFLA_MTU={0x8, 0x4, 0x101}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_VFINFO_LIST={0x1cc, 0x16, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x8fe, 0xffff}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x5, 0x1}}]}, {0x84, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN_LIST={0x54, 0xc, 0x0, 0x1, [{0x14, 0x1, {0xb5d3, 0xadc, 0x100, 0xd1c53560eb87a9fa}}, {0x14, 0x1, {0x4, 0xb6, 0x81, 0x8100}}, {0x14, 0x1, {0x0, 0x6e4, 0x1, 0x88a8}}, {0x14, 0x1, {0x14, 0xaed, 0x0, 0x8100}}]}, @IFLA_VF_TX_RATE={0xc, 0x3, {0x1000, 0x200}}, @IFLA_VF_TRUST={0xc, 0x9, {0x7, 0x800}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x8000, 0x1}}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x7f, 0x7fff}}, @IFLA_VF_TRUST={0xc, 0x9, {0x7ff, 0x8}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_RATE={0x10, 0x6, {0x9, 0x5, 0x5}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x9}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x80000000, 0x3}}]}, {0xa4, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0xfff, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1d}}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x3f, 0x43}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x65c, 0x1}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x2, 0x80000001}}, @IFLA_VF_VLAN_LIST={0x40, 0xc, 0x0, 0x1, [{0x14, 0x1, {0xcae8, 0x919, 0x9, 0x8100}}, {0x14, 0x1, {0x200, 0xb47, 0xaaa, 0x8100}}, {0x14, 0x1, {0x5, 0x53b, 0xfffffff7, 0x88a8}}]}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x3f, 0x7fff}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x930, 0x5}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x6, 0x8}}]}]}]}, 0x25c}, 0x1, 0x0, 0x0, 0x11}, 0x4c089) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r7, 0x40189429, &(0x7f0000000480)={0x1, 0x4, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r10, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x45, 0xfc, 0x6}, {0x6}]}, 0x10) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x2, 0x3, &(0x7f0000000000)=@framed={{0x18, 0xf}}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) socket$inet6_sctp(0xa, 0x801, 0x84) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) r11 = socket$igmp(0x2, 0x3, 0x2) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@private1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) ioctl$TUNSETOWNER(r3, 0x400454cc, r12) setsockopt$MRT_INIT(r11, 0x0, 0xc8, &(0x7f0000000040), 0x4) setsockopt$MRT_ADD_VIF(r11, 0x0, 0xca, &(0x7f0000000100)={0x0, 0x1, 0x0, 0x0, @vifc_lcl_addr=@dev={0xac, 0x14, 0x14, 0xb}, @multicast1}, 0x10) 07:23:27 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, 0x0) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$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") (fail_nth: 74) [ 695.071093][T23147] (unnamed net_device) (uninitialized): option use_carrier: invalid value (6) 07:23:27 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0xfeffffff}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) [ 695.112941][T23147] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 695.141660][T23151] FAULT_INJECTION: forcing a failure. [ 695.141660][T23151] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 695.154999][T23151] CPU: 1 PID: 23151 Comm: syz-executor.3 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 695.165441][T23151] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 695.175553][T23151] Call Trace: [ 695.178857][T23151] [ 695.181803][T23151] dump_stack_lvl+0xda/0x130 [ 695.186516][T23151] dump_stack+0x15/0x20 [ 695.190698][T23151] should_fail_ex+0x21f/0x230 [ 695.195475][T23151] __alloc_pages+0x108/0x340 [ 695.200125][T23151] vma_alloc_folio+0x6a3/0x8c0 [ 695.205054][T23151] ? __vm_enough_memory+0xdf/0x2a0 [ 695.210378][T23151] shmem_get_folio_gfp+0x801/0x1200 [ 695.215614][T23151] shmem_write_begin+0xa6/0x1d0 [ 695.220499][T23151] generic_perform_write+0x1c3/0x3d0 [ 695.225826][T23151] ? shmem_write_begin+0x1d0/0x1d0 [ 695.230962][T23151] __generic_file_write_iter+0xe6/0x290 [ 695.236595][T23151] generic_file_write_iter+0x7d/0x1c0 [ 695.242217][T23151] vfs_write+0x47b/0x780 [ 695.246497][T23151] ksys_write+0xeb/0x1a0 [ 695.249200][T23153] bond1040: entered promiscuous mode [ 695.250753][T23151] __x64_sys_write+0x42/0x50 07:23:27 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x34000, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:23:27 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) r2 = open(&(0x7f0000000040)='./file0\x00', 0x161842, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'sit0\x00'}) r4 = syz_io_uring_setup(0x73d7, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000100)=0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r6, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x10001) r8 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x8010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(r5, 0x0, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x8) syz_io_uring_submit(0x0, r8, &(0x7f00000008c0)=@IORING_OP_OPENAT2={0x1c, 0x40, 0x0, 0xffffffffffffffff, &(0x7f0000000840)={0x4ae0e0, 0x2, 0x5}, &(0x7f0000000880)='./file0\x00', 0x18, 0x0, 0x12345}, 0xff) syz_io_uring_submit(r5, 0x0, &(0x7f0000002b40)=@IORING_OP_RECVMSG={0xa, 0x2b, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000002b00)={0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/28, 0x1c}, {&(0x7f0000001540)=""/4096, 0x1000}, {&(0x7f0000002540)=""/131, 0x83}, {&(0x7f0000002600)=""/102, 0x66}, {&(0x7f0000002840)=""/203, 0xcb}], 0x6}, 0x0, 0x10040, 0x1, {0x1}}, 0x0) ftruncate(r2, 0x200002) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x200000e, 0x12, r3, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) r10 = creat(&(0x7f0000000180)='./file0\x00', 0x0) fallocate(r10, 0x0, 0x0, 0x2000402) fallocate(r9, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r9, 0xc028660f, &(0x7f0000001380)={0xc, r10, 0x21}) [ 695.256047][T23153] bond1040: entered allmulticast mode [ 695.260719][T23151] do_syscall_64+0x41/0xc0 [ 695.260752][T23151] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 695.270932][T23153] 8021q: adding VLAN 0 to HW filter on device bond1040 [ 695.276473][T23151] RIP: 0033:0x7f1567f53ecf [ 695.276495][T23151] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 695.276519][T23151] RSP: 002b:00007f1567314f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 695.276539][T23151] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007f1567f53ecf [ 695.276569][T23151] RDX: 0000000000100000 RSI: 00007f155eef5000 RDI: 0000000000000005 [ 695.331965][T23151] RBP: 00007f155eef5000 R08: 0000000000000000 R09: 0000000000000534 [ 695.340133][T23151] R10: 0000000000100000 R11: 0000000000000293 R12: 0000000000000000 [ 695.348119][T23151] R13: 00007f1567314fdc R14: 00007f1567314fe0 R15: 0000000020000fc2 [ 695.356116][T23151] 07:23:27 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000019000000", 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000380)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000008c0)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000001cc0)={{}, r2, 0x16, @inherit={0x88, &(0x7f0000001580)=ANY=[@ANYRES16=r3]}, @devid}) r4 = syz_open_dev$MSR(&(0x7f0000000140), 0x100000000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r4, 0x84009422, &(0x7f0000000ec0)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(r6, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000001840)=ANY=[@ANYRES32=r5, @ANYRES32=r3, @ANYRESOCT, @ANYRES32=r1, @ANYRES32, @ANYRES64, @ANYRESHEX], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x40025) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f0000001500)={r5, "2ce8b7e675c30c143ac940d229ad3592"}) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$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") r7 = socket$inet_udplite(0x2, 0x2, 0x88) read(r7, &(0x7f00000000c0)=""/43, 0x2b) 07:23:27 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0xff7f0000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) 07:23:27 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, 0x0) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$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") (fail_nth: 75) 07:23:27 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000002c0)={&(0x7f0000000c80)=ANY=[@ANYBLOB="0026bd7000ffdbdf25070000000c00068008000b00060000000c0008002302b41174de3f460a6d000000000000080003000380000008000300bd2c00ff07000400f8ffffff080003001dd30000080004006604000000000000000000"], 0x5c}, 0x1, 0x0, 0x0, 0x1884}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6, 0x6}]}}}]}, 0x3c}}, 0x0) r3 = openat(r2, &(0x7f00000000c0)='./file0\x00', 0x0, 0x31) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00./file0\x00']) connect$unix(r3, &(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000001c0), 0x200080, 0x0) ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f0000000200)={0x55, 0xb5f3, 0x2, 0x1, 0x6}) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000600)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000800)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x40}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) io_setup(0x6, &(0x7f00000003c0)=0x0) r7 = socket$phonet_pipe(0x23, 0x5, 0x2) io_submit(r6, 0x2, &(0x7f00000005c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, r7, &(0x7f00000001c0)='\"', 0x1}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r8, &(0x7f0000006440)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f0000000c40)={0x10, 0x1d, 0x20, 0x70bd28, 0x25dfdbfd}, 0x10}, {&(0x7f0000000f80)={0x20c, 0x3d, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x1f, 0x46, 0x0, 0x1, [@generic="6b23bda57b0fcd6882aea56d992b0de112a87c9689a0ce8f3a928a"]}, @generic="931dd380ae9b76725532f39b25791247f8e1faaa5606177d1141efdf8a23daecc73d0706f82254c664a01e4c4986b42b265e8e88f8f88e8099514ce917072d6e80996cbddc81dd1014a75c1cd2e0c084d7806b82c11b8a625557f25357333f879c7f3ea978d0c62492b2b2a3437425bf3933cf6d0456ae40263ff847b9956f9f56cd1e35dd616a0dffde59", @nested={0x14d, 0x46, 0x0, 0x1, [@typed={0x8, 0x8f, 0x0, 0x0, @u32=0x4}, @generic="3fe433e9f5d2f6047805d9eb39d59742ad46c8bd198fea6b4f77d0bf577f925374abd91b16efa9a31621d58f4b1ee788ba33ce3ae89358fcbecdc28e3a8775ee6c905d5275bf5f05ca6bfc68336199389a9644323a81d22c4bd081ec9c4826b7e965a5292167778eefb5edac3e1e0fd628684a30dbac663eb65de357a891a90855f356cbe26225342cce43c8e320a777c2a1f74ab97b7e442c94", @typed={0x8, 0x41, 0x0, 0x0, @ipv4=@multicast2}, @typed={0x8, 0x6b, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @generic="79c7219fa8393ab7671b616b9cea5f59e77de2a2ea4a268fcad39d31284ee1045f7dedc0dea487845188adde6fe70f5537a0635e01c2ec0a205c1f92c2272999ec8388f9a95b4d387581056e112c58f96f686734281b5a", @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@remote}, @generic="2d7a6c2813a21aa5bc78773404596de147d491e1868776a08d604bfb6aea387b585ce5b3f7ab336df3922c65"]}]}, 0x20c}, {&(0x7f0000000e00)={0x30, 0x12, 0x800, 0x70bd27, 0x25dfdbfc, "", [@typed={0x8, 0x5b, 0x0, 0x0, @pid}, @typed={0xf, 0x8c, 0x0, 0x0, @str='syzkaller1\x00'}, @typed={0x8, 0x7, 0x0, 0x0, @u32}]}, 0x30}, {&(0x7f0000000e40)={0xc8, 0x42, 0x10, 0x70bd26, 0x25dfdbff, "", [@generic="208cd2ae6be9be", @generic="c1d6c27da633daf115873b83c8913d284239d441678e667c20444d1a1f77f48ea7cbf783d84e79a9ebc262452149fe521b40868bf3938c61c8be3cdbd7429e623c99db5ae26d9cf24ee4ef4777ff0410e8b899b18e829f387d7926641f189d2b9697e099ffb7f20f691064b7d87d04cd2e230e8df8c77a2f1e4f4fabd49cfe414b3027dd850d9a2be9547ba5f2ed09811ea9ed9b201782165a792b57afca3e3d575d0f5b4b17a8", @typed={0x8, 0x94, 0x0, 0x0, @u32=0x1}]}, 0xc8}], 0x4, 0x0, 0x0, 0x8801}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000900)={'team0\x00', 0x0}) sendmsg$nl_route(r8, &(0x7f0000000c00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000bc0)={&(0x7f00000011c0)=@dellink={0x25c, 0x11, 0x400, 0x0, 0x25dfdbff, {0x0, 0x0, 0x0, r9, 0x1000}, [@IFLA_PROTO_DOWN={0x5}, @IFLA_IFNAME={0x14, 0x3, 'macvlan1\x00'}, @IFLA_MAP={0x24, 0xe, {0x9, 0xd2, 0x2e4d, 0x200, 0x3e, 0xff}}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x5}, @IFLA_IFALIAS={0x14, 0x14, 'syzkaller1\x00'}, @IFLA_MTU={0x8, 0x4, 0x101}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_VFINFO_LIST={0x1cc, 0x16, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x8fe, 0xffff}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x5, 0x1}}]}, {0x84, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN_LIST={0x54, 0xc, 0x0, 0x1, [{0x14, 0x1, {0xb5d3, 0xadc, 0x100, 0xd1c53560eb87a9fa}}, {0x14, 0x1, {0x4, 0xb6, 0x81, 0x8100}}, {0x14, 0x1, {0x0, 0x6e4, 0x1, 0x88a8}}, {0x14, 0x1, {0x14, 0xaed, 0x0, 0x8100}}]}, @IFLA_VF_TX_RATE={0xc, 0x3, {0x1000, 0x200}}, @IFLA_VF_TRUST={0xc, 0x9, {0x7, 0x800}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x8000, 0x1}}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x7f, 0x7fff}}, @IFLA_VF_TRUST={0xc, 0x9, {0x7ff, 0x8}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_RATE={0x10, 0x6, {0x9, 0x5, 0x5}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x9}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x80000000, 0x3}}]}, {0xa4, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0xfff, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1d}}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x3f, 0x43}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x65c, 0x1}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x2, 0x80000001}}, @IFLA_VF_VLAN_LIST={0x40, 0xc, 0x0, 0x1, [{0x14, 0x1, {0xcae8, 0x919, 0x9, 0x8100}}, {0x14, 0x1, {0x200, 0xb47, 0xaaa, 0x8100}}, {0x14, 0x1, {0x5, 0x53b, 0xfffffff7, 0x88a8}}]}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x3f, 0x7fff}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x930, 0x5}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x6, 0x8}}]}]}]}, 0x25c}, 0x1, 0x0, 0x0, 0x11}, 0x4c089) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r7, 0x40189429, &(0x7f0000000480)={0x1, 0x4, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r10, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x45, 0xfc, 0x6}, {0x6}]}, 0x10) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x2, 0x3, &(0x7f0000000000)=@framed={{0x18, 0xf}}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) socket$inet6_sctp(0xa, 0x801, 0x84) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) r11 = socket$igmp(0x2, 0x3, 0x2) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@private1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) ioctl$TUNSETOWNER(r3, 0x400454cc, r12) setsockopt$MRT_INIT(r11, 0x0, 0xc8, &(0x7f0000000040), 0x4) setsockopt$MRT_ADD_VIF(r11, 0x0, 0xca, &(0x7f0000000100)={0x0, 0x1, 0x0, 0x0, @vifc_lcl_addr=@dev={0xac, 0x14, 0x14, 0xb}, @multicast1}, 0x10) 07:23:27 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) r2 = open(&(0x7f0000000040)='./file0\x00', 0x161842, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'sit0\x00'}) r4 = syz_io_uring_setup(0x73d7, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000100)=0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r6, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x10001) r8 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x8010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(r5, 0x0, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x8) syz_io_uring_submit(0x0, r8, &(0x7f00000008c0)=@IORING_OP_OPENAT2={0x1c, 0x40, 0x0, 0xffffffffffffffff, &(0x7f0000000840)={0x4ae0e0, 0x2, 0x5}, &(0x7f0000000880)='./file0\x00', 0x18, 0x0, 0x12345}, 0xff) syz_io_uring_submit(r5, 0x0, &(0x7f0000002b40)=@IORING_OP_RECVMSG={0xa, 0x2b, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000002b00)={0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/28, 0x1c}, {&(0x7f0000001540)=""/4096, 0x1000}, {&(0x7f0000002540)=""/131, 0x83}, {&(0x7f0000002600)=""/102, 0x66}, {&(0x7f0000002840)=""/203, 0xcb}], 0x6}, 0x0, 0x10040, 0x1, {0x1}}, 0x0) ftruncate(r2, 0x200002) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x200000e, 0x12, r3, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) r10 = creat(&(0x7f0000000180)='./file0\x00', 0x0) fallocate(r10, 0x0, 0x0, 0x2000402) fallocate(r9, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r9, 0xc028660f, &(0x7f0000001380)={0xc, r10, 0x22}) 07:23:28 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0xffff0300}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) [ 695.509315][T23165] (unnamed net_device) (uninitialized): option use_carrier: invalid value (6) [ 695.542133][T23162] FAULT_INJECTION: forcing a failure. [ 695.542133][T23162] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 695.547371][T23165] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 695.555447][T23162] CPU: 0 PID: 23162 Comm: syz-executor.3 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 695.575008][T23162] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 695.585097][T23162] Call Trace: [ 695.588397][T23162] [ 695.591384][T23162] dump_stack_lvl+0xda/0x130 [ 695.596047][T23162] dump_stack+0x15/0x20 [ 695.600229][T23162] should_fail_ex+0x21f/0x230 [ 695.605027][T23162] __alloc_pages+0x108/0x340 [ 695.609682][T23162] vma_alloc_folio+0x6a3/0x8c0 [ 695.614556][T23162] ? __vm_enough_memory+0xdf/0x2a0 [ 695.619689][T23162] shmem_get_folio_gfp+0x801/0x1200 [ 695.624985][T23162] shmem_write_begin+0xa6/0x1d0 [ 695.629872][T23162] generic_perform_write+0x1c3/0x3d0 [ 695.635276][T23162] ? shmem_write_begin+0x1d0/0x1d0 [ 695.640415][T23162] __generic_file_write_iter+0xe6/0x290 [ 695.645997][T23162] generic_file_write_iter+0x7d/0x1c0 [ 695.651485][T23162] vfs_write+0x47b/0x780 [ 695.655763][T23162] ksys_write+0xeb/0x1a0 [ 695.660059][T23162] __x64_sys_write+0x42/0x50 [ 695.664777][T23162] do_syscall_64+0x41/0xc0 [ 695.669223][T23162] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 695.675156][T23162] RIP: 0033:0x7f1567f53ecf [ 695.679609][T23162] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 695.699258][T23162] RSP: 002b:00007f1567314f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 07:23:28 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, 0x0) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$eJzs1T9rE3EYB/AnaazRqbM4/MDFqVQ3JyOSQvFAUTLoZKBxyYmQWy6Z8hJ8Ab4wB1+EZMp2Ei5VWxSDNLnSfj7LPdz3ud+/g7v39z+OTz8VH75+/hLdXivavbjTXrbiINpxZh4AwHWyrKr4XtWaXgsAsBv+/wBw87x5++7Fsyzrv06pG7GYl4NyUF/r/Pgk6x+llf3fnlqU5WDvZ/4o1c7nt+LuOn/8x3w/Hj6o81X2/GV2Ib8dp1vfPQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA3GyHKXUiIqWUDn7dXZTlYK/OD9OZC3ldHZ9k/aN1w/m8E/c6O9sGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAcAmK6Ww8zPPR5JoVEd9ix5N210d6uSMv/tXTW097VU5+m8XTTZtfLatq05GfRMTWF9+KmK/eUvNnuGnR3DcJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABoVjGdjYd5PpoUTa8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALgqiulsPMzz0eS/i2jVI/29p+k9AgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAM34EQAA///P7Cnj") (fail_nth: 76) 07:23:28 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0xffffa888}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) [ 695.707766][T23162] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007f1567f53ecf [ 695.715765][T23162] RDX: 0000000000100000 RSI: 00007f155eef5000 RDI: 0000000000000005 [ 695.723761][T23162] RBP: 00007f155eef5000 R08: 0000000000000000 R09: 0000000000000534 [ 695.731825][T23162] R10: 0000000000100000 R11: 0000000000000293 R12: 0000000000000000 [ 695.739837][T23162] R13: 00007f1567314fdc R14: 00007f1567314fe0 R15: 0000000020000fc2 [ 695.747832][T23162] [ 695.813085][T23186] FAULT_INJECTION: forcing a failure. [ 695.813085][T23186] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 695.815885][T23172] loop0: detected capacity change from 0 to 2048 [ 695.826444][T23186] CPU: 1 PID: 23186 Comm: syz-executor.3 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 695.834445][T23172] FAT-fs (loop0): Unrecognized mount option "ÿÿÿÿÿÿÿÿ184467440737095516150xffffffffffffffff" or missing value [ 695.843112][T23186] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 695.843129][T23186] Call Trace: [ 695.843137][T23186] [ 695.843222][T23186] dump_stack_lvl+0xda/0x130 [ 695.843259][T23186] dump_stack+0x15/0x20 [ 695.843347][T23186] should_fail_ex+0x21f/0x230 [ 695.843387][T23186] __alloc_pages+0x108/0x340 [ 695.843513][T23186] vma_alloc_folio+0x6a3/0x8c0 [ 695.843538][T23186] ? __vm_enough_memory+0xdf/0x2a0 [ 695.843570][T23186] shmem_get_folio_gfp+0x801/0x1200 [ 695.843670][T23186] shmem_write_begin+0xa6/0x1d0 [ 695.843695][T23186] generic_perform_write+0x1c3/0x3d0 [ 695.843746][T23186] ? shmem_write_begin+0x1d0/0x1d0 [ 695.920242][T23186] __generic_file_write_iter+0xe6/0x290 [ 695.925851][T23186] generic_file_write_iter+0x7d/0x1c0 [ 695.931262][T23186] vfs_write+0x47b/0x780 [ 695.935581][T23186] ksys_write+0xeb/0x1a0 [ 695.939851][T23186] __x64_sys_write+0x42/0x50 [ 695.944504][T23186] do_syscall_64+0x41/0xc0 [ 695.948973][T23186] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 695.954908][T23186] RIP: 0033:0x7f1567f53ecf [ 695.959341][T23186] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 695.979074][T23186] RSP: 002b:00007f1567314f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 695.987605][T23186] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007f1567f53ecf [ 695.995592][T23186] RDX: 0000000000100000 RSI: 00007f155eef5000 RDI: 0000000000000005 [ 696.003615][T23186] RBP: 00007f155eef5000 R08: 0000000000000000 R09: 0000000000000534 07:23:28 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0xffffe000}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) 07:23:28 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000002c0)={&(0x7f0000000c80)=ANY=[@ANYBLOB="0026bd7000ffdbdf25070000000c00068008000b00060000000c0008002302b41174de3f460a6d000000000000080003000380000008000300bd2c00ff07000400f8ffffff080003001dd30000080004006604000000000000000000"], 0x5c}, 0x1, 0x0, 0x0, 0x1884}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6, 0x6}]}}}]}, 0x3c}}, 0x0) r3 = openat(r2, &(0x7f00000000c0)='./file0\x00', 0x0, 0x31) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00./file0\x00']) connect$unix(r3, &(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000001c0), 0x200080, 0x0) ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f0000000200)={0x55, 0xb5f3, 0x2, 0x1, 0x6}) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000600)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000800)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x40}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) io_setup(0x6, &(0x7f00000003c0)=0x0) r7 = socket$phonet_pipe(0x23, 0x5, 0x2) io_submit(r6, 0x2, &(0x7f00000005c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, r7, &(0x7f00000001c0)='\"', 0x1}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r8, &(0x7f0000006440)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f0000000c40)={0x10, 0x1d, 0x20, 0x70bd28, 0x25dfdbfd}, 0x10}, {&(0x7f0000000f80)={0x20c, 0x3d, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x1f, 0x46, 0x0, 0x1, [@generic="6b23bda57b0fcd6882aea56d992b0de112a87c9689a0ce8f3a928a"]}, @generic="931dd380ae9b76725532f39b25791247f8e1faaa5606177d1141efdf8a23daecc73d0706f82254c664a01e4c4986b42b265e8e88f8f88e8099514ce917072d6e80996cbddc81dd1014a75c1cd2e0c084d7806b82c11b8a625557f25357333f879c7f3ea978d0c62492b2b2a3437425bf3933cf6d0456ae40263ff847b9956f9f56cd1e35dd616a0dffde59", @nested={0x14d, 0x46, 0x0, 0x1, [@typed={0x8, 0x8f, 0x0, 0x0, @u32=0x4}, @generic="3fe433e9f5d2f6047805d9eb39d59742ad46c8bd198fea6b4f77d0bf577f925374abd91b16efa9a31621d58f4b1ee788ba33ce3ae89358fcbecdc28e3a8775ee6c905d5275bf5f05ca6bfc68336199389a9644323a81d22c4bd081ec9c4826b7e965a5292167778eefb5edac3e1e0fd628684a30dbac663eb65de357a891a90855f356cbe26225342cce43c8e320a777c2a1f74ab97b7e442c94", @typed={0x8, 0x41, 0x0, 0x0, @ipv4=@multicast2}, @typed={0x8, 0x6b, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @generic="79c7219fa8393ab7671b616b9cea5f59e77de2a2ea4a268fcad39d31284ee1045f7dedc0dea487845188adde6fe70f5537a0635e01c2ec0a205c1f92c2272999ec8388f9a95b4d387581056e112c58f96f686734281b5a", @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@remote}, @generic="2d7a6c2813a21aa5bc78773404596de147d491e1868776a08d604bfb6aea387b585ce5b3f7ab336df3922c65"]}]}, 0x20c}, {&(0x7f0000000e00)={0x30, 0x12, 0x800, 0x70bd27, 0x25dfdbfc, "", [@typed={0x8, 0x5b, 0x0, 0x0, @pid}, @typed={0xf, 0x8c, 0x0, 0x0, @str='syzkaller1\x00'}, @typed={0x8, 0x7, 0x0, 0x0, @u32}]}, 0x30}, {&(0x7f0000000e40)={0xc8, 0x42, 0x10, 0x70bd26, 0x25dfdbff, "", [@generic="208cd2ae6be9be", @generic="c1d6c27da633daf115873b83c8913d284239d441678e667c20444d1a1f77f48ea7cbf783d84e79a9ebc262452149fe521b40868bf3938c61c8be3cdbd7429e623c99db5ae26d9cf24ee4ef4777ff0410e8b899b18e829f387d7926641f189d2b9697e099ffb7f20f691064b7d87d04cd2e230e8df8c77a2f1e4f4fabd49cfe414b3027dd850d9a2be9547ba5f2ed09811ea9ed9b201782165a792b57afca3e3d575d0f5b4b17a8", @typed={0x8, 0x94, 0x0, 0x0, @u32=0x1}]}, 0xc8}], 0x4, 0x0, 0x0, 0x8801}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000900)={'team0\x00', 0x0}) sendmsg$nl_route(r8, &(0x7f0000000c00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000bc0)={&(0x7f00000011c0)=@dellink={0x25c, 0x11, 0x400, 0x0, 0x25dfdbff, {0x0, 0x0, 0x0, r9, 0x1000}, [@IFLA_PROTO_DOWN={0x5}, @IFLA_IFNAME={0x14, 0x3, 'macvlan1\x00'}, @IFLA_MAP={0x24, 0xe, {0x9, 0xd2, 0x2e4d, 0x200, 0x3e, 0xff}}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x5}, @IFLA_IFALIAS={0x14, 0x14, 'syzkaller1\x00'}, @IFLA_MTU={0x8, 0x4, 0x101}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_VFINFO_LIST={0x1cc, 0x16, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x8fe, 0xffff}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x5, 0x1}}]}, {0x84, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN_LIST={0x54, 0xc, 0x0, 0x1, [{0x14, 0x1, {0xb5d3, 0xadc, 0x100, 0xd1c53560eb87a9fa}}, {0x14, 0x1, {0x4, 0xb6, 0x81, 0x8100}}, {0x14, 0x1, {0x0, 0x6e4, 0x1, 0x88a8}}, {0x14, 0x1, {0x14, 0xaed, 0x0, 0x8100}}]}, @IFLA_VF_TX_RATE={0xc, 0x3, {0x1000, 0x200}}, @IFLA_VF_TRUST={0xc, 0x9, {0x7, 0x800}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x8000, 0x1}}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x7f, 0x7fff}}, @IFLA_VF_TRUST={0xc, 0x9, {0x7ff, 0x8}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_RATE={0x10, 0x6, {0x9, 0x5, 0x5}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x9}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x80000000, 0x3}}]}, {0xa4, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0xfff, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1d}}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x3f, 0x43}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x65c, 0x1}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x2, 0x80000001}}, @IFLA_VF_VLAN_LIST={0x40, 0xc, 0x0, 0x1, [{0x14, 0x1, {0xcae8, 0x919, 0x9, 0x8100}}, {0x14, 0x1, {0x200, 0xb47, 0xaaa, 0x8100}}, {0x14, 0x1, {0x5, 0x53b, 0xfffffff7, 0x88a8}}]}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x3f, 0x7fff}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x930, 0x5}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x6, 0x8}}]}]}]}, 0x25c}, 0x1, 0x0, 0x0, 0x11}, 0x4c089) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r7, 0x40189429, &(0x7f0000000480)={0x1, 0x4, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r10, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x45, 0xfc, 0x6}, {0x6}]}, 0x10) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x2, 0x3, &(0x7f0000000000)=@framed={{0x18, 0xf}}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) socket$inet6_sctp(0xa, 0x801, 0x84) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) r11 = socket$igmp(0x2, 0x3, 0x2) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@private1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) ioctl$TUNSETOWNER(r3, 0x400454cc, r12) setsockopt$MRT_INIT(r11, 0x0, 0xc8, &(0x7f0000000040), 0x4) setsockopt$MRT_ADD_VIF(r11, 0x0, 0xca, &(0x7f0000000100)={0x0, 0x1, 0x0, 0x0, @vifc_lcl_addr=@dev={0xac, 0x14, 0x14, 0xb}, @multicast1}, 0x10) [ 696.011681][T23186] R10: 0000000000100000 R11: 0000000000000293 R12: 0000000000000000 [ 696.019668][T23186] R13: 00007f1567314fdc R14: 00007f1567314fe0 R15: 0000000020000fc2 [ 696.027690][T23186] [ 696.073505][T23191] (unnamed net_device) (uninitialized): option use_carrier: invalid value (6) [ 696.107200][T23191] selinux_netlink_send: 12 callbacks suppressed 07:23:28 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x2, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:23:28 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, 0x0) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$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") (fail_nth: 77) [ 696.107274][T23191] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=23191 comm=syz-executor.5 [ 696.129242][T23191] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=61 sclass=netlink_route_socket pid=23191 comm=syz-executor.5 [ 696.144103][T23191] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 696.199816][T23194] FAULT_INJECTION: forcing a failure. [ 696.199816][T23194] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 696.212927][T23194] CPU: 1 PID: 23194 Comm: syz-executor.3 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 696.223378][T23194] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 696.233507][T23194] Call Trace: [ 696.236782][T23194] [ 696.239778][T23194] dump_stack_lvl+0xda/0x130 [ 696.244417][T23194] dump_stack+0x15/0x20 [ 696.248634][T23194] should_fail_ex+0x21f/0x230 [ 696.253359][T23194] should_fail+0xb/0x10 [ 696.257527][T23194] should_fail_usercopy+0x1a/0x20 [ 696.262568][T23194] copy_page_from_iter_atomic+0x22d/0xcf0 [ 696.268458][T23194] ? folio_test_hugetlb+0x3a/0x70 [ 696.273539][T23194] ? shmem_write_begin+0x12a/0x1d0 [ 696.278701][T23194] generic_perform_write+0x203/0x3d0 [ 696.284009][T23194] ? shmem_write_begin+0x1d0/0x1d0 [ 696.289232][T23194] __generic_file_write_iter+0xe6/0x290 [ 696.294844][T23194] generic_file_write_iter+0x7d/0x1c0 [ 696.300248][T23194] vfs_write+0x47b/0x780 [ 696.304506][T23194] ksys_write+0xeb/0x1a0 [ 696.308751][T23194] __x64_sys_write+0x42/0x50 [ 696.313419][T23194] do_syscall_64+0x41/0xc0 [ 696.317861][T23194] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 696.323812][T23194] RIP: 0033:0x7f1567f53ecf [ 696.328293][T23194] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 07:23:28 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000019000000", 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000380)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="eb", 0x1a000, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000008c0)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000001cc0)={{}, r2, 0x16, @inherit={0x88, &(0x7f0000001580)=ANY=[@ANYRES16=r3]}, @devid}) r4 = syz_open_dev$MSR(&(0x7f0000000140), 0x100000000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r4, 0x84009422, &(0x7f0000000ec0)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(r6, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000001840)=ANY=[@ANYRES32=r5, @ANYRES32=r3, @ANYRESOCT, @ANYRES32=r1, @ANYRES32, @ANYRES64, @ANYRESHEX], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x40025) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f0000001500)={r5, "2ce8b7e675c30c143ac940d229ad3592"}) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$eJzs1T9rE3EYB/AnaazRqbM4/MDFqVQ3JyOSQvFAUTLoZKBxyYmQWy6Z8hJ8Ab4wB1+EZMp2Ei5VWxSDNLnSfj7LPdz3ud+/g7v39z+OTz8VH75+/hLdXivavbjTXrbiINpxZh4AwHWyrKr4XtWaXgsAsBv+/wBw87x5++7Fsyzrv06pG7GYl4NyUF/r/Pgk6x+llf3fnlqU5WDvZ/4o1c7nt+LuOn/8x3w/Hj6o81X2/GV2Ib8dp1vfPQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA3GyHKXUiIqWUDn7dXZTlYK/OD9OZC3ldHZ9k/aN1w/m8E/c6O9sGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAcAmK6Ww8zPPR5JoVEd9ix5N210d6uSMv/tXTW097VU5+m8XTTZtfLatq05GfRMTWF9+KmK/eUvNnuGnR3DcJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABoVjGdjYd5PpoUTa8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALgqiulsPMzz0eS/i2jVI/29p+k9AgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAM34EQAA///P7Cnj") r7 = socket$inet_udplite(0x2, 0x2, 0x88) read(r7, &(0x7f00000000c0)=""/43, 0x2b) 07:23:28 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0xffffff7f}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) 07:23:28 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) r2 = open(&(0x7f0000000040)='./file0\x00', 0x161842, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'sit0\x00'}) r4 = syz_io_uring_setup(0x73d7, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000100)=0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r6, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x10001) r8 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x8010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(r5, 0x0, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x8) syz_io_uring_submit(0x0, r8, &(0x7f00000008c0)=@IORING_OP_OPENAT2={0x1c, 0x40, 0x0, 0xffffffffffffffff, &(0x7f0000000840)={0x4ae0e0, 0x2, 0x5}, &(0x7f0000000880)='./file0\x00', 0x18, 0x0, 0x12345}, 0xff) syz_io_uring_submit(r5, 0x0, &(0x7f0000002b40)=@IORING_OP_RECVMSG={0xa, 0x2b, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000002b00)={0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/28, 0x1c}, {&(0x7f0000001540)=""/4096, 0x1000}, {&(0x7f0000002540)=""/131, 0x83}, {&(0x7f0000002600)=""/102, 0x66}, {&(0x7f0000002840)=""/203, 0xcb}], 0x6}, 0x0, 0x10040, 0x1, {0x1}}, 0x0) ftruncate(r2, 0x200002) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x200000e, 0x12, r3, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) r10 = creat(&(0x7f0000000180)='./file0\x00', 0x0) fallocate(r10, 0x0, 0x0, 0x2000402) fallocate(r9, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r9, 0xc028660f, &(0x7f0000001380)={0xc, r10, 0x23}) [ 696.347933][T23194] RSP: 002b:00007f1567314f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 696.356353][T23194] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007f1567f53ecf [ 696.364334][T23194] RDX: 0000000000100000 RSI: 00007f155eef5000 RDI: 0000000000000005 [ 696.372368][T23194] RBP: 00007f155eef5000 R08: 0000000000000000 R09: 0000000000000534 [ 696.380357][T23194] R10: 0000000000100000 R11: 0000000000000293 R12: 0000000000000000 [ 696.388427][T23194] R13: 00007f1567314fdc R14: 00007f1567314fe0 R15: 0000000020000fc2 [ 696.396510][T23194] [ 696.404392][T23194] loop3: detected capacity change from 0 to 2048 [ 696.406796][T23199] validate_nla: 25 callbacks suppressed [ 696.406811][T23199] netlink: 'syz-executor.1': attribute type 6 has an invalid length. [ 696.425655][T23194] FAT-fs (loop3): Unrecognized mount option "ÿÿÿÿÿÿÿÿ184467440737095516150xffffffffffffffff" or missing value 07:23:28 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000002c0)={&(0x7f0000000c80)=ANY=[@ANYBLOB="0026bd7000ffdbdf25070000000c00068008000b00060000000c0008002302b41174de3f460a6d000000000000080003000380000008000300bd2c00ff07000400f8ffffff080003001dd30000080004006604000000000000000000"], 0x5c}, 0x1, 0x0, 0x0, 0x1884}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6, 0x6}]}}}]}, 0x3c}}, 0x0) r3 = openat(r2, &(0x7f00000000c0)='./file0\x00', 0x0, 0x31) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00./file0\x00']) connect$unix(r3, &(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000001c0), 0x200080, 0x0) ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f0000000200)={0x55, 0xb5f3, 0x2, 0x1, 0x6}) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000600)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000800)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x40}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) io_setup(0x6, &(0x7f00000003c0)=0x0) r7 = socket$phonet_pipe(0x23, 0x5, 0x2) io_submit(r6, 0x2, &(0x7f00000005c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, r7, &(0x7f00000001c0)='\"', 0x1}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r8, &(0x7f0000006440)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f0000000c40)={0x10, 0x1d, 0x20, 0x70bd28, 0x25dfdbfd}, 0x10}, {&(0x7f0000000f80)={0x20c, 0x3d, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x1f, 0x46, 0x0, 0x1, [@generic="6b23bda57b0fcd6882aea56d992b0de112a87c9689a0ce8f3a928a"]}, @generic="931dd380ae9b76725532f39b25791247f8e1faaa5606177d1141efdf8a23daecc73d0706f82254c664a01e4c4986b42b265e8e88f8f88e8099514ce917072d6e80996cbddc81dd1014a75c1cd2e0c084d7806b82c11b8a625557f25357333f879c7f3ea978d0c62492b2b2a3437425bf3933cf6d0456ae40263ff847b9956f9f56cd1e35dd616a0dffde59", @nested={0x14d, 0x46, 0x0, 0x1, [@typed={0x8, 0x8f, 0x0, 0x0, @u32=0x4}, @generic="3fe433e9f5d2f6047805d9eb39d59742ad46c8bd198fea6b4f77d0bf577f925374abd91b16efa9a31621d58f4b1ee788ba33ce3ae89358fcbecdc28e3a8775ee6c905d5275bf5f05ca6bfc68336199389a9644323a81d22c4bd081ec9c4826b7e965a5292167778eefb5edac3e1e0fd628684a30dbac663eb65de357a891a90855f356cbe26225342cce43c8e320a777c2a1f74ab97b7e442c94", @typed={0x8, 0x41, 0x0, 0x0, @ipv4=@multicast2}, @typed={0x8, 0x6b, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @generic="79c7219fa8393ab7671b616b9cea5f59e77de2a2ea4a268fcad39d31284ee1045f7dedc0dea487845188adde6fe70f5537a0635e01c2ec0a205c1f92c2272999ec8388f9a95b4d387581056e112c58f96f686734281b5a", @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@remote}, @generic="2d7a6c2813a21aa5bc78773404596de147d491e1868776a08d604bfb6aea387b585ce5b3f7ab336df3922c65"]}]}, 0x20c}, {&(0x7f0000000e00)={0x30, 0x12, 0x800, 0x70bd27, 0x25dfdbfc, "", [@typed={0x8, 0x5b, 0x0, 0x0, @pid}, @typed={0xf, 0x8c, 0x0, 0x0, @str='syzkaller1\x00'}, @typed={0x8, 0x7, 0x0, 0x0, @u32}]}, 0x30}, {&(0x7f0000000e40)={0xc8, 0x42, 0x10, 0x70bd26, 0x25dfdbff, "", [@generic="208cd2ae6be9be", @generic="c1d6c27da633daf115873b83c8913d284239d441678e667c20444d1a1f77f48ea7cbf783d84e79a9ebc262452149fe521b40868bf3938c61c8be3cdbd7429e623c99db5ae26d9cf24ee4ef4777ff0410e8b899b18e829f387d7926641f189d2b9697e099ffb7f20f691064b7d87d04cd2e230e8df8c77a2f1e4f4fabd49cfe414b3027dd850d9a2be9547ba5f2ed09811ea9ed9b201782165a792b57afca3e3d575d0f5b4b17a8", @typed={0x8, 0x94, 0x0, 0x0, @u32=0x1}]}, 0xc8}], 0x4, 0x0, 0x0, 0x8801}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000900)={'team0\x00', 0x0}) sendmsg$nl_route(r8, &(0x7f0000000c00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000bc0)={&(0x7f00000011c0)=@dellink={0x25c, 0x11, 0x400, 0x0, 0x25dfdbff, {0x0, 0x0, 0x0, r9, 0x1000}, [@IFLA_PROTO_DOWN={0x5}, @IFLA_IFNAME={0x14, 0x3, 'macvlan1\x00'}, @IFLA_MAP={0x24, 0xe, {0x9, 0xd2, 0x2e4d, 0x200, 0x3e, 0xff}}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x5}, @IFLA_IFALIAS={0x14, 0x14, 'syzkaller1\x00'}, @IFLA_MTU={0x8, 0x4, 0x101}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_VFINFO_LIST={0x1cc, 0x16, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x8fe, 0xffff}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x5, 0x1}}]}, {0x84, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN_LIST={0x54, 0xc, 0x0, 0x1, [{0x14, 0x1, {0xb5d3, 0xadc, 0x100, 0xd1c53560eb87a9fa}}, {0x14, 0x1, {0x4, 0xb6, 0x81, 0x8100}}, {0x14, 0x1, {0x0, 0x6e4, 0x1, 0x88a8}}, {0x14, 0x1, {0x14, 0xaed, 0x0, 0x8100}}]}, @IFLA_VF_TX_RATE={0xc, 0x3, {0x1000, 0x200}}, @IFLA_VF_TRUST={0xc, 0x9, {0x7, 0x800}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x8000, 0x1}}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x7f, 0x7fff}}, @IFLA_VF_TRUST={0xc, 0x9, {0x7ff, 0x8}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_RATE={0x10, 0x6, {0x9, 0x5, 0x5}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x9}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x80000000, 0x3}}]}, {0xa4, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0xfff, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1d}}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x3f, 0x43}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x65c, 0x1}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x2, 0x80000001}}, @IFLA_VF_VLAN_LIST={0x40, 0xc, 0x0, 0x1, [{0x14, 0x1, {0xcae8, 0x919, 0x9, 0x8100}}, {0x14, 0x1, {0x200, 0xb47, 0xaaa, 0x8100}}, {0x14, 0x1, {0x5, 0x53b, 0xfffffff7, 0x88a8}}]}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x3f, 0x7fff}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x930, 0x5}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x6, 0x8}}]}]}]}, 0x25c}, 0x1, 0x0, 0x0, 0x11}, 0x4c089) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r7, 0x40189429, &(0x7f0000000480)={0x1, 0x4, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r10, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x45, 0xfc, 0x6}, {0x6}]}, 0x10) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x2, 0x3, &(0x7f0000000000)=@framed={{0x18, 0xf}}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) socket$inet6_sctp(0xa, 0x801, 0x84) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) r11 = socket$igmp(0x2, 0x3, 0x2) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@private1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) ioctl$TUNSETOWNER(r3, 0x400454cc, r12) setsockopt$MRT_INIT(r11, 0x0, 0xc8, &(0x7f0000000040), 0x4) setsockopt$MRT_ADD_VIF(r11, 0x0, 0xca, &(0x7f0000000100)={0x0, 0x1, 0x0, 0x0, @vifc_lcl_addr=@dev={0xac, 0x14, 0x14, 0xb}, @multicast1}, 0x10) 07:23:28 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0xffffff81}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) [ 696.460171][T23199] bond1044: entered promiscuous mode [ 696.465677][T23199] bond1044: entered allmulticast mode [ 696.471599][T23199] 8021q: adding VLAN 0 to HW filter on device bond1044 07:23:29 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, 0x0) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$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") (fail_nth: 78) [ 696.509701][T23208] netlink: 'syz-executor.5': attribute type 6 has an invalid length. [ 696.540625][T23201] loop0: detected capacity change from 0 to 2048 [ 696.548471][T23201] FAT-fs (loop0): Unrecognized mount option "ÿÿÿÿÿÿÿÿ184467440737095516150xffffffffffffffff" or missing value [ 696.560666][T23208] (unnamed net_device) (uninitialized): option use_carrier: invalid value (6) [ 696.569728][T23211] netlink: 'syz-executor.1': attribute type 6 has an invalid length. [ 696.579579][T23213] FAULT_INJECTION: forcing a failure. [ 696.579579][T23213] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 696.582691][T23208] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=23208 comm=syz-executor.5 [ 696.592837][T23213] CPU: 1 PID: 23213 Comm: syz-executor.3 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 696.592868][T23213] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 696.592882][T23213] Call Trace: [ 696.592889][T23213] [ 696.592898][T23213] dump_stack_lvl+0xda/0x130 [ 696.592985][T23213] dump_stack+0x15/0x20 [ 696.593010][T23213] should_fail_ex+0x21f/0x230 [ 696.593045][T23213] __alloc_pages+0x108/0x340 [ 696.593095][T23213] vma_alloc_folio+0x6a3/0x8c0 [ 696.593122][T23213] ? __vm_enough_memory+0xdf/0x2a0 [ 696.593155][T23213] shmem_get_folio_gfp+0x801/0x1200 [ 696.593236][T23213] shmem_write_begin+0xa6/0x1d0 [ 696.593257][T23213] generic_perform_write+0x1c3/0x3d0 [ 696.593292][T23213] ? shmem_write_begin+0x1d0/0x1d0 [ 696.593314][T23213] __generic_file_write_iter+0xe6/0x290 [ 696.593391][T23213] generic_file_write_iter+0x7d/0x1c0 [ 696.593425][T23213] vfs_write+0x47b/0x780 [ 696.593452][T23213] ksys_write+0xeb/0x1a0 [ 696.693431][T23215] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=61 sclass=netlink_route_socket pid=23215 comm=syz-executor.5 [ 696.696588][T23213] __x64_sys_write+0x42/0x50 [ 696.696620][T23213] do_syscall_64+0x41/0xc0 [ 696.722899][T23213] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 696.728882][T23213] RIP: 0033:0x7f1567f53ecf [ 696.733447][T23213] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 696.753174][T23213] RSP: 002b:00007f1567314f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 696.761687][T23213] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007f1567f53ecf [ 696.769686][T23213] RDX: 0000000000100000 RSI: 00007f155eef5000 RDI: 0000000000000005 [ 696.777678][T23213] RBP: 00007f155eef5000 R08: 0000000000000000 R09: 0000000000000534 [ 696.785708][T23213] R10: 0000000000100000 R11: 0000000000000293 R12: 0000000000000000 [ 696.793702][T23213] R13: 00007f1567314fdc R14: 00007f1567314fe0 R15: 0000000020000fc2 [ 696.801719][T23213] 07:23:29 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0xffffffd9}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) 07:23:29 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, 0x0) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$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") (fail_nth: 79) [ 696.814943][T23211] bond1045: entered promiscuous mode [ 696.820446][T23211] bond1045: entered allmulticast mode [ 696.826465][T23211] 8021q: adding VLAN 0 to HW filter on device bond1045 [ 696.840626][T23215] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 696.873095][T23220] netlink: 'syz-executor.1': attribute type 6 has an invalid length. [ 696.887942][T23219] FAULT_INJECTION: forcing a failure. [ 696.887942][T23219] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 696.901040][T23219] CPU: 1 PID: 23219 Comm: syz-executor.3 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 696.911489][T23219] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 696.921609][T23219] Call Trace: [ 696.924898][T23219] [ 696.927892][T23219] dump_stack_lvl+0xda/0x130 [ 696.932517][T23219] dump_stack+0x15/0x20 [ 696.936787][T23219] should_fail_ex+0x21f/0x230 [ 696.941504][T23219] should_fail+0xb/0x10 [ 696.945768][T23219] should_fail_usercopy+0x1a/0x20 [ 696.950834][T23219] copy_page_from_iter_atomic+0x22d/0xcf0 [ 696.956596][T23219] ? folio_test_hugetlb+0x3a/0x70 [ 696.961777][T23219] ? shmem_write_begin+0x12a/0x1d0 [ 696.966918][T23219] generic_perform_write+0x203/0x3d0 [ 696.972241][T23219] ? shmem_write_begin+0x1d0/0x1d0 [ 696.977380][T23219] __generic_file_write_iter+0xe6/0x290 [ 696.983025][T23219] generic_file_write_iter+0x7d/0x1c0 [ 696.988490][T23219] vfs_write+0x47b/0x780 [ 696.992895][T23219] ksys_write+0xeb/0x1a0 [ 696.997180][T23219] __x64_sys_write+0x42/0x50 [ 697.001836][T23219] do_syscall_64+0x41/0xc0 [ 697.006290][T23219] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 697.012290][T23219] RIP: 0033:0x7f1567f53ecf [ 697.016746][T23219] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 697.036462][T23219] RSP: 002b:00007f1567314f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 697.044911][T23219] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007f1567f53ecf [ 697.053016][T23219] RDX: 0000000000100000 RSI: 00007f155eef5000 RDI: 0000000000000005 [ 697.061018][T23219] RBP: 00007f155eef5000 R08: 0000000000000000 R09: 0000000000000534 07:23:29 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 697.069065][T23219] R10: 0000000000100000 R11: 0000000000000293 R12: 0000000000000000 [ 697.077054][T23219] R13: 00007f1567314fdc R14: 00007f1567314fe0 R15: 0000000020000fc2 [ 697.085168][T23219] [ 697.109890][T23219] loop3: detected capacity change from 0 to 2048 07:23:29 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) r2 = open(&(0x7f0000000040)='./file0\x00', 0x161842, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'sit0\x00'}) r4 = syz_io_uring_setup(0x73d7, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000100)=0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r6, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x10001) r8 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x8010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(r5, 0x0, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x8) syz_io_uring_submit(0x0, r8, &(0x7f00000008c0)=@IORING_OP_OPENAT2={0x1c, 0x40, 0x0, 0xffffffffffffffff, &(0x7f0000000840)={0x4ae0e0, 0x2, 0x5}, &(0x7f0000000880)='./file0\x00', 0x18, 0x0, 0x12345}, 0xff) syz_io_uring_submit(r5, 0x0, &(0x7f0000002b40)=@IORING_OP_RECVMSG={0xa, 0x2b, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000002b00)={0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/28, 0x1c}, {&(0x7f0000001540)=""/4096, 0x1000}, {&(0x7f0000002540)=""/131, 0x83}, {&(0x7f0000002600)=""/102, 0x66}, {&(0x7f0000002840)=""/203, 0xcb}], 0x6}, 0x0, 0x10040, 0x1, {0x1}}, 0x0) ftruncate(r2, 0x200002) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x200000e, 0x12, r3, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) r10 = creat(&(0x7f0000000180)='./file0\x00', 0x0) fallocate(r10, 0x0, 0x0, 0x2000402) fallocate(r9, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r9, 0xc028660f, &(0x7f0000001380)={0xc, r10, 0x24}) 07:23:29 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000002c0)={&(0x7f0000000c80)=ANY=[@ANYBLOB="0026bd7000ffdbdf25070000000c00068008000b00060000000c0008002302b41174de3f460a6d000000000000080003000380000008000300bd2c00ff07000400f8ffffff080003001dd30000080004006604000000000000000000"], 0x5c}, 0x1, 0x0, 0x0, 0x1884}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6, 0x6}]}}}]}, 0x3c}}, 0x0) r3 = openat(r2, &(0x7f00000000c0)='./file0\x00', 0x0, 0x31) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00./file0\x00']) connect$unix(r3, &(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000001c0), 0x200080, 0x0) ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f0000000200)={0x55, 0xb5f3, 0x2, 0x1, 0x6}) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000600)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000800)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000827bd7000fcdbdf25030000000800030020000000050006000e000000040004000500050005000000050005000400000005000600ce00000093f1f198073347359701e9597001ab47a31266da6f292f3671200e551bf08293991a41b55e1b9b3e4e1cf47f9dda9123f38125ba19ef0fdf18ba4ec07cdf24e0153a49e9f9fdf291d868e4e75bb04ccb8ff4e20009f1e6265a9ae5d70e64fcedc9de8942e7b7ca009d98ff7c74a175dd80bfc0e6439cda7cd74b6966033d471542563f1c2ed3dd2fcaee81ecb7be444fbd4a54de26db239a7bb4696daed479759c14105df0b8db2481d840e28c6ed40143c2af3c6f04f17a24ee4c22358fce05"], 0x40}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) io_setup(0x6, &(0x7f00000003c0)=0x0) r7 = socket$phonet_pipe(0x23, 0x5, 0x2) io_submit(r6, 0x2, &(0x7f00000005c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, r7, &(0x7f00000001c0)='\"', 0x1}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r8, &(0x7f0000006440)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f0000000c40)={0x10, 0x1d, 0x20, 0x70bd28, 0x25dfdbfd}, 0x10}, {&(0x7f0000000f80)={0x20c, 0x3d, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x1f, 0x46, 0x0, 0x1, [@generic="6b23bda57b0fcd6882aea56d992b0de112a87c9689a0ce8f3a928a"]}, @generic="931dd380ae9b76725532f39b25791247f8e1faaa5606177d1141efdf8a23daecc73d0706f82254c664a01e4c4986b42b265e8e88f8f88e8099514ce917072d6e80996cbddc81dd1014a75c1cd2e0c084d7806b82c11b8a625557f25357333f879c7f3ea978d0c62492b2b2a3437425bf3933cf6d0456ae40263ff847b9956f9f56cd1e35dd616a0dffde59", @nested={0x14d, 0x46, 0x0, 0x1, [@typed={0x8, 0x8f, 0x0, 0x0, @u32=0x4}, @generic="3fe433e9f5d2f6047805d9eb39d59742ad46c8bd198fea6b4f77d0bf577f925374abd91b16efa9a31621d58f4b1ee788ba33ce3ae89358fcbecdc28e3a8775ee6c905d5275bf5f05ca6bfc68336199389a9644323a81d22c4bd081ec9c4826b7e965a5292167778eefb5edac3e1e0fd628684a30dbac663eb65de357a891a90855f356cbe26225342cce43c8e320a777c2a1f74ab97b7e442c94", @typed={0x8, 0x41, 0x0, 0x0, @ipv4=@multicast2}, @typed={0x8, 0x6b, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @generic="79c7219fa8393ab7671b616b9cea5f59e77de2a2ea4a268fcad39d31284ee1045f7dedc0dea487845188adde6fe70f5537a0635e01c2ec0a205c1f92c2272999ec8388f9a95b4d387581056e112c58f96f686734281b5a", @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@remote}, @generic="2d7a6c2813a21aa5bc78773404596de147d491e1868776a08d604bfb6aea387b585ce5b3f7ab336df3922c65"]}]}, 0x20c}, {&(0x7f0000000e00)={0x30, 0x12, 0x800, 0x70bd27, 0x25dfdbfc, "", [@typed={0x8, 0x5b, 0x0, 0x0, @pid}, @typed={0xf, 0x8c, 0x0, 0x0, @str='syzkaller1\x00'}, @typed={0x8, 0x7, 0x0, 0x0, @u32}]}, 0x30}, {&(0x7f0000000e40)={0xc8, 0x42, 0x10, 0x70bd26, 0x25dfdbff, "", [@generic="208cd2ae6be9be", @generic="c1d6c27da633daf115873b83c8913d284239d441678e667c20444d1a1f77f48ea7cbf783d84e79a9ebc262452149fe521b40868bf3938c61c8be3cdbd7429e623c99db5ae26d9cf24ee4ef4777ff0410e8b899b18e829f387d7926641f189d2b9697e099ffb7f20f691064b7d87d04cd2e230e8df8c77a2f1e4f4fabd49cfe414b3027dd850d9a2be9547ba5f2ed09811ea9ed9b201782165a792b57afca3e3d575d0f5b4b17a8", @typed={0x8, 0x94, 0x0, 0x0, @u32=0x1}]}, 0xc8}], 0x4, 0x0, 0x0, 0x8801}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000900)={'team0\x00', 0x0}) sendmsg$nl_route(r8, &(0x7f0000000c00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000bc0)={&(0x7f00000011c0)=@dellink={0x25c, 0x11, 0x400, 0x70bd28, 0x0, {0x0, 0x0, 0x0, r9, 0x1000}, [@IFLA_PROTO_DOWN={0x5}, @IFLA_IFNAME={0x14, 0x3, 'macvlan1\x00'}, @IFLA_MAP={0x24, 0xe, {0x9, 0xd2, 0x2e4d, 0x200, 0x3e, 0xff}}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x5}, @IFLA_IFALIAS={0x14, 0x14, 'syzkaller1\x00'}, @IFLA_MTU={0x8, 0x4, 0x101}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_VFINFO_LIST={0x1cc, 0x16, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x8fe, 0xffff}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x5, 0x1}}]}, {0x84, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN_LIST={0x54, 0xc, 0x0, 0x1, [{0x14, 0x1, {0xb5d3, 0xadc, 0x100, 0xd1c53560eb87a9fa}}, {0x14, 0x1, {0x4, 0xb6, 0x81, 0x8100}}, {0x14, 0x1, {0x0, 0x6e4, 0x1, 0x88a8}}, {0x14, 0x1, {0x14, 0xaed, 0x0, 0x8100}}]}, @IFLA_VF_TX_RATE={0xc, 0x3, {0x1000, 0x200}}, @IFLA_VF_TRUST={0xc, 0x9, {0x7, 0x800}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x8000, 0x1}}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x7f, 0x7fff}}, @IFLA_VF_TRUST={0xc, 0x9, {0x7ff, 0x8}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_RATE={0x10, 0x6, {0x9, 0x5, 0x5}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x9}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x80000000, 0x3}}]}, {0xa4, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0xfff, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1d}}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x3f, 0x43}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x65c, 0x1}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x2, 0x80000001}}, @IFLA_VF_VLAN_LIST={0x40, 0xc, 0x0, 0x1, [{0x14, 0x1, {0xcae8, 0x919, 0x9, 0x8100}}, {0x14, 0x1, {0x200, 0xb47, 0xaaa, 0x8100}}, {0x14, 0x1, {0x5, 0x53b, 0xfffffff7, 0x88a8}}]}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x3f, 0x7fff}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x930, 0x5}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x6, 0x8}}]}]}]}, 0x25c}, 0x1, 0x0, 0x0, 0x11}, 0x4c089) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r7, 0x40189429, &(0x7f0000000480)={0x1, 0x4, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r10, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x45, 0xfc, 0x6}, {0x6}]}, 0x10) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x2, 0x3, &(0x7f0000000000)=@framed={{0x18, 0xf}}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) socket$inet6_sctp(0xa, 0x801, 0x84) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) r11 = socket$igmp(0x2, 0x3, 0x2) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@private1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) ioctl$TUNSETOWNER(r3, 0x400454cc, r12) setsockopt$MRT_INIT(r11, 0x0, 0xc8, &(0x7f0000000040), 0x4) setsockopt$MRT_ADD_VIF(r11, 0x0, 0xca, &(0x7f0000000100)={0x0, 0x1, 0x0, 0x0, @vifc_lcl_addr=@dev={0xac, 0x14, 0x14, 0xb}, @multicast1}, 0x10) 07:23:29 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0xffffffea}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) [ 697.117782][T23219] FAT-fs (loop3): Unrecognized mount option "ÿÿÿÿÿÿÿÿ184467440737095516150xffffffffffffffff" or missing value [ 697.118664][T23220] bond1046: entered promiscuous mode [ 697.135468][T23220] bond1046: entered allmulticast mode [ 697.141413][T23220] 8021q: adding VLAN 0 to HW filter on device bond1046 [ 697.177662][T23226] netlink: 'syz-executor.1': attribute type 6 has an invalid length. 07:23:29 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000019000000", 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000380)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="eb", 0x1a000, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000008c0)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000001cc0)={{}, r2, 0x16, @inherit={0x88, &(0x7f0000001580)=ANY=[@ANYRES16=r3]}, @devid}) r4 = syz_open_dev$MSR(&(0x7f0000000140), 0x100000000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r4, 0x84009422, &(0x7f0000000ec0)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(r6, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000001840)=ANY=[@ANYRES32=r5, @ANYRES32=r3, @ANYRESOCT, @ANYRES32=r1, @ANYRES32, @ANYRES64, @ANYRESHEX], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x40025) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f0000001500)={r5, "2ce8b7e675c30c143ac940d229ad3592"}) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$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") r7 = socket$inet_udplite(0x2, 0x2, 0x88) read(r7, &(0x7f00000000c0)=""/43, 0x2b) 07:23:29 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, 0x0) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$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") (fail_nth: 80) 07:23:29 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0xffffffed}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) [ 697.221421][T23226] bond1047: entered promiscuous mode [ 697.226960][T23226] bond1047: entered allmulticast mode [ 697.232550][T23228] netlink: 'syz-executor.5': attribute type 6 has an invalid length. [ 697.243476][T23228] (unnamed net_device) (uninitialized): option use_carrier: invalid value (6) [ 697.243597][T23231] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=23231 comm=syz-executor.5 [ 697.289169][T23233] FAULT_INJECTION: forcing a failure. [ 697.289169][T23233] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 697.302528][T23233] CPU: 0 PID: 23233 Comm: syz-executor.3 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 697.312963][T23233] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 697.323068][T23233] Call Trace: [ 697.326445][T23233] [ 697.329397][T23233] dump_stack_lvl+0xda/0x130 [ 697.331735][T23238] netlink: 'syz-executor.1': attribute type 6 has an invalid length. [ 697.334021][T23233] dump_stack+0x15/0x20 [ 697.346274][T23233] should_fail_ex+0x21f/0x230 [ 697.351066][T23233] __alloc_pages+0x108/0x340 [ 697.355731][T23233] vma_alloc_folio+0x6a3/0x8c0 [ 697.360509][T23233] ? __vm_enough_memory+0xdf/0x2a0 [ 697.365674][T23233] shmem_get_folio_gfp+0x801/0x1200 [ 697.370983][T23233] shmem_write_begin+0xa6/0x1d0 [ 697.375869][T23233] generic_perform_write+0x1c3/0x3d0 [ 697.381197][T23233] ? shmem_write_begin+0x1d0/0x1d0 [ 697.386408][T23233] __generic_file_write_iter+0xe6/0x290 [ 697.392021][T23233] generic_file_write_iter+0x7d/0x1c0 [ 697.397427][T23233] vfs_write+0x47b/0x780 [ 697.400478][T23228] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=61 sclass=netlink_route_socket pid=23228 comm=syz-executor.5 [ 697.401702][T23233] ksys_write+0xeb/0x1a0 [ 697.418815][T23233] __x64_sys_write+0x42/0x50 [ 697.423438][T23233] do_syscall_64+0x41/0xc0 [ 697.427043][T23242] loop0: detected capacity change from 0 to 2048 [ 697.427971][T23233] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 697.439106][T23242] FAT-fs (loop0): Unrecognized mount option "ÿÿÿÿÿÿÿÿ184467440737095516150xffffffffffffffff" or missing value [ 697.440176][T23233] RIP: 0033:0x7f1567f53ecf [ 697.440198][T23233] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 697.475880][T23233] RSP: 002b:00007f1567314f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 697.484319][T23233] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007f1567f53ecf [ 697.492313][T23233] RDX: 0000000000100000 RSI: 00007f155eef5000 RDI: 0000000000000005 [ 697.500579][T23233] RBP: 00007f155eef5000 R08: 0000000000000000 R09: 0000000000000534 [ 697.508570][T23233] R10: 0000000000100000 R11: 0000000000000293 R12: 0000000000000000 [ 697.516618][T23233] R13: 00007f1567314fdc R14: 00007f1567314fe0 R15: 0000000020000fc2 [ 697.524621][T23233] 07:23:30 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, 0x0) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$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") (fail_nth: 81) [ 697.544054][T23238] bond1048: entered promiscuous mode [ 697.549486][T23238] bond1048: entered allmulticast mode [ 697.584075][T23238] 8021q: adding VLAN 0 to HW filter on device bond1048 [ 697.613996][T23228] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 697.642711][T23246] FAULT_INJECTION: forcing a failure. [ 697.642711][T23246] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 697.655913][T23246] CPU: 1 PID: 23246 Comm: syz-executor.3 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 697.666350][T23246] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 697.676426][T23246] Call Trace: [ 697.679717][T23246] [ 697.682665][T23246] dump_stack_lvl+0xda/0x130 [ 697.687338][T23246] dump_stack+0x15/0x20 [ 697.691672][T23246] should_fail_ex+0x21f/0x230 [ 697.696386][T23246] should_fail+0xb/0x10 [ 697.700625][T23246] should_fail_usercopy+0x1a/0x20 [ 697.705733][T23246] copy_page_from_iter_atomic+0x22d/0xcf0 07:23:30 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0xfffffff0}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) 07:23:30 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) r2 = open(&(0x7f0000000040)='./file0\x00', 0x161842, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'sit0\x00'}) r4 = syz_io_uring_setup(0x73d7, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000100)=0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r6, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x10001) r8 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x8010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(r5, 0x0, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x8) syz_io_uring_submit(0x0, r8, &(0x7f00000008c0)=@IORING_OP_OPENAT2={0x1c, 0x40, 0x0, 0xffffffffffffffff, &(0x7f0000000840)={0x4ae0e0, 0x2, 0x5}, &(0x7f0000000880)='./file0\x00', 0x18, 0x0, 0x12345}, 0xff) syz_io_uring_submit(r5, 0x0, &(0x7f0000002b40)=@IORING_OP_RECVMSG={0xa, 0x2b, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000002b00)={0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/28, 0x1c}, {&(0x7f0000001540)=""/4096, 0x1000}, {&(0x7f0000002540)=""/131, 0x83}, {&(0x7f0000002600)=""/102, 0x66}, {&(0x7f0000002840)=""/203, 0xcb}], 0x6}, 0x0, 0x10040, 0x1, {0x1}}, 0x0) ftruncate(r2, 0x200002) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x200000e, 0x12, r3, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) r10 = creat(&(0x7f0000000180)='./file0\x00', 0x0) fallocate(r10, 0x0, 0x0, 0x2000402) fallocate(r9, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r9, 0xc028660f, &(0x7f0000001380)={0xc, r10, 0x25}) [ 697.711479][T23246] ? folio_test_hugetlb+0x3a/0x70 [ 697.716538][T23246] ? shmem_write_begin+0x12a/0x1d0 [ 697.721681][T23246] generic_perform_write+0x203/0x3d0 [ 697.727001][T23246] ? shmem_write_begin+0x1d0/0x1d0 [ 697.732148][T23246] __generic_file_write_iter+0xe6/0x290 [ 697.737869][T23246] generic_file_write_iter+0x7d/0x1c0 [ 697.743281][T23246] vfs_write+0x47b/0x780 [ 697.747554][T23246] ksys_write+0xeb/0x1a0 [ 697.751829][T23246] __x64_sys_write+0x42/0x50 [ 697.756481][T23246] do_syscall_64+0x41/0xc0 [ 697.760934][T23246] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 697.766907][T23246] RIP: 0033:0x7f1567f53ecf [ 697.771338][T23246] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 697.791005][T23246] RSP: 002b:00007f1567314f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 697.799457][T23246] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007f1567f53ecf [ 697.807446][T23246] RDX: 0000000000100000 RSI: 00007f155eef5000 RDI: 0000000000000005 [ 697.815482][T23246] RBP: 00007f155eef5000 R08: 0000000000000000 R09: 0000000000000534 [ 697.823553][T23246] R10: 0000000000100000 R11: 0000000000000293 R12: 0000000000000000 [ 697.831547][T23246] R13: 00007f1567314fdc R14: 00007f1567314fe0 R15: 0000000020000fc2 [ 697.839561][T23246] 07:23:30 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000002c0)={&(0x7f0000000c80)=ANY=[@ANYBLOB="0026bd7000ffdbdf25070000000c00068008000b00060000000c0008002302b41174de3f460a6d000000000000080003000380000008000300bd2c00ff07000400f8ffffff080003001dd30000080004006604000000000000000000"], 0x5c}, 0x1, 0x0, 0x0, 0x1884}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6, 0x6}]}}}]}, 0x3c}}, 0x0) r3 = openat(r2, &(0x7f00000000c0)='./file0\x00', 0x0, 0x31) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00./file0\x00']) connect$unix(r3, &(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000001c0), 0x200080, 0x0) ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f0000000200)={0x55, 0xb5f3, 0x2, 0x1, 0x6}) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000600)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000800)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x40}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) io_setup(0x6, &(0x7f00000003c0)=0x0) r7 = socket$phonet_pipe(0x23, 0x5, 0x2) io_submit(r6, 0x2, &(0x7f00000005c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, r7, &(0x7f00000001c0)='\"', 0x1}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r8, &(0x7f0000006440)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f0000000c40)={0x10, 0x1d, 0x20, 0x70bd28, 0x25dfdbfd}, 0x10}, {&(0x7f0000000f80)={0x20c, 0x3d, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x1f, 0x46, 0x0, 0x1, [@generic="6b23bda57b0fcd6882aea56d992b0de112a87c9689a0ce8f3a928a"]}, @generic="931dd380ae9b76725532f39b25791247f8e1faaa5606177d1141efdf8a23daecc73d0706f82254c664a01e4c4986b42b265e8e88f8f88e8099514ce917072d6e80996cbddc81dd1014a75c1cd2e0c084d7806b82c11b8a625557f25357333f879c7f3ea978d0c62492b2b2a3437425bf3933cf6d0456ae40263ff847b9956f9f56cd1e35dd616a0dffde59", @nested={0x14d, 0x46, 0x0, 0x1, [@typed={0x8, 0x8f, 0x0, 0x0, @u32=0x4}, @generic="3fe433e9f5d2f6047805d9eb39d59742ad46c8bd198fea6b4f77d0bf577f925374abd91b16efa9a31621d58f4b1ee788ba33ce3ae89358fcbecdc28e3a8775ee6c905d5275bf5f05ca6bfc68336199389a9644323a81d22c4bd081ec9c4826b7e965a5292167778eefb5edac3e1e0fd628684a30dbac663eb65de357a891a90855f356cbe26225342cce43c8e320a777c2a1f74ab97b7e442c94", @typed={0x8, 0x41, 0x0, 0x0, @ipv4=@multicast2}, @typed={0x8, 0x6b, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @generic="79c7219fa8393ab7671b616b9cea5f59e77de2a2ea4a268fcad39d31284ee1045f7dedc0dea487845188adde6fe70f5537a0635e01c2ec0a205c1f92c2272999ec8388f9a95b4d387581056e112c58f96f686734281b5a", @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@remote}, @generic="2d7a6c2813a21aa5bc78773404596de147d491e1868776a08d604bfb6aea387b585ce5b3f7ab336df3922c65"]}]}, 0x20c}, {&(0x7f0000000e00)={0x30, 0x12, 0x800, 0x70bd27, 0x25dfdbfc, "", [@typed={0x8, 0x5b, 0x0, 0x0, @pid}, @typed={0xf, 0x8c, 0x0, 0x0, @str='syzkaller1\x00'}, @typed={0x8, 0x7, 0x0, 0x0, @u32}]}, 0x30}, {&(0x7f0000000e40)={0xc8, 0x42, 0x10, 0x70bd26, 0x25dfdbff, "", [@generic="208cd2ae6be9be", @generic="c1d6c27da633daf115873b83c8913d284239d441678e667c20444d1a1f77f48ea7cbf783d84e79a9ebc262452149fe521b40868bf3938c61c8be3cdbd7429e623c99db5ae26d9cf24ee4ef4777ff0410e8b899b18e829f387d7926641f189d2b9697e099ffb7f20f691064b7d87d04cd2e230e8df8c77a2f1e4f4fabd49cfe414b3027dd850d9a2be9547ba5f2ed09811ea9ed9b201782165a792b57afca3e3d575d0f5b4b17a8", @typed={0x8, 0x94, 0x0, 0x0, @u32=0x1}]}, 0xc8}], 0x4, 0x0, 0x0, 0x8801}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000900)={'team0\x00', 0x0}) sendmsg$nl_route(r8, &(0x7f0000000c00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000bc0)={&(0x7f00000011c0)=@dellink={0x25c, 0x11, 0x400, 0x70bd28, 0x0, {0x0, 0x0, 0x0, r9, 0x1000}, [@IFLA_PROTO_DOWN={0x5}, @IFLA_IFNAME={0x14, 0x3, 'macvlan1\x00'}, @IFLA_MAP={0x24, 0xe, {0x9, 0xd2, 0x2e4d, 0x200, 0x3e, 0xff}}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x5}, @IFLA_IFALIAS={0x14, 0x14, 'syzkaller1\x00'}, @IFLA_MTU={0x8, 0x4, 0x101}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_VFINFO_LIST={0x1cc, 0x16, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x8fe, 0xffff}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x5, 0x1}}]}, {0x84, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN_LIST={0x54, 0xc, 0x0, 0x1, [{0x14, 0x1, {0xb5d3, 0xadc, 0x100, 0xd1c53560eb87a9fa}}, {0x14, 0x1, {0x4, 0xb6, 0x81, 0x8100}}, {0x14, 0x1, {0x0, 0x6e4, 0x1, 0x88a8}}, {0x14, 0x1, {0x14, 0xaed, 0x0, 0x8100}}]}, @IFLA_VF_TX_RATE={0xc, 0x3, {0x1000, 0x200}}, @IFLA_VF_TRUST={0xc, 0x9, {0x7, 0x800}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x8000, 0x1}}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x7f, 0x7fff}}, @IFLA_VF_TRUST={0xc, 0x9, {0x7ff, 0x8}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_RATE={0x10, 0x6, {0x9, 0x5, 0x5}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x9}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x80000000, 0x3}}]}, {0xa4, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0xfff, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1d}}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x3f, 0x43}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x65c, 0x1}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x2, 0x80000001}}, @IFLA_VF_VLAN_LIST={0x40, 0xc, 0x0, 0x1, [{0x14, 0x1, {0xcae8, 0x919, 0x9, 0x8100}}, {0x14, 0x1, {0x200, 0xb47, 0xaaa, 0x8100}}, {0x14, 0x1, {0x5, 0x53b, 0xfffffff7, 0x88a8}}]}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x3f, 0x7fff}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x930, 0x5}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x6, 0x8}}]}]}]}, 0x25c}, 0x1, 0x0, 0x0, 0x11}, 0x4c089) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r7, 0x40189429, &(0x7f0000000480)={0x1, 0x4, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r10, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x45, 0xfc, 0x6}, {0x6}]}, 0x10) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x2, 0x3, &(0x7f0000000000)=@framed={{0x18, 0xf}}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) socket$inet6_sctp(0xa, 0x801, 0x84) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) r11 = socket$igmp(0x2, 0x3, 0x2) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@private1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) ioctl$TUNSETOWNER(r3, 0x400454cc, r12) setsockopt$MRT_INIT(r11, 0x0, 0xc8, &(0x7f0000000040), 0x4) setsockopt$MRT_ADD_VIF(r11, 0x0, 0xca, &(0x7f0000000100)={0x0, 0x1, 0x0, 0x0, @vifc_lcl_addr=@dev={0xac, 0x14, 0x14, 0xb}, @multicast1}, 0x10) 07:23:30 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0xfffffff3}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) [ 697.863153][T23251] netlink: 'syz-executor.1': attribute type 6 has an invalid length. [ 697.866704][T23246] loop3: detected capacity change from 0 to 2048 [ 697.879226][T23246] FAT-fs (loop3): Unrecognized mount option "ÿÿÿÿÿÿÿÿ184467440737095516150xffffffffffffffff" or missing value [ 697.898285][T23251] bond1049: entered promiscuous mode [ 697.903615][T23251] bond1049: entered allmulticast mode [ 697.939267][T23254] netlink: 'syz-executor.5': attribute type 6 has an invalid length. [ 697.964985][T23254] (unnamed net_device) (uninitialized): option use_carrier: invalid value (6) 07:23:30 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x4, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:23:30 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, 0x0) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$eJzs1T9rE3EYB/AnaazRqbM4/MDFqVQ3JyOSQvFAUTLoZKBxyYmQWy6Z8hJ8Ab4wB1+EZMp2Ei5VWxSDNLnSfj7LPdz3ud+/g7v39z+OTz8VH75+/hLdXivavbjTXrbiINpxZh4AwHWyrKr4XtWaXgsAsBv+/wBw87x5++7Fsyzrv06pG7GYl4NyUF/r/Pgk6x+llf3fnlqU5WDvZ/4o1c7nt+LuOn/8x3w/Hj6o81X2/GV2Ib8dp1vfPQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA3GyHKXUiIqWUDn7dXZTlYK/OD9OZC3ldHZ9k/aN1w/m8E/c6O9sGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAcAmK6Ww8zPPR5JoVEd9ix5N210d6uSMv/tXTW097VU5+m8XTTZtfLatq05GfRMTWF9+KmK/eUvNnuGnR3DcJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABoVjGdjYd5PpoUTa8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALgqiulsPMzz0eS/i2jVI/29p+k9AgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAM34EQAA///P7Cnj") (fail_nth: 82) [ 697.984458][T23256] netlink: 'syz-executor.1': attribute type 6 has an invalid length. [ 698.002560][T23254] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=23254 comm=syz-executor.5 [ 698.032789][T23259] FAULT_INJECTION: forcing a failure. [ 698.032789][T23259] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 698.046820][T23259] CPU: 0 PID: 23259 Comm: syz-executor.3 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 698.057343][T23259] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 698.067429][T23259] Call Trace: [ 698.070758][T23259] [ 698.073725][T23259] dump_stack_lvl+0xda/0x130 [ 698.078365][T23259] dump_stack+0x15/0x20 [ 698.082544][T23259] should_fail_ex+0x21f/0x230 [ 698.087328][T23259] __alloc_pages+0x108/0x340 [ 698.092033][T23259] vma_alloc_folio+0x6a3/0x8c0 [ 698.096851][T23259] ? __vm_enough_memory+0xdf/0x2a0 [ 698.102096][T23259] shmem_get_folio_gfp+0x801/0x1200 [ 698.107329][T23259] shmem_write_begin+0xa6/0x1d0 [ 698.112204][T23259] generic_perform_write+0x1c3/0x3d0 [ 698.117526][T23259] ? shmem_write_begin+0x1d0/0x1d0 [ 698.122766][T23259] __generic_file_write_iter+0xe6/0x290 [ 698.128377][T23259] generic_file_write_iter+0x7d/0x1c0 [ 698.132472][T23256] bond1050: entered promiscuous mode [ 698.133772][T23259] vfs_write+0x47b/0x780 [ 698.139137][T23256] bond1050: entered allmulticast mode [ 698.143345][T23259] ksys_write+0xeb/0x1a0 [ 698.152981][T23259] __x64_sys_write+0x42/0x50 [ 698.157653][T23259] do_syscall_64+0x41/0xc0 [ 698.162104][T23259] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 698.168045][T23259] RIP: 0033:0x7f1567f53ecf [ 698.172487][T23259] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 698.178189][T23256] 8021q: adding VLAN 0 to HW filter on device bond1050 [ 698.192106][T23259] RSP: 002b:00007f1567314f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 698.192131][T23259] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007f1567f53ecf [ 698.215451][T23259] RDX: 0000000000100000 RSI: 00007f155eef5000 RDI: 0000000000000005 [ 698.223504][T23259] RBP: 00007f155eef5000 R08: 0000000000000000 R09: 0000000000000534 [ 698.231618][T23259] R10: 0000000000100000 R11: 0000000000000293 R12: 0000000000000000 07:23:30 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0xfffffffe}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) 07:23:30 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) r2 = open(&(0x7f0000000040)='./file0\x00', 0x161842, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'sit0\x00'}) r4 = syz_io_uring_setup(0x73d7, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000100)=0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r6, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x10001) r8 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x8010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(r5, 0x0, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x8) syz_io_uring_submit(0x0, r8, &(0x7f00000008c0)=@IORING_OP_OPENAT2={0x1c, 0x40, 0x0, 0xffffffffffffffff, &(0x7f0000000840)={0x4ae0e0, 0x2, 0x5}, &(0x7f0000000880)='./file0\x00', 0x18, 0x0, 0x12345}, 0xff) syz_io_uring_submit(r5, 0x0, &(0x7f0000002b40)=@IORING_OP_RECVMSG={0xa, 0x2b, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000002b00)={0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/28, 0x1c}, {&(0x7f0000001540)=""/4096, 0x1000}, {&(0x7f0000002540)=""/131, 0x83}, {&(0x7f0000002600)=""/102, 0x66}, {&(0x7f0000002840)=""/203, 0xcb}], 0x6}, 0x0, 0x10040, 0x1, {0x1}}, 0x0) ftruncate(r2, 0x200002) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x200000e, 0x12, r3, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) r10 = creat(&(0x7f0000000180)='./file0\x00', 0x0) fallocate(r10, 0x0, 0x0, 0x2000402) fallocate(r9, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r9, 0xc028660f, &(0x7f0000001380)={0xc, r10, 0x26}) 07:23:30 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000019000000", 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000380)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="eb", 0x1a000, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000008c0)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000001cc0)={{}, r2, 0x16, @inherit={0x88, &(0x7f0000001580)=ANY=[@ANYRES16=r3]}, @devid}) r4 = syz_open_dev$MSR(&(0x7f0000000140), 0x100000000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r4, 0x84009422, &(0x7f0000000ec0)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(r6, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000001840)=ANY=[@ANYRES32=r5, @ANYRES32=r3, @ANYRESOCT, @ANYRES32=r1, @ANYRES32, @ANYRES64, @ANYRESHEX], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x40025) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f0000001500)={r5, "2ce8b7e675c30c143ac940d229ad3592"}) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$eJzs1T9rE3EYB/AnaazRqbM4/MDFqVQ3JyOSQvFAUTLoZKBxyYmQWy6Z8hJ8Ab4wB1+EZMp2Ei5VWxSDNLnSfj7LPdz3ud+/g7v39z+OTz8VH75+/hLdXivavbjTXrbiINpxZh4AwHWyrKr4XtWaXgsAsBv+/wBw87x5++7Fsyzrv06pG7GYl4NyUF/r/Pgk6x+llf3fnlqU5WDvZ/4o1c7nt+LuOn/8x3w/Hj6o81X2/GV2Ib8dp1vfPQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA3GyHKXUiIqWUDn7dXZTlYK/OD9OZC3ldHZ9k/aN1w/m8E/c6O9sGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAcAmK6Ww8zPPR5JoVEd9ix5N210d6uSMv/tXTW097VU5+m8XTTZtfLatq05GfRMTWF9+KmK/eUvNnuGnR3DcJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABoVjGdjYd5PpoUTa8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALgqiulsPMzz0eS/i2jVI/29p+k9AgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAM34EQAA///P7Cnj") r7 = socket$inet_udplite(0x2, 0x2, 0x88) read(r7, &(0x7f00000000c0)=""/43, 0x2b) [ 698.239649][T23259] R13: 00007f1567314fdc R14: 00007f1567314fe0 R15: 0000000020000fc2 [ 698.247655][T23259] [ 698.266714][T23254] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=61 sclass=netlink_route_socket pid=23254 comm=syz-executor.5 07:23:30 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) 07:23:30 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, 0x0) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$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") (fail_nth: 83) [ 698.299247][T23254] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 698.327137][T23264] bond1051: entered promiscuous mode [ 698.332500][T23264] bond1051: entered allmulticast mode 07:23:30 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0x0, 0x2}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) 07:23:30 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000002c0)={&(0x7f0000000c80)=ANY=[@ANYBLOB="0026bd7000ffdbdf25070000000c00068008000b00060000000c0008002302b41174de3f460a6d000000000000080003000380000008000300bd2c00ff07000400f8ffffff080003001dd30000080004006604000000000000000000"], 0x5c}, 0x1, 0x0, 0x0, 0x1884}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6, 0x6}]}}}]}, 0x3c}}, 0x0) r3 = openat(r2, &(0x7f00000000c0)='./file0\x00', 0x0, 0x31) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00./file0\x00']) connect$unix(r3, &(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000001c0), 0x200080, 0x0) ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f0000000200)={0x55, 0xb5f3, 0x2, 0x1, 0x6}) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000600)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000800)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x40}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) io_setup(0x6, &(0x7f00000003c0)=0x0) r7 = socket$phonet_pipe(0x23, 0x5, 0x2) io_submit(r6, 0x2, &(0x7f00000005c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, r7, &(0x7f00000001c0)='\"', 0x1}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r8, &(0x7f0000006440)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f0000000c40)={0x10, 0x1d, 0x20, 0x70bd28, 0x25dfdbfd}, 0x10}, {&(0x7f0000000f80)={0x20c, 0x3d, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x1f, 0x46, 0x0, 0x1, [@generic="6b23bda57b0fcd6882aea56d992b0de112a87c9689a0ce8f3a928a"]}, @generic="931dd380ae9b76725532f39b25791247f8e1faaa5606177d1141efdf8a23daecc73d0706f82254c664a01e4c4986b42b265e8e88f8f88e8099514ce917072d6e80996cbddc81dd1014a75c1cd2e0c084d7806b82c11b8a625557f25357333f879c7f3ea978d0c62492b2b2a3437425bf3933cf6d0456ae40263ff847b9956f9f56cd1e35dd616a0dffde59", @nested={0x14d, 0x46, 0x0, 0x1, [@typed={0x8, 0x8f, 0x0, 0x0, @u32=0x4}, @generic="3fe433e9f5d2f6047805d9eb39d59742ad46c8bd198fea6b4f77d0bf577f925374abd91b16efa9a31621d58f4b1ee788ba33ce3ae89358fcbecdc28e3a8775ee6c905d5275bf5f05ca6bfc68336199389a9644323a81d22c4bd081ec9c4826b7e965a5292167778eefb5edac3e1e0fd628684a30dbac663eb65de357a891a90855f356cbe26225342cce43c8e320a777c2a1f74ab97b7e442c94", @typed={0x8, 0x41, 0x0, 0x0, @ipv4=@multicast2}, @typed={0x8, 0x6b, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @generic="79c7219fa8393ab7671b616b9cea5f59e77de2a2ea4a268fcad39d31284ee1045f7dedc0dea487845188adde6fe70f5537a0635e01c2ec0a205c1f92c2272999ec8388f9a95b4d387581056e112c58f96f686734281b5a", @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@remote}, @generic="2d7a6c2813a21aa5bc78773404596de147d491e1868776a08d604bfb6aea387b585ce5b3f7ab336df3922c65"]}]}, 0x20c}, {&(0x7f0000000e00)={0x30, 0x12, 0x800, 0x70bd27, 0x25dfdbfc, "", [@typed={0x8, 0x5b, 0x0, 0x0, @pid}, @typed={0xf, 0x8c, 0x0, 0x0, @str='syzkaller1\x00'}, @typed={0x8, 0x7, 0x0, 0x0, @u32}]}, 0x30}, {&(0x7f0000000e40)={0xc8, 0x42, 0x10, 0x70bd26, 0x25dfdbff, "", [@generic="208cd2ae6be9be", @generic="c1d6c27da633daf115873b83c8913d284239d441678e667c20444d1a1f77f48ea7cbf783d84e79a9ebc262452149fe521b40868bf3938c61c8be3cdbd7429e623c99db5ae26d9cf24ee4ef4777ff0410e8b899b18e829f387d7926641f189d2b9697e099ffb7f20f691064b7d87d04cd2e230e8df8c77a2f1e4f4fabd49cfe414b3027dd850d9a2be9547ba5f2ed09811ea9ed9b201782165a792b57afca3e3d575d0f5b4b17a8", @typed={0x8, 0x94, 0x0, 0x0, @u32=0x1}]}, 0xc8}], 0x4, 0x0, 0x0, 0x8801}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000900)={'team0\x00', 0x0}) sendmsg$nl_route(r8, &(0x7f0000000c00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000bc0)={&(0x7f00000011c0)=@dellink={0x25c, 0x11, 0x400, 0x70bd28, 0x0, {0x0, 0x0, 0x0, r9, 0x1000}, [@IFLA_PROTO_DOWN={0x5}, @IFLA_IFNAME={0x14, 0x3, 'macvlan1\x00'}, @IFLA_MAP={0x24, 0xe, {0x9, 0xd2, 0x2e4d, 0x200, 0x3e, 0xff}}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x5}, @IFLA_IFALIAS={0x14, 0x14, 'syzkaller1\x00'}, @IFLA_MTU={0x8, 0x4, 0x101}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_VFINFO_LIST={0x1cc, 0x16, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x8fe, 0xffff}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x5, 0x1}}]}, {0x84, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN_LIST={0x54, 0xc, 0x0, 0x1, [{0x14, 0x1, {0xb5d3, 0xadc, 0x100, 0xd1c53560eb87a9fa}}, {0x14, 0x1, {0x4, 0xb6, 0x81, 0x8100}}, {0x14, 0x1, {0x0, 0x6e4, 0x1, 0x88a8}}, {0x14, 0x1, {0x14, 0xaed, 0x0, 0x8100}}]}, @IFLA_VF_TX_RATE={0xc, 0x3, {0x1000, 0x200}}, @IFLA_VF_TRUST={0xc, 0x9, {0x7, 0x800}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x8000, 0x1}}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x7f, 0x7fff}}, @IFLA_VF_TRUST={0xc, 0x9, {0x7ff, 0x8}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_RATE={0x10, 0x6, {0x9, 0x5, 0x5}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x9}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x80000000, 0x3}}]}, {0xa4, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0xfff, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1d}}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x3f, 0x43}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x65c, 0x1}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x2, 0x80000001}}, @IFLA_VF_VLAN_LIST={0x40, 0xc, 0x0, 0x1, [{0x14, 0x1, {0xcae8, 0x919, 0x9, 0x8100}}, {0x14, 0x1, {0x200, 0xb47, 0xaaa, 0x8100}}, {0x14, 0x1, {0x5, 0x53b, 0xfffffff7, 0x88a8}}]}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x3f, 0x7fff}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x930, 0x5}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x6, 0x8}}]}]}]}, 0x25c}, 0x1, 0x0, 0x0, 0x11}, 0x4c089) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r7, 0x40189429, &(0x7f0000000480)={0x1, 0x4, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r10, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x45, 0xfc, 0x6}, {0x6}]}, 0x10) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x2, 0x3, &(0x7f0000000000)=@framed={{0x18, 0xf}}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) socket$inet6_sctp(0xa, 0x801, 0x84) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) r11 = socket$igmp(0x2, 0x3, 0x2) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@private1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) ioctl$TUNSETOWNER(r3, 0x400454cc, r12) setsockopt$MRT_INIT(r11, 0x0, 0xc8, &(0x7f0000000040), 0x4) setsockopt$MRT_ADD_VIF(r11, 0x0, 0xca, &(0x7f0000000100)={0x0, 0x1, 0x0, 0x0, @vifc_lcl_addr=@dev={0xac, 0x14, 0x14, 0xb}, @multicast1}, 0x10) [ 698.395977][T23278] FAULT_INJECTION: forcing a failure. [ 698.395977][T23278] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 698.409170][T23278] CPU: 1 PID: 23278 Comm: syz-executor.3 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 698.419786][T23278] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 698.429927][T23278] Call Trace: [ 698.433240][T23278] [ 698.436186][T23278] dump_stack_lvl+0xda/0x130 [ 698.440885][T23278] dump_stack+0x15/0x20 [ 698.442429][T23267] loop0: detected capacity change from 0 to 2048 [ 698.445089][T23278] should_fail_ex+0x21f/0x230 [ 698.445129][T23278] should_fail+0xb/0x10 [ 698.455026][T23282] (unnamed net_device) (uninitialized): option use_carrier: invalid value (6) [ 698.456254][T23278] should_fail_usercopy+0x1a/0x20 [ 698.456373][T23278] copy_page_from_iter_atomic+0x22d/0xcf0 [ 698.456408][T23278] ? folio_test_hugetlb+0x3a/0x70 [ 698.456447][T23278] ? shmem_write_begin+0x12a/0x1d0 [ 698.456474][T23278] generic_perform_write+0x203/0x3d0 07:23:31 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) r2 = open(&(0x7f0000000040)='./file0\x00', 0x161842, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'sit0\x00'}) r4 = syz_io_uring_setup(0x73d7, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000100)=0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r6, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x10001) r8 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x8010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(r5, 0x0, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x8) syz_io_uring_submit(0x0, r8, &(0x7f00000008c0)=@IORING_OP_OPENAT2={0x1c, 0x40, 0x0, 0xffffffffffffffff, &(0x7f0000000840)={0x4ae0e0, 0x2, 0x5}, &(0x7f0000000880)='./file0\x00', 0x18, 0x0, 0x12345}, 0xff) syz_io_uring_submit(r5, 0x0, &(0x7f0000002b40)=@IORING_OP_RECVMSG={0xa, 0x2b, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000002b00)={0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/28, 0x1c}, {&(0x7f0000001540)=""/4096, 0x1000}, {&(0x7f0000002540)=""/131, 0x83}, {&(0x7f0000002600)=""/102, 0x66}, {&(0x7f0000002840)=""/203, 0xcb}], 0x6}, 0x0, 0x10040, 0x1, {0x1}}, 0x0) ftruncate(r2, 0x200002) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x200000e, 0x12, r3, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) r10 = creat(&(0x7f0000000180)='./file0\x00', 0x0) fallocate(r10, 0x0, 0x0, 0x2000402) fallocate(r9, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r9, 0xc028660f, &(0x7f0000001380)={0xc, r10, 0x27}) [ 698.456566][T23278] ? shmem_write_begin+0x1d0/0x1d0 [ 698.456593][T23278] __generic_file_write_iter+0xe6/0x290 [ 698.456629][T23278] generic_file_write_iter+0x7d/0x1c0 [ 698.456665][T23278] vfs_write+0x47b/0x780 [ 698.456762][T23278] ksys_write+0xeb/0x1a0 [ 698.456789][T23278] __x64_sys_write+0x42/0x50 [ 698.456812][T23278] do_syscall_64+0x41/0xc0 [ 698.456844][T23278] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 698.456971][T23278] RIP: 0033:0x7f1567f53ecf 07:23:31 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) [ 698.456985][T23278] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 698.457002][T23278] RSP: 002b:00007f1567314f10 EFLAGS: 00000293 [ 698.469697][T23282] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=23282 comm=syz-executor.5 [ 698.470012][T23278] ORIG_RAX: 0000000000000001 [ 698.483845][T23282] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=61 sclass=netlink_route_socket pid=23282 comm=syz-executor.5 07:23:31 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0x0, 0x4}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) [ 698.485754][T23278] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007f1567f53ecf [ 698.494631][T23267] FAT-fs (loop0): Unrecognized mount option "ÿÿÿÿÿÿÿÿ184467440737095516150xffffffffffffffff" or missing value [ 698.496132][T23278] RDX: 0000000000100000 RSI: 00007f155eef5000 RDI: 0000000000000005 [ 698.496152][T23278] RBP: 00007f155eef5000 R08: 0000000000000000 R09: 0000000000000534 [ 698.496168][T23278] R10: 0000000000100000 R11: 0000000000000293 R12: 0000000000000000 [ 698.524328][T23282] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 698.525271][T23278] R13: 00007f1567314fdc R14: 00007f1567314fe0 R15: 0000000020000fc2 [ 698.657824][T23278] [ 698.675628][T23278] loop3: detected capacity change from 0 to 2048 [ 698.689424][T23278] FAT-fs (loop3): Unrecognized mount option "ÿÿÿÿÿÿÿÿ184467440737095516150xffffffffffffffff" or missing value 07:23:31 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x8, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:23:31 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0x0, 0x5}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) 07:23:31 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000002c0)={&(0x7f0000000c80)=ANY=[@ANYBLOB="0026bd7000ffdbdf25070000000c00068008000b00060000000c0008002302b41174de3f460a6d000000000000080003000380000008000300bd2c00ff07000400f8ffffff080003001dd30000080004006604000000000000000000"], 0x5c}, 0x1, 0x0, 0x0, 0x1884}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6, 0x6}]}}}]}, 0x3c}}, 0x0) r3 = openat(r2, &(0x7f00000000c0)='./file0\x00', 0x0, 0x31) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00./file0\x00']) connect$unix(r3, &(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000001c0), 0x200080, 0x0) ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f0000000200)={0x55, 0xb5f3, 0x2, 0x1, 0x6}) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000600)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000800)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x40}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) io_setup(0x6, &(0x7f00000003c0)=0x0) r7 = socket$phonet_pipe(0x23, 0x5, 0x2) io_submit(r6, 0x2, &(0x7f00000005c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, r7, &(0x7f00000001c0)='\"', 0x1}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r8, &(0x7f0000006440)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f0000000c40)={0x10, 0x1d, 0x20, 0x70bd28, 0x25dfdbfd}, 0x10}, {&(0x7f0000000f80)={0x20c, 0x3d, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x1f, 0x46, 0x0, 0x1, [@generic="6b23bda57b0fcd6882aea56d992b0de112a87c9689a0ce8f3a928a"]}, @generic="931dd380ae9b76725532f39b25791247f8e1faaa5606177d1141efdf8a23daecc73d0706f82254c664a01e4c4986b42b265e8e88f8f88e8099514ce917072d6e80996cbddc81dd1014a75c1cd2e0c084d7806b82c11b8a625557f25357333f879c7f3ea978d0c62492b2b2a3437425bf3933cf6d0456ae40263ff847b9956f9f56cd1e35dd616a0dffde59", @nested={0x14d, 0x46, 0x0, 0x1, [@typed={0x8, 0x8f, 0x0, 0x0, @u32=0x4}, @generic="3fe433e9f5d2f6047805d9eb39d59742ad46c8bd198fea6b4f77d0bf577f925374abd91b16efa9a31621d58f4b1ee788ba33ce3ae89358fcbecdc28e3a8775ee6c905d5275bf5f05ca6bfc68336199389a9644323a81d22c4bd081ec9c4826b7e965a5292167778eefb5edac3e1e0fd628684a30dbac663eb65de357a891a90855f356cbe26225342cce43c8e320a777c2a1f74ab97b7e442c94", @typed={0x8, 0x41, 0x0, 0x0, @ipv4=@multicast2}, @typed={0x8, 0x6b, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @generic="79c7219fa8393ab7671b616b9cea5f59e77de2a2ea4a268fcad39d31284ee1045f7dedc0dea487845188adde6fe70f5537a0635e01c2ec0a205c1f92c2272999ec8388f9a95b4d387581056e112c58f96f686734281b5a", @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@remote}, @generic="2d7a6c2813a21aa5bc78773404596de147d491e1868776a08d604bfb6aea387b585ce5b3f7ab336df3922c65"]}]}, 0x20c}, {&(0x7f0000000e00)={0x30, 0x12, 0x800, 0x70bd27, 0x25dfdbfc, "", [@typed={0x8, 0x5b, 0x0, 0x0, @pid}, @typed={0xf, 0x8c, 0x0, 0x0, @str='syzkaller1\x00'}, @typed={0x8, 0x7, 0x0, 0x0, @u32}]}, 0x30}, {&(0x7f0000000e40)={0xc8, 0x42, 0x10, 0x70bd26, 0x25dfdbff, "", [@generic="208cd2ae6be9be", @generic="c1d6c27da633daf115873b83c8913d284239d441678e667c20444d1a1f77f48ea7cbf783d84e79a9ebc262452149fe521b40868bf3938c61c8be3cdbd7429e623c99db5ae26d9cf24ee4ef4777ff0410e8b899b18e829f387d7926641f189d2b9697e099ffb7f20f691064b7d87d04cd2e230e8df8c77a2f1e4f4fabd49cfe414b3027dd850d9a2be9547ba5f2ed09811ea9ed9b201782165a792b57afca3e3d575d0f5b4b17a8", @typed={0x8, 0x94, 0x0, 0x0, @u32=0x1}]}, 0xc8}], 0x4, 0x0, 0x0, 0x8801}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000900)) sendmsg$nl_route(r8, &(0x7f0000000c00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000bc0)={&(0x7f00000011c0)=@dellink={0x25c, 0x11, 0x400, 0x70bd28, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, 0x1000}, [@IFLA_PROTO_DOWN={0x5}, @IFLA_IFNAME={0x14, 0x3, 'macvlan1\x00'}, @IFLA_MAP={0x24, 0xe, {0x9, 0xd2, 0x2e4d, 0x200, 0x3e, 0xff}}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x5}, @IFLA_IFALIAS={0x14, 0x14, 'syzkaller1\x00'}, @IFLA_MTU={0x8, 0x4, 0x101}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_VFINFO_LIST={0x1cc, 0x16, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x8fe, 0xffff}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x5, 0x1}}]}, {0x84, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN_LIST={0x54, 0xc, 0x0, 0x1, [{0x14, 0x1, {0xb5d3, 0xadc, 0x100, 0xd1c53560eb87a9fa}}, {0x14, 0x1, {0x4, 0xb6, 0x81, 0x8100}}, {0x14, 0x1, {0x0, 0x6e4, 0x1, 0x88a8}}, {0x14, 0x1, {0x14, 0xaed, 0x0, 0x8100}}]}, @IFLA_VF_TX_RATE={0xc, 0x3, {0x1000, 0x200}}, @IFLA_VF_TRUST={0xc, 0x9, {0x7, 0x800}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x8000, 0x1}}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x7f, 0x7fff}}, @IFLA_VF_TRUST={0xc, 0x9, {0x7ff, 0x8}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_RATE={0x10, 0x6, {0x9, 0x5, 0x5}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x9}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x80000000, 0x3}}]}, {0xa4, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0xfff, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1d}}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x3f, 0x43}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x65c, 0x1}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x2, 0x80000001}}, @IFLA_VF_VLAN_LIST={0x40, 0xc, 0x0, 0x1, [{0x14, 0x1, {0xcae8, 0x919, 0x9, 0x8100}}, {0x14, 0x1, {0x200, 0xb47, 0xaaa, 0x8100}}, {0x14, 0x1, {0x5, 0x53b, 0xfffffff7, 0x88a8}}]}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x3f, 0x7fff}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x930, 0x5}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x6, 0x8}}]}]}]}, 0x25c}, 0x1, 0x0, 0x0, 0x11}, 0x4c089) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r7, 0x40189429, &(0x7f0000000480)={0x1, 0x4, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r9, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x45, 0xfc, 0x6}, {0x6}]}, 0x10) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r9) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x2, 0x3, &(0x7f0000000000)=@framed={{0x18, 0xf}}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) socket$inet6_sctp(0xa, 0x801, 0x84) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) r10 = socket$igmp(0x2, 0x3, 0x2) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@private1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) ioctl$TUNSETOWNER(r3, 0x400454cc, r11) setsockopt$MRT_INIT(r10, 0x0, 0xc8, &(0x7f0000000040), 0x4) setsockopt$MRT_ADD_VIF(r10, 0x0, 0xca, &(0x7f0000000100)={0x0, 0x1, 0x0, 0x0, @vifc_lcl_addr=@dev={0xac, 0x14, 0x14, 0xb}, @multicast1}, 0x10) 07:23:31 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, 0x0) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$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") (fail_nth: 84) 07:23:31 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000019000000", 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000380)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000008c0)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000001cc0)={{}, r2, 0x16, @inherit={0x88, &(0x7f0000001580)=ANY=[@ANYRES16=r3]}, @devid}) r4 = syz_open_dev$MSR(&(0x7f0000000140), 0x100000000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r4, 0x84009422, &(0x7f0000000ec0)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(r6, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000001840)=ANY=[@ANYRES32=r5, @ANYRES32=r3, @ANYRESOCT, @ANYRES32=r1, @ANYRES32, @ANYRES64, @ANYRESHEX], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x40025) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f0000001500)={r5, "2ce8b7e675c30c143ac940d229ad3592"}) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$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") r7 = socket$inet_udplite(0x2, 0x2, 0x88) read(r7, &(0x7f00000000c0)=""/43, 0x2b) 07:23:31 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) r2 = open(&(0x7f0000000040)='./file0\x00', 0x161842, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'sit0\x00'}) r4 = syz_io_uring_setup(0x73d7, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000100)=0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r6, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x10001) r8 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x8010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(r5, 0x0, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x8) syz_io_uring_submit(0x0, r8, &(0x7f00000008c0)=@IORING_OP_OPENAT2={0x1c, 0x40, 0x0, 0xffffffffffffffff, &(0x7f0000000840)={0x4ae0e0, 0x2, 0x5}, &(0x7f0000000880)='./file0\x00', 0x18, 0x0, 0x12345}, 0xff) syz_io_uring_submit(r5, 0x0, &(0x7f0000002b40)=@IORING_OP_RECVMSG={0xa, 0x2b, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000002b00)={0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/28, 0x1c}, {&(0x7f0000001540)=""/4096, 0x1000}, {&(0x7f0000002540)=""/131, 0x83}, {&(0x7f0000002600)=""/102, 0x66}, {&(0x7f0000002840)=""/203, 0xcb}], 0x6}, 0x0, 0x10040, 0x1, {0x1}}, 0x0) ftruncate(r2, 0x200002) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x200000e, 0x12, r3, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) r10 = creat(&(0x7f0000000180)='./file0\x00', 0x0) fallocate(r10, 0x0, 0x0, 0x2000402) fallocate(r9, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r9, 0xc028660f, &(0x7f0000001380)={0xc, r10, 0x28}) [ 699.162016][T23299] (unnamed net_device) (uninitialized): option use_carrier: invalid value (6) [ 699.163685][T23298] FAULT_INJECTION: forcing a failure. [ 699.163685][T23298] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 699.184850][T23298] CPU: 0 PID: 23298 Comm: syz-executor.3 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 699.195354][T23298] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 699.205522][T23298] Call Trace: [ 699.208863][T23298] [ 699.212081][T23298] dump_stack_lvl+0xda/0x130 [ 699.216735][T23298] dump_stack+0x15/0x20 [ 699.220942][T23298] should_fail_ex+0x21f/0x230 [ 699.225753][T23298] __alloc_pages+0x108/0x340 [ 699.230502][T23298] vma_alloc_folio+0x6a3/0x8c0 [ 699.235296][T23299] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 699.235306][T23298] ? __vm_enough_memory+0xdf/0x2a0 [ 699.235394][T23299] ================================================================== [ 699.235355][T23298] shmem_get_folio_gfp+0x801/0x1200 [ 699.235424][T23299] BUG: KCSAN: data-race in data_alloc / data_push_tail [ 699.235464][T23299] [ 699.235464][T23298] shmem_write_begin+0xa6/0x1d0 [ 699.235472][T23299] write to 0xffffffff86f0a218 of 8 bytes by task 23298 on cpu 0: [ 699.235492][T23299] data_alloc+0x216/0x2c0 [ 699.235514][T23299] prb_reserve+0x893/0xbc0 [ 699.235535][T23299] vprintk_store+0x53e/0x800 [ 699.235554][T23299] vprintk_emit+0xd0/0x430 [ 699.235578][T23299] vprintk_default+0x26/0x30 07:23:31 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0x0, 0x6}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) [ 699.235569][T23298] generic_perform_write+0x1c3/0x3d0 [ 699.235602][T23299] vprintk+0x83/0x90 [ 699.235627][T23298] ? shmem_write_begin+0x1d0/0x1d0 [ 699.235629][T23299] _printk+0x7a/0xa0 [ 699.235657][T23299] show_trace_log_lvl+0x37e/0x400 [ 699.235685][T23299] dump_stack_lvl+0xda/0x130 [ 699.235713][T23299] dump_stack+0x15/0x20 [ 699.235713][T23298] __generic_file_write_iter+0xe6/0x290 [ 699.235745][T23299] should_fail_ex+0x21f/0x230 [ 699.235754][T23298] generic_file_write_iter+0x7d/0x1c0 [ 699.235785][T23299] __alloc_pages+0x108/0x340 [ 699.235807][T23298] vfs_write+0x47b/0x780 [ 699.235823][T23299] vma_alloc_folio+0x6a3/0x8c0 [ 699.235843][T23298] ksys_write+0xeb/0x1a0 [ 699.235851][T23299] shmem_get_folio_gfp+0x801/0x1200 [ 699.235873][T23298] __x64_sys_write+0x42/0x50 [ 699.235878][T23299] shmem_write_begin+0xa6/0x1d0 [ 699.235902][T23299] generic_perform_write+0x1c3/0x3d0 [ 699.235930][T23299] __generic_file_write_iter+0xe6/0x290 [ 699.235959][T23299] generic_file_write_iter+0x7d/0x1c0 [ 699.235960][T23298] do_syscall_64+0x41/0xc0 07:23:31 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, 0x0) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$eJzs1T9rE3EYB/AnaazRqbM4/MDFqVQ3JyOSQvFAUTLoZKBxyYmQWy6Z8hJ8Ab4wB1+EZMp2Ei5VWxSDNLnSfj7LPdz3ud+/g7v39z+OTz8VH75+/hLdXivavbjTXrbiINpxZh4AwHWyrKr4XtWaXgsAsBv+/wBw87x5++7Fsyzrv06pG7GYl4NyUF/r/Pgk6x+llf3fnlqU5WDvZ/4o1c7nt+LuOn/8x3w/Hj6o81X2/GV2Ib8dp1vfPQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA3GyHKXUiIqWUDn7dXZTlYK/OD9OZC3ldHZ9k/aN1w/m8E/c6O9sGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAcAmK6Ww8zPPR5JoVEd9ix5N210d6uSMv/tXTW097VU5+m8XTTZtfLatq05GfRMTWF9+KmK/eUvNnuGnR3DcJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABoVjGdjYd5PpoUTa8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALgqiulsPMzz0eS/i2jVI/29p+k9AgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAM34EQAA///P7Cnj") (fail_nth: 85) [ 699.235994][T23299] vfs_write+0x47b/0x780 [ 699.235995][T23298] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 699.236019][T23299] ksys_write+0xeb/0x1a0 [ 699.236035][T23298] RIP: 0033:0x7f1567f53ecf [ 699.236045][T23299] __x64_sys_write+0x42/0x50 [ 699.236055][T23298] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 699.236072][T23299] do_syscall_64+0x41/0xc0 [ 699.236096][T23299] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 699.236123][T23299] [ 699.236127][T23299] read to 0xffffffff86f0a218 of 8 bytes by task 23299 on cpu 1: [ 699.236143][T23299] data_push_tail+0x102/0x430 [ 699.236161][T23298] RSP: 002b:00007f1567314f10 EFLAGS: 00000293 [ 699.236168][T23299] data_alloc+0xbe/0x2c0 [ 699.236180][T23298] ORIG_RAX: 0000000000000001 [ 699.236191][T23298] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007f1567f53ecf [ 699.236197][T23299] prb_reserve+0x893/0xbc0 [ 699.236210][T23298] RDX: 0000000000100000 RSI: 00007f155eef5000 RDI: 0000000000000005 [ 699.236229][T23298] RBP: 00007f155eef5000 R08: 0000000000000000 R09: 0000000000000534 [ 699.236226][T23299] vprintk_store+0x53e/0x800 [ 699.236247][T23298] R10: 0000000000100000 R11: 0000000000000293 R12: 0000000000000000 [ 699.236252][T23299] vprintk_emit+0xd0/0x430 [ 699.236265][T23298] R13: 00007f1567314fdc R14: 00007f1567314fe0 R15: 0000000020000fc2 [ 699.236277][T23299] vprintk_default+0x26/0x30 [ 699.236288][T23298] [ 699.236303][T23299] vprintk+0x83/0x90 [ 699.236327][T23299] _printk+0x7a/0xa0 [ 699.236349][T23299] __nla_validate_parse+0x15ba/0x1b50 [ 699.236388][T23299] __nla_parse+0x40/0x50 [ 699.236428][T23299] rtnl_newlink+0x1c0/0x15a0 [ 699.236450][T23299] rtnetlink_rcv_msg+0x807/0x8c0 [ 699.236472][T23299] netlink_rcv_skb+0x126/0x220 [ 699.236506][T23299] rtnetlink_rcv+0x1c/0x20 [ 699.236530][T23299] netlink_unicast+0x56f/0x640 [ 699.236560][T23299] netlink_sendmsg+0x665/0x770 [ 699.236593][T23299] __sys_sendto+0x246/0x300 [ 699.236617][T23299] __x64_sys_sendto+0x78/0x90 [ 699.236648][T23299] do_syscall_64+0x41/0xc0 [ 699.236676][T23299] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 699.236708][T23299] [ 699.236713][T23299] value changed: 0x00000001000019c4 -> 0x0000000100002a21 [ 699.236729][T23299] [ 699.236735][T23299] Reported by Kernel Concurrency Sanitizer on: [ 699.236744][T23299] CPU: 1 PID: 23299 Comm: syz-executor.5 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 699.236772][T23299] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 699.236789][T23299] ================================================================== [ 699.479619][T23313] FAULT_INJECTION: forcing a failure. [ 699.479619][T23313] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 699.535265][T23314] loop0: detected capacity change from 0 to 2048 [ 699.535584][T23313] CPU: 0 PID: 23313 Comm: syz-executor.3 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 699.552397][T23314] FAT-fs (loop0): Unrecognized mount option "ÿÿÿÿÿÿÿÿ184467440737095516150xffffffffffffffff" or missing value [ 699.552627][T23313] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 699.719305][T23313] Call Trace: [ 699.722603][T23313] [ 699.725565][T23313] dump_stack_lvl+0xda/0x130 [ 699.730602][T23313] dump_stack+0x15/0x20 [ 699.734922][T23313] should_fail_ex+0x21f/0x230 [ 699.739813][T23313] should_fail+0xb/0x10 [ 699.744043][T23313] should_fail_usercopy+0x1a/0x20 [ 699.749527][T23313] copy_page_from_iter_atomic+0x22d/0xcf0 [ 699.755351][T23313] ? folio_test_hugetlb+0x3a/0x70 07:23:32 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0x0, 0x7}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) [ 699.760514][T23313] ? shmem_write_begin+0x12a/0x1d0 [ 699.765921][T23313] generic_perform_write+0x203/0x3d0 [ 699.771249][T23313] ? shmem_write_begin+0x1d0/0x1d0 [ 699.776391][T23313] __generic_file_write_iter+0xe6/0x290 [ 699.781981][T23313] generic_file_write_iter+0x7d/0x1c0 [ 699.787447][T23313] vfs_write+0x47b/0x780 [ 699.791747][T23313] ksys_write+0xeb/0x1a0 [ 699.796046][T23313] __x64_sys_write+0x42/0x50 [ 699.800673][T23313] do_syscall_64+0x41/0xc0 [ 699.805232][T23313] entry_SYSCALL_64_after_hwframe+0x63/0xcd 07:23:32 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) r2 = open(&(0x7f0000000040)='./file0\x00', 0x161842, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'sit0\x00'}) r4 = syz_io_uring_setup(0x73d7, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000100)=0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r6, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x10001) r8 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x8010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(r5, 0x0, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x8) syz_io_uring_submit(0x0, r8, &(0x7f00000008c0)=@IORING_OP_OPENAT2={0x1c, 0x40, 0x0, 0xffffffffffffffff, &(0x7f0000000840)={0x4ae0e0, 0x2, 0x5}, &(0x7f0000000880)='./file0\x00', 0x18, 0x0, 0x12345}, 0xff) syz_io_uring_submit(r5, 0x0, &(0x7f0000002b40)=@IORING_OP_RECVMSG={0xa, 0x2b, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000002b00)={0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/28, 0x1c}, {&(0x7f0000001540)=""/4096, 0x1000}, {&(0x7f0000002540)=""/131, 0x83}, {&(0x7f0000002600)=""/102, 0x66}, {&(0x7f0000002840)=""/203, 0xcb}], 0x6}, 0x0, 0x10040, 0x1, {0x1}}, 0x0) ftruncate(r2, 0x200002) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x200000e, 0x12, r3, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) r10 = creat(&(0x7f0000000180)='./file0\x00', 0x0) fallocate(r10, 0x0, 0x0, 0x2000402) fallocate(r9, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r9, 0xc028660f, &(0x7f0000001380)={0xc, r10, 0x29}) [ 699.811175][T23313] RIP: 0033:0x7f1567f53ecf [ 699.815617][T23313] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 699.835314][T23313] RSP: 002b:00007f1567314f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 699.843802][T23313] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007f1567f53ecf [ 699.851863][T23313] RDX: 0000000000100000 RSI: 00007f155eef5000 RDI: 0000000000000005 07:23:32 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0x0, 0x8}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) [ 699.859897][T23313] RBP: 00007f155eef5000 R08: 0000000000000000 R09: 0000000000000534 [ 699.867939][T23313] R10: 0000000000100000 R11: 0000000000000293 R12: 0000000000000000 [ 699.875975][T23313] R13: 00007f1567314fdc R14: 00007f1567314fe0 R15: 0000000020000fc2 [ 699.884038][T23313] [ 699.894567][T23299] syz-executor.5 (23299) used greatest stack depth: 9360 bytes left 07:23:32 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0x0, 0x9}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) [ 699.914848][T23313] loop3: detected capacity change from 0 to 2048 [ 699.932761][T23313] FAT-fs (loop3): Unrecognized mount option "ÿÿÿÿÿÿÿÿ184467440737095516150xffffffffffffffff" or missing value 07:23:32 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0xa, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:23:32 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000002c0)={&(0x7f0000000c80)=ANY=[@ANYBLOB="0026bd7000ffdbdf25070000000c00068008000b00060000000c0008002302b41174de3f460a6d000000000000080003000380000008000300bd2c00ff07000400f8ffffff080003001dd30000080004006604000000000000000000"], 0x5c}, 0x1, 0x0, 0x0, 0x1884}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6, 0x6}]}}}]}, 0x3c}}, 0x0) r3 = openat(r2, &(0x7f00000000c0)='./file0\x00', 0x0, 0x31) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00./file0\x00']) connect$unix(r3, &(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000001c0), 0x200080, 0x0) ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f0000000200)={0x55, 0xb5f3, 0x2, 0x1, 0x6}) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000600)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000800)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x40}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) io_setup(0x6, &(0x7f00000003c0)=0x0) r7 = socket$phonet_pipe(0x23, 0x5, 0x2) io_submit(r6, 0x2, &(0x7f00000005c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, r7, &(0x7f00000001c0)='\"', 0x1}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r8, &(0x7f0000006440)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f0000000c40)={0x10, 0x1d, 0x20, 0x70bd28, 0x25dfdbfd}, 0x10}, {&(0x7f0000000f80)={0x20c, 0x3d, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x1f, 0x46, 0x0, 0x1, [@generic="6b23bda57b0fcd6882aea56d992b0de112a87c9689a0ce8f3a928a"]}, @generic="931dd380ae9b76725532f39b25791247f8e1faaa5606177d1141efdf8a23daecc73d0706f82254c664a01e4c4986b42b265e8e88f8f88e8099514ce917072d6e80996cbddc81dd1014a75c1cd2e0c084d7806b82c11b8a625557f25357333f879c7f3ea978d0c62492b2b2a3437425bf3933cf6d0456ae40263ff847b9956f9f56cd1e35dd616a0dffde59", @nested={0x14d, 0x46, 0x0, 0x1, [@typed={0x8, 0x8f, 0x0, 0x0, @u32=0x4}, @generic="3fe433e9f5d2f6047805d9eb39d59742ad46c8bd198fea6b4f77d0bf577f925374abd91b16efa9a31621d58f4b1ee788ba33ce3ae89358fcbecdc28e3a8775ee6c905d5275bf5f05ca6bfc68336199389a9644323a81d22c4bd081ec9c4826b7e965a5292167778eefb5edac3e1e0fd628684a30dbac663eb65de357a891a90855f356cbe26225342cce43c8e320a777c2a1f74ab97b7e442c94", @typed={0x8, 0x41, 0x0, 0x0, @ipv4=@multicast2}, @typed={0x8, 0x6b, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @generic="79c7219fa8393ab7671b616b9cea5f59e77de2a2ea4a268fcad39d31284ee1045f7dedc0dea487845188adde6fe70f5537a0635e01c2ec0a205c1f92c2272999ec8388f9a95b4d387581056e112c58f96f686734281b5a", @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@remote}, @generic="2d7a6c2813a21aa5bc78773404596de147d491e1868776a08d604bfb6aea387b585ce5b3f7ab336df3922c65"]}]}, 0x20c}, {&(0x7f0000000e00)={0x30, 0x12, 0x800, 0x70bd27, 0x25dfdbfc, "", [@typed={0x8, 0x5b, 0x0, 0x0, @pid}, @typed={0xf, 0x8c, 0x0, 0x0, @str='syzkaller1\x00'}, @typed={0x8, 0x7, 0x0, 0x0, @u32}]}, 0x30}, {&(0x7f0000000e40)={0xc8, 0x42, 0x10, 0x70bd26, 0x25dfdbff, "", [@generic="208cd2ae6be9be", @generic="c1d6c27da633daf115873b83c8913d284239d441678e667c20444d1a1f77f48ea7cbf783d84e79a9ebc262452149fe521b40868bf3938c61c8be3cdbd7429e623c99db5ae26d9cf24ee4ef4777ff0410e8b899b18e829f387d7926641f189d2b9697e099ffb7f20f691064b7d87d04cd2e230e8df8c77a2f1e4f4fabd49cfe414b3027dd850d9a2be9547ba5f2ed09811ea9ed9b201782165a792b57afca3e3d575d0f5b4b17a8", @typed={0x8, 0x94, 0x0, 0x0, @u32=0x1}]}, 0xc8}], 0x4, 0x0, 0x0, 0x8801}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000900)) sendmsg$nl_route(r8, &(0x7f0000000c00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000bc0)={&(0x7f00000011c0)=@dellink={0x25c, 0x11, 0x400, 0x70bd28, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, 0x1000}, [@IFLA_PROTO_DOWN={0x5}, @IFLA_IFNAME={0x14, 0x3, 'macvlan1\x00'}, @IFLA_MAP={0x24, 0xe, {0x9, 0xd2, 0x2e4d, 0x200, 0x3e, 0xff}}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x5}, @IFLA_IFALIAS={0x14, 0x14, 'syzkaller1\x00'}, @IFLA_MTU={0x8, 0x4, 0x101}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_VFINFO_LIST={0x1cc, 0x16, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x8fe, 0xffff}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x5, 0x1}}]}, {0x84, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN_LIST={0x54, 0xc, 0x0, 0x1, [{0x14, 0x1, {0xb5d3, 0xadc, 0x100, 0xd1c53560eb87a9fa}}, {0x14, 0x1, {0x4, 0xb6, 0x81, 0x8100}}, {0x14, 0x1, {0x0, 0x6e4, 0x1, 0x88a8}}, {0x14, 0x1, {0x14, 0xaed, 0x0, 0x8100}}]}, @IFLA_VF_TX_RATE={0xc, 0x3, {0x1000, 0x200}}, @IFLA_VF_TRUST={0xc, 0x9, {0x7, 0x800}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x8000, 0x1}}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x7f, 0x7fff}}, @IFLA_VF_TRUST={0xc, 0x9, {0x7ff, 0x8}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_RATE={0x10, 0x6, {0x9, 0x5, 0x5}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x9}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x80000000, 0x3}}]}, {0xa4, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0xfff, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1d}}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x3f, 0x43}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x65c, 0x1}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x2, 0x80000001}}, @IFLA_VF_VLAN_LIST={0x40, 0xc, 0x0, 0x1, [{0x14, 0x1, {0xcae8, 0x919, 0x9, 0x8100}}, {0x14, 0x1, {0x200, 0xb47, 0xaaa, 0x8100}}, {0x14, 0x1, {0x5, 0x53b, 0xfffffff7, 0x88a8}}]}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x3f, 0x7fff}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x930, 0x5}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x6, 0x8}}]}]}]}, 0x25c}, 0x1, 0x0, 0x0, 0x11}, 0x4c089) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r7, 0x40189429, &(0x7f0000000480)={0x1, 0x4, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r9, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x45, 0xfc, 0x6}, {0x6}]}, 0x10) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r9) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x2, 0x3, &(0x7f0000000000)=@framed={{0x18, 0xf}}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) socket$inet6_sctp(0xa, 0x801, 0x84) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) r10 = socket$igmp(0x2, 0x3, 0x2) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@private1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) ioctl$TUNSETOWNER(r3, 0x400454cc, r11) setsockopt$MRT_INIT(r10, 0x0, 0xc8, &(0x7f0000000040), 0x4) setsockopt$MRT_ADD_VIF(r10, 0x0, 0xca, &(0x7f0000000100)={0x0, 0x1, 0x0, 0x0, @vifc_lcl_addr=@dev={0xac, 0x14, 0x14, 0xb}, @multicast1}, 0x10) 07:23:32 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0x0, 0xa}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) 07:23:32 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, 0x0) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$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") (fail_nth: 86) [ 700.028709][T23332] (unnamed net_device) (uninitialized): option use_carrier: invalid value (6) 07:23:32 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000019000000", 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000380)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000008c0)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000001cc0)={{}, r2, 0x16, @inherit={0x88, &(0x7f0000001580)=ANY=[@ANYRES16=r3]}, @devid}) r4 = syz_open_dev$MSR(&(0x7f0000000140), 0x100000000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r4, 0x84009422, &(0x7f0000000ec0)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(r6, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000001840)=ANY=[@ANYRES32=r5, @ANYRES32=r3, @ANYRESOCT, @ANYRES32=r1, @ANYRES32, @ANYRES64, @ANYRESHEX], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x40025) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f0000001500)={r5, "2ce8b7e675c30c143ac940d229ad3592"}) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$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") r7 = socket$inet_udplite(0x2, 0x2, 0x88) read(r7, &(0x7f00000000c0)=""/43, 0x2b) [ 700.120365][T23332] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 700.133944][T23338] FAULT_INJECTION: forcing a failure. [ 700.133944][T23338] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 700.147584][T23338] CPU: 1 PID: 23338 Comm: syz-executor.3 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 700.158122][T23338] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 700.168245][T23338] Call Trace: [ 700.171539][T23338] [ 700.174492][T23338] dump_stack_lvl+0xda/0x130 [ 700.179198][T23338] dump_stack+0x15/0x20 [ 700.183375][T23338] should_fail_ex+0x21f/0x230 [ 700.188120][T23338] __alloc_pages+0x108/0x340 [ 700.192810][T23338] vma_alloc_folio+0x6a3/0x8c0 [ 700.197651][T23338] ? __vm_enough_memory+0xdf/0x2a0 [ 700.202861][T23338] shmem_get_folio_gfp+0x801/0x1200 [ 700.208258][T23338] shmem_write_begin+0xa6/0x1d0 [ 700.213230][T23338] generic_perform_write+0x1c3/0x3d0 [ 700.218569][T23338] ? shmem_write_begin+0x1d0/0x1d0 [ 700.223720][T23338] __generic_file_write_iter+0xe6/0x290 [ 700.229299][T23338] generic_file_write_iter+0x7d/0x1c0 [ 700.234778][T23338] vfs_write+0x47b/0x780 [ 700.239052][T23338] ksys_write+0xeb/0x1a0 [ 700.243477][T23338] __x64_sys_write+0x42/0x50 [ 700.248106][T23338] do_syscall_64+0x41/0xc0 [ 700.252646][T23338] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 700.258591][T23338] RIP: 0033:0x7f1567f53ecf 07:23:32 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0x0, 0xb}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) 07:23:32 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) r2 = open(&(0x7f0000000040)='./file0\x00', 0x161842, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'sit0\x00'}) r4 = syz_io_uring_setup(0x73d7, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000100)=0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r6, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x10001) r8 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x8010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(r5, 0x0, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x8) syz_io_uring_submit(0x0, r8, &(0x7f00000008c0)=@IORING_OP_OPENAT2={0x1c, 0x40, 0x0, 0xffffffffffffffff, &(0x7f0000000840)={0x4ae0e0, 0x2, 0x5}, &(0x7f0000000880)='./file0\x00', 0x18, 0x0, 0x12345}, 0xff) syz_io_uring_submit(r5, 0x0, &(0x7f0000002b40)=@IORING_OP_RECVMSG={0xa, 0x2b, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000002b00)={0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/28, 0x1c}, {&(0x7f0000001540)=""/4096, 0x1000}, {&(0x7f0000002540)=""/131, 0x83}, {&(0x7f0000002600)=""/102, 0x66}, {&(0x7f0000002840)=""/203, 0xcb}], 0x6}, 0x0, 0x10040, 0x1, {0x1}}, 0x0) ftruncate(r2, 0x200002) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x200000e, 0x12, r3, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) r10 = creat(&(0x7f0000000180)='./file0\x00', 0x0) fallocate(r10, 0x0, 0x0, 0x2000402) fallocate(r9, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r9, 0xc028660f, &(0x7f0000001380)={0xc, r10, 0x2a}) [ 700.263085][T23338] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 700.282805][T23338] RSP: 002b:00007f1567314f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 700.291245][T23338] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007f1567f53ecf [ 700.299246][T23338] RDX: 0000000000100000 RSI: 00007f155eef5000 RDI: 0000000000000005 [ 700.307285][T23338] RBP: 00007f155eef5000 R08: 0000000000000000 R09: 0000000000000534 [ 700.315274][T23338] R10: 0000000000100000 R11: 0000000000000293 R12: 0000000000000000 [ 700.323292][T23338] R13: 00007f1567314fdc R14: 00007f1567314fe0 R15: 0000000020000fc2 [ 700.331322][T23338] 07:23:32 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0x0, 0xc}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) 07:23:32 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000002c0)={&(0x7f0000000c80)=ANY=[@ANYBLOB="0026bd7000ffdbdf25070000000c00068008000b00060000000c0008002302b41174de3f460a6d000000000000080003000380000008000300bd2c00ff07000400f8ffffff080003001dd30000080004006604000000000000000000"], 0x5c}, 0x1, 0x0, 0x0, 0x1884}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6, 0x6}]}}}]}, 0x3c}}, 0x0) r3 = openat(r2, &(0x7f00000000c0)='./file0\x00', 0x0, 0x31) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00./file0\x00']) connect$unix(r3, &(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000001c0), 0x200080, 0x0) ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f0000000200)={0x55, 0xb5f3, 0x2, 0x1, 0x6}) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000600)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000800)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x40}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) io_setup(0x6, &(0x7f00000003c0)=0x0) r7 = socket$phonet_pipe(0x23, 0x5, 0x2) io_submit(r6, 0x2, &(0x7f00000005c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, r7, &(0x7f00000001c0)='\"', 0x1}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r8, &(0x7f0000006440)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f0000000c40)={0x10, 0x1d, 0x20, 0x70bd28, 0x25dfdbfd}, 0x10}, {&(0x7f0000000f80)={0x20c, 0x3d, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x1f, 0x46, 0x0, 0x1, [@generic="6b23bda57b0fcd6882aea56d992b0de112a87c9689a0ce8f3a928a"]}, @generic="931dd380ae9b76725532f39b25791247f8e1faaa5606177d1141efdf8a23daecc73d0706f82254c664a01e4c4986b42b265e8e88f8f88e8099514ce917072d6e80996cbddc81dd1014a75c1cd2e0c084d7806b82c11b8a625557f25357333f879c7f3ea978d0c62492b2b2a3437425bf3933cf6d0456ae40263ff847b9956f9f56cd1e35dd616a0dffde59", @nested={0x14d, 0x46, 0x0, 0x1, [@typed={0x8, 0x8f, 0x0, 0x0, @u32=0x4}, @generic="3fe433e9f5d2f6047805d9eb39d59742ad46c8bd198fea6b4f77d0bf577f925374abd91b16efa9a31621d58f4b1ee788ba33ce3ae89358fcbecdc28e3a8775ee6c905d5275bf5f05ca6bfc68336199389a9644323a81d22c4bd081ec9c4826b7e965a5292167778eefb5edac3e1e0fd628684a30dbac663eb65de357a891a90855f356cbe26225342cce43c8e320a777c2a1f74ab97b7e442c94", @typed={0x8, 0x41, 0x0, 0x0, @ipv4=@multicast2}, @typed={0x8, 0x6b, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @generic="79c7219fa8393ab7671b616b9cea5f59e77de2a2ea4a268fcad39d31284ee1045f7dedc0dea487845188adde6fe70f5537a0635e01c2ec0a205c1f92c2272999ec8388f9a95b4d387581056e112c58f96f686734281b5a", @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@remote}, @generic="2d7a6c2813a21aa5bc78773404596de147d491e1868776a08d604bfb6aea387b585ce5b3f7ab336df3922c65"]}]}, 0x20c}, {&(0x7f0000000e00)={0x30, 0x12, 0x800, 0x70bd27, 0x25dfdbfc, "", [@typed={0x8, 0x5b, 0x0, 0x0, @pid}, @typed={0xf, 0x8c, 0x0, 0x0, @str='syzkaller1\x00'}, @typed={0x8, 0x7, 0x0, 0x0, @u32}]}, 0x30}, {&(0x7f0000000e40)={0xc8, 0x42, 0x10, 0x70bd26, 0x25dfdbff, "", [@generic="208cd2ae6be9be", @generic="c1d6c27da633daf115873b83c8913d284239d441678e667c20444d1a1f77f48ea7cbf783d84e79a9ebc262452149fe521b40868bf3938c61c8be3cdbd7429e623c99db5ae26d9cf24ee4ef4777ff0410e8b899b18e829f387d7926641f189d2b9697e099ffb7f20f691064b7d87d04cd2e230e8df8c77a2f1e4f4fabd49cfe414b3027dd850d9a2be9547ba5f2ed09811ea9ed9b201782165a792b57afca3e3d575d0f5b4b17a8", @typed={0x8, 0x94, 0x0, 0x0, @u32=0x1}]}, 0xc8}], 0x4, 0x0, 0x0, 0x8801}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000900)) sendmsg$nl_route(r8, &(0x7f0000000c00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000bc0)={&(0x7f00000011c0)=@dellink={0x25c, 0x11, 0x400, 0x70bd28, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, 0x1000}, [@IFLA_PROTO_DOWN={0x5}, @IFLA_IFNAME={0x14, 0x3, 'macvlan1\x00'}, @IFLA_MAP={0x24, 0xe, {0x9, 0xd2, 0x2e4d, 0x200, 0x3e, 0xff}}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x5}, @IFLA_IFALIAS={0x14, 0x14, 'syzkaller1\x00'}, @IFLA_MTU={0x8, 0x4, 0x101}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_VFINFO_LIST={0x1cc, 0x16, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x8fe, 0xffff}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x5, 0x1}}]}, {0x84, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN_LIST={0x54, 0xc, 0x0, 0x1, [{0x14, 0x1, {0xb5d3, 0xadc, 0x100, 0xd1c53560eb87a9fa}}, {0x14, 0x1, {0x4, 0xb6, 0x81, 0x8100}}, {0x14, 0x1, {0x0, 0x6e4, 0x1, 0x88a8}}, {0x14, 0x1, {0x14, 0xaed, 0x0, 0x8100}}]}, @IFLA_VF_TX_RATE={0xc, 0x3, {0x1000, 0x200}}, @IFLA_VF_TRUST={0xc, 0x9, {0x7, 0x800}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x8000, 0x1}}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x7f, 0x7fff}}, @IFLA_VF_TRUST={0xc, 0x9, {0x7ff, 0x8}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_RATE={0x10, 0x6, {0x9, 0x5, 0x5}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x9}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x80000000, 0x3}}]}, {0xa4, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0xfff, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1d}}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x3f, 0x43}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x65c, 0x1}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x2, 0x80000001}}, @IFLA_VF_VLAN_LIST={0x40, 0xc, 0x0, 0x1, [{0x14, 0x1, {0xcae8, 0x919, 0x9, 0x8100}}, {0x14, 0x1, {0x200, 0xb47, 0xaaa, 0x8100}}, {0x14, 0x1, {0x5, 0x53b, 0xfffffff7, 0x88a8}}]}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x3f, 0x7fff}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x930, 0x5}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x6, 0x8}}]}]}]}, 0x25c}, 0x1, 0x0, 0x0, 0x11}, 0x4c089) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r7, 0x40189429, &(0x7f0000000480)={0x1, 0x4, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r9, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x45, 0xfc, 0x6}, {0x6}]}, 0x10) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r9) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x2, 0x3, &(0x7f0000000000)=@framed={{0x18, 0xf}}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) socket$inet6_sctp(0xa, 0x801, 0x84) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) r10 = socket$igmp(0x2, 0x3, 0x2) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@private1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) ioctl$TUNSETOWNER(r3, 0x400454cc, r11) setsockopt$MRT_INIT(r10, 0x0, 0xc8, &(0x7f0000000040), 0x4) setsockopt$MRT_ADD_VIF(r10, 0x0, 0xca, &(0x7f0000000100)={0x0, 0x1, 0x0, 0x0, @vifc_lcl_addr=@dev={0xac, 0x14, 0x14, 0xb}, @multicast1}, 0x10) [ 700.369280][T23347] loop0: detected capacity change from 0 to 2048 [ 700.403314][T23347] FAT-fs (loop0): Unrecognized mount option "ÿÿÿÿÿÿÿÿ184467440737095516150xffffffffffffffff" or missing value 07:23:32 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, 0x0) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$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") (fail_nth: 87) 07:23:32 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0x0, 0xd}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) [ 700.473265][T23359] FAULT_INJECTION: forcing a failure. [ 700.473265][T23359] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 700.475321][T23357] (unnamed net_device) (uninitialized): option use_carrier: invalid value (6) [ 700.487082][T23359] CPU: 0 PID: 23359 Comm: syz-executor.3 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 700.506344][T23359] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 700.516579][T23359] Call Trace: [ 700.519881][T23359] [ 700.522835][T23359] dump_stack_lvl+0xda/0x130 [ 700.527508][T23359] dump_stack+0x15/0x20 [ 700.531694][T23359] should_fail_ex+0x21f/0x230 [ 700.536535][T23359] should_fail+0xb/0x10 [ 700.540815][T23359] should_fail_usercopy+0x1a/0x20 [ 700.542246][T23357] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 700.545925][T23359] copy_page_from_iter_atomic+0x22d/0xcf0 [ 700.560955][T23359] ? folio_test_hugetlb+0x3a/0x70 [ 700.566052][T23359] ? shmem_write_begin+0x12a/0x1d0 [ 700.571221][T23359] generic_perform_write+0x203/0x3d0 [ 700.576554][T23359] ? shmem_write_begin+0x1d0/0x1d0 [ 700.581730][T23359] __generic_file_write_iter+0xe6/0x290 [ 700.587322][T23359] generic_file_write_iter+0x7d/0x1c0 [ 700.592788][T23359] vfs_write+0x47b/0x780 [ 700.597124][T23359] ksys_write+0xeb/0x1a0 [ 700.601419][T23359] __x64_sys_write+0x42/0x50 [ 700.606097][T23359] do_syscall_64+0x41/0xc0 [ 700.610619][T23359] ? irqentry_exit+0x12/0x40 [ 700.615254][T23359] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 700.621180][T23359] RIP: 0033:0x7f1567f53ecf [ 700.625613][T23359] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 700.645252][T23359] RSP: 002b:00007f1567314f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 700.653870][T23359] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007f1567f53ecf [ 700.661899][T23359] RDX: 0000000000100000 RSI: 00007f155eef5000 RDI: 0000000000000005 07:23:33 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0x0, 0xe}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) [ 700.669953][T23359] RBP: 00007f155eef5000 R08: 0000000000000000 R09: 0000000000000534 [ 700.678017][T23359] R10: 0000000000100000 R11: 0000000000000293 R12: 0000000000000000 [ 700.686127][T23359] R13: 00007f1567314fdc R14: 00007f1567314fe0 R15: 0000000020000fc2 [ 700.694205][T23359] [ 700.706302][T23359] loop3: detected capacity change from 0 to 2048 [ 700.714136][T23359] FAT-fs (loop3): Unrecognized mount option "ÿÿÿÿÿÿÿÿ184467440737095516150xffffffffffffffff" or missing value 07:23:33 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0xf, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:23:33 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0x0, 0xf}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) 07:23:33 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000002c0)={&(0x7f0000000c80)=ANY=[@ANYBLOB="0026bd7000ffdbdf25070000000c00068008000b00060000000c0008002302b41174de3f460a6d000000000000080003000380000008000300bd2c00ff07000400f8ffffff080003001dd30000080004006604000000000000000000"], 0x5c}, 0x1, 0x0, 0x0, 0x1884}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6, 0x6}]}}}]}, 0x3c}}, 0x0) r3 = openat(r2, &(0x7f00000000c0)='./file0\x00', 0x0, 0x31) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00./file0\x00']) connect$unix(r3, &(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000001c0), 0x200080, 0x0) ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f0000000200)={0x55, 0xb5f3, 0x2, 0x1, 0x6}) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000600)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000800)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x40}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) io_setup(0x6, &(0x7f00000003c0)=0x0) r7 = socket$phonet_pipe(0x23, 0x5, 0x2) io_submit(r6, 0x2, &(0x7f00000005c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, r7, &(0x7f00000001c0)='\"', 0x1}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r8, &(0x7f0000006440)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f0000000c40)={0x10, 0x1d, 0x20, 0x70bd28, 0x25dfdbfd}, 0x10}, {&(0x7f0000000f80)={0x20c, 0x3d, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x1f, 0x46, 0x0, 0x1, [@generic="6b23bda57b0fcd6882aea56d992b0de112a87c9689a0ce8f3a928a"]}, @generic="931dd380ae9b76725532f39b25791247f8e1faaa5606177d1141efdf8a23daecc73d0706f82254c664a01e4c4986b42b265e8e88f8f88e8099514ce917072d6e80996cbddc81dd1014a75c1cd2e0c084d7806b82c11b8a625557f25357333f879c7f3ea978d0c62492b2b2a3437425bf3933cf6d0456ae40263ff847b9956f9f56cd1e35dd616a0dffde59", @nested={0x14d, 0x46, 0x0, 0x1, [@typed={0x8, 0x8f, 0x0, 0x0, @u32=0x4}, @generic="3fe433e9f5d2f6047805d9eb39d59742ad46c8bd198fea6b4f77d0bf577f925374abd91b16efa9a31621d58f4b1ee788ba33ce3ae89358fcbecdc28e3a8775ee6c905d5275bf5f05ca6bfc68336199389a9644323a81d22c4bd081ec9c4826b7e965a5292167778eefb5edac3e1e0fd628684a30dbac663eb65de357a891a90855f356cbe26225342cce43c8e320a777c2a1f74ab97b7e442c94", @typed={0x8, 0x41, 0x0, 0x0, @ipv4=@multicast2}, @typed={0x8, 0x6b, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @generic="79c7219fa8393ab7671b616b9cea5f59e77de2a2ea4a268fcad39d31284ee1045f7dedc0dea487845188adde6fe70f5537a0635e01c2ec0a205c1f92c2272999ec8388f9a95b4d387581056e112c58f96f686734281b5a", @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@remote}, @generic="2d7a6c2813a21aa5bc78773404596de147d491e1868776a08d604bfb6aea387b585ce5b3f7ab336df3922c65"]}]}, 0x20c}, {&(0x7f0000000e00)={0x30, 0x12, 0x800, 0x70bd27, 0x25dfdbfc, "", [@typed={0x8, 0x5b, 0x0, 0x0, @pid}, @typed={0xf, 0x8c, 0x0, 0x0, @str='syzkaller1\x00'}, @typed={0x8, 0x7, 0x0, 0x0, @u32}]}, 0x30}, {&(0x7f0000000e40)={0xc8, 0x42, 0x10, 0x70bd26, 0x25dfdbff, "", [@generic="208cd2ae6be9be", @generic="c1d6c27da633daf115873b83c8913d284239d441678e667c20444d1a1f77f48ea7cbf783d84e79a9ebc262452149fe521b40868bf3938c61c8be3cdbd7429e623c99db5ae26d9cf24ee4ef4777ff0410e8b899b18e829f387d7926641f189d2b9697e099ffb7f20f691064b7d87d04cd2e230e8df8c77a2f1e4f4fabd49cfe414b3027dd850d9a2be9547ba5f2ed09811ea9ed9b201782165a792b57afca3e3d575d0f5b4b17a8", @typed={0x8, 0x94, 0x0, 0x0, @u32=0x1}]}, 0xc8}], 0x4, 0x0, 0x0, 0x8801}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000900)={'team0\x00', 0x0}) sendmsg$nl_route(r8, &(0x7f0000000c00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000bc0)={&(0x7f00000011c0)=@dellink={0x25c, 0x11, 0x400, 0x70bd28, 0x25dfdbff, {0x0, 0x0, 0x0, r9}, [@IFLA_PROTO_DOWN={0x5}, @IFLA_IFNAME={0x14, 0x3, 'macvlan1\x00'}, @IFLA_MAP={0x24, 0xe, {0x9, 0xd2, 0x2e4d, 0x200, 0x3e, 0xff}}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x5}, @IFLA_IFALIAS={0x14, 0x14, 'syzkaller1\x00'}, @IFLA_MTU={0x8, 0x4, 0x101}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_VFINFO_LIST={0x1cc, 0x16, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x8fe, 0xffff}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x5, 0x1}}]}, {0x84, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN_LIST={0x54, 0xc, 0x0, 0x1, [{0x14, 0x1, {0xb5d3, 0xadc, 0x100, 0xd1c53560eb87a9fa}}, {0x14, 0x1, {0x4, 0xb6, 0x81, 0x8100}}, {0x14, 0x1, {0x0, 0x6e4, 0x1, 0x88a8}}, {0x14, 0x1, {0x14, 0xaed, 0x0, 0x8100}}]}, @IFLA_VF_TX_RATE={0xc, 0x3, {0x1000, 0x200}}, @IFLA_VF_TRUST={0xc, 0x9, {0x7, 0x800}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x8000, 0x1}}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x7f, 0x7fff}}, @IFLA_VF_TRUST={0xc, 0x9, {0x7ff, 0x8}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_RATE={0x10, 0x6, {0x9, 0x5, 0x5}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x9}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x80000000, 0x3}}]}, {0xa4, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0xfff, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1d}}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x3f, 0x43}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x65c, 0x1}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x2, 0x80000001}}, @IFLA_VF_VLAN_LIST={0x40, 0xc, 0x0, 0x1, [{0x14, 0x1, {0xcae8, 0x919, 0x9, 0x8100}}, {0x14, 0x1, {0x200, 0xb47, 0xaaa, 0x8100}}, {0x14, 0x1, {0x5, 0x53b, 0xfffffff7, 0x88a8}}]}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x3f, 0x7fff}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x930, 0x5}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x6, 0x8}}]}]}]}, 0x25c}, 0x1, 0x0, 0x0, 0x11}, 0x4c089) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r7, 0x40189429, &(0x7f0000000480)={0x1, 0x4, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r10, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x45, 0xfc, 0x6}, {0x6}]}, 0x10) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x2, 0x3, &(0x7f0000000000)=@framed={{0x18, 0xf}}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) socket$inet6_sctp(0xa, 0x801, 0x84) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) r11 = socket$igmp(0x2, 0x3, 0x2) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@private1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) ioctl$TUNSETOWNER(r3, 0x400454cc, r12) setsockopt$MRT_INIT(r11, 0x0, 0xc8, &(0x7f0000000040), 0x4) setsockopt$MRT_ADD_VIF(r11, 0x0, 0xca, &(0x7f0000000100)={0x0, 0x1, 0x0, 0x0, @vifc_lcl_addr=@dev={0xac, 0x14, 0x14, 0xb}, @multicast1}, 0x10) 07:23:33 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, 0x0) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$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") (fail_nth: 88) [ 700.908525][T23373] FAULT_INJECTION: forcing a failure. [ 700.908525][T23373] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 700.912376][T23370] (unnamed net_device) (uninitialized): option use_carrier: invalid value (6) [ 700.921872][T23373] CPU: 0 PID: 23373 Comm: syz-executor.3 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 700.934238][T23370] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 700.941303][T23373] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 700.941321][T23373] Call Trace: [ 700.941327][T23373] [ 700.941335][T23373] dump_stack_lvl+0xda/0x130 [ 700.971630][T23373] dump_stack+0x15/0x20 [ 700.975823][T23373] should_fail_ex+0x21f/0x230 [ 700.980690][T23373] __alloc_pages+0x108/0x340 [ 700.985326][T23373] vma_alloc_folio+0x6a3/0x8c0 [ 700.990169][T23373] ? __vm_enough_memory+0xdf/0x2a0 [ 700.995377][T23373] shmem_get_folio_gfp+0x801/0x1200 [ 701.000670][T23373] shmem_write_begin+0xa6/0x1d0 [ 701.005566][T23373] generic_perform_write+0x1c3/0x3d0 [ 701.011013][T23373] ? shmem_write_begin+0x1d0/0x1d0 [ 701.016196][T23373] __generic_file_write_iter+0xe6/0x290 [ 701.021826][T23373] generic_file_write_iter+0x7d/0x1c0 [ 701.027340][T23373] vfs_write+0x47b/0x780 [ 701.031596][T23373] ksys_write+0xeb/0x1a0 [ 701.035875][T23373] __x64_sys_write+0x42/0x50 [ 701.040486][T23373] do_syscall_64+0x41/0xc0 [ 701.044980][T23373] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 701.050906][T23373] RIP: 0033:0x7f1567f53ecf 07:23:33 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000019000000", 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000380)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000008c0)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000001cc0)={{}, r2, 0x16, @inherit={0x88, &(0x7f0000001580)=ANY=[@ANYRES16=r3]}, @devid}) r4 = syz_open_dev$MSR(&(0x7f0000000140), 0x100000000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r4, 0x84009422, &(0x7f0000000ec0)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(r6, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000001840)=ANY=[@ANYRES32=r5, @ANYRES32=r3, @ANYRESOCT, @ANYRES32=r1, @ANYRES32, @ANYRES64, @ANYRESHEX], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x40025) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f0000001500)={r5, "2ce8b7e675c30c143ac940d229ad3592"}) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$eJzs1T9rE3EYB/AnaazRqbM4/MDFqVQ3JyOSQvFAUTLoZKBxyYmQWy6Z8hJ8Ab4wB1+EZMp2Ei5VWxSDNLnSfj7LPdz3ud+/g7v39z+OTz8VH75+/hLdXivavbjTXrbiINpxZh4AwHWyrKr4XtWaXgsAsBv+/wBw87x5++7Fsyzrv06pG7GYl4NyUF/r/Pgk6x+llf3fnlqU5WDvZ/4o1c7nt+LuOn/8x3w/Hj6o81X2/GV2Ib8dp1vfPQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA3GyHKXUiIqWUDn7dXZTlYK/OD9OZC3ldHZ9k/aN1w/m8E/c6O9sGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAcAmK6Ww8zPPR5JoVEd9ix5N210d6uSMv/tXTW097VU5+m8XTTZtfLatq05GfRMTWF9+KmK/eUvNnuGnR3DcJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABoVjGdjYd5PpoUTa8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALgqiulsPMzz0eS/i2jVI/29p+k9AgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAM34EQAA///P7Cnj") r7 = socket$inet_udplite(0x2, 0x2, 0x88) read(r7, &(0x7f00000000c0)=""/43, 0x2b) 07:23:33 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) r2 = open(&(0x7f0000000040)='./file0\x00', 0x161842, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'sit0\x00'}) r4 = syz_io_uring_setup(0x73d7, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000100)=0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r6, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x10001) r8 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x8010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(r5, 0x0, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x8) syz_io_uring_submit(0x0, r8, &(0x7f00000008c0)=@IORING_OP_OPENAT2={0x1c, 0x40, 0x0, 0xffffffffffffffff, &(0x7f0000000840)={0x4ae0e0, 0x2, 0x5}, &(0x7f0000000880)='./file0\x00', 0x18, 0x0, 0x12345}, 0xff) syz_io_uring_submit(r5, 0x0, &(0x7f0000002b40)=@IORING_OP_RECVMSG={0xa, 0x2b, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000002b00)={0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/28, 0x1c}, {&(0x7f0000001540)=""/4096, 0x1000}, {&(0x7f0000002540)=""/131, 0x83}, {&(0x7f0000002600)=""/102, 0x66}, {&(0x7f0000002840)=""/203, 0xcb}], 0x6}, 0x0, 0x10040, 0x1, {0x1}}, 0x0) ftruncate(r2, 0x200002) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x200000e, 0x12, r3, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) r10 = creat(&(0x7f0000000180)='./file0\x00', 0x0) fallocate(r10, 0x0, 0x0, 0x2000402) fallocate(r9, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r9, 0xc028660f, &(0x7f0000001380)={0xc, r10, 0x2b}) 07:23:33 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0x0, 0x10}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) [ 701.055321][T23373] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 701.075013][T23373] RSP: 002b:00007f1567314f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 701.083481][T23373] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007f1567f53ecf [ 701.091815][T23373] RDX: 0000000000100000 RSI: 00007f155eef5000 RDI: 0000000000000005 [ 701.099862][T23373] RBP: 00007f155eef5000 R08: 0000000000000000 R09: 0000000000000534 [ 701.107943][T23373] R10: 0000000000100000 R11: 0000000000000293 R12: 0000000000000000 [ 701.116000][T23373] R13: 00007f1567314fdc R14: 00007f1567314fe0 R15: 0000000020000fc2 [ 701.124266][T23373] 07:23:33 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0x0, 0x11}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) 07:23:33 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, 0x0) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$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") (fail_nth: 89) 07:23:33 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000002c0)={&(0x7f0000000c80)=ANY=[@ANYBLOB="0026bd7000ffdbdf25070000000c00068008000b00060000000c0008002302b41174de3f460a6d000000000000080003000380000008000300bd2c00ff07000400f8ffffff080003001dd30000080004006604000000000000000000"], 0x5c}, 0x1, 0x0, 0x0, 0x1884}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6, 0x6}]}}}]}, 0x3c}}, 0x0) r3 = openat(r2, &(0x7f00000000c0)='./file0\x00', 0x0, 0x31) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00./file0\x00']) connect$unix(r3, &(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000001c0), 0x200080, 0x0) ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f0000000200)={0x55, 0xb5f3, 0x2, 0x1, 0x6}) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000600)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000800)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x40}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) io_setup(0x6, &(0x7f00000003c0)=0x0) r7 = socket$phonet_pipe(0x23, 0x5, 0x2) io_submit(r6, 0x2, &(0x7f00000005c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, r7, &(0x7f00000001c0)='\"', 0x1}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r8, &(0x7f0000006440)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f0000000c40)={0x10, 0x1d, 0x20, 0x70bd28, 0x25dfdbfd}, 0x10}, {&(0x7f0000000f80)={0x20c, 0x3d, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x1f, 0x46, 0x0, 0x1, [@generic="6b23bda57b0fcd6882aea56d992b0de112a87c9689a0ce8f3a928a"]}, @generic="931dd380ae9b76725532f39b25791247f8e1faaa5606177d1141efdf8a23daecc73d0706f82254c664a01e4c4986b42b265e8e88f8f88e8099514ce917072d6e80996cbddc81dd1014a75c1cd2e0c084d7806b82c11b8a625557f25357333f879c7f3ea978d0c62492b2b2a3437425bf3933cf6d0456ae40263ff847b9956f9f56cd1e35dd616a0dffde59", @nested={0x14d, 0x46, 0x0, 0x1, [@typed={0x8, 0x8f, 0x0, 0x0, @u32=0x4}, @generic="3fe433e9f5d2f6047805d9eb39d59742ad46c8bd198fea6b4f77d0bf577f925374abd91b16efa9a31621d58f4b1ee788ba33ce3ae89358fcbecdc28e3a8775ee6c905d5275bf5f05ca6bfc68336199389a9644323a81d22c4bd081ec9c4826b7e965a5292167778eefb5edac3e1e0fd628684a30dbac663eb65de357a891a90855f356cbe26225342cce43c8e320a777c2a1f74ab97b7e442c94", @typed={0x8, 0x41, 0x0, 0x0, @ipv4=@multicast2}, @typed={0x8, 0x6b, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @generic="79c7219fa8393ab7671b616b9cea5f59e77de2a2ea4a268fcad39d31284ee1045f7dedc0dea487845188adde6fe70f5537a0635e01c2ec0a205c1f92c2272999ec8388f9a95b4d387581056e112c58f96f686734281b5a", @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@remote}, @generic="2d7a6c2813a21aa5bc78773404596de147d491e1868776a08d604bfb6aea387b585ce5b3f7ab336df3922c65"]}]}, 0x20c}, {&(0x7f0000000e00)={0x30, 0x12, 0x800, 0x70bd27, 0x25dfdbfc, "", [@typed={0x8, 0x5b, 0x0, 0x0, @pid}, @typed={0xf, 0x8c, 0x0, 0x0, @str='syzkaller1\x00'}, @typed={0x8, 0x7, 0x0, 0x0, @u32}]}, 0x30}, {&(0x7f0000000e40)={0xc8, 0x42, 0x10, 0x70bd26, 0x25dfdbff, "", [@generic="208cd2ae6be9be", @generic="c1d6c27da633daf115873b83c8913d284239d441678e667c20444d1a1f77f48ea7cbf783d84e79a9ebc262452149fe521b40868bf3938c61c8be3cdbd7429e623c99db5ae26d9cf24ee4ef4777ff0410e8b899b18e829f387d7926641f189d2b9697e099ffb7f20f691064b7d87d04cd2e230e8df8c77a2f1e4f4fabd49cfe414b3027dd850d9a2be9547ba5f2ed09811ea9ed9b201782165a792b57afca3e3d575d0f5b4b17a8", @typed={0x8, 0x94, 0x0, 0x0, @u32=0x1}]}, 0xc8}], 0x4, 0x0, 0x0, 0x8801}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000900)={'team0\x00', 0x0}) sendmsg$nl_route(r8, &(0x7f0000000c00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000bc0)={&(0x7f00000011c0)=@dellink={0x25c, 0x11, 0x400, 0x70bd28, 0x25dfdbff, {0x0, 0x0, 0x0, r9}, [@IFLA_PROTO_DOWN={0x5}, @IFLA_IFNAME={0x14, 0x3, 'macvlan1\x00'}, @IFLA_MAP={0x24, 0xe, {0x9, 0xd2, 0x2e4d, 0x200, 0x3e, 0xff}}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x5}, @IFLA_IFALIAS={0x14, 0x14, 'syzkaller1\x00'}, @IFLA_MTU={0x8, 0x4, 0x101}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_VFINFO_LIST={0x1cc, 0x16, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x8fe, 0xffff}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x5, 0x1}}]}, {0x84, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN_LIST={0x54, 0xc, 0x0, 0x1, [{0x14, 0x1, {0xb5d3, 0xadc, 0x100, 0xd1c53560eb87a9fa}}, {0x14, 0x1, {0x4, 0xb6, 0x81, 0x8100}}, {0x14, 0x1, {0x0, 0x6e4, 0x1, 0x88a8}}, {0x14, 0x1, {0x14, 0xaed, 0x0, 0x8100}}]}, @IFLA_VF_TX_RATE={0xc, 0x3, {0x1000, 0x200}}, @IFLA_VF_TRUST={0xc, 0x9, {0x7, 0x800}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x8000, 0x1}}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x7f, 0x7fff}}, @IFLA_VF_TRUST={0xc, 0x9, {0x7ff, 0x8}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_RATE={0x10, 0x6, {0x9, 0x5, 0x5}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x9}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x80000000, 0x3}}]}, {0xa4, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0xfff, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1d}}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x3f, 0x43}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x65c, 0x1}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x2, 0x80000001}}, @IFLA_VF_VLAN_LIST={0x40, 0xc, 0x0, 0x1, [{0x14, 0x1, {0xcae8, 0x919, 0x9, 0x8100}}, {0x14, 0x1, {0x200, 0xb47, 0xaaa, 0x8100}}, {0x14, 0x1, {0x5, 0x53b, 0xfffffff7, 0x88a8}}]}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x3f, 0x7fff}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x930, 0x5}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x6, 0x8}}]}]}]}, 0x25c}, 0x1, 0x0, 0x0, 0x11}, 0x4c089) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r7, 0x40189429, &(0x7f0000000480)={0x1, 0x4, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r10, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x45, 0xfc, 0x6}, {0x6}]}, 0x10) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x2, 0x3, &(0x7f0000000000)=@framed={{0x18, 0xf}}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) socket$inet6_sctp(0xa, 0x801, 0x84) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) r11 = socket$igmp(0x2, 0x3, 0x2) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@private1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) ioctl$TUNSETOWNER(r3, 0x400454cc, r12) setsockopt$MRT_INIT(r11, 0x0, 0xc8, &(0x7f0000000040), 0x4) setsockopt$MRT_ADD_VIF(r11, 0x0, 0xca, &(0x7f0000000100)={0x0, 0x1, 0x0, 0x0, @vifc_lcl_addr=@dev={0xac, 0x14, 0x14, 0xb}, @multicast1}, 0x10) [ 701.209265][T23380] loop0: detected capacity change from 0 to 2048 [ 701.217445][T23380] FAT-fs (loop0): Unrecognized mount option "ÿÿÿÿÿÿÿÿ184467440737095516150xffffffffffffffff" or missing value [ 701.242933][T23393] (unnamed net_device) (uninitialized): option use_carrier: invalid value (6) [ 701.243128][T23390] FAULT_INJECTION: forcing a failure. [ 701.243128][T23390] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 701.256758][T23393] selinux_netlink_send: 8 callbacks suppressed [ 701.256776][T23393] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=23393 comm=syz-executor.5 [ 701.265098][T23390] CPU: 1 PID: 23390 Comm: syz-executor.3 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 701.284827][T23393] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=61 sclass=netlink_route_socket pid=23393 comm=syz-executor.5 [ 701.294715][T23390] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 701.294734][T23390] Call Trace: [ 701.294740][T23390] [ 701.294748][T23390] dump_stack_lvl+0xda/0x130 [ 701.320524][T23393] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 701.321120][T23390] dump_stack+0x15/0x20 [ 701.342296][T23390] should_fail_ex+0x21f/0x230 [ 701.347096][T23390] __alloc_pages+0x108/0x340 [ 701.351742][T23390] vma_alloc_folio+0x6a3/0x8c0 [ 701.356580][T23390] ? __vm_enough_memory+0xdf/0x2a0 [ 701.361816][T23390] shmem_get_folio_gfp+0x801/0x1200 [ 701.367123][T23390] shmem_write_begin+0xa6/0x1d0 [ 701.372000][T23390] generic_perform_write+0x1c3/0x3d0 [ 701.377328][T23390] ? shmem_write_begin+0x1d0/0x1d0 [ 701.383022][T23390] __generic_file_write_iter+0xe6/0x290 [ 701.388626][T23390] generic_file_write_iter+0x7d/0x1c0 [ 701.394078][T23390] vfs_write+0x47b/0x780 [ 701.398384][T23390] ksys_write+0xeb/0x1a0 [ 701.402658][T23390] __x64_sys_write+0x42/0x50 [ 701.407390][T23390] do_syscall_64+0x41/0xc0 [ 701.411842][T23390] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 701.417846][T23390] RIP: 0033:0x7f1567f53ecf [ 701.422278][T23390] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 701.442066][T23390] RSP: 002b:00007f1567314f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 701.450598][T23390] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007f1567f53ecf 07:23:33 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0x0, 0x12}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) [ 701.458615][T23390] RDX: 0000000000100000 RSI: 00007f155eef5000 RDI: 0000000000000005 [ 701.466612][T23390] RBP: 00007f155eef5000 R08: 0000000000000000 R09: 0000000000000534 [ 701.474695][T23390] R10: 0000000000100000 R11: 0000000000000293 R12: 0000000000000000 [ 701.482794][T23390] R13: 00007f1567314fdc R14: 00007f1567314fe0 R15: 0000000020000fc2 [ 701.490840][T23390] 07:23:34 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, 0x0) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$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") (fail_nth: 90) [ 701.519361][T23395] validate_nla: 24 callbacks suppressed [ 701.519388][T23395] netlink: 'syz-executor.1': attribute type 6 has an invalid length. [ 701.563090][T23398] FAULT_INJECTION: forcing a failure. [ 701.563090][T23398] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 701.576265][T23398] CPU: 1 PID: 23398 Comm: syz-executor.3 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 701.586706][T23398] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 701.597134][T23398] Call Trace: [ 701.600457][T23398] [ 701.603403][T23398] dump_stack_lvl+0xda/0x130 [ 701.608083][T23398] dump_stack+0x15/0x20 [ 701.612450][T23398] should_fail_ex+0x21f/0x230 [ 701.617241][T23398] should_fail+0xb/0x10 [ 701.621465][T23398] should_fail_usercopy+0x1a/0x20 [ 701.626532][T23398] copy_page_from_iter_atomic+0x22d/0xcf0 [ 701.632403][T23398] ? folio_test_hugetlb+0x3a/0x70 [ 701.637504][T23398] ? shmem_write_begin+0x12a/0x1d0 [ 701.642647][T23398] generic_perform_write+0x203/0x3d0 [ 701.648030][T23398] ? shmem_write_begin+0x1d0/0x1d0 [ 701.653174][T23398] __generic_file_write_iter+0xe6/0x290 [ 701.658798][T23398] generic_file_write_iter+0x7d/0x1c0 [ 701.664254][T23398] vfs_write+0x47b/0x780 [ 701.668534][T23398] ksys_write+0xeb/0x1a0 [ 701.672803][T23398] __x64_sys_write+0x42/0x50 [ 701.677436][T23398] do_syscall_64+0x41/0xc0 [ 701.681903][T23398] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 701.687857][T23398] RIP: 0033:0x7f1567f53ecf [ 701.692304][T23398] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 07:23:34 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x10, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:23:34 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0x0, 0x25}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) 07:23:34 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) r2 = open(&(0x7f0000000040)='./file0\x00', 0x161842, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'sit0\x00'}) r4 = syz_io_uring_setup(0x73d7, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000100)=0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r6, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x10001) r8 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x8010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(r5, 0x0, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x8) syz_io_uring_submit(0x0, r8, &(0x7f00000008c0)=@IORING_OP_OPENAT2={0x1c, 0x40, 0x0, 0xffffffffffffffff, &(0x7f0000000840)={0x4ae0e0, 0x2, 0x5}, &(0x7f0000000880)='./file0\x00', 0x18, 0x0, 0x12345}, 0xff) syz_io_uring_submit(r5, 0x0, &(0x7f0000002b40)=@IORING_OP_RECVMSG={0xa, 0x2b, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000002b00)={0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/28, 0x1c}, {&(0x7f0000001540)=""/4096, 0x1000}, {&(0x7f0000002540)=""/131, 0x83}, {&(0x7f0000002600)=""/102, 0x66}, {&(0x7f0000002840)=""/203, 0xcb}], 0x6}, 0x0, 0x10040, 0x1, {0x1}}, 0x0) ftruncate(r2, 0x200002) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x200000e, 0x12, r3, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) r10 = creat(&(0x7f0000000180)='./file0\x00', 0x0) fallocate(r10, 0x0, 0x0, 0x2000402) fallocate(r9, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r9, 0xc028660f, &(0x7f0000001380)={0xc, r10, 0x2c}) 07:23:34 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000002c0)={&(0x7f0000000c80)=ANY=[@ANYBLOB="0026bd7000ffdbdf25070000000c00068008000b00060000000c0008002302b41174de3f460a6d000000000000080003000380000008000300bd2c00ff07000400f8ffffff080003001dd30000080004006604000000000000000000"], 0x5c}, 0x1, 0x0, 0x0, 0x1884}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6, 0x6}]}}}]}, 0x3c}}, 0x0) r3 = openat(r2, &(0x7f00000000c0)='./file0\x00', 0x0, 0x31) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00./file0\x00']) connect$unix(r3, &(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000001c0), 0x200080, 0x0) ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f0000000200)={0x55, 0xb5f3, 0x2, 0x1, 0x6}) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000600)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000800)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x40}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) io_setup(0x6, &(0x7f00000003c0)=0x0) r7 = socket$phonet_pipe(0x23, 0x5, 0x2) io_submit(r6, 0x2, &(0x7f00000005c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, r7, &(0x7f00000001c0)='\"', 0x1}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r8, &(0x7f0000006440)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f0000000c40)={0x10, 0x1d, 0x20, 0x70bd28, 0x25dfdbfd}, 0x10}, {&(0x7f0000000f80)={0x20c, 0x3d, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x1f, 0x46, 0x0, 0x1, [@generic="6b23bda57b0fcd6882aea56d992b0de112a87c9689a0ce8f3a928a"]}, @generic="931dd380ae9b76725532f39b25791247f8e1faaa5606177d1141efdf8a23daecc73d0706f82254c664a01e4c4986b42b265e8e88f8f88e8099514ce917072d6e80996cbddc81dd1014a75c1cd2e0c084d7806b82c11b8a625557f25357333f879c7f3ea978d0c62492b2b2a3437425bf3933cf6d0456ae40263ff847b9956f9f56cd1e35dd616a0dffde59", @nested={0x14d, 0x46, 0x0, 0x1, [@typed={0x8, 0x8f, 0x0, 0x0, @u32=0x4}, @generic="3fe433e9f5d2f6047805d9eb39d59742ad46c8bd198fea6b4f77d0bf577f925374abd91b16efa9a31621d58f4b1ee788ba33ce3ae89358fcbecdc28e3a8775ee6c905d5275bf5f05ca6bfc68336199389a9644323a81d22c4bd081ec9c4826b7e965a5292167778eefb5edac3e1e0fd628684a30dbac663eb65de357a891a90855f356cbe26225342cce43c8e320a777c2a1f74ab97b7e442c94", @typed={0x8, 0x41, 0x0, 0x0, @ipv4=@multicast2}, @typed={0x8, 0x6b, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @generic="79c7219fa8393ab7671b616b9cea5f59e77de2a2ea4a268fcad39d31284ee1045f7dedc0dea487845188adde6fe70f5537a0635e01c2ec0a205c1f92c2272999ec8388f9a95b4d387581056e112c58f96f686734281b5a", @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@remote}, @generic="2d7a6c2813a21aa5bc78773404596de147d491e1868776a08d604bfb6aea387b585ce5b3f7ab336df3922c65"]}]}, 0x20c}, {&(0x7f0000000e00)={0x30, 0x12, 0x800, 0x70bd27, 0x25dfdbfc, "", [@typed={0x8, 0x5b, 0x0, 0x0, @pid}, @typed={0xf, 0x8c, 0x0, 0x0, @str='syzkaller1\x00'}, @typed={0x8, 0x7, 0x0, 0x0, @u32}]}, 0x30}, {&(0x7f0000000e40)={0xc8, 0x42, 0x10, 0x70bd26, 0x25dfdbff, "", [@generic="208cd2ae6be9be", @generic="c1d6c27da633daf115873b83c8913d284239d441678e667c20444d1a1f77f48ea7cbf783d84e79a9ebc262452149fe521b40868bf3938c61c8be3cdbd7429e623c99db5ae26d9cf24ee4ef4777ff0410e8b899b18e829f387d7926641f189d2b9697e099ffb7f20f691064b7d87d04cd2e230e8df8c77a2f1e4f4fabd49cfe414b3027dd850d9a2be9547ba5f2ed09811ea9ed9b201782165a792b57afca3e3d575d0f5b4b17a8", @typed={0x8, 0x94, 0x0, 0x0, @u32=0x1}]}, 0xc8}], 0x4, 0x0, 0x0, 0x8801}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000900)={'team0\x00', 0x0}) sendmsg$nl_route(r8, &(0x7f0000000c00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000bc0)={&(0x7f00000011c0)=@dellink={0x25c, 0x11, 0x400, 0x70bd28, 0x25dfdbff, {0x0, 0x0, 0x0, r9}, [@IFLA_PROTO_DOWN={0x5}, @IFLA_IFNAME={0x14, 0x3, 'macvlan1\x00'}, @IFLA_MAP={0x24, 0xe, {0x9, 0xd2, 0x2e4d, 0x200, 0x3e, 0xff}}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x5}, @IFLA_IFALIAS={0x14, 0x14, 'syzkaller1\x00'}, @IFLA_MTU={0x8, 0x4, 0x101}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_VFINFO_LIST={0x1cc, 0x16, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x8fe, 0xffff}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x5, 0x1}}]}, {0x84, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN_LIST={0x54, 0xc, 0x0, 0x1, [{0x14, 0x1, {0xb5d3, 0xadc, 0x100, 0xd1c53560eb87a9fa}}, {0x14, 0x1, {0x4, 0xb6, 0x81, 0x8100}}, {0x14, 0x1, {0x0, 0x6e4, 0x1, 0x88a8}}, {0x14, 0x1, {0x14, 0xaed, 0x0, 0x8100}}]}, @IFLA_VF_TX_RATE={0xc, 0x3, {0x1000, 0x200}}, @IFLA_VF_TRUST={0xc, 0x9, {0x7, 0x800}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x8000, 0x1}}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x7f, 0x7fff}}, @IFLA_VF_TRUST={0xc, 0x9, {0x7ff, 0x8}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_RATE={0x10, 0x6, {0x9, 0x5, 0x5}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x9}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x80000000, 0x3}}]}, {0xa4, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0xfff, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1d}}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x3f, 0x43}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x65c, 0x1}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x2, 0x80000001}}, @IFLA_VF_VLAN_LIST={0x40, 0xc, 0x0, 0x1, [{0x14, 0x1, {0xcae8, 0x919, 0x9, 0x8100}}, {0x14, 0x1, {0x200, 0xb47, 0xaaa, 0x8100}}, {0x14, 0x1, {0x5, 0x53b, 0xfffffff7, 0x88a8}}]}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x3f, 0x7fff}}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x930, 0x5}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x6, 0x8}}]}]}]}, 0x25c}, 0x1, 0x0, 0x0, 0x11}, 0x4c089) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r7, 0x40189429, &(0x7f0000000480)={0x1, 0x4, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r10, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x45, 0xfc, 0x6}, {0x6}]}, 0x10) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x2, 0x3, &(0x7f0000000000)=@framed={{0x18, 0xf}}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) socket$inet6_sctp(0xa, 0x801, 0x84) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) r11 = socket$igmp(0x2, 0x3, 0x2) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@private1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) ioctl$TUNSETOWNER(r3, 0x400454cc, r12) setsockopt$MRT_INIT(r11, 0x0, 0xc8, &(0x7f0000000040), 0x4) setsockopt$MRT_ADD_VIF(r11, 0x0, 0xca, &(0x7f0000000100)={0x0, 0x1, 0x0, 0x0, @vifc_lcl_addr=@dev={0xac, 0x14, 0x14, 0xb}, @multicast1}, 0x10) [ 701.712025][T23398] RSP: 002b:00007f1567314f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 701.720462][T23398] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007f1567f53ecf [ 701.728895][T23398] RDX: 0000000000100000 RSI: 00007f155eef5000 RDI: 0000000000000005 [ 701.736894][T23398] RBP: 00007f155eef5000 R08: 0000000000000000 R09: 0000000000000534 [ 701.744936][T23398] R10: 0000000000100000 R11: 0000000000000293 R12: 0000000000000000 [ 701.752928][T23398] R13: 00007f1567314fdc R14: 00007f1567314fe0 R15: 0000000020000fc2 [ 701.760914][T23398] [ 701.782629][T23402] netlink: 'syz-executor.5': attribute type 6 has an invalid length. [ 701.791002][T23398] loop3: detected capacity change from 0 to 2048 [ 701.792204][T23398] FAT-fs (loop3): Unrecognized mount option "ÿÿÿÿÿÿÿÿ184467440737095516150xffffffffffffffff" or missing value [ 701.820076][T23402] (unnamed net_device) (uninitialized): option use_carrier: invalid value (6) [ 701.829466][T23401] netlink: 'syz-executor.1': attribute type 6 has an invalid length. [ 701.829695][T23402] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=23402 comm=syz-executor.5 [ 701.854683][T23402] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=61 sclass=netlink_route_socket pid=23402 comm=syz-executor.5 [ 701.871002][T23402] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 07:23:34 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000019000000", 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000380)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000008c0)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000001cc0)={{}, r2, 0x16, @inherit={0x88, &(0x7f0000001580)=ANY=[@ANYRES16=r3]}, @devid}) r4 = syz_open_dev$MSR(&(0x7f0000000140), 0x100000000, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r4, 0x84009422, &(0x7f0000000ec0)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(r6, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000001840)=ANY=[@ANYRES32=r5, @ANYRES32=r3, @ANYRESOCT, @ANYRES32=r1, @ANYRES32, @ANYRES64, @ANYRESHEX], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x40025) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f0000001500)={r5, "2ce8b7e675c30c143ac940d229ad3592"}) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$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") r7 = socket$inet_udplite(0x2, 0x2, 0x88) read(r7, &(0x7f00000000c0)=""/43, 0x2b) 07:23:34 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0x0, 0x2c}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) 07:23:34 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, 0x0) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$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") (fail_nth: 91) 07:23:34 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000002c0)={&(0x7f0000000c80)=ANY=[@ANYBLOB="0026bd7000ffdbdf25070000000c00068008000b00060000000c0008002302b41174de3f460a6d000000000000080003000380000008000300bd2c00ff07000400f8ffffff080003001dd30000080004006604000000000000000000"], 0x5c}, 0x1, 0x0, 0x0, 0x1884}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6, 0x6}]}}}]}, 0x3c}}, 0x0) r3 = openat(r2, &(0x7f00000000c0)='./file0\x00', 0x0, 0x31) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00./file0\x00']) connect$unix(r3, &(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000001c0), 0x200080, 0x0) ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f0000000200)={0x55, 0xb5f3, 0x2, 0x1, 0x6}) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000600)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000800)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x40}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) io_setup(0x6, &(0x7f00000003c0)=0x0) r7 = socket$phonet_pipe(0x23, 0x5, 0x2) io_submit(r6, 0x2, &(0x7f00000005c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, r7, &(0x7f00000001c0)='\"', 0x1}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r8, &(0x7f0000006440)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f0000000c40)={0x10, 0x1d, 0x20, 0x70bd28, 0x25dfdbfd}, 0x10}, {&(0x7f0000000f80)={0x20c, 0x3d, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x1f, 0x46, 0x0, 0x1, [@generic="6b23bda57b0fcd6882aea56d992b0de112a87c9689a0ce8f3a928a"]}, @generic="931dd380ae9b76725532f39b25791247f8e1faaa5606177d1141efdf8a23daecc73d0706f82254c664a01e4c4986b42b265e8e88f8f88e8099514ce917072d6e80996cbddc81dd1014a75c1cd2e0c084d7806b82c11b8a625557f25357333f879c7f3ea978d0c62492b2b2a3437425bf3933cf6d0456ae40263ff847b9956f9f56cd1e35dd616a0dffde59", @nested={0x14d, 0x46, 0x0, 0x1, [@typed={0x8, 0x8f, 0x0, 0x0, @u32=0x4}, @generic="3fe433e9f5d2f6047805d9eb39d59742ad46c8bd198fea6b4f77d0bf577f925374abd91b16efa9a31621d58f4b1ee788ba33ce3ae89358fcbecdc28e3a8775ee6c905d5275bf5f05ca6bfc68336199389a9644323a81d22c4bd081ec9c4826b7e965a5292167778eefb5edac3e1e0fd628684a30dbac663eb65de357a891a90855f356cbe26225342cce43c8e320a777c2a1f74ab97b7e442c94", @typed={0x8, 0x41, 0x0, 0x0, @ipv4=@multicast2}, @typed={0x8, 0x6b, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @generic="79c7219fa8393ab7671b616b9cea5f59e77de2a2ea4a268fcad39d31284ee1045f7dedc0dea487845188adde6fe70f5537a0635e01c2ec0a205c1f92c2272999ec8388f9a95b4d387581056e112c58f96f686734281b5a", @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@remote}, @generic="2d7a6c2813a21aa5bc78773404596de147d491e1868776a08d604bfb6aea387b585ce5b3f7ab336df3922c65"]}]}, 0x20c}, {&(0x7f0000000e00)={0x30, 0x12, 0x800, 0x70bd27, 0x25dfdbfc, "", [@typed={0x8, 0x5b, 0x0, 0x0, @pid}, @typed={0xf, 0x8c, 0x0, 0x0, @str='syzkaller1\x00'}, @typed={0x8, 0x7, 0x0, 0x0, @u32}]}, 0x30}, {&(0x7f0000000e40)={0xc8, 0x42, 0x10, 0x70bd26, 0x25dfdbff, "", [@generic="208cd2ae6be9be", @generic="c1d6c27da633daf115873b83c8913d284239d441678e667c20444d1a1f77f48ea7cbf783d84e79a9ebc262452149fe521b40868bf3938c61c8be3cdbd7429e623c99db5ae26d9cf24ee4ef4777ff0410e8b899b18e829f387d7926641f189d2b9697e099ffb7f20f691064b7d87d04cd2e230e8df8c77a2f1e4f4fabd49cfe414b3027dd850d9a2be9547ba5f2ed09811ea9ed9b201782165a792b57afca3e3d575d0f5b4b17a8", @typed={0x8, 0x94, 0x0, 0x0, @u32=0x1}]}, 0xc8}], 0x4, 0x0, 0x0, 0x8801}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000900)={'team0\x00', 0x0}) sendmsg$nl_route(r8, &(0x7f0000000c00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000bc0)={&(0x7f00000011c0)=@dellink={0x90, 0x11, 0x400, 0x70bd28, 0x25dfdbff, {0x0, 0x0, 0x0, r9, 0x1000}, [@IFLA_PROTO_DOWN={0x5}, @IFLA_IFNAME={0x14, 0x3, 'macvlan1\x00'}, @IFLA_MAP={0x24, 0xe, {0x9, 0xd2, 0x2e4d, 0x200, 0x3e, 0xff}}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x5}, @IFLA_IFALIAS={0x14, 0x14, 'syzkaller1\x00'}, @IFLA_MTU={0x8, 0x4, 0x101}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x90}, 0x1, 0x0, 0x0, 0x11}, 0x4c089) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r7, 0x40189429, &(0x7f0000000480)={0x1, 0x4, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r10, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x45, 0xfc, 0x6}, {0x6}]}, 0x10) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x2, 0x3, &(0x7f0000000000)=@framed={{0x18, 0xf}}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) socket$inet6_sctp(0xa, 0x801, 0x84) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) r11 = socket$igmp(0x2, 0x3, 0x2) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@private1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) ioctl$TUNSETOWNER(r3, 0x400454cc, r12) setsockopt$MRT_INIT(r11, 0x0, 0xc8, &(0x7f0000000040), 0x4) setsockopt$MRT_ADD_VIF(r11, 0x0, 0xca, &(0x7f0000000100)={0x0, 0x1, 0x0, 0x0, @vifc_lcl_addr=@dev={0xac, 0x14, 0x14, 0xb}, @multicast1}, 0x10) [ 701.967607][T23410] netlink: 'syz-executor.1': attribute type 6 has an invalid length. [ 702.020887][T23411] FAULT_INJECTION: forcing a failure. [ 702.020887][T23411] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 702.034666][T23411] CPU: 0 PID: 23411 Comm: syz-executor.3 Not tainted 6.4.0-rc6-syzkaller-00037-gb6dad5178cea #0 [ 702.045193][T23411] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 702.055363][T23411] Call Trace: [ 702.058669][T23411] [ 702.061619][T23411] dump_stack_lvl+0xda/0x130 [ 702.066315][T23411] dump_stack+0x15/0x20 [ 702.067483][T23413] loop0: detected capacity change from 0 to 2048 [ 702.070546][T23411] should_fail_ex+0x21f/0x230 [ 702.078290][T23413] FAT-fs (loop0): Unrecognized mount option "ÿÿÿÿÿÿÿÿ184467440737095516150xffffffffffffffff" or missing value [ 702.081795][T23411] should_fail+0xb/0x10 [ 702.097749][T23411] should_fail_usercopy+0x1a/0x20 [ 702.102817][T23411] copy_page_from_iter_atomic+0x22d/0xcf0 [ 702.108590][T23411] ? folio_test_hugetlb+0x3a/0x70 [ 702.113658][T23411] ? shmem_write_begin+0x12a/0x1d0 [ 702.118866][T23411] generic_perform_write+0x203/0x3d0 [ 702.124240][T23411] ? shmem_write_begin+0x1d0/0x1d0 [ 702.129382][T23411] __generic_file_write_iter+0xe6/0x290 [ 702.135045][T23411] generic_file_write_iter+0x7d/0x1c0 [ 702.140550][T23411] vfs_write+0x47b/0x780 [ 702.145088][T23411] ksys_write+0xeb/0x1a0 [ 702.149547][T23411] __x64_sys_write+0x42/0x50 [ 702.154179][T23411] do_syscall_64+0x41/0xc0 [ 702.158698][T23411] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 702.164708][T23411] RIP: 0033:0x7f1567f53ecf 07:23:34 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) r2 = open(&(0x7f0000000040)='./file0\x00', 0x161842, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'sit0\x00'}) r4 = syz_io_uring_setup(0x73d7, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000100)=0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r6, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x10001) r8 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x8010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(r5, 0x0, &(0x7f0000008540)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x8) syz_io_uring_submit(0x0, r8, &(0x7f00000008c0)=@IORING_OP_OPENAT2={0x1c, 0x40, 0x0, 0xffffffffffffffff, &(0x7f0000000840)={0x4ae0e0, 0x2, 0x5}, &(0x7f0000000880)='./file0\x00', 0x18, 0x0, 0x12345}, 0xff) syz_io_uring_submit(r5, 0x0, &(0x7f0000002b40)=@IORING_OP_RECVMSG={0xa, 0x2b, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000002b00)={0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/28, 0x1c}, {&(0x7f0000001540)=""/4096, 0x1000}, {&(0x7f0000002540)=""/131, 0x83}, {&(0x7f0000002600)=""/102, 0x66}, {&(0x7f0000002840)=""/203, 0xcb}], 0x6}, 0x0, 0x10040, 0x1, {0x1}}, 0x0) ftruncate(r2, 0x200002) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x200000e, 0x12, r3, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) r10 = creat(&(0x7f0000000180)='./file0\x00', 0x0) fallocate(r10, 0x0, 0x0, 0x2000402) fallocate(r9, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r9, 0xc028660f, &(0x7f0000001380)={0xc, r10, 0x2d}) 07:23:34 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0x0, 0x2f}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) [ 702.169146][T23411] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 702.188779][T23411] RSP: 002b:00007f1567314f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 702.197302][T23411] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007f1567f53ecf [ 702.205348][T23411] RDX: 0000000000100000 RSI: 00007f155eef5000 RDI: 0000000000000005 [ 702.213396][T23411] RBP: 00007f155eef5000 R08: 0000000000000000 R09: 0000000000000534 [ 702.221385][T23411] R10: 0000000000100000 R11: 0000000000000293 R12: 0000000000000000 [ 702.229812][T23411] R13: 00007f1567314fdc R14: 00007f1567314fe0 R15: 0000000020000fc2 [ 702.237868][T23411] [ 702.249510][T23420] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=61 sclass=netlink_route_socket pid=23420 comm=syz-executor.5 [ 702.256376][T23426] netlink: 'syz-executor.1': attribute type 6 has an invalid length. 07:23:34 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0x0, 0x38}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) [ 702.291641][T23411] loop3: detected capacity change from 0 to 2048 [ 702.314050][T23411] FAT-fs (loop3): Unrecognized mount option "ÿÿÿÿÿÿÿÿ184467440737095516150xffffffffffffffff" or missing value 07:23:34 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0x0, 0x3a}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) [ 702.335123][T23429] netlink: 'syz-executor.1': attribute type 6 has an invalid length. [ 702.378742][T23432] netlink: 'syz-executor.1': attribute type 6 has an invalid length. 07:23:35 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000000)="eb", 0x1a000, 0x44, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:23:35 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, 0x0) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x53a, &(0x7f0000000fc0)="$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