inconsistent configuration, please check. 05:21:30 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0xa000000) 05:21:30 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) capset(&(0x7f0000000080)={0x19980330}, &(0x7f00009b3000)) r1 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0xfffffffffffffffd) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f00000000c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) ftruncate(r1, 0x80080) r3 = socket$pptp(0x18, 0x1, 0x2) ioctl$int_out(r3, 0xfca2, &(0x7f0000000000)) openat(r2, &(0x7f0000000140)='./file0\x00', 0x1, 0x80) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="0f00"/30]}) [ 2897.374221][T23864] binder: 23770:23864 ioctl c0306201 20000000 returned -14 05:21:30 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x900}}) 05:21:30 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0xe00, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:21:30 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x10000000) 05:21:31 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa00}}) [ 2897.656383][T24089] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2897.668686][T24089] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2897.685031][T24089] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2897.717902][T24089] 8021q: adding VLAN 0 to HW filter on device team0 05:21:31 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x1000000}}) 05:21:31 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xb00}}) [ 2897.800274][T24089] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:21:31 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x1100, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:21:31 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) capset(&(0x7f0000000080)={0x19980330}, &(0x7f00009b3000)) r1 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0xfffffffffffffffd) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f00000000c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) ftruncate(r1, 0x80080) r3 = socket$pptp(0x18, 0x1, 0x2) ioctl$int_out(r3, 0xfca2, &(0x7f0000000000)) openat(r2, &(0x7f0000000140)='./file0\x00', 0x1, 0x80) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="0f00"/30]}) 05:21:31 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) capset(&(0x7f0000000080)={0x19980330}, &(0x7f00009b3000)) r1 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0xfffffffffffffffd) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f00000000c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) ftruncate(r1, 0x80080) r3 = socket$pptp(0x18, 0x1, 0x2) ioctl$int_out(r3, 0xfca2, &(0x7f0000000000)) openat(r2, &(0x7f0000000140)='./file0\x00', 0x1, 0x80) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="0f00"/30]}) [ 2897.902990][T24151] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:21:31 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xc00}}) [ 2897.990174][T24151] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:21:31 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x1200, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:21:31 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) capset(&(0x7f0000000080)={0x19980330}, &(0x7f00009b3000)) r1 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0xfffffffffffffffd) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f00000000c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) ftruncate(r1, 0x80080) r3 = socket$pptp(0x18, 0x1, 0x2) ioctl$int_out(r3, 0xfca2, &(0x7f0000000000)) openat(r2, &(0x7f0000000140)='./file0\x00', 0x1, 0x80) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="0f00"/30]}) 05:21:31 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xd00}}) 05:21:31 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x13a795e7) 05:21:31 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x2000000}}) 05:21:31 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) capset(&(0x7f0000000080)={0x19980330}, &(0x7f00009b3000)) r1 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0xfffffffffffffffd) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f00000000c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) ftruncate(r1, 0x80080) r3 = socket$pptp(0x18, 0x1, 0x2) ioctl$int_out(r3, 0xfca2, &(0x7f0000000000)) openat(r2, &(0x7f0000000140)='./file0\x00', 0x1, 0x80) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="0f00"/30]}) [ 2898.210302][T24430] binder: 24426:24430 ioctl c0306201 20000000 returned -14 05:21:31 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) capset(&(0x7f0000000080)={0x19980330}, &(0x7f00009b3000)) r1 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0xfffffffffffffffd) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f00000000c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) ftruncate(r1, 0x80080) r3 = socket$pptp(0x18, 0x1, 0x2) ioctl$int_out(r3, 0xfca2, &(0x7f0000000000)) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="0f00"/30]}) 05:21:31 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x30000000) 05:21:31 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xe00}}) 05:21:31 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x3000000}}) 05:21:31 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x2000, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:21:31 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1100}}) [ 2898.451299][T24645] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2898.509434][T24645] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2898.544267][T24653] binder: 24650:24653 ioctl c0306201 20000000 returned -14 05:21:31 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1200}}) 05:21:31 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) capset(&(0x7f0000000080)={0x19980330}, &(0x7f00009b3000)) r1 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0xfffffffffffffffd) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f00000000c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) ftruncate(r1, 0x80080) r3 = socket$pptp(0x18, 0x1, 0x2) ioctl$int_out(r3, 0xfca2, &(0x7f0000000000)) openat(r2, &(0x7f0000000140)='./file0\x00', 0x1, 0x80) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="0f00"/30]}) 05:21:31 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) capset(&(0x7f0000000080)={0x19980330}, &(0x7f00009b3000)) r1 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0xfffffffffffffffd) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f00000000c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) ftruncate(r1, 0x80080) socket$pptp(0x18, 0x1, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="0f00"/30]}) 05:21:31 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x3f000000) 05:21:32 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x4000000}}) 05:21:32 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x2500, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:21:32 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1f00}}) 05:21:32 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x2500}}) [ 2898.797148][T24865] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2898.869832][T24865] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:21:32 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) capset(&(0x7f0000000080)={0x19980330}, &(0x7f00009b3000)) r1 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0xfffffffffffffffd) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f00000000c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) ftruncate(r1, 0x80080) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="0f00"/30]}) 05:21:32 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x40000000) 05:21:32 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x3f00, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:21:32 executing program 5: socket$inet6(0xa, 0x1, 0x0) capset(&(0x7f0000000080)={0x19980330}, &(0x7f00009b3000)) r0 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0xfffffffffffffffd) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000000c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) ftruncate(r0, 0x80080) r2 = socket$pptp(0x18, 0x1, 0x2) ioctl$int_out(r2, 0xfca2, &(0x7f0000000000)) openat(r1, &(0x7f0000000140)='./file0\x00', 0x1, 0x80) 05:21:32 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4000}}) 05:21:32 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x5000000}}) 05:21:32 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5c00}}) [ 2899.119641][T25090] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:21:32 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) capset(&(0x7f0000000080)={0x19980330}, &(0x7f00009b3000)) open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0xfffffffffffffffd) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000000c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="0f00"/30]}) 05:21:32 executing program 5: socket$inet6(0xa, 0x1, 0x0) capset(&(0x7f0000000080)={0x19980330}, &(0x7f00009b3000)) r0 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0xfffffffffffffffd) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000000c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) ftruncate(r0, 0x80080) r2 = socket$pptp(0x18, 0x1, 0x2) ioctl$int_out(r2, 0xfca2, &(0x7f0000000000)) 05:21:32 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x4000, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:21:32 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x44000000) 05:21:32 executing program 5: socket$inet6(0xa, 0x1, 0x0) capset(&(0x7f0000000080)={0x19980330}, &(0x7f00009b3000)) r0 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0xfffffffffffffffd) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000000c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) ftruncate(r0, 0x80080) socket$pptp(0x18, 0x1, 0x2) 05:21:32 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1000000}}) [ 2899.372054][T25315] binder: 25313:25315 ioctl c0306201 20000000 returned -14 [ 2899.412777][T25316] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:21:32 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) capset(&(0x7f0000000080)={0x19980330}, &(0x7f00009b3000)) open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0xfffffffffffffffd) pipe(&(0x7f0000000040)) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="0f00"/30]}) 05:21:32 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x4800, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:21:32 executing program 5: socket$inet6(0xa, 0x1, 0x0) capset(&(0x7f0000000080)={0x19980330}, &(0x7f00009b3000)) r0 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0xfffffffffffffffd) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000000c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) ftruncate(r0, 0x80080) 05:21:32 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x46020000) [ 2899.642521][T25433] binder: 25432:25433 ioctl c0306201 20000000 returned -14 05:21:33 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x6000000}}) 05:21:33 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x2000000}}) 05:21:33 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) capset(&(0x7f0000000080)={0x19980330}, &(0x7f00009b3000)) open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0xfffffffffffffffd) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="0f00"/30]}) 05:21:33 executing program 5: socket$inet6(0xa, 0x1, 0x0) capset(&(0x7f0000000080)={0x19980330}, &(0x7f00009b3000)) r0 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0xfffffffffffffffd) pipe(&(0x7f0000000040)) ftruncate(r0, 0x80080) [ 2899.783705][T25458] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:21:33 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x4c00, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:21:33 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3000000}}) 05:21:33 executing program 5: socket$inet6(0xa, 0x1, 0x0) capset(&(0x7f0000000080)={0x19980330}, &(0x7f00009b3000)) r0 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0xfffffffffffffffd) ftruncate(r0, 0x80080) 05:21:33 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) capset(&(0x7f0000000080)={0x19980330}, &(0x7f00009b3000)) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="0f00"/30]}) 05:21:33 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x4c010000) 05:21:33 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x7000000}}) [ 2899.969661][T25628] binder: 25612:25628 ioctl c0306201 20000000 returned -14 05:21:33 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4000000}}) 05:21:33 executing program 5: socket$inet6(0xa, 0x1, 0x0) capset(&(0x7f0000000080)={0x19980330}, &(0x7f00009b3000)) ftruncate(0xffffffffffffffff, 0x80080) 05:21:33 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x5c00, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:21:33 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="0f00"/30]}) 05:21:33 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5000000}}) [ 2900.118196][T25717] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2900.199566][T25717] net_ratelimit: 3 callbacks suppressed [ 2900.199572][T25717] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:21:33 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x6000000}}) 05:21:33 executing program 5: socket$inet6(0xa, 0x1, 0x0) capset(&(0x7f0000000080)={0x19980330}, &(0x7f00009b3000)) ftruncate(0xffffffffffffffff, 0x80080) [ 2900.245129][T25788] binder: 25780:25788 ioctl c0306201 20000000 returned -14 05:21:33 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="0f00"/30]}) 05:21:33 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x50020000) 05:21:33 executing program 5: socket$inet6(0xa, 0x1, 0x0) capset(&(0x7f0000000080)={0x19980330}, &(0x7f00009b3000)) ftruncate(0xffffffffffffffff, 0x80080) 05:21:33 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x7000000}}) [ 2900.543842][T26012] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2900.589546][T26012] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:21:33 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="0f00"/30]}) 05:21:33 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x6000, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:21:33 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x8000000}}) 05:21:33 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x8000000}}) 05:21:33 executing program 5: socket$inet6(0xa, 0x1, 0x0) r0 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0xfffffffffffffffd) ftruncate(r0, 0x80080) 05:21:34 executing program 5: socket$inet6(0xa, 0x1, 0x0) r0 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0xfffffffffffffffd) ftruncate(r0, 0x80080) [ 2900.705991][T26027] binder: 26023:26027 ioctl c0306201 20000000 returned -14 05:21:34 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x52010000) 05:21:34 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x9000000}}) 05:21:34 executing program 0: capset(&(0x7f0000000080)={0x19980330}, &(0x7f00009b3000)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="0f00"/30]}) 05:21:34 executing program 5: socket$inet6(0xa, 0x1, 0x0) r0 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0xfffffffffffffffd) ftruncate(r0, 0x80080) [ 2900.878280][T26157] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:21:34 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x60ff, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:21:34 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x9000000}}) [ 2900.915411][T26157] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:21:34 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa000000}}) 05:21:34 executing program 0: capset(&(0x7f0000000080)={0x19980330}, &(0x7f00009b3000)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="0f00"/30]}) [ 2901.007751][T26256] binder: 26255:26256 ioctl c0306201 20000000 returned -14 05:21:34 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x58010000) 05:21:34 executing program 5: capset(&(0x7f0000000080)={0x19980330}, &(0x7f00009b3000)) r0 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0xfffffffffffffffd) ftruncate(r0, 0x80080) 05:21:34 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xb000000}}) 05:21:34 executing program 0: capset(&(0x7f0000000080)={0x19980330}, &(0x7f00009b3000)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="0f00"/30]}) 05:21:34 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0xa000000}}) 05:21:34 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x6800, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:21:34 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xc000000}}) [ 2901.268075][T26483] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:21:34 executing program 5: capset(0x0, &(0x7f00009b3000)) r0 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0xfffffffffffffffd) ftruncate(r0, 0x80080) 05:21:34 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) capset(&(0x7f0000000080)={0x19980330}, &(0x7f00009b3000)) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="0f00"/30]}) [ 2901.359483][T26483] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:21:34 executing program 5: capset(0x0, &(0x7f00009b3000)) r0 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0xfffffffffffffffd) ftruncate(r0, 0x80080) 05:21:34 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x6c00, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:21:34 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xd000000}}) 05:21:34 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x5a010000) 05:21:34 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0xb000000}}) 05:21:34 executing program 5: capset(0x0, &(0x7f00009b3000)) r0 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0xfffffffffffffffd) ftruncate(r0, 0x80080) 05:21:34 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) capset(&(0x7f0000000080)={0x19980330}, &(0x7f00009b3000)) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="0f00"/30]}) [ 2901.618407][T26719] binder: 26717:26719 ioctl c0306201 20000000 returned -14 05:21:35 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xe000000}}) [ 2901.697042][T26725] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:21:35 executing program 5: capset(&(0x7f0000000080), &(0x7f00009b3000)) r0 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0xfffffffffffffffd) ftruncate(r0, 0x80080) [ 2901.759375][T26725] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:21:35 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x7400, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:21:35 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x10000000}}) 05:21:35 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x60000000) 05:21:35 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) capset(&(0x7f0000000080)={0x19980330}, &(0x7f00009b3000)) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="0f00"/30]}) [ 2901.947675][T26927] binder: 26907:26927 ioctl c0306201 20000000 returned -14 05:21:35 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0xc000000}}) 05:21:35 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x11000000}}) 05:21:35 executing program 5: capset(&(0x7f0000000080), &(0x7f00009b3000)) r0 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0xfffffffffffffffd) ftruncate(r0, 0x80080) 05:21:35 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x7600, &(0x7f0000000080), 0x385, 0x0, 0x0}) [ 2902.113157][T26981] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:21:35 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) capset(0x0, &(0x7f00009b3000)) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="0f00"/30]}) 05:21:35 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x12000000}}) 05:21:35 executing program 5: capset(&(0x7f0000000080), &(0x7f00009b3000)) r0 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0xfffffffffffffffd) ftruncate(r0, 0x80080) [ 2902.189661][T26981] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2902.249787][T27068] binder: 27066:27068 ioctl c0306201 20000000 returned -14 05:21:35 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x65580000) 05:21:35 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0xd000000}}) 05:21:35 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) capset(0x0, &(0x7f00009b3000)) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="0f00"/30]}) 05:21:35 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x7a00, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:21:35 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1f000000}}) 05:21:35 executing program 5: capset(&(0x7f0000000080)={0x19980330}, 0x0) r0 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0xfffffffffffffffd) ftruncate(r0, 0x80080) 05:21:35 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x25000000}}) [ 2902.516536][T27303] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:21:35 executing program 5: capset(&(0x7f0000000080)={0x19980330}, 0x0) r0 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0xfffffffffffffffd) ftruncate(r0, 0x80080) [ 2902.579521][T27303] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:21:35 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000000}}) 05:21:35 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) capset(0x0, &(0x7f00009b3000)) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="0f00"/30]}) 05:21:36 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x9600, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:21:36 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x66010000) 05:21:36 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0xe000000}}) 05:21:36 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5c000000}}) 05:21:36 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) capset(&(0x7f0000000080), &(0x7f00009b3000)) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="0f00"/30]}) 05:21:36 executing program 5: capset(&(0x7f0000000080)={0x19980330}, 0x0) r0 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0xfffffffffffffffd) ftruncate(r0, 0x80080) [ 2902.828936][T27543] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:21:36 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xfdfdffff}}) [ 2902.929698][T27543] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:21:36 executing program 5: capset(&(0x7f0000000080)={0x19980330}, &(0x7f00009b3000)) r0 = open(0x0, 0x20141042, 0xfffffffffffffffd) ftruncate(r0, 0x80080) 05:21:36 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) capset(&(0x7f0000000080), &(0x7f00009b3000)) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="0f00"/30]}) 05:21:36 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x68010000) 05:21:36 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xfffffdfd}}) 05:21:36 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x10000000}}) 05:21:36 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x400000, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:21:36 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) capset(&(0x7f0000000080), &(0x7f00009b3000)) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="0f00"/30]}) 05:21:36 executing program 5: capset(&(0x7f0000000080)={0x19980330}, &(0x7f00009b3000)) r0 = open(0x0, 0x20141042, 0xfffffffffffffffd) ftruncate(r0, 0x80080) [ 2903.185294][T27774] binder: 27770:27774 ioctl c0306201 20000000 returned -14 05:21:36 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)) [ 2903.291572][T27778] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:21:36 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x11000000}}) 05:21:36 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x50f000, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:21:36 executing program 5: capset(&(0x7f0000000080)={0x19980330}, &(0x7f00009b3000)) r0 = open(0x0, 0x20141042, 0xfffffffffffffffd) ftruncate(r0, 0x80080) 05:21:36 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x2]}) [ 2903.359859][T27778] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:21:36 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) capset(&(0x7f0000000080)={0x19980330}, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="0f00"/30]}) 05:21:36 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x6e010000) 05:21:36 executing program 5: capset(&(0x7f0000000080)={0x19980330}, &(0x7f00009b3000)) r0 = open(&(0x7f00000008c0)='./file0\x00', 0x0, 0xfffffffffffffffd) ftruncate(r0, 0x80080) 05:21:36 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x3]}) [ 2903.527827][T28000] binder: 27995:28000 ioctl c0306201 20000000 returned -14 05:21:36 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) capset(&(0x7f0000000080)={0x19980330}, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="0f00"/30]}) 05:21:37 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x70f000, &(0x7f0000000080), 0x385, 0x0, 0x0}) [ 2903.658615][T28147] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:21:37 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x12000000}}) 05:21:37 executing program 5: capset(&(0x7f0000000080)={0x19980330}, &(0x7f00009b3000)) r0 = open(&(0x7f00000008c0)='./file0\x00', 0x0, 0xfffffffffffffffd) ftruncate(r0, 0x80080) 05:21:37 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x4]}) [ 2903.709921][T28147] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:21:37 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) capset(&(0x7f0000000080)={0x19980330}, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="0f00"/30]}) 05:21:37 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x70010000) [ 2903.827485][T28224] binder: 28216:28224 ioctl c0306201 20000000 returned -14 05:21:37 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x5]}) 05:21:37 executing program 5: capset(&(0x7f0000000080)={0x19980330}, &(0x7f00009b3000)) r0 = open(&(0x7f00000008c0)='./file0\x00', 0x0, 0xfffffffffffffffd) ftruncate(r0, 0x80080) 05:21:37 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x718000, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:21:37 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x25000000}}) 05:21:37 executing program 0: socket$inet6(0xa, 0x1, 0x0) capset(&(0x7f0000000080)={0x19980330}, &(0x7f00009b3000)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="0f00"/30]}) [ 2904.011499][T28439] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:21:37 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x6]}) 05:21:37 executing program 5: capset(&(0x7f0000000080)={0x19980330}, &(0x7f00009b3000)) r0 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) ftruncate(r0, 0x80080) 05:21:37 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x81000000) [ 2904.128218][T28450] binder: 28444:28450 ioctl c0306201 20000000 returned -14 05:21:37 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x7]}) 05:21:37 executing program 0: socket$inet6(0xa, 0x1, 0x0) capset(&(0x7f0000000080)={0x19980330}, &(0x7f00009b3000)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="0f00"/30]}) 05:21:37 executing program 5: capset(&(0x7f0000000080)={0x19980330}, &(0x7f00009b3000)) r0 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) ftruncate(r0, 0x80080) 05:21:37 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x3f000000}}) 05:21:37 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x760000, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:21:37 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x88470000) 05:21:37 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x8]}) 05:21:37 executing program 0: socket$inet6(0xa, 0x1, 0x0) capset(&(0x7f0000000080)={0x19980330}, &(0x7f00009b3000)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="0f00"/30]}) 05:21:37 executing program 5: capset(&(0x7f0000000080)={0x19980330}, &(0x7f00009b3000)) r0 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) ftruncate(r0, 0x80080) [ 2904.410655][T28673] binder: 28670:28673 ioctl c0306201 20000000 returned -14 05:21:37 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x88480000) 05:21:37 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x9]}) 05:21:37 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x40000000}}) 05:21:37 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) capset(&(0x7f0000000080)={0x19980330}, &(0x7f00009b3000)) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, 0x0) 05:21:37 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x807100, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:21:38 executing program 5: capset(&(0x7f0000000080)={0x19980330}, &(0x7f00009b3000)) open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0xfffffffffffffffd) ftruncate(0xffffffffffffffff, 0x80080) 05:21:38 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x88a8ffff) 05:21:38 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0xa]}) 05:21:38 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) capset(&(0x7f0000000080)={0x19980330}, &(0x7f00009b3000)) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, 0x0) [ 2904.755509][T28928] binder: 28913:28928 ioctl c0306201 20000000 returned -14 05:21:38 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x48000000}}) 05:21:38 executing program 5: capset(&(0x7f0000000080)={0x19980330}, &(0x7f00009b3000)) open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0xfffffffffffffffd) ftruncate(0xffffffffffffffff, 0x80080) 05:21:38 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x8e020000) 05:21:38 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0xb]}) 05:21:38 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x960000, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:21:38 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) capset(&(0x7f0000000080)={0x19980330}, &(0x7f00009b3000)) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, 0x0) 05:21:38 executing program 5: capset(&(0x7f0000000080)={0x19980330}, &(0x7f00009b3000)) open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0xfffffffffffffffd) ftruncate(0xffffffffffffffff, 0x80080) 05:21:38 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0xc]}) 05:21:38 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x90020000) 05:21:38 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x4c000000}}) [ 2905.132736][T29210] binder: 29194:29210 ioctl c0306201 20000000 returned -14 05:21:38 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) capset(&(0x7f0000000080)={0x19980330}, &(0x7f00009b3000)) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00'}) 05:21:38 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0xd]}) 05:21:38 executing program 5: capset(&(0x7f0000000080)={0x19980330}, &(0x7f00009b3000)) r0 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0xfffffffffffffffd) ftruncate(r0, 0x0) 05:21:38 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x96020000) 05:21:38 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0xf05000, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:21:38 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) capset(&(0x7f0000000080)={0x19980330}, &(0x7f00009b3000)) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00'}) 05:21:38 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0xe]}) 05:21:38 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="0f00"/30]}) 05:21:38 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x98020000) [ 2905.420860][T29460] binder: 29456:29460 ioctl c0306201 20000000 returned -14 05:21:38 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) capset(&(0x7f0000000080)={0x19980330}, &(0x7f00009b3000)) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00'}) 05:21:38 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x10]}) 05:21:39 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x5c000000}}) 05:21:39 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0xf07000, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:21:39 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x8848) 05:21:39 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x9a020000) 05:21:39 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) capset(&(0x7f0000000080)={0x19980330}, &(0x7f00009b3000)) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=ANY=[]}) 05:21:39 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x11]}) 05:21:39 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x12]}) [ 2905.850266][T29591] binder: 29583:29591 ioctl c0306201 20000000 returned -14 05:21:39 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x9effffff) 05:21:39 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x25]}) 05:21:39 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x5c]}) 05:21:39 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)) 05:21:39 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x1000000, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:21:39 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x68000000}}) 05:21:39 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x8848) 05:21:39 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0xa4020000) 05:21:39 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) capset(&(0x7f0000000080)={0x19980330}, &(0x7f00009b3000)) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=ANY=[]}) [ 2906.285863][T29929] binder: 29894:29929 ioctl c0306201 20000000 returned -14 05:21:39 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x2]}) 05:21:39 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x2000000, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:21:39 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x3]}) [ 2906.412830][T29983] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2906.499523][T29983] net_ratelimit: 1 callbacks suppressed [ 2906.499529][T29983] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:21:39 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x4]}) 05:21:39 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0xa6020000) 05:21:39 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) capset(&(0x7f0000000080)={0x19980330}, &(0x7f00009b3000)) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=ANY=[]}) 05:21:39 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x3000000, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:21:40 executing program 5: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xe}}) 05:21:40 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x6c000000}}) 05:21:40 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) capset(&(0x7f0000000080)={0x19980330}, &(0x7f00009b3000)) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB]}) 05:21:40 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0xac020000) 05:21:40 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x5]}) [ 2906.813197][T30265] binder: 30263:30265 ioctl c0306201 20000000 returned -14 05:21:40 executing program 5: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xe}}) 05:21:40 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) capset(&(0x7f0000000080)={0x19980330}, &(0x7f00009b3000)) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB]}) 05:21:40 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x74000000}}) 05:21:40 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x4000000, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:21:40 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x6]}) 05:21:40 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0xae010000) 05:21:40 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) capset(&(0x7f0000000080)={0x19980330}, &(0x7f00009b3000)) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB]}) [ 2907.093851][T30488] binder: 30484:30488 ioctl c0306201 20000000 returned -14 05:21:40 executing program 5: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xe}}) 05:21:40 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x7]}) 05:21:40 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0xaf020000) 05:21:40 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x7a000000}}) 05:21:40 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x5000000, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:21:40 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) capset(&(0x7f0000000080)={0x19980330}, &(0x7f00009b3000)) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="0f00"/15]}) 05:21:40 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0xb0020000) 05:21:40 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0xae010000) 05:21:40 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x8]}) [ 2907.409913][T30712] binder: 30707:30712 ioctl c0306201 20000000 returned -14 05:21:40 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) capset(&(0x7f0000000080)={0x19980330}, &(0x7f00009b3000)) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB]}) 05:21:40 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0xc3ffffff}}) 05:21:40 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x6000000, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:21:40 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0xb2020000) 05:21:40 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x9]}) 05:21:41 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0xa]}) 05:21:41 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x7000000, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:21:41 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) capset(&(0x7f0000000080)={0x19980330}, &(0x7f00009b3000)) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB]}) 05:21:41 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0xb8010000) 05:21:41 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0xae010000) 05:21:41 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0xb]}) 05:21:41 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0xfdfdffff}}) [ 2907.963481][T31238] binder: 31222:31238 ioctl c0306201 20000000 returned -14 05:21:41 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0xc0020000) 05:21:41 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) capset(&(0x7f0000000080)={0x19980330}, &(0x7f00009b3000)) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB]}) 05:21:41 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0xc]}) 05:21:41 executing program 5: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xd}}) 05:21:41 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x8000000, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:21:41 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) capset(&(0x7f0000000080)={0x19980330}, &(0x7f00009b3000)) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="0f00000000000000"]}) 05:21:41 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0xc3ffffff) 05:21:41 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0xfeffffff}}) 05:21:41 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0xd]}) [ 2908.283743][T31479] binder: 31477:31479 ioctl c0306201 20000000 returned -14 05:21:41 executing program 5: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xd}}) 05:21:41 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) capset(&(0x7f0000000080)={0x19980330}, &(0x7f00009b3000)) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="0f"]}) 05:21:41 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0xe]}) 05:21:41 executing program 5: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0x9}}) 05:21:41 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0xfffffdfd}}) 05:21:41 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0xce030000) 05:21:41 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:21:41 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) capset(&(0x7f0000000080)={0x19980330}, &(0x7f00009b3000)) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB]}) 05:21:42 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x10]}) [ 2908.690058][T31712] binder: 31703:31712 ioctl c0306201 20000000 returned -14 05:21:42 executing program 5: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0x8}}) 05:21:42 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0xe0ffffff) 05:21:42 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x11]}) 05:21:42 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) capset(&(0x7f0000000080)={0x19980330}, &(0x7f00009b3000)) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB]}) 05:21:42 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0xffffffc3}}) 05:21:42 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0xe795a713) 05:21:42 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0xa000000, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:21:42 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x12]}) 05:21:42 executing program 5: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0x8}}) [ 2909.030484][T31936] binder: 31935:31936 ioctl c0306201 20000000 returned -14 05:21:42 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) capset(&(0x7f0000000080)={0x19980330}, &(0x7f00009b3000)) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB]}) 05:21:42 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0xefffffff) 05:21:42 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0xfffffffe}}) 05:21:42 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x25]}) 05:21:42 executing program 5: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0x8}}) 05:21:42 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0x4}}) 05:21:42 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0xb000000, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:21:42 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x5c]}) 05:21:42 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0xf0010000) 05:21:42 executing program 5: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0x8}}) [ 2909.416112][T32196] binder: 32174:32196 ioctl c0306201 20000000 returned -14 05:21:42 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0x4}}) 05:21:42 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf}}) 05:21:42 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)) 05:21:42 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0xf0ffffff) 05:21:42 executing program 5: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0x8}}) 05:21:42 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0xc000000, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:21:43 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0x4}}) 05:21:43 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x2]}) 05:21:43 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0xf2000000) 05:21:43 executing program 5: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0x8}}) 05:21:43 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x2}}) [ 2909.792198][T32510] binder: 32451:32510 ioctl c0306201 20000000 returned -14 05:21:43 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x3]}) 05:21:43 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x158) 05:21:43 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0x8}}) 05:21:43 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0xd000000, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:21:43 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0xf2010000) 05:21:43 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x3}}) 05:21:43 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0x8}}) [ 2910.082373][T32736] binder: 32720:32736 ioctl c0306201 20000000 returned -14 05:21:43 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x4]}) 05:21:43 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0xe000000, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:21:43 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x5]}) 05:21:43 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x6]}) 05:21:43 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0x8}}) 05:21:43 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0xf4030000) [ 2910.588114][ T388] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2910.675642][ T388] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:21:44 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x4000000}) 05:21:44 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x4}}) 05:21:44 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x7]}) 05:21:44 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x10000000, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:21:44 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0x8}}) 05:21:44 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0xfc000000) [ 2910.862023][ T618] binder: 614:618 ioctl c0306201 20000000 returned -14 05:21:44 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0x8}}) 05:21:44 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x8]}) 05:21:44 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0xfd000000) 05:21:44 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x4000000}) 05:21:44 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x11000000, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:21:44 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x5}}) 05:21:44 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x9]}) 05:21:44 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0x8}}) [ 2911.115934][ T847] binder: 841:847 ioctl c0306201 20000000 returned -14 05:21:44 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0xfdffffff) 05:21:44 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x4000000}) 05:21:44 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x6}}) 05:21:44 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0xa]}) 05:21:44 executing program 5: perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0x8}}) 05:21:44 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x12000000, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:21:44 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0xfe000000) 05:21:44 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_CPUID(0xffffffffffffffff, 0x4008ae8a, &(0x7f0000000040)=ANY=[@ANYBLOB="1f00000000000000000000400500ef000000e7fc4b09"]) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000040)={0x7}, 0x7) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 2911.400596][ T1080] binder: 1078:1080 ioctl c0306201 20000000 returned -14 05:21:44 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0xfe800000) 05:21:44 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0xb]}) 05:21:44 executing program 5: perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0x8}}) 05:21:44 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x7}}) 05:21:44 executing program 0: r0 = socket(0xa, 0x5, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000180)) 05:21:44 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0xfe80ffff) 05:21:44 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0xc]}) 05:21:44 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x20000000, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:21:45 executing program 5: perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0x8}}) 05:21:45 executing program 0: sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004800010044000400200001000a00000000000000ff09"], 0x2}}, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @quote}], 0xf1be) 05:21:45 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0xfec0ffff) [ 2911.790082][ T1401] binder: 1367:1401 ioctl c0306201 20000000 returned -14 05:21:45 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x8}}) 05:21:45 executing program 5: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0x8}}) 05:21:45 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0xd]}) 05:21:45 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000140)={0x0, 0xffffffff}) 05:21:45 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x25000000, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:21:45 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0xe]}) 05:21:45 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0xfeffffff) 05:21:45 executing program 5: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0x8}}) [ 2912.091767][ T1617] binder: 1614:1617 ioctl c0306201 20000000 returned -14 05:21:45 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x9}}) 05:21:45 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x10]}) 05:21:45 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0xff000000) 05:21:45 executing program 5: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0x8}}) 05:21:45 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:21:45 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x11]}) 05:21:45 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0xa}}) [ 2912.370803][ T1902] binder: 1901:1902 ioctl c0306201 20000000 returned -14 05:21:46 executing program 0: r0 = socket$inet6(0xa, 0x801, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r1 = memfd_create(&(0x7f0000000540)='\x97&\x89\\\xd0\xe7\xca\x16ZO\x94:\xe1\x01\xe5`iq@Nse;\xa8Fpj\x0e\x04!\xd5\xc5YBz\x94\xaf\x13\xe9\xd2\x0f\xc2G\x86Xe\xf1/V\x8cvS\xa6K&u\x9dX\xcc\r\x12\x11\x99\xe7\xce\xaeA\xb8-E\xa1\xf8\xe4~IS\xc1\x04\xf78\xf1\'\xdfv\x90\xbc\xd1\xda\x88j\x16\xeb>\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\xe5j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x80dX\xcc\xab\x84\xd1\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2L\xf0\xaf\xe1jd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU\".\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf', 0x0) fcntl$setlease(r1, 0x400, 0x1) fcntl$setown(r1, 0x8, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="17f0d80c95eb7bbf08b20528f8a4576e05c1fe7e0ad8fc318c", 0x19, 0x400, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) execveat(r1, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000100)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) getresgid(&(0x7f00000001c0), &(0x7f00000002c0), &(0x7f0000000380)) getresgid(0x0, &(0x7f0000000400), &(0x7f00000004c0)) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x24e23, @local}, 0x10) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES64], 0xc63b9e35) timer_settime(0x0, 0x0, &(0x7f0000000300)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r5 = gettid() tkill(r5, 0x1000000000013) 05:21:46 executing program 5: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0x8}}) 05:21:46 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0xffff0000) 05:21:46 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x12]}) 05:21:46 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x40000000, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:21:46 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0xb}}) [ 2913.086059][ T2120] binder: 2116:2120 ioctl c0306201 20000000 returned -14 05:21:46 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x25]}) 05:21:46 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0xffff80fe) 05:21:46 executing program 5: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0x8}}) 05:21:46 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0xc}}) 05:21:46 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x5c]}) 05:21:46 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x48000000, &(0x7f0000000080), 0x385, 0x0, 0x0}) [ 2913.370041][ T2349] binder: 2344:2349 ioctl c0306201 20000000 returned -14 05:21:47 executing program 0: r0 = socket$inet6(0xa, 0x801, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r1 = memfd_create(&(0x7f0000000540)='\x97&\x89\\\xd0\xe7\xca\x16ZO\x94:\xe1\x01\xe5`iq@Nse;\xa8Fpj\x0e\x04!\xd5\xc5YBz\x94\xaf\x13\xe9\xd2\x0f\xc2G\x86Xe\xf1/V\x8cvS\xa6K&u\x9dX\xcc\r\x12\x11\x99\xe7\xce\xaeA\xb8-E\xa1\xf8\xe4~IS\xc1\x04\xf78\xf1\'\xdfv\x90\xbc\xd1\xda\x88j\x16\xeb>\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\xe5j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x80dX\xcc\xab\x84\xd1\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2L\xf0\xaf\xe1jd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU\".\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf', 0x0) fcntl$setlease(r1, 0x400, 0x1) fcntl$setown(r1, 0x8, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="17f0d80c95eb7bbf08b20528f8a4576e05c1fe7e0ad8fc318c", 0x19, 0x400, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) execveat(r1, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000100)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) getresgid(&(0x7f00000001c0), &(0x7f00000002c0), &(0x7f0000000380)) getresgid(0x0, &(0x7f0000000400), &(0x7f00000004c0)) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x24e23, @local}, 0x10) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES64], 0xc63b9e35) timer_settime(0x0, 0x0, &(0x7f0000000300)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r5 = gettid() tkill(r5, 0x1000000000013) 05:21:47 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0xffffa888) 05:21:47 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)) 05:21:47 executing program 5: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0x8}}) 05:21:47 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x4c000000, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:21:47 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0xd}}) 05:21:47 executing program 5: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0x8}}) [ 2913.825540][ T2567] binder: 2565:2567 ioctl c0306201 20000000 returned -14 05:21:47 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0xffffc0fe) 05:21:47 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x2]}) 05:21:47 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0xe}}) 05:21:47 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x5c000000, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:21:47 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x3]}) [ 2914.156145][ T2985] binder: 2925:2985 ioctl c0306201 20000000 returned -14 05:21:47 executing program 0: r0 = socket$inet6(0xa, 0x801, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r1 = memfd_create(&(0x7f0000000540)='\x97&\x89\\\xd0\xe7\xca\x16ZO\x94:\xe1\x01\xe5`iq@Nse;\xa8Fpj\x0e\x04!\xd5\xc5YBz\x94\xaf\x13\xe9\xd2\x0f\xc2G\x86Xe\xf1/V\x8cvS\xa6K&u\x9dX\xcc\r\x12\x11\x99\xe7\xce\xaeA\xb8-E\xa1\xf8\xe4~IS\xc1\x04\xf78\xf1\'\xdfv\x90\xbc\xd1\xda\x88j\x16\xeb>\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\xe5j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x80dX\xcc\xab\x84\xd1\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2L\xf0\xaf\xe1jd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU\".\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf', 0x0) fcntl$setlease(r1, 0x400, 0x1) fcntl$setown(r1, 0x8, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="17f0d80c95eb7bbf08b20528f8a4576e05c1fe7e0ad8fc318c", 0x19, 0x400, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) execveat(r1, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000100)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) getresgid(&(0x7f00000001c0), &(0x7f00000002c0), &(0x7f0000000380)) getresgid(0x0, &(0x7f0000000400), &(0x7f00000004c0)) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x24e23, @local}, 0x10) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES64], 0xc63b9e35) timer_settime(0x0, 0x0, &(0x7f0000000300)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r5 = gettid() tkill(r5, 0x1000000000013) 05:21:47 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0xffffff7f) 05:21:47 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x10}}) 05:21:47 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x4]}) 05:21:47 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x60000000, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:21:47 executing program 5: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0x8}}) 05:21:47 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x5]}) [ 2914.596097][ T3138] binder: 3126:3138 ioctl c0306201 20000000 returned -14 05:21:47 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0xffffff9e) 05:21:48 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x68000000, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:21:48 executing program 5: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0x8}}) 05:21:48 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x6]}) 05:21:48 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0xffffffc3) [ 2914.904556][ T3506] binder: 3505:3506 ioctl c0306201 20000000 returned -14 05:21:48 executing program 0: r0 = socket$inet6(0xa, 0x801, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r1 = memfd_create(&(0x7f0000000540)='\x97&\x89\\\xd0\xe7\xca\x16ZO\x94:\xe1\x01\xe5`iq@Nse;\xa8Fpj\x0e\x04!\xd5\xc5YBz\x94\xaf\x13\xe9\xd2\x0f\xc2G\x86Xe\xf1/V\x8cvS\xa6K&u\x9dX\xcc\r\x12\x11\x99\xe7\xce\xaeA\xb8-E\xa1\xf8\xe4~IS\xc1\x04\xf78\xf1\'\xdfv\x90\xbc\xd1\xda\x88j\x16\xeb>\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\xe5j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x80dX\xcc\xab\x84\xd1\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2L\xf0\xaf\xe1jd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU\".\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf', 0x0) fcntl$setlease(r1, 0x400, 0x1) fcntl$setown(r1, 0x8, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="17f0d80c95eb7bbf08b20528f8a4576e05c1fe7e0ad8fc318c", 0x19, 0x400, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) execveat(r1, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000100)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) getresgid(&(0x7f00000001c0), &(0x7f00000002c0), &(0x7f0000000380)) getresgid(0x0, &(0x7f0000000400), &(0x7f00000004c0)) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x24e23, @local}, 0x10) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES64], 0xc63b9e35) timer_settime(0x0, 0x0, &(0x7f0000000300)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r5 = gettid() tkill(r5, 0x1000000000013) 05:21:48 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x7]}) 05:21:48 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x6c000000, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:21:48 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0xffffffe0) 05:21:48 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x11}}) 05:21:48 executing program 5: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0x8}}) 05:21:48 executing program 5: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0x8}}) 05:21:48 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x8]}) [ 2915.361519][ T3736] binder: 3730:3736 ioctl c0306201 20000000 returned -14 05:21:48 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0xffffffef) 05:21:48 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x12}}) 05:21:48 executing program 5: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0x8}}) 05:21:48 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0xfffffff0) 05:21:49 executing program 0: syz_mount_image$minix(&(0x7f0000000080)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000280)="600b42e006000a0090040300001af5c96824", 0x12, 0x400}], 0x0, 0x0) 05:21:49 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x74000000, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:21:49 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x9]}) 05:21:49 executing program 5: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, 0x0) 05:21:49 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0xfffffffd) 05:21:49 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x25}}) 05:21:49 executing program 5: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, 0x0) [ 2916.125681][ T4074] binder: 4069:4074 ioctl c0306201 20000000 returned -14 05:21:49 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0xa]}) 05:21:49 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0xfffffffe) 05:21:49 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x48}}) 05:21:49 executing program 0: ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, &(0x7f0000000000)={0x1, 0x2, 0x24}) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$DRM_IOCTL_GET_CAP(0xffffffffffffffff, 0xc010640c, &(0x7f0000000040)={0x3, 0xfffffffffffffd80}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:21:49 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x7a000000, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:21:49 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0xb]}) 05:21:49 executing program 5: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, 0x0) 05:21:49 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x1000201bb) 05:21:49 executing program 0: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000040)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000100)=""/11, 0xa) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)) clone(0x2000003102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) ioctl$GIO_FONTX(r0, 0x4b6b, 0x0) open$dir(&(0x7f0000000300)='./file0\x00', 0x841, 0x0) [ 2916.435892][ T4357] binder: 4327:4357 ioctl c0306201 20000000 returned -14 05:21:49 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x4c}}) 05:21:49 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0xc]}) 05:21:49 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0xffff00000000) 05:21:49 executing program 5: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', 0x0}) 05:21:49 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0xff600000, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:21:50 executing program 0: ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, &(0x7f0000000000)={0x1, 0x2}) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, &(0x7f0000000040)='system+\x00') ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:21:50 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0xd]}) 05:21:50 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x5c}}) [ 2916.765850][ T4570] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:21:50 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x0, 0x1000000000000, 0x102, 0x1, 0x0, 0x6, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x400, 0x0, 0x1, 0x3}, 0x20) connect$inet6(r1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r2, r2, &(0x7f00000002c0)=0x202, 0xdd) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f00000000c0)={@mcast2, 0x50, r3}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'sit0\x00', r3}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000240)={'team0\x00', r3}) sendmmsg$inet6(r0, &(0x7f0000000200)=[{{&(0x7f0000000000)={0xa, 0x4e22, 0x5, @ipv4={[], [], @broadcast}, 0x1}, 0x35d, &(0x7f0000000140), 0x0, &(0x7f0000000400)=[@hopopts={{0x0, 0x29, 0x36, {0xeda3c4c253a54040, 0x0, [], [@generic={0x80, 0x0, "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"}, @ra={0x5, 0x2, 0x2}, @hao={0xc9, 0x0, @rand_addr="7824fdf97c8705985559428030847e94"}, @enc_lim={0x4, 0x1, 0x20}, @jumbo={0xc2, 0x4, 0x80000001}, @hao={0xc9, 0x0, @mcast1}, @pad1]}}}, @dstopts_2292={{0x0, 0x29, 0x4, {0xb1, 0x2000000000000306, [], [@hao={0xc9, 0x0, @mcast2}, @enc_lim={0x4, 0x1, 0xff}, @enc_lim={0x4, 0x1, 0x1}, @padn={0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}]}}}, @flowinfo={{0x0, 0x29, 0xb, 0x7}}, @hoplimit_2292={{0x0, 0x29, 0x8, 0x81}}, @dstopts_2292={{0x0, 0x29, 0x4, {0x33, 0x0, [], [@padn={0x1, 0x0, [0x0, 0x0, 0x0, 0x0]}, @enc_lim={0x4, 0x1, 0x2}, @padn={0x1, 0x0, [0x0, 0x0, 0x0]}, @calipso={0x7, 0x0, {0x35570817, 0x0, 0x80, 0x2, [0x3, 0x0, 0x2, 0x1, 0x4, 0x6ea, 0x8, 0xffffffff]}}]}}}, @flowinfo={{0x0, 0x29, 0xb, 0x8000}}, @pktinfo={{0x0, 0x29, 0x32, {@remote, r4}}}]}}], 0x1, 0x4008008) 05:21:50 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0xe]}) [ 2916.822530][ T4570] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:21:50 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x400000000000, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:21:50 executing program 5: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', 0x0}) 05:21:50 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x100000000000000) 05:21:50 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x10]}) [ 2916.992891][ T4775] binder: 4758:4775 ioctl c0306201 20000000 returned -14 05:21:50 executing program 5: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', 0x0}) 05:21:50 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x68}}) 05:21:50 executing program 0: r0 = memfd_create(&(0x7f0000000100)='(GPL)\x00', 0x0) write$binfmt_elf32(r0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000001680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff}, 0x0) flistxattr(r4, &(0x7f00000002c0)=""/82, 0x52) connect$inet(r3, 0x0, 0x0) 05:21:50 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x11]}) 05:21:50 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x60ffffffffff, &(0x7f0000000080), 0x385, 0x0, 0x0}) [ 2917.152933][ T4895] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2917.210326][ T4895] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:21:50 executing program 5: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam}) 05:21:50 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x12]}) 05:21:50 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x200000000000000) [ 2917.334648][ T5030] binder: 4990:5030 ioctl c0306201 20000000 returned -14 05:21:50 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x6c}}) 05:21:50 executing program 5: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam}) 05:21:50 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x760000000000, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:21:50 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x25]}) [ 2917.518655][ T5192] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:21:50 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x5c]}) [ 2917.629429][ T5192] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:21:51 executing program 5: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam}) 05:21:51 executing program 0: r0 = accept(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000001d00)=[{{&(0x7f0000000340)=@in6, 0x80, &(0x7f0000001d80)=[{0x0}, {&(0x7f0000000400)=""/206, 0xce}, {&(0x7f0000000500)=""/194, 0xc2}, {&(0x7f0000000600)=""/245, 0xf5}, {&(0x7f0000000700)=""/95, 0x5f}], 0x5}, 0x101}], 0x1, 0x40, &(0x7f0000000040)={0x77359400}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x6) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f0000000300)={@dev={0xfe, 0x80, [], 0x21}, 0xffffffff}) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @loopback}) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x200006) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x55aa40be, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000040)={{0x2, 0x4e22, @loopback}, {0x6, @dev={[], 0x1e}}, 0x20, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, 'ip6_vti0\x00'}) 05:21:51 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)) 05:21:51 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x300000000000000) 05:21:51 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x7ffffffff000, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:21:51 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x74}}) 05:21:51 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @empty}, 0x1c) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) [ 2918.020586][ T5425] binder: 5422:5425 ioctl c0306201 20000000 returned -14 05:21:51 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x2]}) 05:21:51 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x7a}}) [ 2918.102706][ T5433] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:21:51 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) read(r0, &(0x7f0000000100)=""/41, 0x2) close(r0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000004c0)=ANY=[@ANYBLOB='Y'], 0x1) splice(r0, 0x0, r1, 0x0, 0x200, 0x0) 05:21:51 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x960000000000, &(0x7f0000000080), 0x385, 0x0, 0x0}) [ 2918.159548][ T5433] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:21:51 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x3]}) 05:21:51 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x300}}) 05:21:51 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES16=0x0], 0x1}}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:21:51 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x400000000000000) 05:21:51 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x4]}) 05:21:51 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x80710000000000, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:21:51 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:21:51 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x500}}) 05:21:51 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x5]}) [ 2918.574510][ T6170] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 2918.601684][ T6167] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:21:52 executing program 0: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) ioctl$FITRIM(r0, 0xc0185879, 0x0) [ 2918.650133][ T6167] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2918.671608][ T6170] BTRFS error (device loop5): superblock checksum mismatch 05:21:52 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0xf0500000000000, &(0x7f0000000080), 0x385, 0x0, 0x0}) [ 2918.729717][ T6170] BTRFS error (device loop5): open_ctree failed 05:21:52 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x500000000000000) 05:21:52 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x6]}) 05:21:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000), 0x4) [ 2918.843047][ T6170] BTRFS error (device loop5): superblock checksum mismatch [ 2918.875641][ T6390] binder: 6368:6390 ioctl c0306201 20000000 returned -14 [ 2918.919953][ T6170] BTRFS error (device loop5): open_ctree failed [ 2918.937229][ T6394] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:21:52 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:21:52 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0x12, 0x0, 0x0, 0x0, 0xf000000, 0x0, 0x718000}}) 05:21:52 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x7]}) [ 2919.100200][ T6394] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:21:52 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0xf0700000000000, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:21:52 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x600}}) 05:21:52 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x8]}) [ 2919.212955][ T6508] BTRFS error (device loop5): superblock checksum mismatch 05:21:52 executing program 0: ftruncate(0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'syz_tun\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000380)=@newqdisc={0x68, 0x24, 0xf01, 0x0, 0x0, {0x0, r1, {}, {0xffff, 0xffff}}, [@TCA_STAB={0x28, 0x8, [{{0x1c, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}, {0x8, 0x2, [0x0, 0x0]}}]}, @qdisc_kind_options=@q_pfifo_head_drop={{0x14, 0x1, 'pfifo_head_drop\x00'}, {0x8}}]}, 0x68}}, 0x0) 05:21:52 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x600000000000000) [ 2919.279883][ T6508] BTRFS error (device loop5): open_ctree failed [ 2919.311299][ T6518] binder: 6517:6518 ioctl c0306201 20000000 returned -14 05:21:52 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x9]}) 05:21:52 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="240000001a005f0014f9f407000904000a002000000000000000000008001b003a000000", 0x24) 05:21:52 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:21:52 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0xf0ffffff7f0000, &(0x7f0000000080), 0x385, 0x0, 0x0}) [ 2919.455184][ T6633] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2919.519503][ T6633] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2919.575133][ T6736] netlink: 'syz-executor.0': attribute type 27 has an invalid length. 05:21:52 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0xa]}) [ 2919.623882][ T6742] binder: 6737:6742 ioctl c0306201 20000000 returned -14 [ 2919.639883][ T6740] BTRFS error (device loop5): superblock checksum mismatch 05:21:53 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="240000001a005f0014f9f407000904000a002000000000000000000008001b003a000000", 0x24) 05:21:53 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x700000000000000) [ 2919.719906][ T6740] BTRFS error (device loop5): open_ctree failed 05:21:53 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x700}}) 05:21:53 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0xb]}) 05:21:53 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x100000000000000, &(0x7f0000000080), 0x385, 0x0, 0x0}) [ 2919.829700][ T6851] netlink: 'syz-executor.0': attribute type 27 has an invalid length. 05:21:53 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2919.917595][ T6853] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:21:53 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="240000001a005f0014f9f407000904000a002000000000000000000008001b003a000000", 0x24) 05:21:53 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0xc]}) [ 2920.026488][ T6864] BTRFS error (device loop5): superblock checksum mismatch [ 2920.045076][ T6958] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 2920.059493][ T6853] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:21:53 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="240000001a005f0014f9f407000904000a002000000000000000000008001b003a000000", 0x24) 05:21:53 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x200000000000000, &(0x7f0000000080), 0x385, 0x0, 0x0}) [ 2920.099453][ T6864] BTRFS error (device loop5): open_ctree failed 05:21:53 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0xd]}) 05:21:53 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x900}}) 05:21:53 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x800000000000000) [ 2920.199658][ T7072] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 2920.224194][ T7083] binder: 7076:7083 ioctl c0306201 20000000 returned -14 05:21:53 executing program 5: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:21:53 executing program 0: write(0xffffffffffffffff, &(0x7f0000000080)="240000001a005f0014f9f407000904000a002000000000000000000008001b003a000000", 0x24) 05:21:53 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0xe]}) [ 2920.358742][ T7129] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:21:53 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x300000000000000, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:21:53 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0xa00}}) 05:21:53 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x10]}) [ 2920.450159][ T7129] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:21:53 executing program 5: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:21:53 executing program 0: write(0xffffffffffffffff, &(0x7f0000000080)="240000001a005f0014f9f407000904000a002000000000000000000008001b003a000000", 0x24) 05:21:53 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0xa00000000000000) [ 2920.588564][ T7315] binder: 7306:7315 ioctl c0306201 20000000 returned -14 05:21:54 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0xb00}}) 05:21:54 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x11]}) 05:21:54 executing program 0: write(0xffffffffffffffff, &(0x7f0000000080)="240000001a005f0014f9f407000904000a002000000000000000000008001b003a000000", 0x24) 05:21:54 executing program 5: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:21:54 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x400000000000000, &(0x7f0000000080), 0x385, 0x0, 0x0}) [ 2920.797023][ T7470] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:21:54 executing program 0: r0 = socket(0x0, 0x3, 0x0) write(r0, &(0x7f0000000080)="240000001a005f0014f9f407000904000a002000000000000000000008001b003a000000", 0x24) 05:21:54 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x12]}) [ 2920.860277][ T7470] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2920.960217][ T7630] binder: 7618:7630 ioctl c0306201 20000000 returned -14 05:21:54 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0xc00000000000000) 05:21:54 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0xc00}}) 05:21:54 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x25]}) 05:21:54 executing program 0: r0 = socket(0x0, 0x3, 0x0) write(r0, &(0x7f0000000080)="240000001a005f0014f9f407000904000a002000000000000000000008001b003a000000", 0x24) 05:21:54 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2921.115688][ T7717] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:21:54 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x500000000000000, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:21:54 executing program 0: r0 = socket(0x0, 0x3, 0x0) write(r0, &(0x7f0000000080)="240000001a005f0014f9f407000904000a002000000000000000000008001b003a000000", 0x24) 05:21:54 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0xc02000000000000) 05:21:54 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0xd00}}) 05:21:54 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x5c]}) [ 2921.336998][ T7927] binder: 7924:7927 ioctl c0306201 20000000 returned -14 05:21:54 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:21:54 executing program 0: r0 = socket(0x10, 0x0, 0x0) write(r0, &(0x7f0000000080)="240000001a005f0014f9f407000904000a002000000000000000000008001b003a000000", 0x24) [ 2921.418339][ T7932] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:21:54 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)) 05:21:54 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x600000000000000, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:21:54 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0xc03000000000000) 05:21:54 executing program 0: r0 = socket(0x10, 0x0, 0x0) write(r0, &(0x7f0000000080)="240000001a005f0014f9f407000904000a002000000000000000000008001b003a000000", 0x24) 05:21:54 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2921.615650][ T8154] binder: 8136:8154 ioctl c0306201 20000000 returned -14 05:21:55 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 05:21:55 executing program 0: r0 = socket(0x10, 0x0, 0x0) write(r0, &(0x7f0000000080)="240000001a005f0014f9f407000904000a002000000000000000000008001b003a000000", 0x24) [ 2921.717357][ T8234] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:21:55 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x700000000000000, &(0x7f0000000080), 0x385, 0x0, 0x0}) [ 2921.903561][ T8234] net_ratelimit: 2 callbacks suppressed [ 2921.903567][ T8234] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:21:55 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0xe00}}) 05:21:55 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x9, 0x0) 05:21:55 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}) 05:21:55 executing program 0: socket(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000080)="240000001a005f0014f9f407000904000a002000000000000000000008001b003a000000", 0x24) 05:21:55 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x800000000000000, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:21:55 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0xe02000000000000) 05:21:55 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}) 05:21:55 executing program 0: socket(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000080)="240000001a005f0014f9f407000904000a002000000000000000000008001b003a000000", 0x24) 05:21:55 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x9, 0x0) [ 2922.110506][ T8429] binder: 8407:8429 ioctl c0306201 20000000 returned -14 05:21:55 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x1100}}) [ 2922.184277][ T8439] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:21:55 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}) [ 2922.243514][ T8439] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:21:55 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x900000000000000, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:21:55 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x9, 0x0) 05:21:55 executing program 0: socket(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000080)="240000001a005f0014f9f407000904000a002000000000000000000008001b003a000000", 0x24) 05:21:55 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) 05:21:55 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0xf00000000000000) 05:21:55 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x1200}}) [ 2922.424935][ T8698] binder: 8666:8698 ioctl c0306201 20000000 returned -14 05:21:55 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, 0x0, 0x0) 05:21:55 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x9, 0x0) 05:21:55 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}) 05:21:55 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0xa00000000000000, &(0x7f0000000080), 0x385, 0x0, 0x0}) [ 2922.609164][ T8836] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:21:55 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, 0x0, 0x0) 05:21:56 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}) [ 2922.719559][ T8836] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:21:56 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x9, 0x0) 05:21:56 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, 0x0, 0x0) 05:21:56 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x1000000000000000) 05:21:56 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x2500}}) 05:21:56 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0xb00000000000000, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:21:56 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080), 0x0) 05:21:56 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}) 05:21:56 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x9, 0x0) [ 2922.967600][ T9072] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:21:56 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080), 0x0) 05:21:56 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}) [ 2923.079415][ T9072] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:21:56 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0xc00000000000000, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:21:56 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080), 0x0) 05:21:56 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x9, 0x0) 05:21:56 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0xb]}) 05:21:56 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x13a795e700000000) [ 2923.318221][ T9301] binder: 9299:9301 ioctl c0306201 20000000 returned -14 [ 2923.413847][ T9310] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:21:56 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="240000001a005f0014f9f407000904000a00", 0x12) 05:21:56 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x9, 0x0) 05:21:56 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x3f00}}) 05:21:56 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0xc]}) [ 2923.490106][ T9310] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:21:56 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0xd00000000000000, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:21:56 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}) 05:21:56 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="240000001a005f0014f9f407000904000a00", 0x12) 05:21:56 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x3000000000000000) [ 2923.606265][ T9430] binder: 9429:9430 ioctl c0306201 20000000 returned -14 05:21:57 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x9, 0x0) 05:21:57 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0xe]}) 05:21:57 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="240000001a005f0014f9f407000904000a00", 0x12) 05:21:57 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x4000}}) 05:21:57 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0xe00000000000000, &(0x7f0000000080), 0x385, 0x0, 0x0}) [ 2923.821642][ T9608] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:21:57 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}) [ 2923.905028][ T9608] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2923.924595][ T9652] binder: 9651:9652 ioctl c0306201 20000000 returned -14 05:21:57 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="240000001a005f0014f9f407000904000a00200000000000000000", 0x1b) 05:21:57 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140), 0x0, 0x10000}], 0x9, 0x0) 05:21:57 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x3f00000000000000) 05:21:57 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}) 05:21:57 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x4800}}) 05:21:57 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="240000001a005f0014f9f407000904000a00200000000000000000", 0x1b) 05:21:57 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x1000000000000000, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:21:57 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140), 0x0, 0x10000}], 0x9, 0x0) 05:21:57 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x12]}) [ 2924.202953][ T9872] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2924.289509][ T9872] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2924.340274][ T9886] binder: 9884:9886 ioctl c0306201 20000000 returned -14 05:21:57 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x25]}) 05:21:57 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140), 0x0, 0x10000}], 0x9, 0x0) 05:21:57 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="240000001a005f0014f9f407000904000a00200000000000000000", 0x1b) 05:21:57 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x4000000000000000) 05:21:57 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x1100000000000000, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:21:57 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5c]}) 05:21:57 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x4c00}}) 05:21:57 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="240000001a005f0014f9f407000904000a002000000000000000000008001b00", 0x20) 05:21:57 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2", 0x24, 0x10000}], 0x9, 0x0) [ 2924.652936][T10107] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:21:58 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)) 05:21:58 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="240000001a005f0014f9f407000904000a002000000000000000000008001b00", 0x20) 05:21:58 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x1200000000000000, &(0x7f0000000080), 0x385, 0x0, 0x0}) [ 2924.729436][T10107] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:21:58 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2", 0x24, 0x10000}], 0x9, 0x0) 05:21:58 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x4400000000000000) 05:21:58 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="240000001a005f0014f9f407000904000a002000000000000000000008001b00", 0x20) 05:21:58 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x5c00}}) 05:21:58 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) [ 2924.919440][T10334] binder: 10325:10334 ioctl c0306201 20000000 returned -14 05:21:58 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="240000001a005f0014f9f407000904000a002000000000000000000008001b003a00", 0x22) 05:21:58 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2", 0x24, 0x10000}], 0x9, 0x0) [ 2925.020420][T10338] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:21:58 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}) [ 2925.071846][T10338] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:21:58 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x2000000000000000, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:21:58 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="240000001a005f0014f9f407000904000a002000000000000000000008001b003a00", 0x22) 05:21:58 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x4602000000000000) 05:21:58 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x9, 0x0) 05:21:58 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}) [ 2925.236364][T10562] binder: 10560:10562 ioctl c0306201 20000000 returned -14 05:21:58 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x6800}}) 05:21:58 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="240000001a005f0014f9f407000904000a002000000000000000000008001b003a00", 0x22) 05:21:58 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x9, 0x0) 05:21:58 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x2500000000000000, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:21:58 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="240000001a005f0014f9f407000904000a002000000000000000000008001b003a0000", 0x23) [ 2925.396700][T10606] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:21:58 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}) [ 2925.483380][T10606] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:21:58 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x9, 0x0) [ 2925.523840][T10700] binder: 10685:10700 ioctl c0306201 20000000 returned -14 05:21:58 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="240000001a005f0014f9f407000904000a002000000000000000000008001b003a0000", 0x23) 05:21:58 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x4c01000000000000) 05:21:58 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x6c00}}) 05:21:59 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) 05:21:59 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x3f00000000000000, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:21:59 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="240000001a005f0014f9f407000904000a002000000000000000000008001b003a0000", 0x23) 05:21:59 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000", 0x3f, 0x10000}], 0x9, 0x0) [ 2925.763231][T10903] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:21:59 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}) 05:21:59 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0xc, 0x28001) write$evdev(r0, &(0x7f0000000000)=[{{}, 0x11, 0x100}], 0x18) 05:21:59 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x4000000000000000, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:21:59 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000", 0x3f, 0x10000}], 0x9, 0x0) 05:21:59 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x5002000000000000) [ 2925.994605][T11110] binder: 11102:11110 ioctl c0306201 20000000 returned -14 05:21:59 executing program 0: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x8000, 0x0) 05:21:59 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}) [ 2926.213534][T11227] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:21:59 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x7400}}) 05:21:59 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000", 0x3f, 0x10000}], 0x9, 0x0) 05:21:59 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x4800000000000000, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:21:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x406}, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 05:21:59 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}) 05:21:59 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x5201000000000000) 05:21:59 executing program 0: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/3, 0x3}, {&(0x7f0000000380)=""/165, 0xa5}], 0x2, 0x0) [ 2926.469778][T11261] binder: 11253:11261 ioctl c0306201 20000000 returned -14 05:21:59 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}) 05:21:59 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f424852", 0x44, 0x10000}], 0x9, 0x0) 05:21:59 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x7a00}}) [ 2926.581528][T11380] fuse: Bad value for 'fd' [ 2926.608407][T11367] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2926.627936][T11436] fuse: Bad value for 'fd' 05:22:00 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb]}) 05:22:00 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x4c00000000000000, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:22:00 executing program 0: 05:22:00 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f424852", 0x44, 0x10000}], 0x9, 0x0) 05:22:00 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x5801000000000000) 05:22:00 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc]}) [ 2926.812544][T11504] binder: 11496:11504 ioctl c0306201 20000000 returned -14 05:22:00 executing program 0: 05:22:00 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f424852", 0x44, 0x10000}], 0x9, 0x0) 05:22:00 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x5c00000000000000, &(0x7f0000000080), 0x385, 0x0, 0x0}) [ 2927.011923][T11592] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:22:00 executing program 0: 05:22:00 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}) [ 2927.089573][T11592] net_ratelimit: 3 callbacks suppressed [ 2927.089579][T11592] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2927.134071][T11717] binder: 11716:11717 ioctl c0306201 20000000 returned -14 05:22:00 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x1000000}}) 05:22:00 executing program 0: 05:22:00 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x5a01000000000000) 05:22:00 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f4248526653", 0x46, 0x10000}], 0x9, 0x0) 05:22:00 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe]}) 05:22:00 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x6000000000000000, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:22:00 executing program 0: 05:22:00 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}) 05:22:00 executing program 0: 05:22:00 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}) [ 2927.501454][T11837] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:22:00 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f4248526653", 0x46, 0x10000}], 0x9, 0x0) 05:22:00 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x2000000}}) [ 2927.560752][T11837] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:22:00 executing program 0: 05:22:01 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x6800000000000000, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:22:01 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x6000000000000000) 05:22:01 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12]}) 05:22:01 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f4248526653", 0x46, 0x10000}], 0x9, 0x0) 05:22:01 executing program 0: 05:22:01 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25]}) [ 2927.811553][T12150] binder: 12142:12150 ioctl c0306201 20000000 returned -14 05:22:01 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x3000000}}) 05:22:01 executing program 0: [ 2927.915961][T12176] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:22:01 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c]}) [ 2927.990333][T12176] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:22:01 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x6c00000000000000, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:22:01 executing program 0: 05:22:01 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f", 0x47, 0x10000}], 0x9, 0x0) 05:22:01 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)) 05:22:01 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x6558000000000000) 05:22:01 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x4000000}}) [ 2928.197845][T12400] binder: 12398:12400 ioctl c0306201 20000000 returned -14 05:22:01 executing program 0: 05:22:01 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 05:22:01 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x7400000000000000, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:22:01 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f", 0x47, 0x10000}], 0x9, 0x0) 05:22:01 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x5000000}}) 05:22:01 executing program 0: [ 2928.396079][T12463] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:22:01 executing program 0: 05:22:01 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}) [ 2928.480376][T12463] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:22:01 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f", 0x47, 0x10000}], 0x9, 0x0) 05:22:01 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x6000000}}) 05:22:02 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x6601000000000000) 05:22:02 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x7a00000000000000, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:22:02 executing program 0: 05:22:02 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}) 05:22:02 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48}], 0x9, 0x0) [ 2928.749298][T12863] binder: 12847:12863 ioctl c0306201 20000000 returned -14 05:22:02 executing program 0: 05:22:02 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x7000000}}) 05:22:02 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}) 05:22:02 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0xffffffff00000000, &(0x7f0000000080), 0x385, 0x0, 0x0}) [ 2928.911142][T12974] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:22:02 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48}], 0x9, 0x0) 05:22:02 executing program 0: 05:22:02 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) [ 2928.989372][T12974] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2929.054684][T13066] binder: 13064:13066 ioctl c0306201 20000000 returned -14 05:22:02 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x6801000000000000) 05:22:02 executing program 0: 05:22:02 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x8000000}}) 05:22:02 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}) 05:22:02 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0xffffffffff600000, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:22:02 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48}], 0x9, 0x0) 05:22:02 executing program 0: 05:22:02 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}) [ 2929.346608][T13292] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:22:02 executing program 0: 05:22:02 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2929.430188][T13292] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:22:02 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}) 05:22:02 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x2, 0x0}) 05:22:02 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x6e01000000000000) 05:22:02 executing program 0: 05:22:03 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x9000000}}) 05:22:03 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 05:22:03 executing program 0: 05:22:03 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}) 05:22:03 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x3, 0x0}) 05:22:03 executing program 0: [ 2929.870295][T13543] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:22:03 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb]}) [ 2929.930228][T13543] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:22:03 executing program 0: 05:22:03 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 05:22:03 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x7001000000000000) 05:22:03 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc]}) 05:22:03 executing program 0: [ 2930.364542][T13855] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:22:03 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0xa000000}}) 05:22:03 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x4, 0x0}) 05:22:03 executing program 5: 05:22:03 executing program 0: 05:22:03 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}) [ 2930.429514][T13855] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:22:03 executing program 0: 05:22:03 executing program 5: 05:22:03 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x8000000000000000) 05:22:03 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe]}) 05:22:03 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0xb000000}}) 05:22:03 executing program 0: 05:22:03 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x5, 0x0}) 05:22:04 executing program 5: [ 2930.670763][T14084] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:22:04 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}) [ 2930.750560][T14084] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:22:04 executing program 0: 05:22:04 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}) 05:22:04 executing program 5: 05:22:04 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x8100000000000000) 05:22:04 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x6, 0x0}) 05:22:04 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0xc000000}}) 05:22:04 executing program 0: 05:22:04 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12]}) 05:22:04 executing program 5: 05:22:04 executing program 5: 05:22:04 executing program 0: 05:22:04 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0xd000000}}) 05:22:04 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x7, 0x0}) 05:22:04 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25]}) [ 2931.181824][T14424] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:22:04 executing program 5: [ 2931.279597][T14424] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:22:04 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x8847000000000000) 05:22:04 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c]}) 05:22:04 executing program 0: 05:22:04 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x8, 0x0}) 05:22:04 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@broadcast, 0x4d3, 0x32}, 0x0, @in=@empty, 0x0, 0x0, 0x0, 0x5}}, 0xe8) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) 05:22:04 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="cc0000002400070500"/20, @ANYRES32=r1, @ANYBLOB="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"], 0xcc}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0xe, &(0x7f0000000100)}], 0x492492492492642, 0x0) 05:22:04 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)) 05:22:04 executing program 5: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x17f) write(r0, &(0x7f0000001340)="240000004a00ff0014f9f400000904000a00000000000000305128a0001000000c000000", 0x24) [ 2931.650127][T14783] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2931.721060][T14851] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2931.768119][T14851] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.0'. 05:22:05 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0xe000000}}) 05:22:05 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 05:22:05 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x9, 0x0}) 05:22:05 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f0000000000)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000480)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000200)="fbbe22cf104c948f665e6007769d", 0x0, 0x2b1}, 0x28) 05:22:05 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x8848000000000000) 05:22:05 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}) 05:22:05 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x101404, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000300)=ANY=[@ANYBLOB="06e5ffe7b36093f143c2a77fb4f6f2ff9b926a4b8b53d795ab38b561eb36b333b69824112aa59f05862e7d08dc8e11171045c133da1006febf393007490e6981f2fa73a0b939d12b7e90c66da8bd0994c64635e11fb352abf6a8b66b62cf3f77cc257cec3ef6577714d115da544d4a3c065640e2c047737528237bd4a16e17d2a971644293270b46ee57db4448a6585b7358f611e9951fde0e33eed179e49dff6e", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) creat(&(0x7f0000000240)='./file0\x00', 0x0) uselib(&(0x7f0000000080)='./file0\x00') getsockopt$sock_int(r0, 0x1, 0x7, &(0x7f00000000c0), &(0x7f0000000100)=0x4) fanotify_init(0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$UHID_INPUT(r0, &(0x7f00000015c0)={0x8, "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", 0xfffffffffffffde9}, 0x10000005c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x498301, 0x0) fadvise64(r0, 0x0, 0x0, 0x4) 05:22:05 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0xa, 0x0}) 05:22:05 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x10000000}}) 05:22:05 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}) [ 2932.096229][T15241] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:22:05 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 05:22:05 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2932.193475][T15241] net_ratelimit: 1 callbacks suppressed [ 2932.193482][T15241] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:22:05 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}) 05:22:05 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0xb, 0x0}) 05:22:05 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc018620c, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:22:05 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x88a8ffff00000000) 05:22:05 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x11000000}}) 05:22:05 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0xf2000000}, 0x0) 05:22:05 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) 05:22:05 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 05:22:05 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0xc, 0x0}) [ 2932.528822][T15617] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:22:05 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}) [ 2932.659505][T15617] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:22:06 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 05:22:06 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}) 05:22:06 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x12000000}}) 05:22:06 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}) 05:22:06 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0xd, 0x0}) [ 2933.030728][T15731] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2933.139392][T15731] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:22:07 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x8e02000000000000) 05:22:07 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x11}) 05:22:07 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x25000000}}) 05:22:07 executing program 5: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 05:22:07 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}) 05:22:07 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0xe, 0x0}) 05:22:07 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0bc5310, &(0x7f0000000000)) [ 2934.158225][T16187] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:22:07 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x3f000000}}) 05:22:07 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb]}) 05:22:07 executing program 5: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2934.259360][T16187] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:22:07 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc]}) 05:22:07 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0bc5310, &(0x7f0000000000)) 05:22:07 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x9002000000000000) 05:22:07 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x10, 0x0}) 05:22:07 executing program 5: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 05:22:07 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x40000000}}) 05:22:07 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}) 05:22:07 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0bc5310, &(0x7f0000000000)) 05:22:07 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x11, 0x0}) [ 2934.606217][T16548] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2934.679587][T16548] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:22:08 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe]}) 05:22:08 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 05:22:08 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc08c5336, &(0x7f0000000000)) 05:22:08 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x9602000000000000) 05:22:08 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x48000000}}) 05:22:08 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x12, 0x0}) 05:22:08 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}) 05:22:08 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc05c5340, &(0x7f0000000000)) 05:22:08 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2934.968839][T16844] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:22:08 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}) [ 2935.049655][T16844] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:22:08 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc05c5340, &(0x7f0000000000)) 05:22:08 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x25, 0x0}) 05:22:08 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12]}) 05:22:08 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 05:22:08 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x4c000000}}) 05:22:08 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x9802000000000000) 05:22:08 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc05c5340, &(0x7f0000000000)) 05:22:08 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 05:22:08 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25]}) 05:22:08 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x48, 0x0}) 05:22:08 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc02c5341, &(0x7f0000000000)) [ 2935.452453][T17145] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:22:08 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x5c000000}}) [ 2935.519913][T17145] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:22:08 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 05:22:08 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c]}) 05:22:08 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc02c5341, &(0x7f0000000000)) 05:22:09 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)) 05:22:09 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc02c5341, &(0x7f0000000000)) 05:22:09 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x9a02000000000000) 05:22:09 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x4c, 0x0}) 05:22:09 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x68000000}}) 05:22:09 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 05:22:09 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 05:22:09 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0x80045301, &(0x7f0000000000)) [ 2935.923467][T17530] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:22:09 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x5c, 0x0}) 05:22:09 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) [ 2936.004003][T17530] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:22:09 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0x80045301, &(0x7f0000000000)) 05:22:09 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}) 05:22:09 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x6c000000}}) 05:22:09 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x9effffff00000000) 05:22:09 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0x80045301, &(0x7f0000000000)) 05:22:09 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x60, 0x0}) 05:22:09 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) 05:22:09 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}) 05:22:09 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0x40bc5311, &(0x7f0000000000)) [ 2936.382366][T17868] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:22:09 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x74000000}}) 05:22:09 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) 05:22:09 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}) [ 2936.461991][T17868] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:22:09 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0x408c5333, &(0x7f0000000000)) 05:22:09 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x68, 0x0}) 05:22:09 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0x404c534a, &(0x7f0000000000)) 05:22:10 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0xa402000000000000) 05:22:10 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) 05:22:10 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x7a000000}}) 05:22:10 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 05:22:10 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x6c, 0x0}) 05:22:10 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0x404c534a, &(0x7f0000000000)) 05:22:10 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}) [ 2936.868302][T18312] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:22:10 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0x404c534a, &(0x7f0000000000)) [ 2936.932986][T18312] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:22:10 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 05:22:10 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}) 05:22:10 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x74, 0x0}) 05:22:10 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0xa602000000000000) 05:22:10 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0x402c5342, &(0x7f0000000000)) 05:22:10 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0xc3ffffff}}) 05:22:10 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}) 05:22:10 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 05:22:10 executing program 0 (fault-call:0 fault-nth:0): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:10 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}) [ 2937.322349][T18545] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:22:10 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:10 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x7a, 0x0}) [ 2937.380353][T18545] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:22:10 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb]}) 05:22:10 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140), 0x0, 0x10000}], 0x0, 0x0) 05:22:10 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0xfdfdffff}}) 05:22:10 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0xac02000000000000) 05:22:10 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='b\\rfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:10 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc]}) 05:22:11 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140), 0x0, 0x10000}], 0x0, 0x0) 05:22:11 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btr%s\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:11 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x300, 0x0}) 05:22:11 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0xfeffffff}}) 05:22:11 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}) [ 2937.785137][T18926] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:22:11 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btr\\s\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:11 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe]}) [ 2937.899355][T18926] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:22:11 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140), 0x0, 0x10000}], 0x0, 0x0) 05:22:11 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x500, 0x0}) 05:22:11 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0xae01000000000000) 05:22:11 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrf#\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:11 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}) 05:22:11 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0xfffffdfd}}) 05:22:11 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2", 0x24, 0x10000}], 0x0, 0x0) 05:22:11 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrf%\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:11 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}) [ 2938.272797][T19230] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:22:11 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrf*\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:11 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x600, 0x0}) 05:22:11 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2", 0x24, 0x10000}], 0x0, 0x0) 05:22:11 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12]}) [ 2938.349661][T19230] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:22:11 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrf+\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:11 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0xaf02000000000000) 05:22:11 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25]}) 05:22:11 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0xffffffc3}}) 05:22:11 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x700, 0x0}) 05:22:11 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2", 0x24, 0x10000}], 0x0, 0x0) 05:22:11 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrf-\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:11 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c]}) 05:22:12 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrf.\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2938.726742][T19581] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:22:12 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x900, 0x0}) [ 2938.799956][T19581] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:22:12 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x0, 0x0) 05:22:12 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrf0\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:12 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)) 05:22:12 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0xb002000000000000) 05:22:12 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x0, 0x0) [ 2939.165513][T19910] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:22:12 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0xfffffffe}}) 05:22:12 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x0, 0x0) 05:22:12 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0xa00, 0x0}) 05:22:12 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfL\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:12 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 05:22:12 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfX\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:12 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}) [ 2939.289573][T19910] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:22:12 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0xb00, 0x0}) 05:22:12 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000", 0x3f, 0x10000}], 0x0, 0x0) 05:22:12 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}) 05:22:12 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0xb202000000000000) 05:22:12 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf}}) 05:22:12 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrf\\\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:12 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000", 0x3f, 0x10000}], 0x0, 0x0) 05:22:12 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0xc00, 0x0}) 05:22:12 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfc\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:12 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}) [ 2939.638509][T20209] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2939.709813][T20209] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:22:13 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000", 0x3f, 0x10000}], 0x0, 0x0) 05:22:13 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x2}}) 05:22:13 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) 05:22:13 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfd\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:13 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0xd00, 0x0}) 05:22:13 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0xb801000000000000) 05:22:13 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f424852", 0x44, 0x10000}], 0x0, 0x0) 05:22:13 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}) 05:22:13 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfh\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:13 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x3}}) 05:22:13 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}) [ 2940.149041][T20587] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:22:13 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0xe00, 0x0}) 05:22:13 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f424852", 0x44, 0x10000}], 0x0, 0x0) [ 2940.219490][T20587] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:22:13 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfi\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:13 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}) 05:22:13 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0xbb01020001000000) 05:22:13 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f424852", 0x44, 0x10000}], 0x0, 0x0) 05:22:13 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x4}}) 05:22:13 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfl\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:13 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x1100, 0x0}) 05:22:13 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}) 05:22:13 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfo\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2940.594069][T20929] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:22:13 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb]}) 05:22:13 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) [ 2940.679566][T20929] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:22:14 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x1200, 0x0}) 05:22:14 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfp\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:14 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc]}) 05:22:14 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0xc002000000000000) 05:22:14 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) [ 2941.056345][T21183] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:22:14 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x5}}) 05:22:14 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}) 05:22:14 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrft\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:14 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x2000, 0x0}) 05:22:14 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) [ 2941.149461][T21183] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:22:14 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe]}) 05:22:14 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfu\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:14 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0xc3ffffff00000000) 05:22:14 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 05:22:14 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}) 05:22:14 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x2500, 0x0}) 05:22:14 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfx\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:14 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x6}}) [ 2941.437693][T21495] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:22:14 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfz\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:14 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}) 05:22:14 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) [ 2941.519372][T21495] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:22:14 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x02', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:15 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x3f00, 0x0}) 05:22:15 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0xce03000000000000) 05:22:15 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 05:22:15 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12]}) 05:22:15 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x03', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2941.807210][T21730] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:22:15 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25]}) 05:22:15 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x4000, 0x0}) 05:22:15 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x7}}) 05:22:15 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48}], 0x0, 0x0) 05:22:15 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0xe0ffffff00000000) 05:22:15 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x04', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:15 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c]}) 05:22:15 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x4800, 0x0}) 05:22:15 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x05', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:15 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48}], 0x0, 0x0) 05:22:15 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)) [ 2942.306842][T21959] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:22:15 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 05:22:15 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x06', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:15 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x4c00, 0x0}) 05:22:15 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x8}}) 05:22:15 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0xefffffff00000000) 05:22:15 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48}], 0x0, 0x0) 05:22:16 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\a', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:16 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}) [ 2942.674131][T22216] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:22:16 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x9}}) 05:22:16 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\b', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2942.769703][T22216] net_ratelimit: 2 callbacks suppressed [ 2942.769709][T22216] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:22:16 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}) 05:22:16 executing program 5 (fault-call:0 fault-nth:0): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 05:22:16 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x5c00, 0x0}) [ 2942.928109][T22442] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:22:16 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\t', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:16 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}) [ 2942.977850][T22470] FAULT_INJECTION: forcing a failure. [ 2942.977850][T22470] name failslab, interval 1, probability 0, space 0, times 0 05:22:16 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0xa}}) [ 2943.039809][T22442] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2943.048566][T22470] CPU: 0 PID: 22470 Comm: syz-executor.5 Not tainted 5.4.0-rc2+ #0 [ 2943.063263][T22470] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2943.073326][T22470] Call Trace: [ 2943.076633][T22470] dump_stack+0x1d8/0x2f8 [ 2943.080981][T22470] should_fail+0x555/0x770 [ 2943.085417][T22470] __should_failslab+0x11a/0x160 [ 2943.090370][T22470] ? __se_sys_memfd_create+0x10a/0x4b0 [ 2943.095847][T22470] should_failslab+0x9/0x20 [ 2943.100359][T22470] __kmalloc+0x7a/0x340 [ 2943.104528][T22470] __se_sys_memfd_create+0x10a/0x4b0 [ 2943.109822][T22470] ? do_syscall_64+0x1d/0x1c0 [ 2943.114514][T22470] __x64_sys_memfd_create+0x5b/0x70 [ 2943.119724][T22470] do_syscall_64+0xf7/0x1c0 [ 2943.124245][T22470] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2943.130230][T22470] RIP: 0033:0x459a59 [ 2943.134134][T22470] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2943.153915][T22470] RSP: 002b:00007fddc3987a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2943.162506][T22470] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000459a59 [ 2943.162515][T22470] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004be9b7 [ 2943.178451][T22470] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 05:22:16 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0xf001000000000000) 05:22:16 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x6000, 0x0}) 05:22:16 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) [ 2943.186448][T22470] R10: 0000000000010000 R11: 0000000000000246 R12: 00007fddc39886d4 [ 2943.186455][T22470] R13: 00000000004c8da6 R14: 00000000004e0200 R15: 0000000000000003 05:22:16 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\n', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:16 executing program 5 (fault-call:0 fault-nth:1): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 05:22:16 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}) [ 2943.347707][T22698] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:22:16 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\v', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:16 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x60ff, 0x0}) [ 2943.447698][T22848] FAULT_INJECTION: forcing a failure. [ 2943.447698][T22848] name failslab, interval 1, probability 0, space 0, times 0 [ 2943.461731][T22698] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:22:16 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}) 05:22:16 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\f', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2943.598041][T22848] CPU: 0 PID: 22848 Comm: syz-executor.5 Not tainted 5.4.0-rc2+ #0 [ 2943.605981][T22848] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2943.616045][T22848] Call Trace: [ 2943.619352][T22848] dump_stack+0x1d8/0x2f8 [ 2943.623698][T22848] should_fail+0x555/0x770 [ 2943.628131][T22848] __should_failslab+0x11a/0x160 [ 2943.633079][T22848] ? shmem_alloc_inode+0x1b/0x40 [ 2943.638031][T22848] should_failslab+0x9/0x20 [ 2943.642550][T22848] kmem_cache_alloc+0x56/0x2e0 05:22:16 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}) [ 2943.647331][T22848] ? shmem_match+0x180/0x180 [ 2943.651938][T22848] shmem_alloc_inode+0x1b/0x40 [ 2943.656708][T22848] ? shmem_match+0x180/0x180 [ 2943.661308][T22848] new_inode_pseudo+0x68/0x240 [ 2943.666085][T22848] new_inode+0x28/0x1c0 [ 2943.670253][T22848] ? __kasan_check_read+0x11/0x20 [ 2943.675282][T22848] shmem_get_inode+0x11b/0x700 [ 2943.680054][T22848] ? __alloc_fd+0x58f/0x630 [ 2943.684572][T22848] __shmem_file_setup+0x129/0x280 [ 2943.689748][T22848] shmem_file_setup+0x2f/0x40 [ 2943.694452][T22848] __se_sys_memfd_create+0x28e/0x4b0 [ 2943.699741][T22848] ? do_syscall_64+0x1d/0x1c0 [ 2943.704419][T22848] __x64_sys_memfd_create+0x5b/0x70 [ 2943.709622][T22848] do_syscall_64+0xf7/0x1c0 [ 2943.714126][T22848] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2943.720249][T22848] RIP: 0033:0x459a59 [ 2943.724150][T22848] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 05:22:17 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0xb}}) 05:22:17 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x6800, 0x0}) 05:22:17 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0xf0ffffff00000000) [ 2943.743876][T22848] RSP: 002b:00007fddc3987a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2943.752308][T22848] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000459a59 [ 2943.760283][T22848] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004be9b7 [ 2943.768349][T22848] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 2943.776328][T22848] R10: 0000000000010000 R11: 0000000000000246 R12: 00007fddc39886d4 [ 2943.784307][T22848] R13: 00000000004c8da6 R14: 00000000004e0200 R15: 0000000000000003 05:22:17 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\r', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:17 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}) 05:22:17 executing program 5 (fault-call:0 fault-nth:2): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2943.881482][T22969] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2943.941812][T22969] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:22:17 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb]}) 05:22:17 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x6c00, 0x0}) [ 2944.007233][T23096] FAULT_INJECTION: forcing a failure. [ 2944.007233][T23096] name failslab, interval 1, probability 0, space 0, times 0 05:22:17 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x0e', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2944.077356][T23096] CPU: 0 PID: 23096 Comm: syz-executor.5 Not tainted 5.4.0-rc2+ #0 [ 2944.085600][T23096] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2944.095667][T23096] Call Trace: [ 2944.098976][T23096] dump_stack+0x1d8/0x2f8 [ 2944.103317][T23096] should_fail+0x555/0x770 [ 2944.107734][T23096] __should_failslab+0x11a/0x160 [ 2944.112682][T23096] ? security_inode_alloc+0x36/0x1e0 [ 2944.117977][T23096] should_failslab+0x9/0x20 [ 2944.122576][T23096] kmem_cache_alloc+0x56/0x2e0 [ 2944.127368][T23096] ? rcu_read_lock_sched_held+0x10b/0x170 [ 2944.133102][T23096] security_inode_alloc+0x36/0x1e0 [ 2944.146475][T23096] inode_init_always+0x3b5/0x8d0 [ 2944.151437][T23096] ? shmem_match+0x180/0x180 [ 2944.156047][T23096] new_inode_pseudo+0x7f/0x240 [ 2944.160817][T23096] new_inode+0x28/0x1c0 [ 2944.165248][T23096] ? __kasan_check_read+0x11/0x20 [ 2944.170283][T23096] shmem_get_inode+0x11b/0x700 [ 2944.175055][T23096] ? __alloc_fd+0x58f/0x630 [ 2944.179714][T23096] __shmem_file_setup+0x129/0x280 [ 2944.184759][T23096] shmem_file_setup+0x2f/0x40 [ 2944.189620][T23096] __se_sys_memfd_create+0x28e/0x4b0 [ 2944.195056][T23096] ? do_syscall_64+0x1d/0x1c0 [ 2944.201395][T23096] __x64_sys_memfd_create+0x5b/0x70 [ 2944.206601][T23096] do_syscall_64+0xf7/0x1c0 [ 2944.211119][T23096] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2944.217035][T23096] RIP: 0033:0x459a59 05:22:17 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0xf200000000000000) 05:22:17 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc]}) 05:22:17 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x10', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:17 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0xc}}) [ 2944.220937][T23096] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2944.240680][T23096] RSP: 002b:00007fddc3987a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2944.249094][T23096] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000459a59 [ 2944.257261][T23096] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004be9b7 [ 2944.257268][T23096] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 05:22:17 executing program 5 (fault-call:0 fault-nth:3): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2944.257273][T23096] R10: 0000000000010000 R11: 0000000000000246 R12: 00007fddc39886d4 [ 2944.257278][T23096] R13: 00000000004c8da6 R14: 00000000004e0200 R15: 0000000000000003 05:22:17 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x7400, 0x0}) 05:22:17 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x11', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:17 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}) [ 2944.368200][T23287] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2944.392799][T23301] FAULT_INJECTION: forcing a failure. [ 2944.392799][T23301] name failslab, interval 1, probability 0, space 0, times 0 [ 2944.440731][T23287] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2944.472156][T23301] CPU: 0 PID: 23301 Comm: syz-executor.5 Not tainted 5.4.0-rc2+ #0 [ 2944.480234][T23301] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2944.490301][T23301] Call Trace: [ 2944.493603][T23301] dump_stack+0x1d8/0x2f8 [ 2944.497949][T23301] should_fail+0x555/0x770 [ 2944.502396][T23301] __should_failslab+0x11a/0x160 [ 2944.507353][T23301] ? __d_alloc+0x2d/0x6e0 [ 2944.511698][T23301] should_failslab+0x9/0x20 [ 2944.516208][T23301] kmem_cache_alloc+0x56/0x2e0 [ 2944.520990][T23301] __d_alloc+0x2d/0x6e0 [ 2944.525157][T23301] ? lockdep_init_map+0x2a/0x680 [ 2944.530111][T23301] d_alloc_pseudo+0x1d/0x70 [ 2944.534629][T23301] alloc_file_pseudo+0xc3/0x260 05:22:17 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x12', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:17 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe]}) [ 2944.539505][T23301] __shmem_file_setup+0x1a2/0x280 [ 2944.545058][T23301] shmem_file_setup+0x2f/0x40 [ 2944.549985][T23301] __se_sys_memfd_create+0x28e/0x4b0 [ 2944.549997][T23301] ? do_syscall_64+0x1d/0x1c0 [ 2944.550009][T23301] __x64_sys_memfd_create+0x5b/0x70 [ 2944.550019][T23301] do_syscall_64+0xf7/0x1c0 [ 2944.550034][T23301] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2944.550043][T23301] RIP: 0033:0x459a59 [ 2944.550053][T23301] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2944.550058][T23301] RSP: 002b:00007fddc3987a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2944.550067][T23301] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000459a59 [ 2944.550073][T23301] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004be9b7 [ 2944.550078][T23301] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 2944.550084][T23301] R10: 0000000000010000 R11: 0000000000000246 R12: 00007fddc39886d4 05:22:17 executing program 5 (fault-call:0 fault-nth:4): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 05:22:17 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0xd}}) [ 2944.550090][T23301] R13: 00000000004c8da6 R14: 00000000004e0200 R15: 0000000000000003 05:22:18 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0xf201000000000000) 05:22:18 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x7600, 0x0}) [ 2944.715028][T23520] FAULT_INJECTION: forcing a failure. [ 2944.715028][T23520] name failslab, interval 1, probability 0, space 0, times 0 05:22:18 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs%', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:18 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}) [ 2944.810680][T23520] CPU: 1 PID: 23520 Comm: syz-executor.5 Not tainted 5.4.0-rc2+ #0 [ 2944.815610][T23525] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2944.818616][T23520] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2944.818621][T23520] Call Trace: [ 2944.818640][T23520] dump_stack+0x1d8/0x2f8 [ 2944.818656][T23520] should_fail+0x555/0x770 [ 2944.818677][T23520] __should_failslab+0x11a/0x160 [ 2944.818688][T23520] ? __alloc_file+0x2c/0x390 [ 2944.818704][T23520] should_failslab+0x9/0x20 [ 2944.839478][T23520] kmem_cache_alloc+0x56/0x2e0 [ 2944.839493][T23520] __alloc_file+0x2c/0x390 [ 2944.839507][T23520] alloc_empty_file+0xac/0x1b0 [ 2944.839519][T23520] alloc_file+0x60/0x4c0 [ 2944.839534][T23520] alloc_file_pseudo+0x1d4/0x260 [ 2944.839554][T23520] __shmem_file_setup+0x1a2/0x280 [ 2944.839569][T23520] shmem_file_setup+0x2f/0x40 [ 2944.839581][T23520] __se_sys_memfd_create+0x28e/0x4b0 [ 2944.839595][T23520] ? do_syscall_64+0x1d/0x1c0 [ 2944.848328][T23520] __x64_sys_memfd_create+0x5b/0x70 [ 2944.848344][T23520] do_syscall_64+0xf7/0x1c0 [ 2944.848361][T23520] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2944.848372][T23520] RIP: 0033:0x459a59 [ 2944.848380][T23520] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2944.848389][T23520] RSP: 002b:00007fddc3987a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2944.954088][T23520] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000459a59 [ 2944.962074][T23520] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004be9b7 [ 2944.970184][T23520] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 2944.978341][T23520] R10: 0000000000010000 R11: 0000000000000246 R12: 00007fddc39886d4 [ 2944.986314][T23520] R13: 00000000004c8da6 R14: 00000000004e0200 R15: 0000000000000003 [ 2945.023575][T23525] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:22:18 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x7a00, 0x0}) 05:22:18 executing program 5 (fault-call:0 fault-nth:5): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 05:22:18 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0xe}}) 05:22:18 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}) 05:22:18 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\\', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:18 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0xf403000000000000) [ 2945.239852][T23817] FAULT_INJECTION: forcing a failure. [ 2945.239852][T23817] name failslab, interval 1, probability 0, space 0, times 0 [ 2945.268326][T23817] CPU: 0 PID: 23817 Comm: syz-executor.5 Not tainted 5.4.0-rc2+ #0 [ 2945.276269][T23817] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2945.286427][T23817] Call Trace: [ 2945.289747][T23817] dump_stack+0x1d8/0x2f8 [ 2945.294101][T23817] should_fail+0x555/0x770 [ 2945.298539][T23817] __should_failslab+0x11a/0x160 [ 2945.303497][T23817] ? security_file_alloc+0x36/0x200 [ 2945.308713][T23817] should_failslab+0x9/0x20 [ 2945.313230][T23817] kmem_cache_alloc+0x56/0x2e0 [ 2945.318024][T23817] security_file_alloc+0x36/0x200 [ 2945.323064][T23817] __alloc_file+0xde/0x390 [ 2945.327499][T23817] alloc_empty_file+0xac/0x1b0 [ 2945.332295][T23817] alloc_file+0x60/0x4c0 05:22:18 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x10}}) 05:22:18 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x9600, 0x0}) 05:22:18 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12]}) 05:22:18 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x04', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2945.336562][T23817] alloc_file_pseudo+0x1d4/0x260 [ 2945.341528][T23817] __shmem_file_setup+0x1a2/0x280 [ 2945.346576][T23817] shmem_file_setup+0x2f/0x40 [ 2945.351271][T23817] __se_sys_memfd_create+0x28e/0x4b0 [ 2945.356737][T23817] ? do_syscall_64+0x1d/0x1c0 [ 2945.356753][T23817] __x64_sys_memfd_create+0x5b/0x70 [ 2945.356765][T23817] do_syscall_64+0xf7/0x1c0 [ 2945.366742][T23817] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2945.366753][T23817] RIP: 0033:0x459a59 [ 2945.366764][T23817] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2945.366770][T23817] RSP: 002b:00007fddc3987a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2945.366780][T23817] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000459a59 [ 2945.366787][T23817] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004be9b7 [ 2945.366794][T23817] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 05:22:18 executing program 5 (fault-call:0 fault-nth:6): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 05:22:18 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25]}) [ 2945.366800][T23817] R10: 0000000000010000 R11: 0000000000000246 R12: 00007fddc39886d4 [ 2945.366807][T23817] R13: 00000000004c8da6 R14: 00000000004e0200 R15: 0000000000000003 05:22:18 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2945.523981][T23979] FAULT_INJECTION: forcing a failure. [ 2945.523981][T23979] name failslab, interval 1, probability 0, space 0, times 0 05:22:18 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x400000, 0x0}) [ 2945.592011][T23964] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2945.619420][T23979] CPU: 1 PID: 23979 Comm: syz-executor.5 Not tainted 5.4.0-rc2+ #0 [ 2945.627376][T23979] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2945.637441][T23979] Call Trace: 05:22:18 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x11}}) 05:22:18 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c]}) [ 2945.640746][T23979] dump_stack+0x1d8/0x2f8 [ 2945.645085][T23979] should_fail+0x555/0x770 [ 2945.649758][T23979] __should_failslab+0x11a/0x160 [ 2945.654708][T23979] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 2945.660433][T23979] should_failslab+0x9/0x20 [ 2945.660464][T23979] __kmalloc+0x7a/0x340 [ 2945.660476][T23979] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 2945.660490][T23979] tomoyo_realpath_from_path+0xdc/0x7c0 [ 2945.660509][T23979] tomoyo_path_perm+0x192/0x850 [ 2945.669153][T23979] ? perf_trace_lock_acquire+0x97/0x3b0 [ 2945.669195][T23979] tomoyo_path_truncate+0x1c/0x20 [ 2945.669207][T23979] security_path_truncate+0xd5/0x150 [ 2945.669220][T23979] do_sys_ftruncate+0x493/0x710 [ 2945.669238][T23979] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 2945.711750][T23979] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 2945.717286][T23979] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 2945.723221][T23979] ? do_syscall_64+0x1d/0x1c0 [ 2945.727889][T23979] __x64_sys_ftruncate+0x60/0x70 [ 2945.732816][T23979] do_syscall_64+0xf7/0x1c0 [ 2945.737316][T23979] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2945.743206][T23979] RIP: 0033:0x459a27 [ 2945.747234][T23979] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2945.766964][T23979] RSP: 002b:00007fddc3987a88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 2945.775366][T23979] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000459a27 [ 2945.783328][T23979] RDX: 0000000020000068 RSI: 0000000000020000 RDI: 0000000000000004 [ 2945.791295][T23979] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 2945.799254][T23979] R10: 0000000000010000 R11: 0000000000000217 R12: 0000000000000004 [ 2945.807221][T23979] R13: 00000000004c8da6 R14: 00000000004e0200 R15: 0000000000000003 [ 2945.816401][T23979] ERROR: Out of memory at tomoyo_realpath_from_path. [ 2945.840994][T23964] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:22:19 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x02', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:19 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0xfc00000000000000) 05:22:19 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)) 05:22:19 executing program 5 (fault-call:0 fault-nth:7): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 05:22:19 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x50f000, 0x0}) 05:22:19 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x12}}) [ 2946.106236][T24407] FAULT_INJECTION: forcing a failure. [ 2946.106236][T24407] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2946.119660][T24407] CPU: 0 PID: 24407 Comm: syz-executor.5 Not tainted 5.4.0-rc2+ #0 [ 2946.119667][T24407] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2946.119672][T24407] Call Trace: [ 2946.119690][T24407] dump_stack+0x1d8/0x2f8 [ 2946.119707][T24407] should_fail+0x555/0x770 [ 2946.119727][T24407] should_fail_alloc_page+0x55/0x60 [ 2946.119737][T24407] prepare_alloc_pages+0x283/0x460 [ 2946.119751][T24407] __alloc_pages_nodemask+0xb2/0x5d0 [ 2946.119774][T24407] kmem_getpages+0x4d/0xa00 [ 2946.119787][T24407] cache_grow_begin+0x7e/0x2c0 [ 2946.119802][T24407] cache_alloc_refill+0x311/0x3f0 [ 2946.119813][T24407] ? check_preemption_disabled+0xb7/0x2a0 [ 2946.119832][T24407] __kmalloc+0x318/0x340 [ 2946.119841][T24407] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 2946.119855][T24407] tomoyo_realpath_from_path+0xdc/0x7c0 [ 2946.119876][T24407] tomoyo_path_perm+0x192/0x850 [ 2946.119890][T24407] ? perf_trace_lock_acquire+0x97/0x3b0 [ 2946.119928][T24407] tomoyo_path_truncate+0x1c/0x20 [ 2946.145733][T24407] security_path_truncate+0xd5/0x150 [ 2946.222415][T24407] do_sys_ftruncate+0x493/0x710 [ 2946.227284][T24407] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 2946.233193][T24407] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 2946.238667][T24407] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 2946.244397][T24407] ? do_syscall_64+0x1d/0x1c0 [ 2946.249096][T24407] __x64_sys_ftruncate+0x60/0x70 05:22:19 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x06', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:19 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) [ 2946.254049][T24407] do_syscall_64+0xf7/0x1c0 [ 2946.258566][T24407] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2946.264467][T24407] RIP: 0033:0x459a27 [ 2946.268366][T24407] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2946.288251][T24407] RSP: 002b:00007fddc3987a88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 2946.288262][T24407] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000459a27 05:22:19 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x70f000, 0x0}) [ 2946.288268][T24407] RDX: 0000000020000068 RSI: 0000000000020000 RDI: 0000000000000004 [ 2946.288275][T24407] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 2946.288281][T24407] R10: 0000000000010000 R11: 0000000000000217 R12: 0000000000000004 [ 2946.288294][T24407] R13: 00000000004c8da6 R14: 00000000004e0200 R15: 0000000000000003 [ 2946.317486][T24454] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:22:19 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:19 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}) [ 2946.410816][T24454] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:22:19 executing program 5 (fault-call:0 fault-nth:8): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 05:22:19 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x718000, 0x0}) 05:22:19 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0xfd00000000000000) 05:22:19 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:20 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x760000, 0x0}) 05:22:20 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}) [ 2946.716418][T24820] FAULT_INJECTION: forcing a failure. [ 2946.716418][T24820] name failslab, interval 1, probability 0, space 0, times 0 [ 2946.746505][T24805] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2946.759786][T24820] CPU: 0 PID: 24820 Comm: syz-executor.5 Not tainted 5.4.0-rc2+ #0 [ 2946.767710][T24820] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2946.777779][T24820] Call Trace: [ 2946.781086][T24820] dump_stack+0x1d8/0x2f8 [ 2946.785512][T24820] should_fail+0x555/0x770 [ 2946.785534][T24820] __should_failslab+0x11a/0x160 [ 2946.785548][T24820] ? tomoyo_encode2+0x273/0x5a0 [ 2946.785560][T24820] should_failslab+0x9/0x20 [ 2946.785572][T24820] __kmalloc+0x7a/0x340 [ 2946.785588][T24820] tomoyo_encode2+0x273/0x5a0 [ 2946.785602][T24820] ? dynamic_dname+0xf0/0xf0 [ 2946.785617][T24820] tomoyo_realpath_from_path+0x769/0x7c0 [ 2946.794976][T24820] tomoyo_path_perm+0x192/0x850 [ 2946.794993][T24820] ? perf_trace_lock_acquire+0x97/0x3b0 [ 2946.795031][T24820] tomoyo_path_truncate+0x1c/0x20 [ 2946.795044][T24820] security_path_truncate+0xd5/0x150 [ 2946.795058][T24820] do_sys_ftruncate+0x493/0x710 [ 2946.795081][T24820] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 2946.854875][T24820] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 2946.860498][T24820] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 2946.866232][T24820] ? do_syscall_64+0x1d/0x1c0 [ 2946.870926][T24820] __x64_sys_ftruncate+0x60/0x70 [ 2946.875879][T24820] do_syscall_64+0xf7/0x1c0 [ 2946.880485][T24820] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2946.886389][T24820] RIP: 0033:0x459a27 [ 2946.890293][T24820] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 05:22:20 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x25}}) 05:22:20 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x04', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:20 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}) [ 2946.909909][T24820] RSP: 002b:00007fddc3987a88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 2946.918519][T24820] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000459a27 [ 2946.926877][T24820] RDX: 0000000020000068 RSI: 0000000000020000 RDI: 0000000000000004 [ 2946.934868][T24820] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 2946.942858][T24820] R10: 0000000000010000 R11: 0000000000000217 R12: 0000000000000004 [ 2946.950846][T24820] R13: 00000000004c8da6 R14: 00000000004e0200 R15: 0000000000000003 05:22:20 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2946.970528][T24805] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2947.002847][T24820] ERROR: Out of memory at tomoyo_realpath_from_path. 05:22:20 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0xfdffffff00000000) 05:22:20 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) 05:22:20 executing program 5 (fault-call:0 fault-nth:9): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 05:22:20 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:20 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x807100, 0x0}) 05:22:20 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}) 05:22:20 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2947.313325][T25092] FAULT_INJECTION: forcing a failure. [ 2947.313325][T25092] name failslab, interval 1, probability 0, space 0, times 0 [ 2947.322934][T25073] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2947.326541][T25092] CPU: 1 PID: 25092 Comm: syz-executor.5 Not tainted 5.4.0-rc2+ #0 [ 2947.326590][T25092] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2947.351735][T25092] Call Trace: [ 2947.355034][T25092] dump_stack+0x1d8/0x2f8 [ 2947.359377][T25092] should_fail+0x555/0x770 [ 2947.363810][T25092] __should_failslab+0x11a/0x160 [ 2947.368755][T25092] ? xas_create+0x1197/0x1910 [ 2947.368768][T25092] should_failslab+0x9/0x20 [ 2947.368780][T25092] kmem_cache_alloc+0x56/0x2e0 [ 2947.368795][T25092] xas_create+0x1197/0x1910 [ 2947.368819][T25092] xas_create_range+0x142/0x700 [ 2947.392087][T25092] shmem_add_to_page_cache+0x91e/0x1290 [ 2947.392123][T25092] shmem_getpage_gfp+0x184e/0x2c20 [ 2947.402798][T25092] shmem_write_begin+0xcb/0x1b0 [ 2947.407727][T25092] generic_perform_write+0x25d/0x4e0 [ 2947.413036][T25092] __generic_file_write_iter+0x24b/0x520 [ 2947.418684][T25092] generic_file_write_iter+0x48e/0x630 [ 2947.424166][T25092] __vfs_write+0x5a1/0x740 [ 2947.428605][T25092] vfs_write+0x275/0x590 [ 2947.432858][T25092] __x64_sys_pwrite64+0x162/0x1d0 [ 2947.438034][T25092] do_syscall_64+0xf7/0x1c0 [ 2947.442706][T25092] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2947.448607][T25092] RIP: 0033:0x4139a7 05:22:20 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x48}}) [ 2947.452512][T25092] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2947.472122][T25092] RSP: 002b:00007fddc3987a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 2947.480545][T25092] RAX: ffffffffffffffda RBX: 0000000020000050 RCX: 00000000004139a7 [ 2947.488530][T25092] RDX: 0000000000000048 RSI: 0000000020000140 RDI: 0000000000000004 [ 2947.496512][T25092] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 2947.504491][T25092] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 2947.512624][T25092] R13: 00000000004c8da6 R14: 00000000004e0200 R15: 0000000000000003 [ 2947.534026][T25073] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:22:20 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x960000, 0x0}) 05:22:20 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}) 05:22:20 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:20 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0xfe00000000000000) 05:22:21 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:21 executing program 5 (fault-call:0 fault-nth:10): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 05:22:21 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}) 05:22:21 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x4c}}) [ 2947.794272][T25293] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:22:21 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0xf05000, 0x0}) [ 2947.877561][T25410] FAULT_INJECTION: forcing a failure. [ 2947.877561][T25410] name failslab, interval 1, probability 0, space 0, times 0 [ 2947.890205][T25410] CPU: 1 PID: 25410 Comm: syz-executor.5 Not tainted 5.4.0-rc2+ #0 [ 2947.898214][T25410] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2947.908283][T25410] Call Trace: [ 2947.911585][T25410] dump_stack+0x1d8/0x2f8 [ 2947.915917][T25410] should_fail+0x555/0x770 [ 2947.920514][T25410] __should_failslab+0x11a/0x160 [ 2947.925446][T25410] ? xas_create+0x1197/0x1910 [ 2947.930116][T25410] should_failslab+0x9/0x20 [ 2947.934784][T25410] kmem_cache_alloc+0x56/0x2e0 [ 2947.939554][T25410] xas_create+0x1197/0x1910 [ 2947.944085][T25410] xas_create_range+0x142/0x700 [ 2947.949114][T25410] shmem_add_to_page_cache+0x91e/0x1290 [ 2947.954827][T25410] shmem_getpage_gfp+0x184e/0x2c20 [ 2947.960067][T25410] shmem_write_begin+0xcb/0x1b0 [ 2947.964985][T25410] generic_perform_write+0x25d/0x4e0 [ 2947.970292][T25410] __generic_file_write_iter+0x24b/0x520 [ 2947.975939][T25410] generic_file_write_iter+0x48e/0x630 [ 2947.981620][T25410] __vfs_write+0x5a1/0x740 [ 2947.986211][T25410] vfs_write+0x275/0x590 [ 2947.990466][T25410] __x64_sys_pwrite64+0x162/0x1d0 [ 2947.995496][T25410] do_syscall_64+0xf7/0x1c0 [ 2947.999992][T25410] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2948.005963][T25410] RIP: 0033:0x4139a7 [ 2948.009856][T25410] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2948.029853][T25410] RSP: 002b:00007fddc3987a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 2948.038257][T25410] RAX: ffffffffffffffda RBX: 0000000020000050 RCX: 00000000004139a7 [ 2948.046223][T25410] RDX: 0000000000000048 RSI: 0000000020000140 RDI: 0000000000000004 [ 2948.054318][T25410] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 2948.062293][T25410] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 2948.070522][T25410] R13: 00000000004c8da6 R14: 00000000004e0200 R15: 0000000000000003 05:22:21 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:21 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}) [ 2948.106805][T25293] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:22:21 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0xf07000, 0x0}) 05:22:21 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0xfe80000000000000) 05:22:21 executing program 5 (fault-call:0 fault-nth:11): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 05:22:21 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:21 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb]}) [ 2948.329474][T25738] FAULT_INJECTION: forcing a failure. [ 2948.329474][T25738] name failslab, interval 1, probability 0, space 0, times 0 [ 2948.375804][T25735] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2948.409384][T25738] CPU: 1 PID: 25738 Comm: syz-executor.5 Not tainted 5.4.0-rc2+ #0 [ 2948.417315][T25738] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2948.427377][T25738] Call Trace: [ 2948.430683][T25738] dump_stack+0x1d8/0x2f8 [ 2948.435028][T25738] should_fail+0x555/0x770 [ 2948.439472][T25738] __should_failslab+0x11a/0x160 [ 2948.444513][T25738] ? __alloc_file+0x2c/0x390 [ 2948.449114][T25738] should_failslab+0x9/0x20 [ 2948.453622][T25738] kmem_cache_alloc+0x56/0x2e0 [ 2948.458396][T25738] __alloc_file+0x2c/0x390 [ 2948.462823][T25738] alloc_empty_file+0xac/0x1b0 [ 2948.467688][T25738] path_openat+0x9e/0x4420 [ 2948.472116][T25738] ? __kasan_kmalloc+0x178/0x1b0 [ 2948.477063][T25738] ? __lock_acquire+0xc75/0x1be0 [ 2948.482162][T25738] ? perf_trace_lock_acquire+0x97/0x3b0 [ 2948.488521][T25738] do_filp_open+0x192/0x3d0 [ 2948.493039][T25738] ? _raw_spin_unlock+0x2c/0x50 [ 2948.497912][T25738] do_sys_open+0x29f/0x560 [ 2948.502344][T25738] __x64_sys_open+0x87/0x90 [ 2948.506860][T25738] do_syscall_64+0xf7/0x1c0 [ 2948.511376][T25738] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2948.517276][T25738] RIP: 0033:0x413941 [ 2948.521180][T25738] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2948.521186][T25738] RSP: 002b:00007fddc3987a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 2948.521200][T25738] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000413941 [ 2948.521206][T25738] RDX: 00007fddc3987b0a RSI: 0000000000000002 RDI: 00007fddc3987b00 [ 2948.521211][T25738] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 05:22:21 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:21 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc]}) 05:22:21 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x5c}}) 05:22:21 executing program 5 (fault-call:0 fault-nth:12): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 05:22:21 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}) [ 2948.521217][T25738] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 2948.521222][T25738] R13: 00000000004c8da6 R14: 00000000004e0200 R15: 0000000000000003 [ 2948.636176][T25857] FAULT_INJECTION: forcing a failure. [ 2948.636176][T25857] name failslab, interval 1, probability 0, space 0, times 0 [ 2948.652174][T25735] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:22:22 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe]}) [ 2948.699441][T25857] CPU: 0 PID: 25857 Comm: syz-executor.5 Not tainted 5.4.0-rc2+ #0 [ 2948.707471][T25857] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2948.717681][T25857] Call Trace: [ 2948.720994][T25857] dump_stack+0x1d8/0x2f8 [ 2948.725348][T25857] should_fail+0x555/0x770 [ 2948.729965][T25857] __should_failslab+0x11a/0x160 [ 2948.735069][T25857] ? security_file_alloc+0x36/0x200 [ 2948.740283][T25857] should_failslab+0x9/0x20 [ 2948.744798][T25857] kmem_cache_alloc+0x56/0x2e0 05:22:22 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2948.749582][T25857] security_file_alloc+0x36/0x200 [ 2948.754796][T25857] __alloc_file+0xde/0x390 [ 2948.759332][T25857] alloc_empty_file+0xac/0x1b0 [ 2948.764113][T25857] path_openat+0x9e/0x4420 [ 2948.768543][T25857] ? __kasan_kmalloc+0x178/0x1b0 [ 2948.773640][T25857] ? __lock_acquire+0xc75/0x1be0 [ 2948.778607][T25857] ? perf_trace_lock_acquire+0x97/0x3b0 [ 2948.784195][T25857] do_filp_open+0x192/0x3d0 [ 2948.788902][T25857] ? _raw_spin_unlock+0x2c/0x50 [ 2948.793782][T25857] do_sys_open+0x29f/0x560 05:22:22 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x1000000, 0x0}) [ 2948.798232][T25857] __x64_sys_open+0x87/0x90 [ 2948.802752][T25857] do_syscall_64+0xf7/0x1c0 [ 2948.807273][T25857] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2948.813173][T25857] RIP: 0033:0x413941 [ 2948.817082][T25857] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2948.836834][T25857] RSP: 002b:00007fddc3987a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 05:22:22 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0xfe80ffff00000000) 05:22:22 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}) [ 2948.845396][T25857] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000413941 [ 2948.845403][T25857] RDX: 00007fddc3987b0a RSI: 0000000000000002 RDI: 00007fddc3987b00 [ 2948.845408][T25857] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2948.845413][T25857] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 2948.845418][T25857] R13: 00000000004c8da6 R14: 00000000004e0200 R15: 0000000000000003 05:22:22 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:22 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x68}}) 05:22:22 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}) 05:22:22 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x2000000, 0x0}) 05:22:22 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:22 executing program 5 (fault-call:0 fault-nth:13): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 05:22:22 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12]}) [ 2949.102355][T26025] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2949.163563][T26105] FAULT_INJECTION: forcing a failure. [ 2949.163563][T26105] name failslab, interval 1, probability 0, space 0, times 0 [ 2949.207585][T26105] CPU: 0 PID: 26105 Comm: syz-executor.5 Not tainted 5.4.0-rc2+ #0 [ 2949.215522][T26105] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2949.215528][T26105] Call Trace: [ 2949.215547][T26105] dump_stack+0x1d8/0x2f8 [ 2949.215563][T26105] should_fail+0x555/0x770 [ 2949.215580][T26105] __should_failslab+0x11a/0x160 [ 2949.215591][T26105] ? __alloc_file+0x2c/0x390 [ 2949.215603][T26105] should_failslab+0x9/0x20 [ 2949.215613][T26105] kmem_cache_alloc+0x56/0x2e0 [ 2949.215627][T26105] __alloc_file+0x2c/0x390 [ 2949.215641][T26105] alloc_empty_file+0xac/0x1b0 [ 2949.215652][T26105] path_openat+0x9e/0x4420 [ 2949.215664][T26105] ? __kasan_kmalloc+0x178/0x1b0 [ 2949.275140][T26105] ? __lock_acquire+0xc75/0x1be0 [ 2949.280108][T26105] ? rcu_read_lock_sched_held+0x10b/0x170 [ 2949.285849][T26105] ? perf_trace_lock_acquire+0x97/0x3b0 [ 2949.291432][T26105] do_filp_open+0x192/0x3d0 [ 2949.295957][T26105] ? _raw_spin_unlock+0x2c/0x50 [ 2949.301049][T26105] do_sys_open+0x29f/0x560 05:22:22 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25]}) [ 2949.305484][T26105] __x64_sys_open+0x87/0x90 [ 2949.310089][T26105] do_syscall_64+0xf7/0x1c0 [ 2949.314606][T26105] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2949.320508][T26105] RIP: 0033:0x413941 [ 2949.324403][T26105] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2949.343996][T26105] RSP: 002b:00007fddc3987a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 05:22:22 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:22 executing program 5 (fault-call:0 fault-nth:14): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2949.344006][T26105] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000413941 [ 2949.344011][T26105] RDX: 00007fddc3987b0a RSI: 0000000000000002 RDI: 00007fddc3987b00 [ 2949.344017][T26105] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2949.344022][T26105] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 2949.344028][T26105] R13: 00000000004c8da6 R14: 00000000004e0200 R15: 0000000000000003 [ 2949.424548][T26025] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2949.475679][T26216] FAULT_INJECTION: forcing a failure. [ 2949.475679][T26216] name failslab, interval 1, probability 0, space 0, times 0 [ 2949.509496][T26216] CPU: 1 PID: 26216 Comm: syz-executor.5 Not tainted 5.4.0-rc2+ #0 [ 2949.517574][T26216] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2949.527640][T26216] Call Trace: [ 2949.531082][T26216] dump_stack+0x1d8/0x2f8 [ 2949.535431][T26216] should_fail+0x555/0x770 [ 2949.539858][T26216] __should_failslab+0x11a/0x160 [ 2949.544791][T26216] ? tomoyo_encode2+0x273/0x5a0 [ 2949.549993][T26216] should_failslab+0x9/0x20 [ 2949.554488][T26216] __kmalloc+0x7a/0x340 [ 2949.558793][T26216] tomoyo_encode2+0x273/0x5a0 [ 2949.563462][T26216] tomoyo_realpath_from_path+0x769/0x7c0 [ 2949.569091][T26216] tomoyo_check_open_permission+0x1ce/0x9d0 [ 2949.574988][T26216] tomoyo_file_open+0x141/0x190 [ 2949.579842][T26216] security_file_open+0x65/0x2f0 [ 2949.584906][T26216] do_dentry_open+0x345/0xf80 [ 2949.589577][T26216] vfs_open+0x73/0x80 [ 2949.593549][T26216] path_openat+0x1397/0x4420 [ 2949.598152][T26216] do_filp_open+0x192/0x3d0 [ 2949.602674][T26216] do_sys_open+0x29f/0x560 [ 2949.607096][T26216] __x64_sys_open+0x87/0x90 [ 2949.611591][T26216] do_syscall_64+0xf7/0x1c0 [ 2949.616330][T26216] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2949.622212][T26216] RIP: 0033:0x413941 [ 2949.626103][T26216] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2949.645774][T26216] RSP: 002b:00007fddc3987a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 2949.654278][T26216] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000413941 [ 2949.662241][T26216] RDX: 00007fddc3987b0a RSI: 0000000000000002 RDI: 00007fddc3987b00 [ 2949.670202][T26216] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2949.678159][T26216] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 2949.686225][T26216] R13: 00000000004c8da6 R14: 00000000004e0200 R15: 0000000000000003 05:22:23 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0xfec0ffff00000000) 05:22:23 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c]}) 05:22:23 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:23 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x3000000, 0x0}) 05:22:23 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x6c}}) [ 2949.726447][T26216] ERROR: Out of memory at tomoyo_realpath_from_path. 05:22:23 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)) 05:22:23 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:23 executing program 5 (fault-call:0 fault-nth:15): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2949.840628][T26253] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:22:23 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x4000000, 0x0}) 05:22:23 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x74}}) [ 2949.929486][T26253] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:22:23 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) [ 2949.989008][T26456] FAULT_INJECTION: forcing a failure. [ 2949.989008][T26456] name failslab, interval 1, probability 0, space 0, times 0 [ 2950.025476][T26456] CPU: 0 PID: 26456 Comm: syz-executor.5 Not tainted 5.4.0-rc2+ #0 05:22:23 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2950.033415][T26456] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2950.043482][T26456] Call Trace: [ 2950.046786][T26456] dump_stack+0x1d8/0x2f8 [ 2950.051138][T26456] should_fail+0x555/0x770 [ 2950.055573][T26456] __should_failslab+0x11a/0x160 [ 2950.060547][T26456] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 2950.060559][T26456] should_failslab+0x9/0x20 [ 2950.060570][T26456] __kmalloc+0x7a/0x340 [ 2950.060580][T26456] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 2950.060592][T26456] tomoyo_realpath_from_path+0xdc/0x7c0 [ 2950.060612][T26456] tomoyo_path_number_perm+0x166/0x640 [ 2950.060649][T26456] ? smack_file_ioctl+0x226/0x2e0 [ 2950.060658][T26456] ? __fget+0x481/0x510 [ 2950.060676][T26456] tomoyo_file_ioctl+0x23/0x30 [ 2950.070902][T26456] security_file_ioctl+0x6d/0xd0 [ 2950.070918][T26456] __x64_sys_ioctl+0xa3/0x120 [ 2950.070934][T26456] do_syscall_64+0xf7/0x1c0 [ 2950.070956][T26456] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2950.125772][T26456] RIP: 0033:0x4598c7 [ 2950.130026][T26456] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2950.149644][T26456] RSP: 002b:00007fddc3987a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2950.158067][T26456] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004598c7 [ 2950.166048][T26456] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2950.174040][T26456] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 05:22:23 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0xfeffffff00000000) 05:22:23 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}) 05:22:23 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2950.182302][T26456] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2950.191246][T26456] R13: 00000000004c8da6 R14: 00000000004e0200 R15: 0000000000000003 [ 2950.206701][T26456] ERROR: Out of memory at tomoyo_realpath_from_path. 05:22:23 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x7a}}) 05:22:23 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}) 05:22:23 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2950.325131][T26562] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:22:23 executing program 5 (fault-call:0 fault-nth:16): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 05:22:23 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x5000000, 0x0}) [ 2950.373323][T26562] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2950.434808][T26587] FAULT_INJECTION: forcing a failure. [ 2950.434808][T26587] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2950.448054][T26587] CPU: 0 PID: 26587 Comm: syz-executor.5 Not tainted 5.4.0-rc2+ #0 [ 2950.456100][T26587] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2950.466167][T26587] Call Trace: [ 2950.469471][T26587] dump_stack+0x1d8/0x2f8 [ 2950.473830][T26587] should_fail+0x555/0x770 [ 2950.478268][T26587] should_fail_alloc_page+0x55/0x60 [ 2950.483478][T26587] prepare_alloc_pages+0x283/0x460 [ 2950.488602][T26587] __alloc_pages_nodemask+0xb2/0x5d0 [ 2950.494062][T26587] kmem_getpages+0x4d/0xa00 [ 2950.498584][T26587] cache_grow_begin+0x7e/0x2c0 [ 2950.503366][T26587] cache_alloc_refill+0x311/0x3f0 [ 2950.508410][T26587] ? check_preemption_disabled+0xb7/0x2a0 [ 2950.514149][T26587] __kmalloc+0x318/0x340 [ 2950.518402][T26587] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 2950.524135][T26587] tomoyo_realpath_from_path+0xdc/0x7c0 05:22:23 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}) 05:22:23 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2950.529706][T26587] tomoyo_check_open_permission+0x1ce/0x9d0 [ 2950.535638][T26587] tomoyo_file_open+0x141/0x190 [ 2950.540505][T26587] security_file_open+0x65/0x2f0 [ 2950.545455][T26587] do_dentry_open+0x345/0xf80 [ 2950.550157][T26587] vfs_open+0x73/0x80 [ 2950.554153][T26587] path_openat+0x1397/0x4420 [ 2950.558796][T26587] do_filp_open+0x192/0x3d0 [ 2950.563342][T26587] do_sys_open+0x29f/0x560 [ 2950.567777][T26587] __x64_sys_open+0x87/0x90 [ 2950.572297][T26587] do_syscall_64+0xf7/0x1c0 [ 2950.576818][T26587] entry_SYSCALL_64_after_hwframe+0x49/0xbe 05:22:23 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) [ 2950.582719][T26587] RIP: 0033:0x413941 [ 2950.586619][T26587] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2950.606372][T26587] RSP: 002b:00007fddc3987a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 2950.614789][T26587] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000413941 [ 2950.622769][T26587] RDX: 00007fddc3987b0a RSI: 0000000000000002 RDI: 00007fddc3987b00 05:22:24 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2950.630750][T26587] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2950.638724][T26587] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 2950.646693][T26587] R13: 00000000004c8da6 R14: 00000000004e0200 R15: 0000000000000003 05:22:24 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0xff00000000000000) 05:22:24 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x6000000, 0x0}) 05:22:24 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x300}}) 05:22:24 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}) 05:22:24 executing program 5 (fault-call:0 fault-nth:17): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 05:22:24 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2950.930086][T26850] FAULT_INJECTION: forcing a failure. [ 2950.930086][T26850] name failslab, interval 1, probability 0, space 0, times 0 [ 2950.949389][T26850] CPU: 0 PID: 26850 Comm: syz-executor.5 Not tainted 5.4.0-rc2+ #0 [ 2950.957331][T26850] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2950.963912][T26834] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2950.967663][T26850] Call Trace: 05:22:24 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x7000000, 0x0}) 05:22:24 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}) 05:22:24 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2950.967683][T26850] dump_stack+0x1d8/0x2f8 [ 2950.967700][T26850] should_fail+0x555/0x770 [ 2950.967720][T26850] __should_failslab+0x11a/0x160 [ 2950.967737][T26850] ? tomoyo_encode2+0x273/0x5a0 [ 2950.991865][T26850] should_failslab+0x9/0x20 [ 2950.991878][T26850] __kmalloc+0x7a/0x340 [ 2950.991893][T26850] tomoyo_encode2+0x273/0x5a0 [ 2950.991910][T26850] tomoyo_realpath_from_path+0x769/0x7c0 [ 2950.991932][T26850] tomoyo_check_open_permission+0x1ce/0x9d0 [ 2950.991974][T26850] tomoyo_file_open+0x141/0x190 [ 2950.991988][T26850] security_file_open+0x65/0x2f0 [ 2950.992004][T26850] do_dentry_open+0x345/0xf80 [ 2950.992026][T26850] vfs_open+0x73/0x80 [ 2950.992038][T26850] path_openat+0x1397/0x4420 [ 2950.992094][T26850] do_filp_open+0x192/0x3d0 [ 2950.992128][T26850] do_sys_open+0x29f/0x560 [ 2950.992144][T26850] __x64_sys_open+0x87/0x90 [ 2950.992158][T26850] do_syscall_64+0xf7/0x1c0 [ 2950.992176][T26850] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2950.992186][T26850] RIP: 0033:0x413941 05:22:24 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2950.992197][T26850] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2950.992203][T26850] RSP: 002b:00007fddc3987a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 2950.992214][T26850] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000413941 [ 2950.992220][T26850] RDX: 00007fddc3987b0a RSI: 0000000000000002 RDI: 00007fddc3987b00 [ 2950.992225][T26850] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 05:22:24 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2950.992231][T26850] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 2950.992237][T26850] R13: 00000000004c8da6 R14: 00000000004e0200 R15: 0000000000000003 [ 2951.004830][T26850] ERROR: Out of memory at tomoyo_realpath_from_path. [ 2951.179622][T26834] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:22:24 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}) 05:22:24 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0xffffff7f00000000) 05:22:24 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x500}}) 05:22:24 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:24 executing program 5 (fault-call:0 fault-nth:18): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 05:22:24 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x8000000, 0x0}) 05:22:24 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}) 05:22:24 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2951.482734][T27163] FAULT_INJECTION: forcing a failure. [ 2951.482734][T27163] name failslab, interval 1, probability 0, space 0, times 0 [ 2951.514349][T27164] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:22:24 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb]}) [ 2951.559502][T27163] CPU: 0 PID: 27163 Comm: syz-executor.5 Not tainted 5.4.0-rc2+ #0 [ 2951.567446][T27163] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2951.577517][T27163] Call Trace: [ 2951.580821][T27163] dump_stack+0x1d8/0x2f8 [ 2951.585172][T27163] should_fail+0x555/0x770 [ 2951.589612][T27163] __should_failslab+0x11a/0x160 [ 2951.594570][T27163] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 2951.600305][T27163] should_failslab+0x9/0x20 [ 2951.604815][T27163] __kmalloc+0x7a/0x340 05:22:24 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x600}}) [ 2951.608976][T27163] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 2951.614710][T27163] tomoyo_realpath_from_path+0xdc/0x7c0 [ 2951.620281][T27163] tomoyo_path_number_perm+0x166/0x640 [ 2951.625776][T27163] ? smack_file_ioctl+0x226/0x2e0 [ 2951.630819][T27163] ? __fget+0x481/0x510 [ 2951.634998][T27163] tomoyo_file_ioctl+0x23/0x30 [ 2951.639779][T27163] security_file_ioctl+0x6d/0xd0 [ 2951.644818][T27163] __x64_sys_ioctl+0xa3/0x120 [ 2951.649511][T27163] do_syscall_64+0xf7/0x1c0 [ 2951.654205][T27163] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2951.660108][T27163] RIP: 0033:0x4598c7 [ 2951.664011][T27163] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2951.683750][T27163] RSP: 002b:00007fddc3987a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2951.683761][T27163] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004598c7 [ 2951.683767][T27163] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 05:22:25 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2951.683772][T27163] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2951.683777][T27163] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2951.683783][T27163] R13: 00000000004c8da6 R14: 00000000004e0200 R15: 0000000000000003 [ 2951.693945][T27163] ERROR: Out of memory at tomoyo_realpath_from_path. [ 2951.744271][T27164] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:22:25 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x9000000, 0x0}) 05:22:25 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc]}) 05:22:25 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0xffffffff00000000) 05:22:25 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x700}}) 05:22:25 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:25 executing program 5 (fault-call:0 fault-nth:19): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 05:22:25 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2951.995468][T27513] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:22:25 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}) 05:22:25 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x900}}) [ 2952.060949][T27513] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:22:25 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2952.124477][T27724] FAULT_INJECTION: forcing a failure. [ 2952.124477][T27724] name failslab, interval 1, probability 0, space 0, times 0 [ 2952.137963][T27724] CPU: 1 PID: 27724 Comm: syz-executor.5 Not tainted 5.4.0-rc2+ #0 [ 2952.145981][T27724] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2952.156136][T27724] Call Trace: [ 2952.159440][T27724] dump_stack+0x1d8/0x2f8 [ 2952.163777][T27724] should_fail+0x555/0x770 [ 2952.168221][T27724] __should_failslab+0x11a/0x160 [ 2952.173153][T27724] ? radix_tree_node_alloc+0x1a1/0x370 [ 2952.178699][T27724] should_failslab+0x9/0x20 [ 2952.183208][T27724] kmem_cache_alloc+0x56/0x2e0 [ 2952.187964][T27724] radix_tree_node_alloc+0x1a1/0x370 [ 2952.193373][T27724] idr_get_free+0x2b8/0x890 [ 2952.197872][T27724] idr_alloc_cyclic+0x18b/0x550 [ 2952.202774][T27724] __kernfs_new_node+0x124/0x6b0 [ 2952.207706][T27724] ? bd_set_size+0x97/0xb0 [ 2952.212399][T27724] kernfs_create_dir_ns+0x9b/0x230 [ 2952.217603][T27724] internal_create_group+0x207/0xd80 [ 2952.222888][T27724] sysfs_create_group+0x1f/0x30 [ 2952.227776][T27724] loop_set_fd+0xf54/0x1470 [ 2952.232364][T27724] lo_ioctl+0xd5/0x2200 [ 2952.236516][T27724] ? __kasan_slab_free+0x12a/0x1e0 [ 2952.241665][T27724] ? kasan_slab_free+0xe/0x10 [ 2952.246332][T27724] ? kfree+0x115/0x200 [ 2952.250543][T27724] ? tomoyo_path_number_perm+0x4e1/0x640 [ 2952.256160][T27724] ? tomoyo_file_ioctl+0x23/0x30 [ 2952.261082][T27724] ? security_file_ioctl+0x6d/0xd0 [ 2952.266320][T27724] ? __x64_sys_ioctl+0xa3/0x120 [ 2952.271290][T27724] ? do_syscall_64+0xf7/0x1c0 [ 2952.275964][T27724] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2952.282081][T27724] ? debug_check_no_obj_freed+0x505/0x5b0 [ 2952.287802][T27724] ? rcu_lock_release+0x9/0x30 [ 2952.292560][T27724] ? rcu_lock_release+0x9/0x30 [ 2952.297316][T27724] ? lo_release+0x1f0/0x1f0 [ 2952.302005][T27724] blkdev_ioctl+0x807/0x2980 [ 2952.306587][T27724] ? tomoyo_path_number_perm+0x53e/0x640 [ 2952.312218][T27724] block_ioctl+0xbd/0x100 [ 2952.316535][T27724] ? blkdev_iopoll+0x100/0x100 [ 2952.321500][T27724] do_vfs_ioctl+0x744/0x1730 [ 2952.326179][T27724] ? __fget+0x481/0x510 [ 2952.330332][T27724] ? tomoyo_file_ioctl+0x23/0x30 [ 2952.335261][T27724] ? security_file_ioctl+0xa1/0xd0 [ 2952.340503][T27724] __x64_sys_ioctl+0xe3/0x120 [ 2952.345174][T27724] do_syscall_64+0xf7/0x1c0 [ 2952.349669][T27724] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2952.355698][T27724] RIP: 0033:0x4598c7 [ 2952.359590][T27724] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2952.379181][T27724] RSP: 002b:00007fddc3987a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2952.387591][T27724] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004598c7 [ 2952.395560][T27724] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2952.403520][T27724] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2952.411479][T27724] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 05:22:25 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0xa000000, 0x0}) [ 2952.419439][T27724] R13: 00000000004c8da6 R14: 00000000004e0200 R15: 0000000000000003 05:22:25 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe]}) 05:22:25 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:25 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = open(&(0x7f0000000480)='./bus\x00', 0x141c42, 0xcaa8921539362622) syz_open_dev$vcsn(&(0x7f0000000400)='/dev/vcs#\x00', 0xfffffffffffeffff, 0xa00881) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0xe32c48ef588bba5, 0x810, r0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {&(0x7f0000000100), 0x4, {0xa, 0x4e23, 0x5, @remote, 0x7f}, r1}}, 0x38) write$P9_RWALK(r0, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r3 = socket$netlink(0x10, 0x3, 0x0) open(&(0x7f00000000c0)='./bus\x00', 0x602220, 0x80) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) r5 = syz_open_dev$dmmidi(&(0x7f0000000340)='/dev/dmmidi#\x00', 0x2, 0x341dc0) r6 = socket$inet6(0xa, 0x1, 0x8010000400000084) sendto$inet6(r6, 0x0, 0x0, 0x0, 0x0, 0x0) close(r6) r7 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r7, 0x0) write$P9_RWALK(r7, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000380)={r6, r7}) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r4, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 05:22:25 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0xa00}}) 05:22:25 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0xb000000, 0x0}) 05:22:26 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}) 05:22:26 executing program 5 (fault-call:0 fault-nth:20): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 05:22:26 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2952.724598][T27942] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:22:26 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}) 05:22:26 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2952.812765][T27967] FAULT_INJECTION: forcing a failure. [ 2952.812765][T27967] name failslab, interval 1, probability 0, space 0, times 0 [ 2952.825742][T27942] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2952.865495][T27967] CPU: 0 PID: 27967 Comm: syz-executor.5 Not tainted 5.4.0-rc2+ #0 [ 2952.873434][T27967] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2952.883492][T27967] Call Trace: [ 2952.886791][T27967] dump_stack+0x1d8/0x2f8 [ 2952.891126][T27967] should_fail+0x555/0x770 [ 2952.895552][T27967] __should_failslab+0x11a/0x160 [ 2952.900490][T27967] ? tomoyo_encode2+0x273/0x5a0 [ 2952.905341][T27967] should_failslab+0x9/0x20 [ 2952.909848][T27967] __kmalloc+0x7a/0x340 [ 2952.914016][T27967] tomoyo_encode2+0x273/0x5a0 [ 2952.918700][T27967] tomoyo_realpath_from_path+0x769/0x7c0 [ 2952.924395][T27967] tomoyo_path_number_perm+0x166/0x640 [ 2952.929886][T27967] ? smack_file_ioctl+0x226/0x2e0 [ 2952.934908][T27967] ? __fget+0x481/0x510 [ 2952.939071][T27967] tomoyo_file_ioctl+0x23/0x30 [ 2952.943836][T27967] security_file_ioctl+0x6d/0xd0 [ 2952.948780][T27967] __x64_sys_ioctl+0xa3/0x120 [ 2952.953466][T27967] do_syscall_64+0xf7/0x1c0 [ 2952.957972][T27967] entry_SYSCALL_64_after_hwframe+0x49/0xbe 05:22:26 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0xb00}}) 05:22:26 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0xc000000, 0x0}) [ 2952.963858][T27967] RIP: 0033:0x4598c7 [ 2952.967748][T27967] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2952.987344][T27967] RSP: 002b:00007fddc3987a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2952.987359][T27967] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004598c7 [ 2952.987365][T27967] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 05:22:26 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12]}) [ 2952.987370][T27967] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2952.987375][T27967] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2952.987381][T27967] R13: 00000000004c8da6 R14: 00000000004e0200 R15: 0000000000000003 [ 2953.001866][T27967] ERROR: Out of memory at tomoyo_realpath_from_path. 05:22:26 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:26 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000040)=0x53, 0x4) 05:22:26 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25]}) 05:22:26 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0xc00}}) 05:22:26 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0xd000000, 0x0}) 05:22:26 executing program 5 (fault-call:0 fault-nth:21): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 05:22:26 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:26 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c]}) [ 2953.353860][T28391] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2953.386885][T28401] FAULT_INJECTION: forcing a failure. [ 2953.386885][T28401] name failslab, interval 1, probability 0, space 0, times 0 [ 2953.405517][T28401] CPU: 0 PID: 28401 Comm: syz-executor.5 Not tainted 5.4.0-rc2+ #0 [ 2953.413429][T28401] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2953.423486][T28401] Call Trace: [ 2953.426782][T28401] dump_stack+0x1d8/0x2f8 [ 2953.431120][T28401] should_fail+0x555/0x770 [ 2953.435544][T28401] __should_failslab+0x11a/0x160 [ 2953.440480][T28401] ? loop_set_fd+0x1470/0x1470 [ 2953.445257][T28401] should_failslab+0x9/0x20 [ 2953.449751][T28401] kmem_cache_alloc_trace+0x5d/0x2f0 05:22:26 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2953.455044][T28401] ? __kthread_create_on_node+0xb2/0x3b0 [ 2953.460684][T28401] ? loop_set_fd+0x1470/0x1470 [ 2953.465447][T28401] __kthread_create_on_node+0xb2/0x3b0 [ 2953.470923][T28401] ? loop_set_fd+0x1470/0x1470 [ 2953.475691][T28401] kthread_create_on_node+0x72/0xa0 [ 2953.480888][T28401] ? lockdep_init_map+0x2a/0x680 [ 2953.485824][T28401] ? __kthread_init_worker+0x5a/0xe0 [ 2953.491109][T28401] loop_set_fd+0x6a8/0x1470 [ 2953.495615][T28401] ? check_preemption_disabled+0xb7/0x2a0 [ 2953.501341][T28401] ? tomoyo_path_number_perm+0x4e1/0x640 [ 2953.506969][T28401] lo_ioctl+0xd5/0x2200 [ 2953.511116][T28401] ? __kasan_slab_free+0x12a/0x1e0 [ 2953.516223][T28401] ? kasan_slab_free+0xe/0x10 [ 2953.520897][T28401] ? kfree+0x115/0x200 [ 2953.524966][T28401] ? tomoyo_path_number_perm+0x4e1/0x640 [ 2953.530597][T28401] ? tomoyo_file_ioctl+0x23/0x30 [ 2953.535537][T28401] ? security_file_ioctl+0x6d/0xd0 [ 2953.540647][T28401] ? __x64_sys_ioctl+0xa3/0x120 [ 2953.545499][T28401] ? do_syscall_64+0xf7/0x1c0 [ 2953.550171][T28401] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 05:22:26 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2953.556237][T28401] ? debug_check_no_obj_freed+0x505/0x5b0 [ 2953.561978][T28401] ? rcu_lock_release+0x9/0x30 [ 2953.566750][T28401] ? rcu_lock_release+0x9/0x30 [ 2953.571522][T28401] ? lo_release+0x1f0/0x1f0 [ 2953.576026][T28401] blkdev_ioctl+0x807/0x2980 [ 2953.580623][T28401] ? tomoyo_path_number_perm+0x53e/0x640 [ 2953.586354][T28401] block_ioctl+0xbd/0x100 [ 2953.590680][T28401] ? blkdev_iopoll+0x100/0x100 [ 2953.595437][T28401] do_vfs_ioctl+0x744/0x1730 [ 2953.600015][T28401] ? __fget+0x481/0x510 05:22:26 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2953.604180][T28401] ? tomoyo_file_ioctl+0x23/0x30 [ 2953.609126][T28401] ? security_file_ioctl+0xa1/0xd0 [ 2953.614237][T28401] __x64_sys_ioctl+0xe3/0x120 [ 2953.618915][T28401] do_syscall_64+0xf7/0x1c0 [ 2953.623421][T28401] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2953.629307][T28401] RIP: 0033:0x4598c7 [ 2953.633199][T28401] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 05:22:27 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2953.652815][T28401] RSP: 002b:00007fddc3987a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2953.661232][T28401] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004598c7 [ 2953.669209][T28401] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2953.677189][T28401] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2953.685177][T28401] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2953.693144][T28401] R13: 00000000004c8da6 R14: 00000000004e0200 R15: 0000000000000003 05:22:27 executing program 5 (fault-call:0 fault-nth:22): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2953.739427][T28391] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2953.834112][T28521] FAULT_INJECTION: forcing a failure. [ 2953.834112][T28521] name failslab, interval 1, probability 0, space 0, times 0 [ 2953.858392][T28391] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2953.866275][T28521] CPU: 0 PID: 28521 Comm: syz-executor.5 Not tainted 5.4.0-rc2+ #0 [ 2953.874174][T28521] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2953.884219][T28521] Call Trace: [ 2953.887496][T28521] dump_stack+0x1d8/0x2f8 [ 2953.891832][T28521] should_fail+0x555/0x770 [ 2953.896293][T28521] __should_failslab+0x11a/0x160 [ 2953.901250][T28521] ? __kernfs_new_node+0x97/0x6b0 [ 2953.906266][T28521] should_failslab+0x9/0x20 [ 2953.910765][T28521] kmem_cache_alloc+0x56/0x2e0 [ 2953.915552][T28521] __kernfs_new_node+0x97/0x6b0 [ 2953.920399][T28521] ? mutex_unlock+0xd/0x10 [ 2953.924794][T28521] ? kernfs_activate+0x4c7/0x4e0 [ 2953.929729][T28521] kernfs_new_node+0x97/0x170 [ 2953.934400][T28521] __kernfs_create_file+0x4a/0x2f0 [ 2953.939504][T28521] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 2953.944900][T28521] internal_create_group+0x4be/0xd80 [ 2953.950190][T28521] sysfs_create_group+0x1f/0x30 [ 2953.955033][T28521] loop_set_fd+0xf54/0x1470 [ 2953.959537][T28521] lo_ioctl+0xd5/0x2200 [ 2953.963677][T28521] ? __kasan_slab_free+0x12a/0x1e0 [ 2953.968763][T28521] ? kasan_slab_free+0xe/0x10 [ 2953.973422][T28521] ? kfree+0x115/0x200 [ 2953.977491][T28521] ? tomoyo_path_number_perm+0x4e1/0x640 [ 2953.983101][T28521] ? tomoyo_file_ioctl+0x23/0x30 [ 2953.988012][T28521] ? security_file_ioctl+0x6d/0xd0 [ 2953.993110][T28521] ? __x64_sys_ioctl+0xa3/0x120 [ 2953.997965][T28521] ? do_syscall_64+0xf7/0x1c0 [ 2954.002622][T28521] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2954.008669][T28521] ? debug_check_no_obj_freed+0x505/0x5b0 [ 2954.014380][T28521] ? rcu_lock_release+0x9/0x30 [ 2954.019139][T28521] ? rcu_lock_release+0x9/0x30 [ 2954.023883][T28521] ? lo_release+0x1f0/0x1f0 [ 2954.028361][T28521] blkdev_ioctl+0x807/0x2980 [ 2954.032942][T28521] ? tomoyo_path_number_perm+0x53e/0x640 [ 2954.038572][T28521] block_ioctl+0xbd/0x100 [ 2954.042880][T28521] ? blkdev_iopoll+0x100/0x100 [ 2954.047620][T28521] do_vfs_ioctl+0x744/0x1730 [ 2954.052195][T28521] ? __fget+0x481/0x510 [ 2954.056339][T28521] ? tomoyo_file_ioctl+0x23/0x30 [ 2954.061255][T28521] ? security_file_ioctl+0xa1/0xd0 [ 2954.066343][T28521] __x64_sys_ioctl+0xe3/0x120 [ 2954.071012][T28521] do_syscall_64+0xf7/0x1c0 [ 2954.075505][T28521] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2954.081372][T28521] RIP: 0033:0x4598c7 [ 2954.085243][T28521] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2954.104848][T28521] RSP: 002b:00007fddc3987a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2954.113250][T28521] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004598c7 [ 2954.121208][T28521] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2954.129157][T28521] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2954.137107][T28521] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2954.145063][T28521] R13: 00000000004c8da6 R14: 00000000004e0200 R15: 0000000000000003 [ 2954.160170][T28391] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:22:27 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\xff', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:27 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0xe000000, 0x0}) 05:22:27 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0xd00}}) 05:22:27 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)) 05:22:27 executing program 1: r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) tgkill(r0, r1, 0x38) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r4, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 05:22:27 executing program 5 (fault-call:0 fault-nth:23): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 05:22:27 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 05:22:27 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\xfe', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2954.399706][T28734] FAULT_INJECTION: forcing a failure. [ 2954.399706][T28734] name failslab, interval 1, probability 0, space 0, times 0 [ 2954.419371][T28734] CPU: 1 PID: 28734 Comm: syz-executor.5 Not tainted 5.4.0-rc2+ #0 [ 2954.427290][T28734] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2954.437341][T28734] Call Trace: [ 2954.440639][T28734] dump_stack+0x1d8/0x2f8 [ 2954.444977][T28734] should_fail+0x555/0x770 [ 2954.449393][T28734] __should_failslab+0x11a/0x160 [ 2954.454308][T28734] ? __kernfs_new_node+0x97/0x6b0 [ 2954.459310][T28734] should_failslab+0x9/0x20 [ 2954.463789][T28734] kmem_cache_alloc+0x56/0x2e0 [ 2954.468527][T28734] __kernfs_new_node+0x97/0x6b0 [ 2954.473353][T28734] ? mutex_unlock+0xd/0x10 [ 2954.477742][T28734] ? kernfs_activate+0x4c7/0x4e0 [ 2954.482655][T28734] kernfs_new_node+0x97/0x170 [ 2954.487305][T28734] __kernfs_create_file+0x4a/0x2f0 [ 2954.492391][T28734] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 2954.497738][T28734] internal_create_group+0x4be/0xd80 [ 2954.503003][T28734] sysfs_create_group+0x1f/0x30 [ 2954.507826][T28734] loop_set_fd+0xf54/0x1470 [ 2954.512311][T28734] lo_ioctl+0xd5/0x2200 [ 2954.516438][T28734] ? __kasan_slab_free+0x12a/0x1e0 [ 2954.521521][T28734] ? kasan_slab_free+0xe/0x10 [ 2954.526170][T28734] ? kfree+0x115/0x200 [ 2954.530212][T28734] ? tomoyo_path_number_perm+0x4e1/0x640 [ 2954.535830][T28734] ? tomoyo_file_ioctl+0x23/0x30 [ 2954.540740][T28734] ? security_file_ioctl+0x6d/0xd0 [ 2954.545825][T28734] ? __x64_sys_ioctl+0xa3/0x120 [ 2954.550649][T28734] ? do_syscall_64+0xf7/0x1c0 [ 2954.555319][T28734] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2954.561372][T28734] ? debug_check_no_obj_freed+0x505/0x5b0 [ 2954.567072][T28734] ? rcu_lock_release+0x9/0x30 [ 2954.571815][T28734] ? rcu_lock_release+0x9/0x30 [ 2954.576552][T28734] ? lo_release+0x1f0/0x1f0 [ 2954.581047][T28734] blkdev_ioctl+0x807/0x2980 [ 2954.585629][T28734] ? tomoyo_path_number_perm+0x53e/0x640 [ 2954.591247][T28734] block_ioctl+0xbd/0x100 [ 2954.595547][T28734] ? blkdev_iopoll+0x100/0x100 [ 2954.600301][T28734] do_vfs_ioctl+0x744/0x1730 [ 2954.605408][T28734] ? __fget+0x481/0x510 [ 2954.609539][T28734] ? tomoyo_file_ioctl+0x23/0x30 [ 2954.614448][T28734] ? security_file_ioctl+0xa1/0xd0 [ 2954.619533][T28734] __x64_sys_ioctl+0xe3/0x120 [ 2954.624195][T28734] do_syscall_64+0xf7/0x1c0 [ 2954.628673][T28734] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2954.634550][T28734] RIP: 0033:0x4598c7 [ 2954.638431][T28734] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2954.658008][T28734] RSP: 002b:00007fddc3987a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2954.666390][T28734] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004598c7 [ 2954.674337][T28734] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2954.682282][T28734] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2954.690227][T28734] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 05:22:28 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x10000000, 0x0}) 05:22:28 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0xe00}}) 05:22:28 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) socket$isdn_base(0x22, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000011400090100004a00000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 05:22:28 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2954.698185][T28734] R13: 00000000004c8da6 R14: 00000000004e0200 R15: 0000000000000003 05:22:28 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}) 05:22:28 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2954.844925][T28751] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:22:28 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x11000000, 0x0}) 05:22:28 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x1100}}) 05:22:28 executing program 5 (fault-call:0 fault-nth:24): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 05:22:28 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}) [ 2954.939306][T28751] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:22:28 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2955.007721][T28970] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2955.056106][T28973] FAULT_INJECTION: forcing a failure. [ 2955.056106][T28973] name failslab, interval 1, probability 0, space 0, times 0 [ 2955.096158][T28973] CPU: 0 PID: 28973 Comm: syz-executor.5 Not tainted 5.4.0-rc2+ #0 05:22:28 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}) [ 2955.104093][T28973] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2955.114152][T28973] Call Trace: [ 2955.117449][T28973] dump_stack+0x1d8/0x2f8 [ 2955.121788][T28973] should_fail+0x555/0x770 [ 2955.126215][T28973] __should_failslab+0x11a/0x160 [ 2955.131160][T28973] ? __kernfs_new_node+0x97/0x6b0 [ 2955.136188][T28973] should_failslab+0x9/0x20 [ 2955.140691][T28973] kmem_cache_alloc+0x56/0x2e0 [ 2955.145463][T28973] __kernfs_new_node+0x97/0x6b0 [ 2955.150325][T28973] ? mutex_unlock+0xd/0x10 [ 2955.154736][T28973] ? kernfs_activate+0x4c7/0x4e0 [ 2955.159683][T28973] kernfs_new_node+0x97/0x170 [ 2955.164357][T28973] __kernfs_create_file+0x4a/0x2f0 [ 2955.169558][T28973] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 2955.174921][T28973] internal_create_group+0x4be/0xd80 [ 2955.180209][T28973] sysfs_create_group+0x1f/0x30 [ 2955.185052][T28973] loop_set_fd+0xf54/0x1470 [ 2955.189561][T28973] lo_ioctl+0xd5/0x2200 [ 2955.193702][T28973] ? __kasan_slab_free+0x12a/0x1e0 [ 2955.198788][T28973] ? kasan_slab_free+0xe/0x10 [ 2955.203442][T28973] ? kfree+0x115/0x200 [ 2955.207486][T28973] ? tomoyo_path_number_perm+0x4e1/0x640 [ 2955.213095][T28973] ? tomoyo_file_ioctl+0x23/0x30 [ 2955.218010][T28973] ? security_file_ioctl+0x6d/0xd0 [ 2955.223105][T28973] ? __x64_sys_ioctl+0xa3/0x120 [ 2955.227934][T28973] ? do_syscall_64+0xf7/0x1c0 [ 2955.232589][T28973] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2955.238641][T28973] ? debug_check_no_obj_freed+0x505/0x5b0 [ 2955.244348][T28973] ? rcu_lock_release+0x9/0x30 [ 2955.249093][T28973] ? rcu_lock_release+0x9/0x30 [ 2955.253839][T28973] ? lo_release+0x1f0/0x1f0 [ 2955.258387][T28973] blkdev_ioctl+0x807/0x2980 [ 2955.262971][T28973] ? tomoyo_path_number_perm+0x53e/0x640 [ 2955.268608][T28973] block_ioctl+0xbd/0x100 [ 2955.272917][T28973] ? blkdev_iopoll+0x100/0x100 [ 2955.277669][T28973] do_vfs_ioctl+0x744/0x1730 [ 2955.282255][T28973] ? __fget+0x481/0x510 [ 2955.286401][T28973] ? tomoyo_file_ioctl+0x23/0x30 [ 2955.291329][T28973] ? security_file_ioctl+0xa1/0xd0 [ 2955.296427][T28973] __x64_sys_ioctl+0xe3/0x120 [ 2955.301097][T28973] do_syscall_64+0xf7/0x1c0 [ 2955.305593][T28973] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2955.311477][T28973] RIP: 0033:0x4598c7 [ 2955.315360][T28973] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2955.334951][T28973] RSP: 002b:00007fddc3987a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2955.343350][T28973] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004598c7 05:22:28 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2955.351320][T28973] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2955.359289][T28973] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2955.367246][T28973] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2955.375220][T28973] R13: 00000000004c8da6 R14: 00000000004e0200 R15: 0000000000000003 05:22:28 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) [ 2955.409450][T28970] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:22:28 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x480040, 0x0) ioctl$IMSETDEVNAME(r2, 0x80184947, &(0x7f00000000c0)={0x7, 'syz1\x00'}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r3, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r4, 0x0) write$P9_RWALK(r4, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) bind$llc(r4, &(0x7f0000000040)={0x1a, 0x33a, 0x3, 0x80, 0xff, 0x3, @random="1dd11bf9b565"}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 05:22:28 executing program 5 (fault-call:0 fault-nth:25): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 05:22:28 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x12000000, 0x0}) 05:22:28 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2955.585541][T29186] FAULT_INJECTION: forcing a failure. [ 2955.585541][T29186] name failslab, interval 1, probability 0, space 0, times 0 [ 2955.619791][T29186] CPU: 1 PID: 29186 Comm: syz-executor.5 Not tainted 5.4.0-rc2+ #0 [ 2955.627804][T29186] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2955.637865][T29186] Call Trace: [ 2955.641164][T29186] dump_stack+0x1d8/0x2f8 [ 2955.645506][T29186] should_fail+0x555/0x770 [ 2955.649946][T29186] __should_failslab+0x11a/0x160 [ 2955.654887][T29186] ? __kernfs_new_node+0x97/0x6b0 [ 2955.659916][T29186] should_failslab+0x9/0x20 [ 2955.664421][T29186] kmem_cache_alloc+0x56/0x2e0 [ 2955.669188][T29186] __kernfs_new_node+0x97/0x6b0 [ 2955.674054][T29186] ? mutex_unlock+0xd/0x10 [ 2955.678474][T29186] ? kernfs_activate+0x4c7/0x4e0 [ 2955.683429][T29186] kernfs_new_node+0x97/0x170 [ 2955.688118][T29186] __kernfs_create_file+0x4a/0x2f0 [ 2955.693245][T29186] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 2955.698629][T29186] internal_create_group+0x4be/0xd80 [ 2955.703940][T29186] sysfs_create_group+0x1f/0x30 [ 2955.708789][T29186] loop_set_fd+0xf54/0x1470 [ 2955.713311][T29186] lo_ioctl+0xd5/0x2200 [ 2955.717463][T29186] ? __kasan_slab_free+0x12a/0x1e0 [ 2955.722579][T29186] ? kasan_slab_free+0xe/0x10 [ 2955.727246][T29186] ? kfree+0x115/0x200 [ 2955.731309][T29186] ? tomoyo_path_number_perm+0x4e1/0x640 [ 2955.736937][T29186] ? tomoyo_file_ioctl+0x23/0x30 [ 2955.741874][T29186] ? security_file_ioctl+0x6d/0xd0 [ 2955.746981][T29186] ? __x64_sys_ioctl+0xa3/0x120 [ 2955.751832][T29186] ? do_syscall_64+0xf7/0x1c0 [ 2955.756521][T29186] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2955.762590][T29186] ? debug_check_no_obj_freed+0x505/0x5b0 [ 2955.768335][T29186] ? rcu_lock_release+0x9/0x30 [ 2955.773106][T29186] ? rcu_lock_release+0x9/0x30 [ 2955.777870][T29186] ? lo_release+0x1f0/0x1f0 05:22:29 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x20000000, 0x0}) 05:22:29 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x1200}}) 05:22:29 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}) [ 2955.782374][T29186] blkdev_ioctl+0x807/0x2980 [ 2955.783663][T29198] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2955.786960][T29186] ? tomoyo_path_number_perm+0x53e/0x640 [ 2955.786995][T29186] block_ioctl+0xbd/0x100 [ 2955.799789][T29186] ? blkdev_iopoll+0x100/0x100 [ 2955.799805][T29186] do_vfs_ioctl+0x744/0x1730 [ 2955.799814][T29186] ? __fget+0x481/0x510 [ 2955.799830][T29186] ? tomoyo_file_ioctl+0x23/0x30 [ 2955.799844][T29186] ? security_file_ioctl+0xa1/0xd0 [ 2955.799857][T29186] __x64_sys_ioctl+0xe3/0x120 [ 2955.808909][T29186] do_syscall_64+0xf7/0x1c0 [ 2955.808927][T29186] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2955.808939][T29186] RIP: 0033:0x4598c7 [ 2955.846488][T29186] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2955.866081][T29186] RSP: 002b:00007fddc3987a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2955.874481][T29186] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004598c7 [ 2955.882435][T29186] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2955.890384][T29186] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2955.898379][T29186] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2955.906328][T29186] R13: 00000000004c8da6 R14: 00000000004e0200 R15: 0000000000000003 [ 2955.962054][T29198] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:22:29 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:29 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}) 05:22:29 executing program 5 (fault-call:0 fault-nth:26): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 05:22:29 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x2500}}) 05:22:29 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$l2tp(0x18, 0x1, 0x1) syncfs(r2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r3, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 05:22:29 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x25000000, 0x0}) 05:22:29 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}) 05:22:29 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2956.212156][T29527] FAULT_INJECTION: forcing a failure. [ 2956.212156][T29527] name failslab, interval 1, probability 0, space 0, times 0 [ 2956.230493][T29527] CPU: 0 PID: 29527 Comm: syz-executor.5 Not tainted 5.4.0-rc2+ #0 [ 2956.238407][T29527] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2956.248462][T29527] Call Trace: [ 2956.251768][T29527] dump_stack+0x1d8/0x2f8 [ 2956.256109][T29527] should_fail+0x555/0x770 [ 2956.260545][T29527] __should_failslab+0x11a/0x160 [ 2956.265486][T29527] ? __kernfs_new_node+0x97/0x6b0 [ 2956.270516][T29527] should_failslab+0x9/0x20 [ 2956.275028][T29527] kmem_cache_alloc+0x56/0x2e0 [ 2956.279800][T29527] __kernfs_new_node+0x97/0x6b0 [ 2956.284656][T29527] ? mutex_unlock+0xd/0x10 [ 2956.289070][T29527] ? kernfs_activate+0x4c7/0x4e0 [ 2956.294018][T29527] kernfs_new_node+0x97/0x170 [ 2956.298696][T29527] __kernfs_create_file+0x4a/0x2f0 [ 2956.303808][T29527] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 2956.308393][T29531] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2956.309179][T29527] internal_create_group+0x4be/0xd80 [ 2956.321646][T29527] sysfs_create_group+0x1f/0x30 [ 2956.326506][T29527] loop_set_fd+0xf54/0x1470 [ 2956.331025][T29527] lo_ioctl+0xd5/0x2200 [ 2956.335174][T29527] ? __kasan_slab_free+0x12a/0x1e0 [ 2956.340270][T29527] ? kasan_slab_free+0xe/0x10 [ 2956.344936][T29527] ? kfree+0x115/0x200 [ 2956.349000][T29527] ? tomoyo_path_number_perm+0x4e1/0x640 [ 2956.349010][T29527] ? tomoyo_file_ioctl+0x23/0x30 [ 2956.349021][T29527] ? security_file_ioctl+0x6d/0xd0 [ 2956.349033][T29527] ? __x64_sys_ioctl+0xa3/0x120 [ 2956.359565][T29527] ? do_syscall_64+0xf7/0x1c0 [ 2956.359579][T29527] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2956.359596][T29527] ? debug_check_no_obj_freed+0x505/0x5b0 [ 2956.359625][T29527] ? rcu_lock_release+0x9/0x30 [ 2956.359643][T29527] ? rcu_lock_release+0x9/0x30 [ 2956.359655][T29527] ? lo_release+0x1f0/0x1f0 [ 2956.359667][T29527] blkdev_ioctl+0x807/0x2980 [ 2956.359681][T29527] ? tomoyo_path_number_perm+0x53e/0x640 [ 2956.359718][T29527] block_ioctl+0xbd/0x100 [ 2956.414532][T29527] ? blkdev_iopoll+0x100/0x100 [ 2956.419299][T29527] do_vfs_ioctl+0x744/0x1730 [ 2956.423885][T29527] ? __fget+0x481/0x510 [ 2956.428061][T29527] ? tomoyo_file_ioctl+0x23/0x30 [ 2956.433009][T29527] ? security_file_ioctl+0xa1/0xd0 [ 2956.438130][T29527] __x64_sys_ioctl+0xe3/0x120 [ 2956.442812][T29527] do_syscall_64+0xf7/0x1c0 [ 2956.447320][T29527] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2956.453205][T29527] RIP: 0033:0x4598c7 05:22:29 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:29 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:29 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2956.457090][T29527] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2956.476696][T29527] RSP: 002b:00007fddc3987a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2956.485109][T29527] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004598c7 [ 2956.493084][T29527] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2956.501055][T29527] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2956.509027][T29527] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2956.517000][T29527] R13: 00000000004c8da6 R14: 00000000004e0200 R15: 0000000000000003 [ 2956.571746][T29531] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:22:29 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:29 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}) 05:22:29 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x3f00}}) 05:22:30 executing program 5 (fault-call:0 fault-nth:27): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 05:22:30 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:30 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x3f000000, 0x0}) [ 2956.838672][T29841] FAULT_INJECTION: forcing a failure. [ 2956.838672][T29841] name failslab, interval 1, probability 0, space 0, times 0 [ 2956.859588][T29841] CPU: 0 PID: 29841 Comm: syz-executor.5 Not tainted 5.4.0-rc2+ #0 [ 2956.867522][T29841] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2956.877586][T29841] Call Trace: [ 2956.880882][T29841] dump_stack+0x1d8/0x2f8 [ 2956.885218][T29841] should_fail+0x555/0x770 [ 2956.889645][T29841] __should_failslab+0x11a/0x160 [ 2956.894592][T29841] ? __kernfs_new_node+0x97/0x6b0 [ 2956.899618][T29841] should_failslab+0x9/0x20 [ 2956.904127][T29841] kmem_cache_alloc+0x56/0x2e0 [ 2956.908900][T29841] __kernfs_new_node+0x97/0x6b0 [ 2956.913760][T29841] ? mutex_unlock+0xd/0x10 [ 2956.918180][T29841] ? kernfs_activate+0x4c7/0x4e0 [ 2956.923132][T29841] kernfs_new_node+0x97/0x170 [ 2956.927824][T29841] __kernfs_create_file+0x4a/0x2f0 [ 2956.932945][T29841] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 2956.938336][T29841] internal_create_group+0x4be/0xd80 [ 2956.943641][T29841] sysfs_create_group+0x1f/0x30 [ 2956.948495][T29841] loop_set_fd+0xf54/0x1470 [ 2956.953019][T29841] lo_ioctl+0xd5/0x2200 [ 2956.957180][T29841] ? __kasan_slab_free+0x12a/0x1e0 [ 2956.962291][T29841] ? kasan_slab_free+0xe/0x10 [ 2956.966967][T29841] ? kfree+0x115/0x200 [ 2956.971044][T29841] ? tomoyo_path_number_perm+0x4e1/0x640 [ 2956.976679][T29841] ? tomoyo_file_ioctl+0x23/0x30 [ 2956.981623][T29841] ? security_file_ioctl+0x6d/0xd0 [ 2956.986736][T29841] ? __x64_sys_ioctl+0xa3/0x120 [ 2956.991587][T29841] ? do_syscall_64+0xf7/0x1c0 [ 2956.996272][T29841] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2957.002349][T29841] ? debug_check_no_obj_freed+0x505/0x5b0 [ 2957.008091][T29841] ? rcu_lock_release+0x9/0x30 [ 2957.012870][T29841] ? rcu_lock_release+0x9/0x30 [ 2957.017640][T29841] ? lo_release+0x1f0/0x1f0 [ 2957.022150][T29841] blkdev_ioctl+0x807/0x2980 [ 2957.026738][T29841] ? tomoyo_path_number_perm+0x53e/0x640 [ 2957.032434][T29841] block_ioctl+0xbd/0x100 [ 2957.036864][T29841] ? blkdev_iopoll+0x100/0x100 [ 2957.041636][T29841] do_vfs_ioctl+0x744/0x1730 [ 2957.046223][T29841] ? __fget+0x481/0x510 [ 2957.050389][T29841] ? tomoyo_file_ioctl+0x23/0x30 [ 2957.055335][T29841] ? security_file_ioctl+0xa1/0xd0 [ 2957.060451][T29841] __x64_sys_ioctl+0xe3/0x120 [ 2957.065131][T29841] do_syscall_64+0xf7/0x1c0 [ 2957.069640][T29841] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2957.075530][T29841] RIP: 0033:0x4598c7 [ 2957.079436][T29841] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2957.099042][T29841] RSP: 002b:00007fddc3987a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2957.107462][T29841] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004598c7 [ 2957.115438][T29841] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2957.123446][T29841] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2957.131428][T29841] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 05:22:30 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb]}) 05:22:30 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002a00000084000000000000009500000000000000"], &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r2, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r3}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000040)='sit0\x00', r3}, 0x30) sched_getparam(r4, &(0x7f00000000c0)) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r6, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 05:22:30 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="0100000000fcff08001b72007be91600"], 0x28}}, 0x0) 05:22:30 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:30 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:30 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:30 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x40000000, 0x0}) [ 2957.139418][T29841] R13: 00000000004c8da6 R14: 00000000004e0200 R15: 0000000000000003 [ 2957.152627][T29984] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 05:22:30 executing program 1: r0 = syz_open_dev$dmmidi(&(0x7f0000000500)='/dev/dmmidi#\x00', 0x100, 0x8000) ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc018643a, &(0x7f0000000540)={0x10000000, 0x8000, 0x26}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) recvmsg(r1, &(0x7f0000000440)={&(0x7f0000000280)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/117, 0x75}, {&(0x7f00000000c0)=""/15, 0xf}], 0x2, &(0x7f0000000380)=""/165, 0xa5}, 0x10000) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x6d, &(0x7f0000000000)={r6}, &(0x7f0000000040)=0x8) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) r8 = syz_open_dev$midi(&(0x7f0000000580)='/dev/midi#\x00', 0xffffffffffffffee, 0x400) ioctl$DRM_IOCTL_SET_UNIQUE(r8, 0x40106410, &(0x7f0000000600)={0x35, &(0x7f00000005c0)="008100a4b4c42de292f85dfd4141ea68795252817ae58c8dcbdda5ac41b57a85d8c466404b160793057e80c9d8ad03c97ece26eb1c"}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000840)={0x0, 0x368, 0x5df0, 0x3f00000, 0x200, 0x1}, &(0x7f0000000880)=0x14) r9 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r7, 0x84, 0x6d, &(0x7f0000000000)={r10}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f0000000640)=@sack_info={r11, 0x0, 0x400}, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000004c0)={'team0\x00', r12}) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100002000000000000a000000", @ANYRES32=r12, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000680)={0x4, 0x94, "32cefece56c6acb79ad9cb16c16a9724205ecddad87f58a0a77aa53b9d45ac5919718339323dc4591e554107ff23ea86771bcc25f49fe7440906637b7da3b250ed63417af08eeba6a8af5a36cccce9e882be21be76970fc68c0a63732a0832ee5a6d259d797b53baa6ac3334c2417dd145eed8aab440b44f80f33eacd4e46ec40f67e90ca5cf4aec4774f2fb4c4bc1471ec6cd6d"}) r13 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r13, 0x0) r14 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vga_arbiter\x00', 0x800, 0x0) sendmsg$nl_route(r14, &(0x7f0000000800)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)=@ipv4_delroute={0x2c, 0x19, 0x300, 0x70bd26, 0x25dfdbfe, {0x2, 0x80, 0x10, 0x4, 0xff, 0x2, 0xff, 0x4, 0x200}, [@RTA_DST={0x8, 0x1, @multicast1}, @RTA_MARK={0x8, 0x10, 0x9}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10c0}, 0x1) write$P9_RWALK(r13, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) sendmsg$nl_route(r13, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="2840000010005fba0000000000000000fafffffffb2ed00998f6c56c62237a8bc9608dd9d40656134227de7365b34179f6e8f8ed816ae3cc3cd495913b7c6c3a72c1", @ANYRES32=0x0, @ANYBLOB="010000000000000008001b0000000000dc0855aedd4dcb99763df91325585cc548602438e791253d347f8ccc1be0d3ad40a6994e7fe8b0a9169dbb1c24e4e3d58b8f0023eac9699226b05ad6419329e4177162e38b8d80ca69aca1a387a7c5559d1cf990ca08738c964faa6ba9097f72377c07c8bd39a9bd8ee90463895237d73cfd054f12562e963bef590cb2857bf9aed7ccccbdef3d42134115308309015015f1d1a1b58fe6ba3486f6d26bee84b525c122077741a0cd75a70ac9942e498d68a4644bf4239eabbfd03b443e5dbc851e2dd3"], 0x3}}, 0x0) 05:22:30 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:30 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x4000}}) 05:22:30 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc]}) 05:22:30 executing program 5 (fault-call:0 fault-nth:28): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 05:22:30 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x48000000, 0x0}) [ 2957.506257][T30107] FAULT_INJECTION: forcing a failure. [ 2957.506257][T30107] name failslab, interval 1, probability 0, space 0, times 0 [ 2957.534957][T30107] CPU: 0 PID: 30107 Comm: syz-executor.5 Not tainted 5.4.0-rc2+ #0 [ 2957.542990][T30107] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2957.553054][T30107] Call Trace: [ 2957.556360][T30107] dump_stack+0x1d8/0x2f8 [ 2957.560715][T30107] should_fail+0x555/0x770 [ 2957.565155][T30107] __should_failslab+0x11a/0x160 [ 2957.570103][T30107] ? __kernfs_new_node+0x97/0x6b0 [ 2957.575136][T30107] should_failslab+0x9/0x20 [ 2957.579654][T30107] kmem_cache_alloc+0x56/0x2e0 [ 2957.584431][T30107] __kernfs_new_node+0x97/0x6b0 [ 2957.589299][T30107] ? mutex_unlock+0xd/0x10 [ 2957.593721][T30107] ? kernfs_activate+0x4c7/0x4e0 [ 2957.598669][T30107] kernfs_new_node+0x97/0x170 [ 2957.603357][T30107] __kernfs_create_file+0x4a/0x2f0 [ 2957.608493][T30107] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 2957.613879][T30107] internal_create_group+0x4be/0xd80 [ 2957.619181][T30107] sysfs_create_group+0x1f/0x30 [ 2957.624038][T30107] loop_set_fd+0xf54/0x1470 [ 2957.628558][T30107] lo_ioctl+0xd5/0x2200 [ 2957.632711][T30107] ? __kasan_slab_free+0x12a/0x1e0 [ 2957.637837][T30107] ? kasan_slab_free+0xe/0x10 [ 2957.642519][T30107] ? kfree+0x115/0x200 [ 2957.646595][T30107] ? tomoyo_path_number_perm+0x4e1/0x640 05:22:30 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:30 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x4800}}) [ 2957.652236][T30107] ? tomoyo_file_ioctl+0x23/0x30 [ 2957.657179][T30107] ? security_file_ioctl+0x6d/0xd0 [ 2957.662290][T30107] ? __x64_sys_ioctl+0xa3/0x120 [ 2957.667149][T30107] ? do_syscall_64+0xf7/0x1c0 [ 2957.671830][T30107] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2957.677900][T30107] ? debug_check_no_obj_freed+0x505/0x5b0 [ 2957.683636][T30107] ? rcu_lock_release+0x9/0x30 [ 2957.688405][T30107] ? rcu_lock_release+0x9/0x30 [ 2957.693167][T30107] ? lo_release+0x1f0/0x1f0 [ 2957.697674][T30107] blkdev_ioctl+0x807/0x2980 05:22:31 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2957.702274][T30107] ? tomoyo_path_number_perm+0x53e/0x640 [ 2957.707930][T30107] block_ioctl+0xbd/0x100 [ 2957.712260][T30107] ? blkdev_iopoll+0x100/0x100 [ 2957.717024][T30107] do_vfs_ioctl+0x744/0x1730 [ 2957.721611][T30107] ? __fget+0x481/0x510 [ 2957.725773][T30107] ? tomoyo_file_ioctl+0x23/0x30 [ 2957.730716][T30107] ? security_file_ioctl+0xa1/0xd0 [ 2957.735830][T30107] __x64_sys_ioctl+0xe3/0x120 [ 2957.740516][T30107] do_syscall_64+0xf7/0x1c0 [ 2957.745038][T30107] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2957.750934][T30107] RIP: 0033:0x4598c7 05:22:31 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x4c00}}) [ 2957.754830][T30107] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2957.774435][T30107] RSP: 002b:00007fddc3987a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2957.782855][T30107] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004598c7 [ 2957.790832][T30107] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2957.798820][T30107] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 05:22:31 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}) 05:22:31 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2957.806809][T30107] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2957.814796][T30107] R13: 00000000004c8da6 R14: 00000000004e0200 R15: 0000000000000003 05:22:31 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x5c00}}) 05:22:31 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe]}) 05:22:31 executing program 5 (fault-call:0 fault-nth:29): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 05:22:31 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:31 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x4c000000, 0x0}) 05:22:31 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) ioctl$KVM_ENABLE_CAP_CPU(r0, 0x4068aea3, &(0x7f0000000040)={0x7b, 0x0, [0x5, 0xe96, 0xfa, 0x3f]}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r3, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 05:22:31 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:31 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}) [ 2958.208728][T30542] FAULT_INJECTION: forcing a failure. [ 2958.208728][T30542] name failslab, interval 1, probability 0, space 0, times 0 [ 2958.257686][T30542] CPU: 0 PID: 30542 Comm: syz-executor.5 Not tainted 5.4.0-rc2+ #0 [ 2958.265618][T30542] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2958.275682][T30542] Call Trace: [ 2958.278982][T30542] dump_stack+0x1d8/0x2f8 [ 2958.283328][T30542] should_fail+0x555/0x770 [ 2958.287754][T30542] __should_failslab+0x11a/0x160 [ 2958.292696][T30542] should_failslab+0x9/0x20 [ 2958.297206][T30542] kmem_cache_alloc_trace+0x5d/0x2f0 [ 2958.302499][T30542] ? kobject_uevent_env+0x2cd/0x1260 05:22:31 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x6800}}) [ 2958.307863][T30542] ? dev_uevent_filter+0xb0/0xb0 [ 2958.312815][T30542] kobject_uevent_env+0x2cd/0x1260 [ 2958.317940][T30542] kobject_uevent+0x1f/0x30 [ 2958.322446][T30542] loop_set_fd+0xfc3/0x1470 [ 2958.326963][T30542] lo_ioctl+0xd5/0x2200 [ 2958.331113][T30542] ? __kasan_slab_free+0x12a/0x1e0 [ 2958.336222][T30542] ? kasan_slab_free+0xe/0x10 [ 2958.340900][T30542] ? kfree+0x115/0x200 [ 2958.344969][T30542] ? tomoyo_path_number_perm+0x4e1/0x640 [ 2958.350596][T30542] ? tomoyo_file_ioctl+0x23/0x30 [ 2958.355536][T30542] ? security_file_ioctl+0x6d/0xd0 [ 2958.360647][T30542] ? __x64_sys_ioctl+0xa3/0x120 [ 2958.365503][T30542] ? do_syscall_64+0xf7/0x1c0 [ 2958.370183][T30542] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2958.376260][T30542] ? debug_check_no_obj_freed+0x505/0x5b0 [ 2958.382000][T30542] ? rcu_lock_release+0x9/0x30 [ 2958.386776][T30542] ? rcu_lock_release+0x9/0x30 [ 2958.391555][T30542] ? lo_release+0x1f0/0x1f0 [ 2958.396064][T30542] blkdev_ioctl+0x807/0x2980 [ 2958.400657][T30542] ? tomoyo_path_number_perm+0x53e/0x640 [ 2958.406320][T30542] block_ioctl+0xbd/0x100 [ 2958.410651][T30542] ? blkdev_iopoll+0x100/0x100 [ 2958.414172][T30751] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2958.415413][T30542] do_vfs_ioctl+0x744/0x1730 [ 2958.415424][T30542] ? __fget+0x481/0x510 [ 2958.415443][T30542] ? tomoyo_file_ioctl+0x23/0x30 [ 2958.415457][T30542] ? security_file_ioctl+0xa1/0xd0 [ 2958.415473][T30542] __x64_sys_ioctl+0xe3/0x120 [ 2958.427229][T30542] do_syscall_64+0xf7/0x1c0 [ 2958.441378][T30542] entry_SYSCALL_64_after_hwframe+0x49/0xbe 05:22:31 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x5c000000, 0x0}) [ 2958.441389][T30542] RIP: 0033:0x4598c7 [ 2958.441400][T30542] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2958.441406][T30542] RSP: 002b:00007fddc3987a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2958.441416][T30542] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004598c7 [ 2958.441422][T30542] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 05:22:31 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2958.441429][T30542] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2958.441435][T30542] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2958.441440][T30542] R13: 00000000004c8da6 R14: 00000000004e0200 R15: 0000000000000003 05:22:31 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}) [ 2958.564906][T30751] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:22:32 executing program 5 (fault-call:0 fault-nth:30): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 05:22:32 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:32 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x6c00}}) 05:22:32 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x60000000, 0x0}) 05:22:32 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12]}) 05:22:32 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r3, 0x0, 0x0) ptrace$cont(0x7, r3, 0x7ff, 0x0) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 2958.755080][T30973] FAULT_INJECTION: forcing a failure. [ 2958.755080][T30973] name failslab, interval 1, probability 0, space 0, times 0 05:22:32 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x7400}}) [ 2958.803329][T30973] CPU: 1 PID: 30973 Comm: syz-executor.5 Not tainted 5.4.0-rc2+ #0 [ 2958.811263][T30973] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2958.821329][T30973] Call Trace: [ 2958.824623][T30973] dump_stack+0x1d8/0x2f8 [ 2958.828958][T30973] should_fail+0x555/0x770 [ 2958.833383][T30973] __should_failslab+0x11a/0x160 [ 2958.838334][T30973] ? skb_clone+0x1cc/0x380 [ 2958.842751][T30973] should_failslab+0x9/0x20 [ 2958.847253][T30973] kmem_cache_alloc+0x56/0x2e0 05:22:32 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2958.852023][T30973] skb_clone+0x1cc/0x380 [ 2958.856259][T30973] netlink_broadcast_filtered+0x619/0x1080 [ 2958.862072][T30973] netlink_broadcast+0x3a/0x50 [ 2958.866837][T30973] kobject_uevent_env+0xcf0/0x1260 [ 2958.871932][T30973] kobject_uevent+0x1f/0x30 [ 2958.876459][T30973] loop_set_fd+0xfc3/0x1470 [ 2958.880950][T30973] lo_ioctl+0xd5/0x2200 [ 2958.885081][T30973] ? __kasan_slab_free+0x12a/0x1e0 [ 2958.890164][T30973] ? kasan_slab_free+0xe/0x10 [ 2958.894819][T30973] ? kfree+0x115/0x200 [ 2958.898868][T30973] ? tomoyo_path_number_perm+0x4e1/0x640 [ 2958.904475][T30973] ? tomoyo_file_ioctl+0x23/0x30 [ 2958.909398][T30973] ? security_file_ioctl+0x6d/0xd0 [ 2958.914491][T30973] ? __x64_sys_ioctl+0xa3/0x120 [ 2958.919323][T30973] ? do_syscall_64+0xf7/0x1c0 [ 2958.923991][T30973] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2958.930045][T30973] ? debug_check_no_obj_freed+0x505/0x5b0 [ 2958.935758][T30973] ? rcu_lock_release+0x9/0x30 [ 2958.940503][T30973] ? rcu_lock_release+0x9/0x30 [ 2958.945940][T30973] ? lo_release+0x1f0/0x1f0 [ 2958.950420][T30973] blkdev_ioctl+0x807/0x2980 [ 2958.954991][T30973] ? tomoyo_path_number_perm+0x53e/0x640 [ 2958.960627][T30973] block_ioctl+0xbd/0x100 [ 2958.964942][T30973] ? blkdev_iopoll+0x100/0x100 [ 2958.969681][T30973] do_vfs_ioctl+0x744/0x1730 [ 2958.974245][T30973] ? __fget+0x481/0x510 [ 2958.978433][T30973] ? tomoyo_file_ioctl+0x23/0x30 [ 2958.983404][T30973] ? security_file_ioctl+0xa1/0xd0 [ 2958.988502][T30973] __x64_sys_ioctl+0xe3/0x120 [ 2958.993158][T30973] do_syscall_64+0xf7/0x1c0 [ 2958.997640][T30973] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2959.003516][T30973] RIP: 0033:0x4598c7 [ 2959.007397][T30973] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2959.026983][T30973] RSP: 002b:00007fddc3987a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2959.035374][T30973] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004598c7 [ 2959.043333][T30973] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2959.051296][T30973] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2959.059693][T30973] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2959.067655][T30973] R13: 00000000004c8da6 R14: 00000000004e0200 R15: 0000000000000003 05:22:32 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x68000000, 0x0}) 05:22:32 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r3, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r4 = openat(r3, &(0x7f0000000040)='./file0\x00', 0x102, 0x0) setsockopt$inet_group_source_req(r4, 0x0, 0x2b, &(0x7f0000000280)={0x0, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x21}}}, {{0x2, 0x4e24, @loopback}}}, 0x108) 05:22:32 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25]}) 05:22:32 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:32 executing program 5 (fault-call:0 fault-nth:31): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 05:22:32 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x7a00}}) 05:22:32 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:32 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c]}) [ 2959.382019][T31348] FAULT_INJECTION: forcing a failure. [ 2959.382019][T31348] name failslab, interval 1, probability 0, space 0, times 0 [ 2959.395792][T31306] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2959.425118][T31348] CPU: 1 PID: 31348 Comm: syz-executor.5 Not tainted 5.4.0-rc2+ #0 [ 2959.433043][T31348] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2959.443103][T31348] Call Trace: [ 2959.446398][T31348] dump_stack+0x1d8/0x2f8 [ 2959.450726][T31348] should_fail+0x555/0x770 [ 2959.455146][T31348] __should_failslab+0x11a/0x160 [ 2959.460087][T31348] should_failslab+0x9/0x20 [ 2959.464586][T31348] kmem_cache_alloc_node_trace+0x6e/0x2d0 [ 2959.470300][T31348] ? __kmalloc_node_track_caller+0x3c/0x60 [ 2959.476110][T31348] __kmalloc_node_track_caller+0x3c/0x60 [ 2959.481740][T31348] ? alloc_uevent_skb+0x7f/0x230 [ 2959.486673][T31348] __alloc_skb+0xe8/0x500 [ 2959.491005][T31348] alloc_uevent_skb+0x7f/0x230 [ 2959.495772][T31348] kobject_uevent_env+0xcbb/0x1260 [ 2959.500895][T31348] kobject_uevent+0x1f/0x30 [ 2959.505394][T31348] loop_set_fd+0xfc3/0x1470 [ 2959.509907][T31348] lo_ioctl+0xd5/0x2200 [ 2959.514055][T31348] ? __kasan_slab_free+0x12a/0x1e0 [ 2959.519157][T31348] ? kasan_slab_free+0xe/0x10 [ 2959.523824][T31348] ? kfree+0x115/0x200 [ 2959.527889][T31348] ? tomoyo_path_number_perm+0x4e1/0x640 [ 2959.533516][T31348] ? tomoyo_file_ioctl+0x23/0x30 [ 2959.538446][T31348] ? security_file_ioctl+0x6d/0xd0 [ 2959.543551][T31348] ? __x64_sys_ioctl+0xa3/0x120 [ 2959.548391][T31348] ? do_syscall_64+0xf7/0x1c0 [ 2959.553063][T31348] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2959.559129][T31348] ? debug_check_no_obj_freed+0x505/0x5b0 [ 2959.564866][T31348] ? rcu_lock_release+0x9/0x30 [ 2959.569634][T31348] ? rcu_lock_release+0x9/0x30 [ 2959.574480][T31348] ? lo_release+0x1f0/0x1f0 [ 2959.578979][T31348] blkdev_ioctl+0x807/0x2980 [ 2959.583569][T31348] ? tomoyo_path_number_perm+0x53e/0x640 [ 2959.589216][T31348] block_ioctl+0xbd/0x100 [ 2959.593541][T31348] ? blkdev_iopoll+0x100/0x100 [ 2959.598306][T31348] do_vfs_ioctl+0x744/0x1730 [ 2959.602891][T31348] ? __fget+0x481/0x510 [ 2959.607047][T31348] ? tomoyo_file_ioctl+0x23/0x30 [ 2959.611990][T31348] ? security_file_ioctl+0xa1/0xd0 [ 2959.617097][T31348] __x64_sys_ioctl+0xe3/0x120 [ 2959.621776][T31348] do_syscall_64+0xf7/0x1c0 [ 2959.626280][T31348] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2959.632175][T31348] RIP: 0033:0x4598c7 [ 2959.636066][T31348] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2959.655660][T31348] RSP: 002b:00007fddc3987a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2959.664064][T31348] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004598c7 05:22:33 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x6c000000, 0x0}) [ 2959.672027][T31348] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2959.679988][T31348] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2959.687953][T31348] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2959.695918][T31348] R13: 00000000004c8da6 R14: 00000000004e0200 R15: 0000000000000003 05:22:33 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)) [ 2959.749714][T31306] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:22:33 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:33 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x74000000, 0x0}) 05:22:33 executing program 5 (fault-call:0 fault-nth:32): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2959.935893][T31364] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2959.975726][T31649] FAULT_INJECTION: forcing a failure. [ 2959.975726][T31649] name failslab, interval 1, probability 0, space 0, times 0 [ 2959.998662][T31649] CPU: 0 PID: 31649 Comm: syz-executor.5 Not tainted 5.4.0-rc2+ #0 [ 2960.006594][T31649] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2960.016664][T31649] Call Trace: [ 2960.019970][T31649] dump_stack+0x1d8/0x2f8 [ 2960.024302][T31649] should_fail+0x555/0x770 [ 2960.028727][T31649] __should_failslab+0x11a/0x160 [ 2960.033661][T31649] ? getname_flags+0xba/0x640 [ 2960.038367][T31649] should_failslab+0x9/0x20 [ 2960.042875][T31649] kmem_cache_alloc+0x56/0x2e0 [ 2960.047633][T31649] ? __kasan_check_write+0x14/0x20 [ 2960.052745][T31649] getname_flags+0xba/0x640 [ 2960.057249][T31649] do_mkdirat+0x3c/0x320 [ 2960.061491][T31649] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 2960.067205][T31649] ? do_syscall_64+0x1d/0x1c0 [ 2960.071879][T31649] __x64_sys_mkdir+0x60/0x70 [ 2960.076462][T31649] do_syscall_64+0xf7/0x1c0 [ 2960.080966][T31649] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2960.086854][T31649] RIP: 0033:0x458e77 [ 2960.090743][T31649] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2960.110337][T31649] RSP: 002b:00007fddc3987a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2960.118742][T31649] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000458e77 [ 2960.126714][T31649] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 2960.134680][T31649] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2960.142654][T31649] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2960.150622][T31649] R13: 00000000004c8da6 R14: 00000000004e0200 R15: 0000000000000003 [ 2960.189467][T31364] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:22:33 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d114b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x3}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 05:22:33 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 05:22:33 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x1000000}}) 05:22:33 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:33 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x7a000000, 0x0}) 05:22:33 executing program 5 (fault-call:0 fault-nth:33): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 05:22:33 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}) [ 2960.338540][T31795] FAULT_INJECTION: forcing a failure. [ 2960.338540][T31795] name failslab, interval 1, probability 0, space 0, times 0 [ 2960.362807][T31795] CPU: 0 PID: 31795 Comm: syz-executor.5 Not tainted 5.4.0-rc2+ #0 [ 2960.370732][T31795] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2960.380791][T31795] Call Trace: [ 2960.384088][T31795] dump_stack+0x1d8/0x2f8 [ 2960.388421][T31795] should_fail+0x555/0x770 [ 2960.392852][T31795] __should_failslab+0x11a/0x160 [ 2960.397789][T31795] should_failslab+0x9/0x20 [ 2960.402295][T31795] kmem_cache_alloc_node+0x65/0x280 [ 2960.407492][T31795] ? __alloc_skb+0x9f/0x500 [ 2960.412006][T31795] __alloc_skb+0x9f/0x500 [ 2960.416344][T31795] alloc_uevent_skb+0x7f/0x230 [ 2960.421109][T31795] kobject_uevent_env+0xcbb/0x1260 [ 2960.426233][T31795] kobject_uevent+0x1f/0x30 [ 2960.430736][T31795] loop_set_fd+0xfc3/0x1470 [ 2960.435239][T31795] lo_ioctl+0xd5/0x2200 [ 2960.439382][T31795] ? __kasan_slab_free+0x12a/0x1e0 [ 2960.444520][T31795] ? kasan_slab_free+0xe/0x10 [ 2960.449185][T31795] ? kfree+0x115/0x200 [ 2960.453245][T31795] ? tomoyo_path_number_perm+0x4e1/0x640 [ 2960.458865][T31795] ? tomoyo_file_ioctl+0x23/0x30 [ 2960.463796][T31795] ? security_file_ioctl+0x6d/0xd0 [ 2960.469069][T31795] ? __x64_sys_ioctl+0xa3/0x120 [ 2960.473909][T31795] ? do_syscall_64+0xf7/0x1c0 [ 2960.478581][T31795] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2960.484650][T31795] ? debug_check_no_obj_freed+0x505/0x5b0 [ 2960.490388][T31795] ? rcu_lock_release+0x9/0x30 [ 2960.495159][T31795] ? rcu_lock_release+0x9/0x30 [ 2960.499923][T31795] ? lo_release+0x1f0/0x1f0 [ 2960.504431][T31795] blkdev_ioctl+0x807/0x2980 [ 2960.509030][T31795] ? tomoyo_path_number_perm+0x53e/0x640 [ 2960.514693][T31795] block_ioctl+0xbd/0x100 [ 2960.519019][T31795] ? blkdev_iopoll+0x100/0x100 [ 2960.523777][T31795] do_vfs_ioctl+0x744/0x1730 [ 2960.528355][T31795] ? __fget+0x481/0x510 [ 2960.532511][T31795] ? tomoyo_file_ioctl+0x23/0x30 [ 2960.537459][T31795] ? security_file_ioctl+0xa1/0xd0 [ 2960.542572][T31795] __x64_sys_ioctl+0xe3/0x120 [ 2960.546513][T31848] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2960.547244][T31795] do_syscall_64+0xf7/0x1c0 [ 2960.558940][T31795] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2960.564825][T31795] RIP: 0033:0x4598c7 [ 2960.568717][T31795] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 05:22:33 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0xff600000, 0x0}) 05:22:33 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2960.588312][T31795] RSP: 002b:00007fddc3987a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2960.596722][T31795] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004598c7 [ 2960.596729][T31795] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2960.596735][T31795] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2960.596741][T31795] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2960.596746][T31795] R13: 00000000004c8da6 R14: 00000000004e0200 R15: 0000000000000003 05:22:34 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}) 05:22:34 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2960.709334][T31848] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:22:34 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x2000000}}) 05:22:34 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x2000, 0x0) sendto$rxrpc(r3, &(0x7f0000000280)="278a1720bc59ab976f96346991a4c6f06af870f73802226b235532e6d30647c05f861c76238296f922c6b0b79b1b48b43d782b5ef7f84fd714de37bb89f688f58477a347c508f1a8ed18c4e9cede4ff2ecdcf7ca318491d4b7369168edf80e281f07104fbb8713795c2f953d94fc7dae01fec624aa83e3f093184c604e9784eb01e5d0810e5eb4522226d8bb6a462ae9cb0f70411ca50a17fcb605530d9337d5b4f4e2ca7e72d86db317418dcc650a8add891241fae212192afe935f7db1e2f0eec6a7e2c10add28d485f8e9df34fec3a1f731d368ab5e51cbfb9d0b5f846d", 0xdf, 0x40000, 0x0, 0x0) 05:22:34 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}) 05:22:34 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\xff', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:34 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x400000000000, 0x0}) 05:22:34 executing program 5 (fault-call:0 fault-nth:34): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 05:22:34 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) 05:22:34 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:34 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x3000000}}) 05:22:34 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}) 05:22:34 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x60ffffffffff, 0x0}) [ 2961.092779][T32147] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:22:34 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x3, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2961.150847][T32147] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:22:34 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2961.252466][T32147] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2961.275345][T32289] FAULT_INJECTION: forcing a failure. [ 2961.275345][T32289] name failslab, interval 1, probability 0, space 0, times 0 [ 2961.298245][T32289] CPU: 0 PID: 32289 Comm: syz-executor.5 Not tainted 5.4.0-rc2+ #0 [ 2961.306178][T32289] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2961.316241][T32289] Call Trace: [ 2961.319538][T32289] dump_stack+0x1d8/0x2f8 [ 2961.323874][T32289] should_fail+0x555/0x770 [ 2961.328297][T32289] __should_failslab+0x11a/0x160 [ 2961.333243][T32289] should_failslab+0x9/0x20 [ 2961.337749][T32289] kmem_cache_alloc_node_trace+0x6e/0x2d0 [ 2961.343472][T32289] ? __kmalloc_node_track_caller+0x3c/0x60 [ 2961.349280][T32289] __kmalloc_node_track_caller+0x3c/0x60 [ 2961.354906][T32289] ? alloc_uevent_skb+0x7f/0x230 [ 2961.359846][T32289] __alloc_skb+0xe8/0x500 [ 2961.364179][T32289] alloc_uevent_skb+0x7f/0x230 [ 2961.368942][T32289] kobject_uevent_env+0xcbb/0x1260 [ 2961.374066][T32289] kobject_uevent+0x1f/0x30 [ 2961.378562][T32289] loop_set_fd+0xfc3/0x1470 [ 2961.383078][T32289] lo_ioctl+0xd5/0x2200 [ 2961.387228][T32289] ? __kasan_slab_free+0x12a/0x1e0 [ 2961.392418][T32289] ? kasan_slab_free+0xe/0x10 [ 2961.397089][T32289] ? kfree+0x115/0x200 [ 2961.401157][T32289] ? tomoyo_path_number_perm+0x4e1/0x640 [ 2961.406779][T32289] ? tomoyo_file_ioctl+0x23/0x30 [ 2961.411714][T32289] ? security_file_ioctl+0x6d/0xd0 [ 2961.416819][T32289] ? __x64_sys_ioctl+0xa3/0x120 [ 2961.421677][T32289] ? do_syscall_64+0xf7/0x1c0 [ 2961.426351][T32289] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2961.432419][T32289] ? debug_check_no_obj_freed+0x505/0x5b0 [ 2961.438160][T32289] ? rcu_lock_release+0x9/0x30 [ 2961.442928][T32289] ? rcu_lock_release+0x9/0x30 [ 2961.447692][T32289] ? lo_release+0x1f0/0x1f0 [ 2961.452194][T32289] blkdev_ioctl+0x807/0x2980 [ 2961.456783][T32289] ? tomoyo_path_number_perm+0x53e/0x640 [ 2961.462439][T32289] block_ioctl+0xbd/0x100 [ 2961.466767][T32289] ? blkdev_iopoll+0x100/0x100 [ 2961.471529][T32289] do_vfs_ioctl+0x744/0x1730 [ 2961.476119][T32289] ? __fget+0x481/0x510 [ 2961.480275][T32289] ? tomoyo_file_ioctl+0x23/0x30 [ 2961.485208][T32289] ? security_file_ioctl+0xa1/0xd0 [ 2961.490322][T32289] __x64_sys_ioctl+0xe3/0x120 [ 2961.494999][T32289] do_syscall_64+0xf7/0x1c0 [ 2961.499503][T32289] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2961.505386][T32289] RIP: 0033:0x4598c7 [ 2961.509277][T32289] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2961.528877][T32289] RSP: 002b:00007fddc3987a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2961.537281][T32289] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004598c7 [ 2961.545247][T32289] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2961.553213][T32289] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2961.561178][T32289] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2961.569143][T32289] R13: 00000000004c8da6 R14: 00000000004e0200 R15: 0000000000000003 [ 2961.590499][T32147] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:22:35 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) clone3(&(0x7f0000000440)={0x5391c851aafb9032, &(0x7f0000000040), &(0x7f0000000080)=0x0, &(0x7f00000000c0), 0x24, 0x0, &(0x7f0000000280)=""/247, 0xf7, &(0x7f0000000380)=""/135}, 0x40) sched_setscheduler(r2, 0x2, &(0x7f0000000480)=0x8ba0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000004c0)=ANY=[@ANYRESHEX=r3, @ANYBLOB="75113968b92c8250551544b61741e1e14639369cf09142f61804c01e3e101800bb27bb6610614b3b39df495bbc3182716c38b2e6524e987d9286f2d0ad1821d3f100a1fb9d843f5f5bafb1fd1c14d04d8ff47332582af8ed7a0b258a5e0bc83c905769babd3c75004b389901c6bc0019213d4a755d260d5ed71635475ade8281e6731ed0a6cd5d3ed3c548", @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x3}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 05:22:35 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}) 05:22:35 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x5, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:35 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x760000000000, 0x0}) 05:22:35 executing program 5 (fault-call:0 fault-nth:35): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 05:22:35 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x4000000}}) 05:22:35 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x6, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:35 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}) [ 2961.848479][T32518] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2961.860369][T32625] FAULT_INJECTION: forcing a failure. [ 2961.860369][T32625] name failslab, interval 1, probability 0, space 0, times 0 [ 2961.909461][T32625] CPU: 0 PID: 32625 Comm: syz-executor.5 Not tainted 5.4.0-rc2+ #0 [ 2961.917397][T32625] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2961.927454][T32625] Call Trace: [ 2961.930752][T32625] dump_stack+0x1d8/0x2f8 [ 2961.935086][T32625] should_fail+0x555/0x770 [ 2961.939514][T32625] __should_failslab+0x11a/0x160 [ 2961.944451][T32625] ? getname_flags+0xba/0x640 [ 2961.949128][T32625] should_failslab+0x9/0x20 [ 2961.953664][T32625] kmem_cache_alloc+0x56/0x2e0 [ 2961.958428][T32625] ? __kasan_check_write+0x14/0x20 [ 2961.963541][T32625] getname_flags+0xba/0x640 [ 2961.968046][T32625] do_mkdirat+0x3c/0x320 [ 2961.972289][T32625] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 2961.978001][T32625] ? do_syscall_64+0x1d/0x1c0 [ 2961.982682][T32625] __x64_sys_mkdir+0x60/0x70 [ 2961.987272][T32625] do_syscall_64+0xf7/0x1c0 [ 2961.991779][T32625] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2961.997661][T32625] RIP: 0033:0x458e77 05:22:35 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:35 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}) 05:22:35 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x7ffffffff000, 0x0}) [ 2962.001552][T32625] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2962.021150][T32625] RSP: 002b:00007fddc3987a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2962.021161][T32625] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000458e77 [ 2962.021167][T32625] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 2962.021173][T32625] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2962.021180][T32625] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2962.021186][T32625] R13: 00000000004c8da6 R14: 00000000004e0200 R15: 0000000000000003 [ 2962.070657][T32518] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:22:35 executing program 5 (fault-call:0 fault-nth:36): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2962.210712][T32647] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2962.257879][ T342] FAULT_INJECTION: forcing a failure. [ 2962.257879][ T342] name failslab, interval 1, probability 0, space 0, times 0 [ 2962.273138][T32647] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2962.342591][ T342] CPU: 1 PID: 342 Comm: syz-executor.5 Not tainted 5.4.0-rc2+ #0 [ 2962.350358][ T342] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2962.360410][ T342] Call Trace: [ 2962.363705][ T342] dump_stack+0x1d8/0x2f8 [ 2962.368038][ T342] should_fail+0x555/0x770 [ 2962.372456][ T342] __should_failslab+0x11a/0x160 [ 2962.377394][ T342] ? security_inode_alloc+0x36/0x1e0 [ 2962.382681][ T342] should_failslab+0x9/0x20 [ 2962.387183][ T342] kmem_cache_alloc+0x56/0x2e0 05:22:35 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:35 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb]}) 05:22:35 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x960000000000, 0x0}) 05:22:35 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x5000000}}) [ 2962.391946][ T342] security_inode_alloc+0x36/0x1e0 [ 2962.397056][ T342] inode_init_always+0x3b5/0x8d0 [ 2962.402058][ T342] ? set_qf_name+0x3c0/0x3c0 [ 2962.406654][ T342] new_inode_pseudo+0x7f/0x240 [ 2962.411414][ T342] new_inode+0x28/0x1c0 [ 2962.415652][ T342] ? trace_ext4_request_inode+0x28b/0x2d0 [ 2962.421374][ T342] __ext4_new_inode+0x43d/0x5650 [ 2962.426309][ T342] ? memset+0x31/0x40 [ 2962.430299][ T342] ? smk_curacc+0xa3/0xe0 [ 2962.434633][ T342] ext4_mkdir+0x3f5/0x1450 05:22:35 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000400000084) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r3 = socket$inet6(0xa, 0x1, 0x8010000400000084) sendto$inet6(r3, 0x0, 0x0, 0x0, 0x0, 0x0) close(r3) r4 = socket$inet6(0xa, 0x1, 0x8010000400000084) sendto$inet6(r4, 0x0, 0x0, 0x0, 0x0, 0x0) close(r4) mmap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x2, 0x13, r0, 0xfffffffffffffffc) r5 = socket$inet6(0xa, 0x1, 0x8010000400000084) sendto$inet6(r5, 0x0, 0x0, 0x0, 0x0, 0x0) close(r5) r6 = socket$inet6(0xa, 0x1, 0x8010000400000084) sendto$inet6(r6, 0x0, 0x0, 0x0, 0x0, 0x0) close(r6) r7 = socket$inet6(0xa, 0x1, 0x8010000400000084) sendto$inet6(r7, 0x0, 0x0, 0x0, 0x0, 0x0) close(r7) write$P9_RWALK(r2, &(0x7f0000000800)=ANY=[], 0xfffffffffffffec2) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r2, 0x40bc5311, &(0x7f00000006c0)={0x1, 0x3, 'client1\x00', 0xffffffff80000000, "95938c73e3ae1c60", "b60e33c5e30f7b777f75c0d74750b2f0b81551252c1b2ad0eeefbc5bda5fd59c", 0x400, 0x4}) sendto$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) close(r1) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'sit0\x00'}) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x10000, 0x0) ioctl$PPPIOCCONNECT(r9, 0x4004743a, &(0x7f00000000c0)=0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r8, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="2c000000000000650000000000000000000000009a0380c4ad4dda62609df801e558e1f5b573c6356c02d5536a3315022d94280f5cb4544e44fc233232c393b4f83a993d49a1d13e5701aa5121984224d04cd556dbf59ba40f0dd4f9ce2e05c35c7b970ada9c5752a5f1973760bfaeedcefe5660c4242987b02195c9f29e4b0bf15f7ac3bdc1d93b64c6a01268d8c3b156c0e7598be1d9dcba5127145660683b057fef408ad24778bfbcf8bbd26e49da00", @ANYRES32=r10, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r11 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/net/pfkey\x00', 0x128280, 0x0) setsockopt$inet_MCAST_MSFILTER(r11, 0x0, 0x30, &(0x7f0000000400)={0xff, {{0x2, 0x4e23, @loopback}}, 0x1, 0x4, [{{0x2, 0x4e20, @rand_addr=0x22f}}, {{0x2, 0x4e22, @remote}}, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xa}}}, {{0x2, 0x4e22, @multicast2}}]}, 0x290) [ 2962.439067][ T342] ? security_inode_permission+0xdd/0x120 [ 2962.444798][ T342] vfs_mkdir+0x43f/0x610 [ 2962.449046][ T342] do_mkdirat+0x1d7/0x320 [ 2962.453376][ T342] __x64_sys_mkdir+0x60/0x70 [ 2962.457969][ T342] do_syscall_64+0xf7/0x1c0 [ 2962.462473][ T342] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2962.468361][ T342] RIP: 0033:0x458e77 [ 2962.472257][ T342] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2962.491869][ T342] RSP: 002b:00007fddc3987a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2962.500278][ T342] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000458e77 [ 2962.508245][ T342] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 2962.516208][ T342] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2962.524175][ T342] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2962.532142][ T342] R13: 00000000004c8da6 R14: 00000000004e0200 R15: 0000000000000003 05:22:35 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc]}) 05:22:35 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:35 executing program 5 (fault-call:0 fault-nth:37): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2962.662379][ T395] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:22:36 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x6000000}}) [ 2962.716038][ T509] FAULT_INJECTION: forcing a failure. [ 2962.716038][ T509] name failslab, interval 1, probability 0, space 0, times 0 [ 2962.739316][ T395] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2962.769537][ T509] CPU: 0 PID: 509 Comm: syz-executor.5 Not tainted 5.4.0-rc2+ #0 [ 2962.777290][ T509] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2962.787354][ T509] Call Trace: [ 2962.790655][ T509] dump_stack+0x1d8/0x2f8 [ 2962.794997][ T509] should_fail+0x555/0x770 [ 2962.799428][ T509] __should_failslab+0x11a/0x160 [ 2962.804372][ T509] ? tomoyo_encode2+0x273/0x5a0 [ 2962.809220][ T509] should_failslab+0x9/0x20 [ 2962.813726][ T509] __kmalloc+0x7a/0x340 [ 2962.817885][ T509] tomoyo_encode2+0x273/0x5a0 [ 2962.822570][ T509] tomoyo_realpath_from_path+0x769/0x7c0 [ 2962.828209][ T509] tomoyo_path_number_perm+0x166/0x640 [ 2962.833701][ T509] ? rcu_read_lock_sched_held+0x10b/0x170 [ 2962.839429][ T509] ? trace_kmem_cache_free+0xb2/0x110 [ 2962.844811][ T509] tomoyo_path_mkdir+0x9c/0xc0 [ 2962.849580][ T509] security_path_mkdir+0xed/0x170 [ 2962.854612][ T509] do_mkdirat+0x15c/0x320 [ 2962.858949][ T509] __x64_sys_mkdir+0x60/0x70 [ 2962.859034][ T395] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2962.863545][ T509] do_syscall_64+0xf7/0x1c0 [ 2962.863581][ T509] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2962.863592][ T509] RIP: 0033:0x458e77 [ 2962.863603][ T509] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2962.863609][ T509] RSP: 002b:00007fddc3987a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 05:22:36 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}) 05:22:36 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xa, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:36 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x80710000000000, 0x0}) 05:22:36 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x7000000}}) [ 2962.863618][ T509] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000458e77 [ 2962.863624][ T509] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 2962.863630][ T509] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2962.863635][ T509] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2962.863640][ T509] R13: 00000000004c8da6 R14: 00000000004e0200 R15: 0000000000000003 [ 2962.885522][ T509] ERROR: Out of memory at tomoyo_realpath_from_path. 05:22:36 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xb, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2962.991246][ T395] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:22:36 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe]}) 05:22:36 executing program 5 (fault-call:0 fault-nth:38): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 05:22:36 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) shmctl$SHM_UNLOCK(0x0, 0xc) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="2800000010215fba0000000000000000000000ac0b5cd47aa8005e0d396ffe58aa38f80097f07a12e9d376348c5d9936fbf32877bb5e94429a4ccc79f3a6d9fd8a0dcc05c732d5ee80367d5fed4b1e3d88a02c780644", @ANYRES32=0x0, @ANYBLOB="010000000000000008001b0000000000"], 0x28}}, 0x0) 05:22:36 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0xf0500000000000, 0x0}) 05:22:36 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xc, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:36 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x8000000}}) 05:22:36 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}) [ 2963.189869][ T930] FAULT_INJECTION: forcing a failure. [ 2963.189869][ T930] name failslab, interval 1, probability 0, space 0, times 0 05:22:36 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) msgctl$IPC_STAT(0xffffffffffffffff, 0x2, &(0x7f0000000280)=""/206) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 2963.232769][ T930] CPU: 1 PID: 930 Comm: syz-executor.5 Not tainted 5.4.0-rc2+ #0 [ 2963.240530][ T930] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2963.250591][ T930] Call Trace: [ 2963.253891][ T930] dump_stack+0x1d8/0x2f8 [ 2963.258231][ T930] should_fail+0x555/0x770 [ 2963.262653][ T930] __should_failslab+0x11a/0x160 [ 2963.267592][ T930] ? __d_alloc+0x2d/0x6e0 [ 2963.271925][ T930] should_failslab+0x9/0x20 [ 2963.276429][ T930] kmem_cache_alloc+0x56/0x2e0 05:22:36 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0xf0700000000000, 0x0}) 05:22:36 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xd, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2963.281199][ T930] __d_alloc+0x2d/0x6e0 [ 2963.285357][ T930] d_alloc+0x4e/0x1d0 [ 2963.289337][ T930] __lookup_hash+0xe5/0x290 [ 2963.293840][ T930] filename_create+0x14f/0x670 [ 2963.298608][ T930] ? getname_flags+0x214/0x640 [ 2963.303373][ T930] do_mkdirat+0x5a/0x320 [ 2963.307621][ T930] __x64_sys_mkdir+0x60/0x70 [ 2963.312216][ T930] do_syscall_64+0xf7/0x1c0 [ 2963.316730][ T930] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2963.322622][ T930] RIP: 0033:0x458e77 [ 2963.326515][ T930] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2963.346112][ T930] RSP: 002b:00007fddc3987a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2963.354519][ T930] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000458e77 [ 2963.362494][ T930] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 2963.370481][ T930] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2963.378455][ T930] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2963.386420][ T930] R13: 00000000004c8da6 R14: 00000000004e0200 R15: 0000000000000003 05:22:36 executing program 5 (fault-call:0 fault-nth:39): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 05:22:36 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}) 05:22:36 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xe, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2963.531320][ T1074] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2963.577018][ T1256] FAULT_INJECTION: forcing a failure. [ 2963.577018][ T1256] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2963.590248][ T1256] CPU: 0 PID: 1256 Comm: syz-executor.5 Not tainted 5.4.0-rc2+ #0 [ 2963.598044][ T1256] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2963.598051][ T1256] Call Trace: [ 2963.598070][ T1256] dump_stack+0x1d8/0x2f8 [ 2963.598086][ T1256] should_fail+0x555/0x770 [ 2963.611421][ T1256] should_fail_alloc_page+0x55/0x60 [ 2963.611431][ T1256] prepare_alloc_pages+0x283/0x460 [ 2963.611444][ T1256] __alloc_pages_nodemask+0xb2/0x5d0 [ 2963.611463][ T1256] kmem_getpages+0x4d/0xa00 [ 2963.611477][ T1256] cache_grow_begin+0x7e/0x2c0 [ 2963.611491][ T1256] cache_alloc_refill+0x311/0x3f0 [ 2963.611502][ T1256] ? check_preemption_disabled+0xb7/0x2a0 [ 2963.611517][ T1256] __kmalloc+0x318/0x340 [ 2963.611529][ T1256] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 2963.645029][ T1256] tomoyo_realpath_from_path+0xdc/0x7c0 [ 2963.645052][ T1256] tomoyo_path_number_perm+0x166/0x640 [ 2963.645084][ T1256] ? rcu_read_lock_sched_held+0x10b/0x170 [ 2963.682407][ T1256] ? trace_kmem_cache_free+0xb2/0x110 [ 2963.687786][ T1256] tomoyo_path_mkdir+0x9c/0xc0 [ 2963.692557][ T1256] security_path_mkdir+0xed/0x170 [ 2963.697590][ T1256] do_mkdirat+0x15c/0x320 [ 2963.701944][ T1256] __x64_sys_mkdir+0x60/0x70 [ 2963.706531][ T1256] do_syscall_64+0xf7/0x1c0 [ 2963.711034][ T1256] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2963.716915][ T1256] RIP: 0033:0x458e77 [ 2963.716926][ T1256] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2963.716932][ T1256] RSP: 002b:00007fddc3987a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2963.716942][ T1256] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000458e77 [ 2963.716949][ T1256] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 2963.716955][ T1256] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 05:22:37 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0xf0ffffff7f0000, 0x0}) 05:22:37 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12]}) [ 2963.716961][ T1256] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2963.716967][ T1256] R13: 00000000004c8da6 R14: 00000000004e0200 R15: 0000000000000003 05:22:37 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x10, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:37 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x9000000}}) 05:22:37 executing program 5 (fault-call:0 fault-nth:40): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 05:22:37 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25]}) [ 2963.998761][ T1385] FAULT_INJECTION: forcing a failure. [ 2963.998761][ T1385] name failslab, interval 1, probability 0, space 0, times 0 [ 2964.013475][ T1074] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2964.029643][ T1385] CPU: 0 PID: 1385 Comm: syz-executor.5 Not tainted 5.4.0-rc2+ #0 [ 2964.037461][ T1385] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2964.047653][ T1385] Call Trace: [ 2964.050955][ T1385] dump_stack+0x1d8/0x2f8 [ 2964.055299][ T1385] should_fail+0x555/0x770 [ 2964.059726][ T1385] __should_failslab+0x11a/0x160 [ 2964.064665][ T1385] ? kcalloc+0x2f/0x50 [ 2964.068736][ T1385] should_failslab+0x9/0x20 [ 2964.073238][ T1385] __kmalloc+0x7a/0x340 [ 2964.077408][ T1385] kcalloc+0x2f/0x50 [ 2964.081311][ T1385] ext4_find_extent+0x216/0xaa0 [ 2964.086171][ T1385] ? trace_ext4_ext_map_blocks_enter+0x2ca/0x310 [ 2964.092509][ T1385] ext4_ext_map_blocks+0x170/0x7170 [ 2964.097742][ T1385] ? __kasan_check_write+0x14/0x20 [ 2964.102850][ T1385] ? __down_read+0x14b/0x360 [ 2964.107517][ T1385] ext4_map_blocks+0x424/0x1e30 [ 2964.112378][ T1385] ? __kasan_check_write+0x14/0x20 [ 2964.117492][ T1385] ext4_getblk+0xae/0x460 [ 2964.121826][ T1385] ext4_bread+0x4a/0x340 [ 2964.121839][ T1385] ext4_append+0x175/0x310 [ 2964.121854][ T1385] ext4_mkdir+0x7ad/0x1450 [ 2964.121882][ T1385] vfs_mkdir+0x43f/0x610 [ 2964.121898][ T1385] do_mkdirat+0x1d7/0x320 [ 2964.121919][ T1385] __x64_sys_mkdir+0x60/0x70 [ 2964.121933][ T1385] do_syscall_64+0xf7/0x1c0 [ 2964.121948][ T1385] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2964.121959][ T1385] RIP: 0033:0x458e77 [ 2964.162368][ T1385] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2964.181972][ T1385] RSP: 002b:00007fddc3987a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2964.190377][ T1385] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000458e77 [ 2964.198339][ T1385] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 2964.206301][ T1385] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2964.214265][ T1385] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2964.222230][ T1385] R13: 00000000004c8da6 R14: 00000000004e0200 R15: 0000000000000003 [ 2964.267862][ T1495] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:22:37 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) r3 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x2000) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r3, 0xc0505405, &(0x7f0000000080)={{0xfffffffffffffffc, 0x3, 0x80000000, 0x51da79a4ff5376b5, 0x9}, 0x8001, 0x2, 0x2d}) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 05:22:37 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x11, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:37 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c]}) 05:22:37 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x100000000000000, 0x0}) 05:22:37 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0xa000000}}) 05:22:37 executing program 5 (fault-call:0 fault-nth:41): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 05:22:37 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x12, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:37 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)) [ 2964.473563][ T1593] FAULT_INJECTION: forcing a failure. [ 2964.473563][ T1593] name failslab, interval 1, probability 0, space 0, times 0 [ 2964.561319][ T1593] CPU: 1 PID: 1593 Comm: syz-executor.5 Not tainted 5.4.0-rc2+ #0 [ 2964.569168][ T1593] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2964.579223][ T1593] Call Trace: [ 2964.582514][ T1593] dump_stack+0x1d8/0x2f8 [ 2964.586850][ T1593] should_fail+0x555/0x770 [ 2964.591278][ T1593] __should_failslab+0x11a/0x160 [ 2964.596218][ T1593] ? tomoyo_encode2+0x273/0x5a0 [ 2964.601067][ T1593] should_failslab+0x9/0x20 [ 2964.605568][ T1593] __kmalloc+0x7a/0x340 [ 2964.609726][ T1593] tomoyo_encode2+0x273/0x5a0 [ 2964.614407][ T1593] tomoyo_realpath_from_path+0x769/0x7c0 [ 2964.620047][ T1593] tomoyo_path_number_perm+0x166/0x640 [ 2964.625529][ T1593] ? rcu_read_lock_sched_held+0x10b/0x170 [ 2964.631241][ T1593] ? trace_kmem_cache_free+0xb2/0x110 [ 2964.636609][ T1593] tomoyo_path_mkdir+0x9c/0xc0 [ 2964.641371][ T1593] security_path_mkdir+0xed/0x170 [ 2964.646393][ T1593] do_mkdirat+0x15c/0x320 [ 2964.650725][ T1593] __x64_sys_mkdir+0x60/0x70 [ 2964.655309][ T1593] do_syscall_64+0xf7/0x1c0 [ 2964.659817][ T1593] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2964.665705][ T1593] RIP: 0033:0x458e77 [ 2964.669593][ T1593] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2964.689195][ T1593] RSP: 002b:00007fddc3987a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2964.697602][ T1593] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000458e77 05:22:38 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0xb000000}}) 05:22:38 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x25, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:38 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x200000000000000, 0x0}) 05:22:38 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) [ 2964.705566][ T1593] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 2964.713543][ T1593] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2964.721513][ T1593] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2964.729481][ T1593] R13: 00000000004c8da6 R14: 00000000004e0200 R15: 0000000000000003 [ 2964.761584][ T1682] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2964.829395][ T1682] net_ratelimit: 1 callbacks suppressed [ 2964.829401][ T1682] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2964.871175][ T1593] ERROR: Out of memory at tomoyo_realpath_from_path. 05:22:38 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x5c, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:38 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}) 05:22:38 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x300000000000000, 0x0}) 05:22:38 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r3 = socket$inet6(0xa, 0x1, 0x8010000400000084) sendto$inet6(r3, 0x0, 0x0, 0x0, 0x0, 0x0) close(r3) sendto(r3, &(0x7f0000000040)="608d1d69dd2ade5205632c49767598545279a213de11eec152c47e8c4b93c37df2eff510a4f9e6dd4ca5c8b94b8ba8e3504a882e827abd0268c39ca6d2a970c915", 0x41, 0x10080, &(0x7f0000000280)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @loopback}}, 0x80) 05:22:38 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x204, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:38 executing program 5 (fault-call:0 fault-nth:42): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 05:22:38 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}) [ 2965.112988][ T1957] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:22:38 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x400000000000000, 0x0}) [ 2965.170035][ T1957] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2965.204154][ T2062] FAULT_INJECTION: forcing a failure. [ 2965.204154][ T2062] name failslab, interval 1, probability 0, space 0, times 0 [ 2965.248469][ T2062] CPU: 0 PID: 2062 Comm: syz-executor.5 Not tainted 5.4.0-rc2+ #0 [ 2965.256315][ T2062] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2965.266376][ T2062] Call Trace: [ 2965.269674][ T2062] dump_stack+0x1d8/0x2f8 [ 2965.274009][ T2062] should_fail+0x555/0x770 [ 2965.278432][ T2062] __should_failslab+0x11a/0x160 [ 2965.283368][ T2062] ? tomoyo_encode2+0x273/0x5a0 [ 2965.288215][ T2062] should_failslab+0x9/0x20 [ 2965.292717][ T2062] __kmalloc+0x7a/0x340 [ 2965.296877][ T2062] tomoyo_encode2+0x273/0x5a0 [ 2965.301563][ T2062] tomoyo_realpath_from_path+0x769/0x7c0 [ 2965.307207][ T2062] tomoyo_path_number_perm+0x166/0x640 [ 2965.312703][ T2062] ? rcu_read_lock_sched_held+0x10b/0x170 [ 2965.318419][ T2062] ? trace_kmem_cache_free+0xb2/0x110 [ 2965.323796][ T2062] tomoyo_path_mkdir+0x9c/0xc0 [ 2965.328568][ T2062] security_path_mkdir+0xed/0x170 [ 2965.333598][ T2062] do_mkdirat+0x15c/0x320 [ 2965.337940][ T2062] __x64_sys_mkdir+0x60/0x70 [ 2965.342540][ T2062] do_syscall_64+0xf7/0x1c0 [ 2965.347046][ T2062] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2965.352935][ T2062] RIP: 0033:0x458e77 [ 2965.356825][ T2062] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2965.376433][ T2062] RSP: 002b:00007fddc3987a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2965.384842][ T2062] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000458e77 05:22:38 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0xc000000}}) 05:22:38 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x300, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:38 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}) [ 2965.392817][ T2062] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 2965.400791][ T2062] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2965.408756][ T2062] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2965.416722][ T2062] R13: 00000000004c8da6 R14: 00000000004e0200 R15: 0000000000000003 05:22:38 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x402, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:38 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x500000000000000, 0x0}) 05:22:38 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) [ 2965.502424][ T1957] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2965.527793][ T2062] ERROR: Out of memory at tomoyo_realpath_from_path. 05:22:38 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 05:22:38 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x406, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2965.571027][ T1957] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:22:39 executing program 5 (fault-call:0 fault-nth:43): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 05:22:39 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0xd000000}}) 05:22:39 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}) [ 2965.756418][ T2284] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2965.772975][ T2342] FAULT_INJECTION: forcing a failure. [ 2965.772975][ T2342] name failslab, interval 1, probability 0, space 0, times 0 [ 2965.797266][ T2342] CPU: 1 PID: 2342 Comm: syz-executor.5 Not tainted 5.4.0-rc2+ #0 05:22:39 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x600000000000000, 0x0}) [ 2965.805103][ T2342] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2965.815157][ T2342] Call Trace: [ 2965.818455][ T2342] dump_stack+0x1d8/0x2f8 [ 2965.822792][ T2342] should_fail+0x555/0x770 [ 2965.827224][ T2342] __should_failslab+0x11a/0x160 [ 2965.832176][ T2342] ? kcalloc+0x2f/0x50 [ 2965.836245][ T2342] should_failslab+0x9/0x20 [ 2965.840745][ T2342] __kmalloc+0x7a/0x340 [ 2965.844903][ T2342] kcalloc+0x2f/0x50 [ 2965.848803][ T2342] ext4_find_extent+0x216/0xaa0 [ 2965.853652][ T2342] ? trace_ext4_ext_map_blocks_enter+0x2ca/0x310 [ 2965.859978][ T2342] ext4_ext_map_blocks+0x170/0x7170 [ 2965.865203][ T2342] ? __kasan_check_write+0x14/0x20 [ 2965.870308][ T2342] ? __down_read+0x14b/0x360 [ 2965.874914][ T2342] ext4_map_blocks+0x424/0x1e30 [ 2965.879777][ T2342] ? __kasan_check_write+0x14/0x20 [ 2965.884894][ T2342] ext4_getblk+0xae/0x460 [ 2965.889228][ T2342] ext4_bread+0x4a/0x340 [ 2965.893473][ T2342] ext4_append+0x175/0x310 [ 2965.897891][ T2342] ext4_mkdir+0x7ad/0x1450 [ 2965.902333][ T2342] vfs_mkdir+0x43f/0x610 [ 2965.906579][ T2342] do_mkdirat+0x1d7/0x320 [ 2965.911025][ T2342] __x64_sys_mkdir+0x60/0x70 [ 2965.915635][ T2342] do_syscall_64+0xf7/0x1c0 [ 2965.920151][ T2342] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2965.926036][ T2342] RIP: 0033:0x458e77 [ 2965.929928][ T2342] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 05:22:39 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x500, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2965.949530][ T2342] RSP: 002b:00007fddc3987a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2965.957935][ T2342] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000458e77 [ 2965.965903][ T2342] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 2965.973868][ T2342] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2965.981837][ T2342] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2965.989804][ T2342] R13: 00000000004c8da6 R14: 00000000004e0200 R15: 0000000000000003 [ 2966.029378][ T2284] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:22:39 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}) 05:22:39 executing program 5 (fault-call:0 fault-nth:44): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 05:22:39 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x600, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:39 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0xe000000}}) [ 2966.163802][ T2284] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:22:39 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x700000000000000, 0x0}) [ 2966.214028][ T2614] FAULT_INJECTION: forcing a failure. [ 2966.214028][ T2614] name failslab, interval 1, probability 0, space 0, times 0 [ 2966.284525][ T2614] CPU: 0 PID: 2614 Comm: syz-executor.5 Not tainted 5.4.0-rc2+ #0 [ 2966.292376][ T2614] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2966.302435][ T2614] Call Trace: [ 2966.305736][ T2614] dump_stack+0x1d8/0x2f8 [ 2966.310084][ T2614] should_fail+0x555/0x770 [ 2966.314512][ T2614] __should_failslab+0x11a/0x160 [ 2966.319453][ T2614] ? ext4_mb_new_blocks+0x2ac/0x2cc0 [ 2966.324741][ T2614] should_failslab+0x9/0x20 [ 2966.329244][ T2614] kmem_cache_alloc+0x56/0x2e0 [ 2966.334011][ T2614] ext4_mb_new_blocks+0x2ac/0x2cc0 [ 2966.339128][ T2614] ? trace_kmalloc+0xcd/0x130 [ 2966.343808][ T2614] ? kcalloc+0x2f/0x50 [ 2966.347878][ T2614] ? __kmalloc+0x26c/0x340 [ 2966.352296][ T2614] ? kcalloc+0x2f/0x50 [ 2966.356373][ T2614] ? ext4_ext_search_right+0x4cb/0x940 [ 2966.361834][ T2614] ? ext4_find_extent+0x8e0/0xaa0 [ 2966.366881][ T2614] ? ext4_inode_to_goal_block+0x27b/0x3b0 [ 2966.372601][ T2614] ext4_ext_map_blocks+0x4b8c/0x7170 [ 2966.377884][ T2614] ? perf_trace_lock_acquire+0x97/0x3b0 [ 2966.383471][ T2614] ext4_map_blocks+0x8f4/0x1e30 [ 2966.388336][ T2614] ? __kasan_check_write+0x14/0x20 [ 2966.393448][ T2614] ext4_getblk+0xae/0x460 [ 2966.397789][ T2614] ext4_bread+0x4a/0x340 [ 2966.402031][ T2614] ext4_append+0x175/0x310 [ 2966.406449][ T2614] ext4_mkdir+0x7ad/0x1450 [ 2966.410884][ T2614] vfs_mkdir+0x43f/0x610 [ 2966.415134][ T2614] do_mkdirat+0x1d7/0x320 [ 2966.419466][ T2614] __x64_sys_mkdir+0x60/0x70 [ 2966.424061][ T2614] do_syscall_64+0xf7/0x1c0 [ 2966.428569][ T2614] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2966.434456][ T2614] RIP: 0033:0x458e77 [ 2966.438345][ T2614] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2966.457946][ T2614] RSP: 002b:00007fddc3987a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2966.466359][ T2614] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000458e77 [ 2966.474331][ T2614] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 2966.482294][ T2614] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2966.490261][ T2614] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2966.498223][ T2614] R13: 00000000004c8da6 R14: 00000000004e0200 R15: 0000000000000003 [ 2966.519637][ T2284] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:22:39 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}) 05:22:39 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x604, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:39 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x800000000000000, 0x0}) 05:22:39 executing program 5 (fault-call:0 fault-nth:45): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 05:22:40 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x10000000}}) 05:22:40 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x700, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:40 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}) 05:22:40 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = syz_open_dev$mouse(&(0x7f00000005c0)='/dev/input/mouse#\x00', 0x6, 0x6d1f7e407131c52) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f0000000600)={0x0, 0x6000}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r3, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r4, 0x0) write$P9_RWALK(r4, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) ioctl$RTC_IRQP_SET(r4, 0x4008700c, 0xabb) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) r6 = socket$inet_tcp(0x2, 0x1, 0x0) fstat(r6, &(0x7f00000002c0)) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r6, 0x40106614, 0x0) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000280)={{{@in=@initdev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0xe8) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r8, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)={0x28, r9, 0x101, 0x0, 0x0, {0x6}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}}, 0x0) sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x40200000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x40, r9, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x5}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x1}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x623}]}, 0x40}, 0x1, 0x0, 0x0, 0x10}, 0x2000000) sendmsg$nl_route(r5, &(0x7f0000000480)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2004}, 0xc, &(0x7f0000000380)={&(0x7f0000000400)=@setlink={0x58, 0x13, 0x4, 0x70bd28, 0x25dfdbff, {0x0, 0x0, 0x0, r7, 0x40000, 0x100}, [@IFLA_TXQLEN={0x8, 0xd, 0x200}, @IFLA_LINKINFO={0x1c, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0xc, 0x2, [@IFLA_IPTUN_PROTO={0x8}]}}}, @IFLA_WEIGHT={0x8, 0xf, 0x92}, @IFLA_ADDRESS={0xc, 0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe90b74518c13a73e}}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000060}, 0x400c040) [ 2966.694805][ T2840] FAULT_INJECTION: forcing a failure. [ 2966.694805][ T2840] name failslab, interval 1, probability 0, space 0, times 0 [ 2966.782729][ T2840] CPU: 0 PID: 2840 Comm: syz-executor.5 Not tainted 5.4.0-rc2+ #0 [ 2966.790623][ T2840] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2966.800713][ T2840] Call Trace: [ 2966.804023][ T2840] dump_stack+0x1d8/0x2f8 [ 2966.808367][ T2840] should_fail+0x555/0x770 [ 2966.812797][ T2840] __should_failslab+0x11a/0x160 [ 2966.817740][ T2840] ? smack_inode_init_security+0x3cf/0x490 [ 2966.823553][ T2840] should_failslab+0x9/0x20 [ 2966.828058][ T2840] __kmalloc_track_caller+0x79/0x340 [ 2966.833353][ T2840] kstrdup+0x34/0x70 [ 2966.837258][ T2840] smack_inode_init_security+0x3cf/0x490 [ 2966.842909][ T2840] security_inode_init_security+0xfe/0x310 [ 2966.848718][ T2840] ? ext4_init_security+0x40/0x40 [ 2966.853759][ T2840] ext4_init_security+0x34/0x40 [ 2966.858627][ T2840] __ext4_new_inode+0x446c/0x5650 [ 2966.863689][ T2840] ? smk_curacc+0xa3/0xe0 [ 2966.868020][ T2840] ext4_mkdir+0x3f5/0x1450 [ 2966.872450][ T2840] ? security_inode_permission+0xdd/0x120 [ 2966.878180][ T2840] vfs_mkdir+0x43f/0x610 [ 2966.882518][ T2840] do_mkdirat+0x1d7/0x320 [ 2966.886860][ T2840] __x64_sys_mkdir+0x60/0x70 [ 2966.891454][ T2840] do_syscall_64+0xf7/0x1c0 [ 2966.896219][ T2840] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2966.902120][ T2840] RIP: 0033:0x458e77 [ 2966.906036][ T2840] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 05:22:40 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x11000000}}) 05:22:40 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x900, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:40 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x900000000000000, 0x0}) [ 2966.925746][ T2840] RSP: 002b:00007fddc3987a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2966.934164][ T2840] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000458e77 [ 2966.942187][ T2840] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 2966.950157][ T2840] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2966.958122][ T2840] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2966.966087][ T2840] R13: 00000000004c8da6 R14: 00000000004e0200 R15: 0000000000000003 05:22:40 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb]}) 05:22:40 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xa00, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:40 executing program 5 (fault-call:0 fault-nth:46): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2967.061707][ T2898] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2967.099905][ T2898] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:22:40 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc]}) 05:22:40 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x12000000}}) [ 2967.137310][ T3371] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 05:22:40 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0xa00000000000000, 0x0}) 05:22:40 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}) 05:22:40 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xb00, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2967.254616][ T3439] FAULT_INJECTION: forcing a failure. [ 2967.254616][ T3439] name failslab, interval 1, probability 0, space 0, times 0 [ 2967.271181][ T2898] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2967.321600][ T3439] CPU: 1 PID: 3439 Comm: syz-executor.5 Not tainted 5.4.0-rc2+ #0 [ 2967.329450][ T3439] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2967.339498][ T3439] Call Trace: [ 2967.339518][ T3439] dump_stack+0x1d8/0x2f8 [ 2967.339534][ T3439] should_fail+0x555/0x770 [ 2967.339551][ T3439] __should_failslab+0x11a/0x160 [ 2967.339566][ T3439] ? kcalloc+0x2f/0x50 [ 2967.356463][ T3439] should_failslab+0x9/0x20 [ 2967.356477][ T3439] __kmalloc+0x7a/0x340 [ 2967.356493][ T3439] kcalloc+0x2f/0x50 [ 2967.373044][ T3439] ext4_find_extent+0x216/0xaa0 [ 2967.377909][ T3439] ? trace_ext4_ext_map_blocks_enter+0x2ca/0x310 [ 2967.380382][ T2898] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2967.384237][ T3439] ext4_ext_map_blocks+0x170/0x7170 [ 2967.384278][ T3439] ? __kasan_check_write+0x14/0x20 [ 2967.409899][ T3439] ? __down_read+0x14b/0x360 [ 2967.414499][ T3439] ext4_map_blocks+0x424/0x1e30 05:22:40 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) 05:22:40 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe]}) [ 2967.419364][ T3439] ? __kasan_check_write+0x14/0x20 [ 2967.424478][ T3439] ext4_getblk+0xae/0x460 [ 2967.428816][ T3439] ext4_bread+0x4a/0x340 [ 2967.433063][ T3439] ext4_append+0x175/0x310 [ 2967.437493][ T3439] ext4_mkdir+0x7ad/0x1450 [ 2967.441933][ T3439] vfs_mkdir+0x43f/0x610 [ 2967.446186][ T3439] do_mkdirat+0x1d7/0x320 [ 2967.450526][ T3439] __x64_sys_mkdir+0x60/0x70 [ 2967.457115][ T3439] do_syscall_64+0xf7/0x1c0 [ 2967.461627][ T3439] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2967.467515][ T3439] RIP: 0033:0x458e77 [ 2967.471399][ T3439] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2967.490995][ T3439] RSP: 002b:00007fddc3987a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2967.499402][ T3439] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000458e77 [ 2967.507370][ T3439] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 05:22:40 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xc00, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:40 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0xb00000000000000, 0x0}) [ 2967.515332][ T3439] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2967.523294][ T3439] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2967.531256][ T3439] R13: 00000000004c8da6 R14: 00000000004e0200 R15: 0000000000000003 05:22:41 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x25000000}}) 05:22:41 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xd00, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:41 executing program 5 (fault-call:0 fault-nth:47): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 05:22:41 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}) [ 2967.727922][ T3648] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:22:41 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0xc00000000000000, 0x0}) 05:22:41 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xe00, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2967.793603][ T3648] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2967.850918][ T3786] FAULT_INJECTION: forcing a failure. [ 2967.850918][ T3786] name failslab, interval 1, probability 0, space 0, times 0 [ 2967.864139][ T3786] CPU: 0 PID: 3786 Comm: syz-executor.5 Not tainted 5.4.0-rc2+ #0 [ 2967.871950][ T3786] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2967.882009][ T3786] Call Trace: [ 2967.885308][ T3786] dump_stack+0x1d8/0x2f8 [ 2967.889647][ T3786] should_fail+0x555/0x770 [ 2967.894073][ T3786] __should_failslab+0x11a/0x160 [ 2967.899022][ T3786] ? __es_insert_extent+0x7ba/0x17c0 [ 2967.904314][ T3786] should_failslab+0x9/0x20 [ 2967.908820][ T3786] kmem_cache_alloc+0x56/0x2e0 [ 2967.913600][ T3786] __es_insert_extent+0x7ba/0x17c0 [ 2967.918727][ T3786] ? __kasan_check_write+0x14/0x20 [ 2967.923847][ T3786] ? do_raw_write_lock+0xf3/0x460 [ 2967.928883][ T3786] ext4_es_insert_extent+0x250/0x2ea0 [ 2967.934272][ T3786] ext4_ext_map_blocks+0x1806/0x7170 [ 2967.939576][ T3786] ? __down_read+0x14b/0x360 [ 2967.944176][ T3786] ext4_map_blocks+0x424/0x1e30 05:22:41 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}) 05:22:41 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1100, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2967.949043][ T3786] ? __kasan_check_write+0x14/0x20 [ 2967.954169][ T3786] ext4_getblk+0xae/0x460 [ 2967.958510][ T3786] ext4_bread+0x4a/0x340 [ 2967.962754][ T3786] ext4_append+0x175/0x310 [ 2967.967244][ T3786] ext4_mkdir+0x7ad/0x1450 [ 2967.971692][ T3786] vfs_mkdir+0x43f/0x610 [ 2967.975943][ T3786] do_mkdirat+0x1d7/0x320 [ 2967.980281][ T3786] __x64_sys_mkdir+0x60/0x70 [ 2967.984875][ T3786] do_syscall_64+0xf7/0x1c0 [ 2967.989385][ T3786] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2967.995269][ T3786] RIP: 0033:0x458e77 [ 2967.999166][ T3786] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2968.018764][ T3786] RSP: 002b:00007fddc3987a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2968.018776][ T3786] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000458e77 [ 2968.018782][ T3786] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 2968.018788][ T3786] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2968.018793][ T3786] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2968.018800][ T3786] R13: 00000000004c8da6 R14: 00000000004e0200 R15: 0000000000000003 05:22:41 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) r3 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x5, 0x800) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x9) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000081ff4bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 05:22:41 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1200, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:41 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0xd00000000000000, 0x0}) 05:22:41 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12]}) 05:22:41 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x3f000000}}) 05:22:41 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0xe00000000000000, 0x0}) [ 2968.390018][ T4012] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2968.479867][ T4012] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:22:41 executing program 5 (fault-call:0 fault-nth:48): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 05:22:41 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2500, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:41 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25]}) 05:22:41 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x1000000000000000, 0x0}) 05:22:41 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x40000000}}) 05:22:41 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 05:22:42 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x3f00, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:42 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c]}) [ 2968.695866][ T4305] FAULT_INJECTION: forcing a failure. [ 2968.695866][ T4305] name failslab, interval 1, probability 0, space 0, times 0 [ 2968.742613][ T4318] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2968.766778][ T4305] CPU: 1 PID: 4305 Comm: syz-executor.5 Not tainted 5.4.0-rc2+ #0 [ 2968.774626][ T4305] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2968.784682][ T4305] Call Trace: [ 2968.787982][ T4305] dump_stack+0x1d8/0x2f8 [ 2968.792322][ T4305] should_fail+0x555/0x770 [ 2968.796745][ T4305] __should_failslab+0x11a/0x160 [ 2968.801683][ T4305] ? ext4_mb_new_blocks+0x2ac/0x2cc0 [ 2968.806987][ T4305] should_failslab+0x9/0x20 [ 2968.811491][ T4305] kmem_cache_alloc+0x56/0x2e0 [ 2968.816258][ T4305] ext4_mb_new_blocks+0x2ac/0x2cc0 [ 2968.821368][ T4305] ? trace_kmalloc+0xcd/0x130 [ 2968.826041][ T4305] ? kcalloc+0x2f/0x50 [ 2968.830117][ T4305] ? __kmalloc+0x26c/0x340 [ 2968.834533][ T4305] ? kcalloc+0x2f/0x50 [ 2968.838612][ T4305] ? ext4_ext_search_right+0x4cb/0x940 [ 2968.844071][ T4305] ? ext4_find_extent+0x8e0/0xaa0 [ 2968.847802][ T4470] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2968.849090][ T4305] ? ext4_inode_to_goal_block+0x27b/0x3b0 [ 2968.849106][ T4305] ext4_ext_map_blocks+0x4b8c/0x7170 [ 2968.849122][ T4305] ? perf_trace_lock_acquire+0x97/0x3b0 [ 2968.849162][ T4305] ext4_map_blocks+0x8f4/0x1e30 [ 2968.877683][ T4305] ? __kasan_check_write+0x14/0x20 [ 2968.877703][ T4305] ext4_getblk+0xae/0x460 [ 2968.877721][ T4305] ext4_bread+0x4a/0x340 [ 2968.891361][ T4305] ext4_append+0x175/0x310 [ 2968.895777][ T4305] ext4_mkdir+0x7ad/0x1450 [ 2968.900208][ T4305] vfs_mkdir+0x43f/0x610 [ 2968.904453][ T4305] do_mkdirat+0x1d7/0x320 [ 2968.908781][ T4305] __x64_sys_mkdir+0x60/0x70 [ 2968.913370][ T4305] do_syscall_64+0xf7/0x1c0 [ 2968.917874][ T4305] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2968.923767][ T4305] RIP: 0033:0x458e77 [ 2968.927655][ T4305] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2968.947257][ T4305] RSP: 002b:00007fddc3987a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2968.955766][ T4305] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000458e77 [ 2968.963737][ T4305] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 2968.971713][ T4305] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2968.979684][ T4305] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 05:22:42 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:42 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x48000000}}) 05:22:42 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x1100000000000000, 0x0}) [ 2968.987651][ T4305] R13: 00000000004c8da6 R14: 00000000004e0200 R15: 0000000000000003 [ 2969.042976][ T4470] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:22:42 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)) [ 2969.143676][ T4470] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 05:22:42 executing program 5 (fault-call:0 fault-nth:49): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 05:22:42 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x5c00, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:42 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x4c000000}}) 05:22:42 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 05:22:42 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x1200000000000000, 0x0}) 05:22:42 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RWALK(r1, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) ioctl$IOC_PR_PREEMPT_ABORT(r1, 0x401870cc, &(0x7f0000000040)={0x5, 0x2, 0x6, 0x6}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) execveat(r1, &(0x7f0000000080)='./bus\x00', &(0x7f0000000380)=[&(0x7f00000000c0)='sit0\x00', &(0x7f0000000280)='\x00', &(0x7f00000002c0)='sit0\x00', &(0x7f0000000300)='[\x00', &(0x7f0000000340)='sit0\x00'], &(0x7f0000000500)=[&(0x7f0000000400)='sit0\x00', &(0x7f0000000440)='sit0\x00', &(0x7f0000000480)='sit0\x00', &(0x7f00000004c0)='sit0\x00'], 0x1000) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00'}) r3 = socket$inet6(0xa, 0x1, 0x8010000400000084) sendto$inet6(r3, 0x0, 0x0, 0x0, 0x0, 0x0) close(r3) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r3, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x3}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 05:22:42 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}) 05:22:42 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x20000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2969.397970][ T4733] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:22:42 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x2000000000000000, 0x0}) 05:22:42 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x5c000000}}) 05:22:42 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}) 05:22:42 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2969.676622][ T4948] FAULT_INJECTION: forcing a failure. [ 2969.676622][ T4948] name failslab, interval 1, probability 0, space 0, times 0 [ 2969.771543][ T4948] CPU: 1 PID: 4948 Comm: syz-executor.5 Not tainted 5.4.0-rc2+ #0 [ 2969.779384][ T4948] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2969.789438][ T4948] Call Trace: [ 2969.792733][ T4948] dump_stack+0x1d8/0x2f8 [ 2969.797065][ T4948] should_fail+0x555/0x770 [ 2969.801491][ T4948] __should_failslab+0x11a/0x160 [ 2969.806426][ T4948] should_failslab+0x9/0x20 [ 2969.810921][ T4948] kmem_cache_alloc_trace+0x5d/0x2f0 [ 2969.816203][ T4948] ? smack_d_instantiate+0x962/0xd70 [ 2969.821491][ T4948] smack_d_instantiate+0x962/0xd70 [ 2969.826600][ T4948] ? lockdep_init_map+0x2a/0x680 [ 2969.831529][ T4948] security_d_instantiate+0xa5/0x100 [ 2969.836807][ T4948] d_instantiate_new+0x65/0x120 [ 2969.841650][ T4948] ext4_mkdir+0xfa9/0x1450 [ 2969.846081][ T4948] vfs_mkdir+0x43f/0x610 [ 2969.850324][ T4948] do_mkdirat+0x1d7/0x320 [ 2969.854657][ T4948] __x64_sys_mkdir+0x60/0x70 [ 2969.859250][ T4948] do_syscall_64+0xf7/0x1c0 [ 2969.863756][ T4948] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2969.869649][ T4948] RIP: 0033:0x458e77 [ 2969.873556][ T4948] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2969.893165][ T4948] RSP: 002b:00007fddc3987a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2969.901574][ T4948] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000458e77 [ 2969.909536][ T4948] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 2969.917500][ T4948] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2969.925562][ T4948] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2969.933526][ T4948] R13: 00000000004c8da6 R14: 00000000004e0200 R15: 0000000000000003 05:22:43 executing program 5 (fault-call:0 fault-nth:50): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 05:22:43 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) sendmsg$nl_crypto(r1, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8814001}, 0xc, &(0x7f0000000080)={&(0x7f0000000280)=@alg={0x100, 0x10, 0x4, 0x70bd2a, 0x25dfdbfe, {{'xts-aes-neon\x00'}, [], [], 0x400}, [{0x8, 0x1, 0x8000}, {0x8, 0x1, 0xd01}, {0x8, 0x1, 0x7}, {0x8, 0x1, 0x1}]}, 0x100}, 0x1, 0x0, 0x0, 0x40}, 0x800) 05:22:43 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}) 05:22:43 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:43 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x2500000000000000, 0x0}) 05:22:43 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x68000000}}) 05:22:43 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:43 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) [ 2970.170091][ T5214] FAULT_INJECTION: forcing a failure. [ 2970.170091][ T5214] name failslab, interval 1, probability 0, space 0, times 0 [ 2970.185497][ T5167] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:22:43 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x3f00000000000000, 0x0}) [ 2970.244341][ T5214] CPU: 1 PID: 5214 Comm: syz-executor.5 Not tainted 5.4.0-rc2+ #0 [ 2970.252175][ T5214] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2970.262279][ T5214] Call Trace: [ 2970.265582][ T5214] dump_stack+0x1d8/0x2f8 [ 2970.269923][ T5214] should_fail+0x555/0x770 [ 2970.274337][ T5214] __should_failslab+0x11a/0x160 [ 2970.274353][ T5214] should_failslab+0x9/0x20 [ 2970.274365][ T5214] kmem_cache_alloc_trace+0x5d/0x2f0 [ 2970.274376][ T5214] ? smack_d_instantiate+0xabf/0xd70 [ 2970.274392][ T5214] smack_d_instantiate+0xabf/0xd70 [ 2970.288314][ T5167] net_ratelimit: 1 callbacks suppressed [ 2970.288320][ T5167] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2970.289062][ T5214] ? lockdep_init_map+0x2a/0x680 [ 2970.325357][ T5214] security_d_instantiate+0xa5/0x100 [ 2970.330645][ T5214] d_instantiate_new+0x65/0x120 [ 2970.335496][ T5214] ext4_mkdir+0xfa9/0x1450 [ 2970.339934][ T5214] vfs_mkdir+0x43f/0x610 [ 2970.344184][ T5214] do_mkdirat+0x1d7/0x320 [ 2970.348515][ T5214] __x64_sys_mkdir+0x60/0x70 [ 2970.353106][ T5214] do_syscall_64+0xf7/0x1c0 [ 2970.357623][ T5214] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2970.363511][ T5214] RIP: 0033:0x458e77 [ 2970.367401][ T5214] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2970.386997][ T5214] RSP: 002b:00007fddc3987a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2970.395400][ T5214] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000458e77 [ 2970.403366][ T5214] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 2970.411333][ T5214] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2970.419297][ T5214] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2970.427258][ T5214] R13: 00000000004c8da6 R14: 00000000004e0200 R15: 0000000000000003 05:22:43 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x6c000000}}) 05:22:43 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2040000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2970.491461][ T5167] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:22:43 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}) [ 2970.569506][ T5167] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:22:44 executing program 5 (fault-call:0 fault-nth:51): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 05:22:44 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x4000000000000000, 0x0}) 05:22:44 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x3000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:44 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x3, 0xc0000) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x10007ff) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'sit0\x00'}) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, &(0x7f0000000080)={0xccec, 0x1}) r3 = socket$inet6(0xa, 0x1, 0x8010000400000084) sendto$inet6(r3, 0x0, 0x0, 0x0, 0x0, 0x0) close(r3) setsockopt$inet6_mtu(r3, 0x29, 0x17, &(0x7f0000000280), 0x4) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f00000000c0)={0x0, @aes128}) setsockopt$sock_int(r2, 0x1, 0x21, &(0x7f0000000040)=0x4, 0x4) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'sit0\x00'}) r5 = socket$inet6(0xa, 0x1, 0x8010000400000084) sendto$inet6(r5, 0x0, 0x0, 0x0, 0x0, 0x0) close(r5) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYRES16=r5, @ANYBLOB='$', @ANYRES64=0x0, @ANYRES64=r5], 0x4}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 05:22:44 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}) [ 2970.779841][ T5604] FAULT_INJECTION: forcing a failure. [ 2970.779841][ T5604] name failslab, interval 1, probability 0, space 0, times 0 05:22:44 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:44 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}) [ 2970.849346][ T5604] CPU: 0 PID: 5604 Comm: syz-executor.5 Not tainted 5.4.0-rc2+ #0 [ 2970.853646][ T5600] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2970.857189][ T5604] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2970.857195][ T5604] Call Trace: [ 2970.857214][ T5604] dump_stack+0x1d8/0x2f8 [ 2970.857231][ T5604] should_fail+0x555/0x770 [ 2970.857250][ T5604] __should_failslab+0x11a/0x160 [ 2970.857265][ T5604] should_failslab+0x9/0x20 [ 2970.891435][ T5604] kmem_cache_alloc_trace+0x5d/0x2f0 [ 2970.891448][ T5604] ? smack_d_instantiate+0x962/0xd70 [ 2970.891463][ T5604] smack_d_instantiate+0x962/0xd70 [ 2970.891480][ T5604] ? lockdep_init_map+0x2a/0x680 [ 2970.891494][ T5604] security_d_instantiate+0xa5/0x100 [ 2970.891506][ T5604] d_instantiate_new+0x65/0x120 [ 2970.891520][ T5604] ext4_mkdir+0xfa9/0x1450 [ 2970.891550][ T5604] vfs_mkdir+0x43f/0x610 [ 2970.891566][ T5604] do_mkdirat+0x1d7/0x320 [ 2970.891581][ T5604] __x64_sys_mkdir+0x60/0x70 [ 2970.891597][ T5604] do_syscall_64+0xf7/0x1c0 [ 2970.931549][ T5604] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2970.931560][ T5604] RIP: 0033:0x458e77 [ 2970.931570][ T5604] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2970.931577][ T5604] RSP: 002b:00007fddc3987a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2970.931586][ T5604] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000458e77 05:22:44 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x4800000000000000, 0x0}) 05:22:44 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}) [ 2970.931592][ T5604] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 2970.931597][ T5604] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2970.931602][ T5604] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2970.931608][ T5604] R13: 00000000004c8da6 R14: 00000000004e0200 R15: 0000000000000003 [ 2971.139716][ T5600] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:22:44 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x74000000}}) 05:22:44 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x5000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:44 executing program 5 (fault-call:0 fault-nth:52): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 05:22:44 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb]}) 05:22:44 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0xec46eec8c965e23b) ioctl$PPPIOCSCOMPRESS(r0, 0x4010744d) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000adca7c1986983e615b5ba6dc2a46be565fba754f7eb6e8ab5ffa1690bb1704b755d1cca98df0c0d892d4480bcebcf9975072fb56d071dce7bce9293d8224a7d304ebc2088d20bcc58f52597c72057d533f234eb6f9091c4e80c7ed9b5b94181557", @ANYRES32=r3, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x22, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x10}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 05:22:44 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x4c00000000000000, 0x0}) [ 2971.296545][ T5804] FAULT_INJECTION: forcing a failure. [ 2971.296545][ T5804] name failslab, interval 1, probability 0, space 0, times 0 [ 2971.350142][ T5804] CPU: 1 PID: 5804 Comm: syz-executor.5 Not tainted 5.4.0-rc2+ #0 [ 2971.357993][ T5804] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2971.368047][ T5804] Call Trace: [ 2971.371342][ T5804] dump_stack+0x1d8/0x2f8 [ 2971.375684][ T5804] should_fail+0x555/0x770 [ 2971.380107][ T5804] __should_failslab+0x11a/0x160 [ 2971.385050][ T5804] should_failslab+0x9/0x20 [ 2971.389558][ T5804] kmem_cache_alloc_node+0x65/0x280 [ 2971.395014][ T5804] ? create_task_io_context+0x32/0x3e0 [ 2971.400481][ T5804] create_task_io_context+0x32/0x3e0 [ 2971.405764][ T5804] ? generic_make_request_checks+0x14f1/0x1a60 [ 2971.410818][ T5932] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2971.411915][ T5804] generic_make_request_checks+0x1501/0x1a60 [ 2971.427176][ T5804] ? rcu_lock_release+0xd/0x30 [ 2971.431942][ T5804] generic_make_request+0x33/0x980 [ 2971.437055][ T5804] ? rcu_lock_release+0xd/0x30 [ 2971.441821][ T5804] submit_bio+0x26b/0x540 [ 2971.446152][ T5804] ? guard_bio_eod+0x2a0/0x640 [ 2971.450926][ T5804] submit_bh_wbc+0x619/0x700 [ 2971.455528][ T5804] __sync_dirty_buffer+0x1a2/0x2d0 [ 2971.457177][ T5933] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2971.460637][ T5804] sync_dirty_buffer+0x1a/0x20 [ 2971.460651][ T5804] __ext4_handle_dirty_metadata+0x154/0x870 [ 2971.460662][ T5804] ? __ext4_journal_get_create_access+0x42/0x290 [ 2971.460681][ T5804] ext4_getblk+0x38d/0x460 [ 2971.460701][ T5804] ext4_bread+0x4a/0x340 [ 2971.495451][ T5804] ext4_append+0x175/0x310 [ 2971.499882][ T5804] ext4_mkdir+0x7ad/0x1450 [ 2971.504318][ T5804] vfs_mkdir+0x43f/0x610 [ 2971.508567][ T5804] do_mkdirat+0x1d7/0x320 [ 2971.512900][ T5804] __x64_sys_mkdir+0x60/0x70 [ 2971.517487][ T5804] do_syscall_64+0xf7/0x1c0 [ 2971.521988][ T5804] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2971.527875][ T5804] RIP: 0033:0x458e77 [ 2971.531760][ T5804] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 05:22:44 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc]}) 05:22:44 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x6000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:44 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x7a000000}}) [ 2971.551357][ T5804] RSP: 002b:00007fddc3987a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2971.559765][ T5804] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000458e77 [ 2971.567729][ T5804] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 2971.575692][ T5804] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2971.583657][ T5804] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2971.591619][ T5804] R13: 00000000004c8da6 R14: 00000000004e0200 R15: 0000000000000003 [ 2971.606441][ T5932] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 05:22:45 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}) 05:22:45 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000400000084) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f0000000300)=0xc) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) fstat(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f00000000c0)='fuse\x00', 0x20000, &(0x7f00000004c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r6}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0xffffffffffffb979}}, {@default_permissions='default_permissions'}], [{@uid_gt={'uid>', r6}}]}}) setresuid(r3, r4, r6) sendto$inet6(r2, 0x0, 0x0, 0x0, 0x0, 0x0) close(r2) getsockopt$inet6_dccp_int(r2, 0x21, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r7, @ANYBLOB="d19c8207fe8000000000009b60a70000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d335ec73e0cca4b881954a5bfe40407e77b474a4d305dc6f0"], 0x2c}}, 0x0) r8 = socket$inet6(0xa, 0x3, 0x7) r9 = socket(0x100000000011, 0x2, 0x0) bind(r9, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r9, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$inet6_mreq(r8, 0x29, 0x1b, &(0x7f0000000000)={@remote, r10}, 0x14) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="2800000010005fba00ff000000000010a3a40000000000", @ANYRES32=r10, @ANYBLOB="010000008000000008001b0000000000"], 0x28}}, 0x0) 05:22:45 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x6040000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:45 executing program 5 (fault-call:0 fault-nth:53): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 05:22:45 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x5c00000000000000, 0x0}) 05:22:45 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0xc3ffffff}}) 05:22:45 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe]}) [ 2971.815487][ T6148] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 05:22:45 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2971.878192][ T6153] FAULT_INJECTION: forcing a failure. [ 2971.878192][ T6153] name failslab, interval 1, probability 0, space 0, times 0 [ 2971.886117][ T6148] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2971.949519][ T6153] CPU: 0 PID: 6153 Comm: syz-executor.5 Not tainted 5.4.0-rc2+ #0 [ 2971.957371][ T6153] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2971.967446][ T6153] Call Trace: [ 2971.970755][ T6153] dump_stack+0x1d8/0x2f8 [ 2971.975100][ T6153] should_fail+0x555/0x770 [ 2971.979618][ T6153] __should_failslab+0x11a/0x160 [ 2971.984561][ T6153] ? mempool_alloc_slab+0x4d/0x70 [ 2971.989592][ T6153] should_failslab+0x9/0x20 [ 2971.994100][ T6153] kmem_cache_alloc+0x56/0x2e0 [ 2971.998874][ T6153] mempool_alloc_slab+0x4d/0x70 [ 2972.003731][ T6153] ? mempool_free+0x350/0x350 [ 2972.008420][ T6153] mempool_alloc+0x104/0x5e0 [ 2972.013016][ T6153] ? rcu_lock_release+0x4/0x20 [ 2972.017862][ T6153] bio_alloc_bioset+0x1b0/0x5f0 [ 2972.022726][ T6153] submit_bh_wbc+0x1d5/0x700 [ 2972.027327][ T6153] __sync_dirty_buffer+0x1a2/0x2d0 [ 2972.032443][ T6153] sync_dirty_buffer+0x1a/0x20 [ 2972.037204][ T6153] __ext4_handle_dirty_metadata+0x154/0x870 [ 2972.043106][ T6153] ext4_handle_dirty_dirblock+0x32c/0x690 05:22:45 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0xfdfdffff}}) [ 2972.048842][ T6153] add_dirent_to_buf+0x9d4/0xc50 [ 2972.053793][ T6153] ext4_add_entry+0x24d6/0x3e70 [ 2972.058654][ T6153] ? __kasan_check_write+0x14/0x20 [ 2972.063793][ T6153] ? ext4_mark_inode_dirty+0x216/0x700 [ 2972.069263][ T6153] ext4_mkdir+0xd03/0x1450 [ 2972.073705][ T6153] vfs_mkdir+0x43f/0x610 [ 2972.077963][ T6153] do_mkdirat+0x1d7/0x320 [ 2972.082304][ T6153] __x64_sys_mkdir+0x60/0x70 [ 2972.086896][ T6153] do_syscall_64+0xf7/0x1c0 [ 2972.091408][ T6153] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2972.097299][ T6153] RIP: 0033:0x458e77 [ 2972.101193][ T6153] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2972.121580][ T6153] RSP: 002b:00007fddc3987a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2972.129995][ T6153] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000458e77 [ 2972.137970][ T6153] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 05:22:45 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}) [ 2972.145945][ T6153] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2972.153916][ T6153] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2972.161891][ T6153] R13: 00000000004c8da6 R14: 00000000004e0200 R15: 0000000000000003 [ 2972.174943][ T6398] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 05:22:45 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x6000000000000000, 0x0}) 05:22:45 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x8000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2972.194050][ T6155] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 05:22:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000400000084) sendto$inet6(r2, 0x0, 0x0, 0x0, 0x0, 0x0) close(r2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'siT0\x00\x00\x00\x00\b\x00\x00\x00\x00\x00#\x00'}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r4, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r5, 0x0) write$P9_RWALK(r5, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) ioctl$sock_x25_SIOCDELRT(r5, 0x890c, &(0x7f00000003c0)={@remote={[], 0x2}, 0xb, 'bcsh0\x00'}) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="280b000070bb2f13556627d4ee128d676aa3417a6fd747d0f98ca58031e33cec9dd85a38582bb6814aa87199867d4a6dd27f8582b74d781dea49e19a28f008f025ceb259d8c57061a9ed5f3b2b17dbe3eab2ced33f5d0873a66dcbc1b110dae4cb9514cb4789ed84689a0074e0f348348c8d5cca3d8b8a0100b82a7b0dc3936532395d539e022352b0eaea816cca8c100b5f378cbed59979ddecbdd0cecd32f18f259d60ac82a0d1d0a27caafff4da8981", @ANYRES32=0x0, @ANYBLOB="010000000000000008001b0000000000"], 0x28}}, 0x0) 05:22:45 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}) 05:22:45 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0xfeffffff}}) 05:22:45 executing program 5 (fault-call:0 fault-nth:54): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 05:22:45 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x9000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:45 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x6800000000000000, 0x0}) 05:22:45 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12]}) [ 2972.462251][ T6605] FAULT_INJECTION: forcing a failure. [ 2972.462251][ T6605] name failslab, interval 1, probability 0, space 0, times 0 05:22:45 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0xfffffdfd}}) [ 2972.519416][ T6605] CPU: 0 PID: 6605 Comm: syz-executor.5 Not tainted 5.4.0-rc2+ #0 [ 2972.527276][ T6605] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2972.537335][ T6605] Call Trace: [ 2972.540627][ T6605] dump_stack+0x1d8/0x2f8 [ 2972.544964][ T6605] should_fail+0x555/0x770 [ 2972.549392][ T6605] __should_failslab+0x11a/0x160 [ 2972.554340][ T6605] should_failslab+0x9/0x20 [ 2972.558851][ T6605] kmem_cache_alloc_trace+0x5d/0x2f0 [ 2972.564143][ T6605] ? smack_d_instantiate+0x732/0xd70 [ 2972.569439][ T6605] smack_d_instantiate+0x732/0xd70 [ 2972.574562][ T6605] ? lockdep_init_map+0x2a/0x680 [ 2972.579508][ T6605] security_d_instantiate+0xa5/0x100 [ 2972.584790][ T6605] d_instantiate_new+0x65/0x120 [ 2972.589644][ T6605] ext4_mkdir+0xfa9/0x1450 [ 2972.594085][ T6605] vfs_mkdir+0x43f/0x610 [ 2972.598347][ T6605] do_mkdirat+0x1d7/0x320 [ 2972.602685][ T6605] __x64_sys_mkdir+0x60/0x70 [ 2972.607279][ T6605] do_syscall_64+0xf7/0x1c0 [ 2972.611790][ T6605] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2972.617687][ T6605] RIP: 0033:0x458e77 [ 2972.621583][ T6605] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2972.641189][ T6605] RSP: 002b:00007fddc3987a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2972.649600][ T6605] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000458e77 [ 2972.657574][ T6605] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 05:22:46 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xa000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2972.665542][ T6605] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2972.673511][ T6605] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2972.681484][ T6605] R13: 00000000004c8da6 R14: 00000000004e0200 R15: 0000000000000003 05:22:46 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0xffffffc3}}) 05:22:46 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25]}) 05:22:46 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x440000, 0x0) ioctl$ASHMEM_GET_SIZE(r3, 0x7704, 0x0) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dd7f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 05:22:46 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xb000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:46 executing program 5 (fault-call:0 fault-nth:55): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 05:22:46 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x6c00000000000000, 0x0}) 05:22:46 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c]}) 05:22:46 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xc000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2972.880556][ T6892] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:22:46 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)) [ 2972.950496][ T6892] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:22:46 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xd000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:46 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x7400000000000000, 0x0}) 05:22:46 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe80000000fd9d9c4f0c81f550f43ea23ee5fc244a353d334b881954a5bfe4060700014e4a4d305d20cc55cdc8f1c6f0e29b"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 05:22:46 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0xfffffffe}}) 05:22:46 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xe000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:46 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) [ 2973.177565][ T6911] FAULT_INJECTION: forcing a failure. [ 2973.177565][ T6911] name failslab, interval 1, probability 0, space 0, times 0 [ 2973.199563][ T6911] CPU: 1 PID: 6911 Comm: syz-executor.5 Not tainted 5.4.0-rc2+ #0 [ 2973.207400][ T6911] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2973.217458][ T6911] Call Trace: [ 2973.220756][ T6911] dump_stack+0x1d8/0x2f8 [ 2973.225094][ T6911] should_fail+0x555/0x770 [ 2973.229522][ T6911] __should_failslab+0x11a/0x160 [ 2973.234468][ T6911] ? kzalloc+0x1f/0x40 [ 2973.238540][ T6911] should_failslab+0x9/0x20 [ 2973.243043][ T6911] __kmalloc+0x7a/0x340 [ 2973.247207][ T6911] kzalloc+0x1f/0x40 [ 2973.251101][ T6911] smk_parse_smack+0x197/0x230 [ 2973.255879][ T6911] smk_import_entry+0x27/0x590 [ 2973.260656][ T6911] smack_d_instantiate+0x78f/0xd70 [ 2973.265782][ T6911] ? lockdep_init_map+0x2a/0x680 [ 2973.270727][ T6911] security_d_instantiate+0xa5/0x100 [ 2973.276014][ T6911] d_instantiate_new+0x65/0x120 [ 2973.280869][ T6911] ext4_mkdir+0xfa9/0x1450 [ 2973.285305][ T6911] vfs_mkdir+0x43f/0x610 [ 2973.289556][ T6911] do_mkdirat+0x1d7/0x320 [ 2973.293890][ T6911] __x64_sys_mkdir+0x60/0x70 [ 2973.298478][ T6911] do_syscall_64+0xf7/0x1c0 [ 2973.302985][ T6911] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2973.308868][ T6911] RIP: 0033:0x458e77 [ 2973.312757][ T6911] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2973.332360][ T6911] RSP: 002b:00007fddc3987a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2973.340770][ T6911] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000458e77 [ 2973.348741][ T6911] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 2973.356710][ T6911] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2973.364677][ T6911] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2973.372645][ T6911] R13: 00000000004c8da6 R14: 00000000004e0200 R15: 0000000000000003 05:22:46 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}) [ 2973.406579][ T7128] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:22:46 executing program 5 (fault-call:0 fault-nth:56): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 05:22:46 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x10000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2973.479459][ T7128] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:22:46 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}) 05:22:46 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x11000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:46 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x7a00000000000000, 0x0}) 05:22:46 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x12000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2973.621559][ T7305] FAULT_INJECTION: forcing a failure. [ 2973.621559][ T7305] name failslab, interval 1, probability 0, space 0, times 0 05:22:47 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r3, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) getsockname$netrom(r3, &(0x7f00000004c0)={{0x3, @netrom}, [@remote, @rose, @remote, @remote, @default, @rose, @remote, @default]}, &(0x7f0000000540)=0x48) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000940)=ANY=[@ANYBLOB="1a19b82e727f07000000018a8ad972b6ad1797bb082b985284e6dc86398b1468b98040298ee8cda753701e6bb90d221dde0a6dea31738f90c1d045d7c9d6f7a14bb15375de4777e1d26704323604a76f1410e4b7b43d8b38894aa5fc1228b4e4457b367aac267d46e0760c3d5103c5a98f67df444aad9d41287a3482e41d0ff30a4a3ce222781890c7286151467fe6f39264368bac688207d1e30abb1977f9b65e9b0336e4b539d7741584b7d4e84813e755d2c41d751706397d358dbf5984c39ac3e510644be77266e0af0e8e21b45a809259fa65c7b2ba2bc71ddfc7a9d1e05899db3fd78941e446208f03", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r4, 0x0) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r5, 0x0) write$P9_RWALK(r5, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r5, 0x40505331, &(0x7f0000000080)={{0x40}, {0xe5, 0x3}, 0x3, 0x8, 0x3}) write$P9_RWALK(r4, &(0x7f00000003c0)=ANY=[], 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000400)='./bus/file0\x00', &(0x7f0000000440)='trusted.overlay.redirect\x00', &(0x7f0000000480)='./file0\x00', 0x8, 0xddbaee3794a113de) syz_mount_image$minix(&(0x7f0000000580)='minix\x00', &(0x7f00000005c0)='./bus\x00', 0x1, 0x4, &(0x7f00000008c0)=[{&(0x7f0000000600)="91a6a42e361c36d8761249d0bafb5634f785710acc3afd0ab2caeaac4da49924d26c12bf0afac5ddf4c28a0edb6b3755188fba77ff8883c048e02b1bad9073a2f61dbffd49e4eff2d9b4365dba96fd82b2fcdcac5c2a15154f01cba0c5c9e209211825f52f08adc47dd78f849843e3d6573b080aba84a8e8c97dd7c188a765ff7c1d7efdeb567efcde6382e9f232254f615de2e90762f9b1b13a751763f57747fb7f331b9b9beb8d384d0d7e65e573e373d22353f5e378d4f15f6dd6f4485b32d220fbfd65ed509349c91fb6f38f018ef4b559077f46738ad31ccb58fd02586d7e38ffa92d", 0xe5, 0x3}, {&(0x7f0000000700)="57a9362a6890beed63df93fbffd40ba076a31cc0c2b37e26c997f92cb84e7d9b7607b36409e9beea23278fdbfe412452588e9cbbb3bcf5de448f0dc07571ec46e00bf0a3a76be8d9513e6e230f97cbfea9ebda33272d7d5a1f907c49eb338b33c8f8f700515cb0e20fdca149f630b0cdb6ca07b177ce837eeb52bda1684ee6434c75a6f2347eba45b4a7d24f0e599f1da40a638819f841a4cb0b1f919c4c127116e8e354f6b0ceb3cbe76601bf198fa4598a4b43f40504", 0xb7, 0x2f}, {&(0x7f00000007c0)="252176395ff0ac7d8cc697902afca8e5aa12766c4b6564e6112558a00748e542cc73127242d35a804ada183ec8c76142b9f81683ef7efcd03d52f6359ef880c13df690b8562f0a61269a7c9737fcd19438420974bd23165ad82fd4492190eafbee7bcb212d7cce95948ac529ea94495321e923da6d21e10bd3f513d6c60c388954fa04cfd139dcae862a6e3a83e3ab0cad8bd047b52821d741ec483edcb55b2000", 0xa1, 0x3ff}, {&(0x7f0000000880)="cc741d286f08b0e6de89a7f68be7fe46b5185c3f006bc80cfffe36e9d84fb9e95c6f6b53fa33e7e59a795e47", 0x2c, 0xfffffffffffffff9}], 0x10, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r4, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f0000000280)}}, 0x10) [ 2973.691008][ T7305] CPU: 0 PID: 7305 Comm: syz-executor.5 Not tainted 5.4.0-rc2+ #0 [ 2973.698880][ T7305] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2973.708938][ T7305] Call Trace: [ 2973.712240][ T7305] dump_stack+0x1d8/0x2f8 [ 2973.716590][ T7305] should_fail+0x555/0x770 [ 2973.721024][ T7305] __should_failslab+0x11a/0x160 [ 2973.725964][ T7305] ? ksys_mount+0x6a/0x100 [ 2973.725977][ T7305] should_failslab+0x9/0x20 [ 2973.725990][ T7305] __kmalloc_track_caller+0x79/0x340 [ 2973.726006][ T7305] strndup_user+0x76/0x130 [ 2973.734899][ T7305] ksys_mount+0x6a/0x100 [ 2973.734914][ T7305] __x64_sys_mount+0xbf/0xd0 [ 2973.734930][ T7305] do_syscall_64+0xf7/0x1c0 [ 2973.734951][ T7305] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2973.763800][ T7305] RIP: 0033:0x45c4aa [ 2973.767697][ T7305] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 05:22:47 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}) 05:22:47 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf}}) 05:22:47 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0xffffffff00000000, 0x0}) [ 2973.787312][ T7305] RSP: 002b:00007fddc3987a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2973.795728][ T7305] RAX: ffffffffffffffda RBX: 00007fddc3987b40 RCX: 000000000045c4aa [ 2973.803703][ T7305] RDX: 00007fddc3987ae0 RSI: 0000000020000100 RDI: 00007fddc3987b00 [ 2973.811670][ T7305] RBP: 0000000000000001 R08: 00007fddc3987b40 R09: 00007fddc3987ae0 [ 2973.819639][ T7305] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2973.827606][ T7305] R13: 00000000004c8da6 R14: 00000000004e0200 R15: 0000000000000003 05:22:47 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x25000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:47 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) [ 2973.881807][ T7459] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:22:47 executing program 5 (fault-call:0 fault-nth:57): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2973.959952][ T7459] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:22:47 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}) 05:22:47 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x3f000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:47 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0xffffffffff600000, 0x0}) [ 2974.103829][ T7597] FAULT_INJECTION: forcing a failure. [ 2974.103829][ T7597] name failslab, interval 1, probability 0, space 0, times 0 [ 2974.129675][ T7597] CPU: 1 PID: 7597 Comm: syz-executor.5 Not tainted 5.4.0-rc2+ #0 [ 2974.137511][ T7597] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2974.147571][ T7597] Call Trace: 05:22:47 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}) [ 2974.150866][ T7597] dump_stack+0x1d8/0x2f8 [ 2974.155203][ T7597] should_fail+0x555/0x770 [ 2974.159622][ T7597] __should_failslab+0x11a/0x160 [ 2974.164563][ T7597] should_failslab+0x9/0x20 [ 2974.169069][ T7597] kmem_cache_alloc_trace+0x5d/0x2f0 [ 2974.174356][ T7597] ? copy_mount_options+0x5f/0x3c0 [ 2974.179478][ T7597] copy_mount_options+0x5f/0x3c0 [ 2974.184416][ T7597] ksys_mount+0xa0/0x100 [ 2974.188659][ T7597] __x64_sys_mount+0xbf/0xd0 [ 2974.193245][ T7597] do_syscall_64+0xf7/0x1c0 [ 2974.197753][ T7597] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2974.203642][ T7597] RIP: 0033:0x45c4aa [ 2974.207532][ T7597] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2974.227135][ T7597] RSP: 002b:00007fddc3987a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2974.235541][ T7597] RAX: ffffffffffffffda RBX: 00007fddc3987b40 RCX: 000000000045c4aa [ 2974.243511][ T7597] RDX: 00007fddc3987ae0 RSI: 0000000020000100 RDI: 00007fddc3987b00 [ 2974.251476][ T7597] RBP: 0000000000000001 R08: 00007fddc3987b40 R09: 00007fddc3987ae0 [ 2974.259443][ T7597] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2974.267408][ T7597] R13: 00000000004c8da6 R14: 00000000004e0200 R15: 0000000000000003 05:22:47 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:47 executing program 1: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x95) ioctl$SCSI_IOCTL_DOORUNLOCK(r0, 0x5381) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090108000000000000000a000000", @ANYRES32=r3, @ANYRESDEC=0x0], 0x3}, 0x1, 0x0, 0x0, 0x200018d0}, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r0, 0x111, 0x1, 0xcccf, 0x4) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[]}}, 0x0) 05:22:47 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}) 05:22:48 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x2}}) 05:22:48 executing program 5 (fault-call:0 fault-nth:58): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 05:22:48 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x5c000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:48 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x0, 0x0}) getsockopt$bt_l2cap_L2CAP_LM(0xffffffffffffffff, 0x6, 0x3, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 05:22:48 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}) 05:22:48 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x68019, 0x4}, [@IFLA_EVENT={0x8}]}, 0x28}}, 0x0) [ 2974.822602][ T7813] FAULT_INJECTION: forcing a failure. [ 2974.822602][ T7813] name failslab, interval 1, probability 0, space 0, times 0 [ 2974.835113][ T7814] binder: 7809:7814 ioctl c0306201 20000000 returned -14 [ 2974.835665][ T7813] CPU: 1 PID: 7813 Comm: syz-executor.5 Not tainted 5.4.0-rc2+ #0 [ 2974.850464][ T7813] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2974.860523][ T7813] Call Trace: [ 2974.863818][ T7813] dump_stack+0x1d8/0x2f8 [ 2974.868162][ T7813] should_fail+0x555/0x770 [ 2974.872581][ T7813] __should_failslab+0x11a/0x160 [ 2974.877609][ T7813] ? __sigqueue_alloc+0x2ce/0x440 [ 2974.882635][ T7813] should_failslab+0x9/0x20 [ 2974.887140][ T7813] kmem_cache_alloc+0x56/0x2e0 [ 2974.891910][ T7813] __sigqueue_alloc+0x2ce/0x440 [ 2974.896766][ T7813] __send_signal+0x508/0xcd0 [ 2974.901365][ T7813] send_signal+0x6e0/0x830 [ 2974.905790][ T7813] force_sig_info_to_task+0x247/0x2e0 [ 2974.911166][ T7813] force_sig_fault+0xbf/0x130 [ 2974.915866][ T7813] __bad_area_nosemaphore+0x307/0x470 [ 2974.921257][ T7813] bad_area+0x6b/0x80 [ 2974.925247][ T7813] do_user_addr_fault+0xacc/0xaf0 [ 2974.930288][ T7813] __do_page_fault+0xd3/0x1f0 [ 2974.934974][ T7813] do_page_fault+0x99/0xb0 [ 2974.939399][ T7813] page_fault+0x39/0x40 [ 2974.943569][ T7813] RIP: 0033:0x45365f [ 2974.947461][ T7813] Code: bc d1 f3 0f 7f 27 f3 0f 7f 6f 10 f3 0f 7f 77 20 f3 0f 7f 7f 30 49 83 c0 0f 49 29 d0 48 8d 7c 17 31 e9 95 0b 00 00 66 0f ef c0 0f 6f 0e f3 0f 6f 56 10 66 0f 74 c1 66 0f d7 d0 49 83 f8 11 0f [ 2974.967063][ T7813] RSP: 002b:00007fddc3987a88 EFLAGS: 00010283 05:22:48 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb]}) 05:22:48 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000080)='/de\xc54bi\xff\xff\x1e\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000000c0)={0x150, 0x0, &(0x7f0000000100), 0x385, 0x0, 0x0}) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x40010, r2, 0x0) write$P9_RWALK(r2, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000b40)={0xffffffffffffffff}) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x6d, &(0x7f0000000000)={r6}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r3, 0x84, 0x17, &(0x7f0000000b80)={r6, 0x2, 0x7e, "58805762f3332d8b8bff1c12a13b5addcd80ec25d779fbd65c257a72634d5207be21c8f8cd2143fa7fbefd618bda3d0159a32c25934eed8370aed6cbe382bd179cd0573a2ebc33beab2e723d0a0e5c5ee4884cd4a7f16fb4e30266f74b321a201b0cf346ce27a1946e2462e535986366ed73ade5ec5d1acdfe5c537a1118"}, 0x86) [ 2974.973126][ T7813] RAX: 00007fddc3987b40 RBX: 0000000020000068 RCX: 0000000000000000 [ 2974.981093][ T7813] RDX: 00000000000000e0 RSI: 0000000000000000 RDI: 00007fddc3987b40 [ 2974.989063][ T7813] RBP: 0000000000000001 R08: 00000000000000e0 R09: 000000000000000a [ 2974.997027][ T7813] R10: 0000000000000075 R11: 00000000004e5d00 R12: 0000000000000004 [ 2975.004992][ T7813] R13: 00000000004c8da6 R14: 00000000004e0200 R15: 0000000000000003 05:22:48 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfeffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:48 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc]}) 05:22:48 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffe, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:48 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r4 = socket(0x10, 0x4, 0x5) recvmsg$kcm(r4, &(0x7f00000000c0)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000400)=""/70, 0x46}, {&(0x7f0000000480)=""/244, 0xf4}, {&(0x7f0000000580)=""/176, 0xb0}, {&(0x7f0000000640)=""/74, 0x4a}, {&(0x7f00000006c0)=""/96, 0x60}], 0x5, &(0x7f00000007c0)=""/160, 0xa0}, 0x10000) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r3, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) getsockopt$X25_QBITINCL(r3, 0x106, 0x1, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r3, 0x810c5701, &(0x7f0000000880)) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="280000001036e9628ba692d3eb00000000000000787ff2fe707114811af3c9128b1de899fe349840336d9684a63e117a5e3d159670e94c1a473e196a2b77225188fb3bb0ae67addaad98d655498c95b6b8b12edfc52c9ba2210d5719320fb55e18a0e889d5bd18853269860f5a487b62b390b24d7a51825901ffb9d910527dd1d0eb", @ANYRES32=0x0, @ANYBLOB="010000000000000008001b0000000000"], 0x28}}, 0x0) 05:22:48 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x3}}) 05:22:48 executing program 5 (fault-call:0 fault-nth:59): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 05:22:48 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) syz_open_procfs$namespace(r2, &(0x7f0000000080)='ns/net\x00') ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:22:48 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}) 05:22:48 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x10000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:48 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="2c0079ef33f3f907493600080003000000000017d0117db61b7e00", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 05:22:48 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x20000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:48 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RWALK(r1, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0), 0xf2, 0x0, 0x0}) 05:22:48 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe]}) 05:22:48 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x80000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2975.528938][ T8302] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:22:48 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}) [ 2975.612654][ T8302] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:22:49 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x28020200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x04\x00\x00 \x00\xee\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x0, 0x0}) r2 = socket$inet6(0xa, 0x1, 0x8010000400000084) sendto$inet6(r2, 0x0, 0x0, 0x0, 0x0, 0x0) close(r2) ioctl$sock_inet_SIOCSIFNETMASK(r2, 0x891c, &(0x7f0000000080)={'sit0\x00', {0x2, 0x4e22, @remote}}) [ 2975.746665][ T8306] FAULT_INJECTION: forcing a failure. [ 2975.746665][ T8306] name failslab, interval 1, probability 0, space 0, times 0 [ 2975.800730][ T8306] CPU: 0 PID: 8306 Comm: syz-executor.5 Not tainted 5.4.0-rc2+ #0 [ 2975.808573][ T8306] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2975.818626][ T8306] Call Trace: [ 2975.821911][ T8306] dump_stack+0x1d8/0x2f8 [ 2975.821928][ T8306] should_fail+0x555/0x770 [ 2975.821946][ T8306] __should_failslab+0x11a/0x160 [ 2975.821956][ T8306] ? ksys_mount+0x38/0x100 [ 2975.821968][ T8306] should_failslab+0x9/0x20 [ 2975.821979][ T8306] __kmalloc_track_caller+0x79/0x340 [ 2975.821993][ T8306] strndup_user+0x76/0x130 [ 2975.822003][ T8306] ksys_mount+0x38/0x100 [ 2975.822015][ T8306] __x64_sys_mount+0xbf/0xd0 [ 2975.822030][ T8306] do_syscall_64+0xf7/0x1c0 [ 2975.822046][ T8306] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2975.822055][ T8306] RIP: 0033:0x45c4aa [ 2975.822069][ T8306] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 05:22:49 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x4}}) [ 2975.896911][ T8306] RSP: 002b:00007fddc3987a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2975.905317][ T8306] RAX: ffffffffffffffda RBX: 00007fddc3987b40 RCX: 000000000045c4aa [ 2975.913282][ T8306] RDX: 00007fddc3987ae0 RSI: 0000000020000100 RDI: 00007fddc3987b00 [ 2975.921256][ T8306] RBP: 0000000000000001 R08: 00007fddc3987b40 R09: 00007fddc3987ae0 [ 2975.929221][ T8306] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2975.937193][ T8306] R13: 00000000004c8da6 R14: 00000000004e0200 R15: 0000000000000003 05:22:49 executing program 5 (fault-call:0 fault-nth:60): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 05:22:49 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}) 05:22:49 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:49 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r3 = syz_init_net_socket$x25(0x9, 0x5, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r3, 0x0, 0x484, &(0x7f0000000040)=""/14, &(0x7f0000000080)=0xe) 05:22:49 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12]}) [ 2976.110181][ T8509] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2976.127748][ T8637] FAULT_INJECTION: forcing a failure. [ 2976.127748][ T8637] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2976.140968][ T8637] CPU: 0 PID: 8637 Comm: syz-executor.5 Not tainted 5.4.0-rc2+ #0 [ 2976.148768][ T8637] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2976.158824][ T8637] Call Trace: [ 2976.162126][ T8637] dump_stack+0x1d8/0x2f8 [ 2976.166458][ T8637] should_fail+0x555/0x770 [ 2976.166479][ T8637] should_fail_alloc_page+0x55/0x60 [ 2976.176075][ T8637] prepare_alloc_pages+0x283/0x460 [ 2976.181195][ T8637] __alloc_pages_nodemask+0xb2/0x5d0 [ 2976.186496][ T8637] kmem_getpages+0x4d/0xa00 [ 2976.191006][ T8637] cache_grow_begin+0x7e/0x2c0 [ 2976.195769][ T8637] cache_alloc_refill+0x311/0x3f0 [ 2976.195783][ T8637] ? check_preemption_disabled+0xb7/0x2a0 [ 2976.195800][ T8637] __kmalloc+0x318/0x340 05:22:49 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x5}}) 05:22:49 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:49 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008911, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RWALK(r1, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) setsockopt$inet_udp_int(r1, 0x11, 0x65, &(0x7f0000000280)=0x5a0f, 0x4) r2 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) r3 = socket$inet6(0xa, 0x1, 0x8010000400000084) sendto$inet6(r3, 0x0, 0x0, 0x0, 0x0, 0x0) close(r3) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[@request_death={0x400c630e, 0x3}, @transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={@fda={0x66646185, 0x9, 0x2, 0x14}, @ptr={0x70742a85, 0x0, &(0x7f0000000080)=""/183, 0x0, 0x2, 0x2a}, @fd={0x66642a85, 0x0, r3}}, &(0x7f00000001c0)}}], 0xfffffe43, 0x0, 0x0}) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, 0x0) [ 2976.195809][ T8637] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 2976.195822][ T8637] tomoyo_realpath_from_path+0xdc/0x7c0 [ 2976.195844][ T8637] tomoyo_mount_permission+0x294/0xa30 [ 2976.195858][ T8637] ? filename_lookup+0x4b0/0x690 [ 2976.195876][ T8637] ? kmem_cache_free+0xd8/0xf0 [ 2976.216555][ T8637] tomoyo_sb_mount+0x35/0x40 [ 2976.216572][ T8637] security_sb_mount+0x84/0xe0 [ 2976.216593][ T8637] do_mount+0x10a/0x2510 [ 2976.216607][ T8637] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 2976.216616][ T8637] ? copy_mount_options+0x5f/0x3c0 [ 2976.216632][ T8637] ? copy_mount_options+0x308/0x3c0 [ 2976.216645][ T8637] ksys_mount+0xcc/0x100 [ 2976.216658][ T8637] __x64_sys_mount+0xbf/0xd0 [ 2976.227637][ T8637] do_syscall_64+0xf7/0x1c0 [ 2976.227657][ T8637] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2976.227666][ T8637] RIP: 0033:0x45c4aa [ 2976.227676][ T8637] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2976.227682][ T8637] RSP: 002b:00007fddc3987a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2976.227692][ T8637] RAX: ffffffffffffffda RBX: 00007fddc3987b40 RCX: 000000000045c4aa [ 2976.227699][ T8637] RDX: 00007fddc3987ae0 RSI: 0000000020000100 RDI: 00007fddc3987b00 [ 2976.227704][ T8637] RBP: 0000000000000001 R08: 00007fddc3987b40 R09: 00007fddc3987ae0 [ 2976.227711][ T8637] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2976.227717][ T8637] R13: 00000000004c8da6 R14: 00000000004e0200 R15: 0000000000000003 [ 2976.380277][ T8509] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:22:49 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25]}) 05:22:49 executing program 5 (fault-call:0 fault-nth:61): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2976.432547][ T8646] binder: 8643:8646 ioctl c0306201 20000000 returned -14 05:22:49 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:22:49 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x200000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:49 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x6}}) 05:22:49 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c]}) [ 2976.564022][ T8509] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2976.615425][ T8858] FAULT_INJECTION: forcing a failure. [ 2976.615425][ T8858] name failslab, interval 1, probability 0, space 0, times 0 05:22:49 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x204000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2976.664649][ T8858] CPU: 1 PID: 8858 Comm: syz-executor.5 Not tainted 5.4.0-rc2+ #0 [ 2976.672494][ T8858] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2976.682553][ T8858] Call Trace: [ 2976.685835][ T8858] dump_stack+0x1d8/0x2f8 [ 2976.690163][ T8858] should_fail+0x555/0x770 [ 2976.694583][ T8858] __should_failslab+0x11a/0x160 [ 2976.699523][ T8858] ? ksys_mount+0x38/0x100 [ 2976.703947][ T8858] should_failslab+0x9/0x20 [ 2976.708445][ T8858] __kmalloc_track_caller+0x79/0x340 [ 2976.713735][ T8858] strndup_user+0x76/0x130 [ 2976.718149][ T8858] ksys_mount+0x38/0x100 [ 2976.722391][ T8858] __x64_sys_mount+0xbf/0xd0 [ 2976.726978][ T8858] do_syscall_64+0xf7/0x1c0 [ 2976.731483][ T8858] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2976.737369][ T8858] RIP: 0033:0x45c4aa [ 2976.741256][ T8858] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2976.761213][ T8858] RSP: 002b:00007fddc3987a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2976.769624][ T8858] RAX: ffffffffffffffda RBX: 00007fddc3987b40 RCX: 000000000045c4aa [ 2976.777589][ T8858] RDX: 00007fddc3987ae0 RSI: 0000000020000100 RDI: 00007fddc3987b00 [ 2976.785557][ T8858] RBP: 0000000000000001 R08: 00007fddc3987b40 R09: 00007fddc3987ae0 [ 2976.793958][ T8858] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2976.801932][ T8858] R13: 00000000004c8da6 R14: 00000000004e0200 R15: 0000000000000003 05:22:50 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba0000000000000001a1000000", @ANYRES32=0x0, @ANYBLOB="010000000000000008001b0000000000"], 0x28}}, 0x0) 05:22:50 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)) [ 2976.819531][ T8509] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:22:50 executing program 5 (fault-call:0 fault-nth:62): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 05:22:50 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000400000084) sendto$inet6(r2, 0x0, 0x0, 0x0, 0x0, 0x0) close(r2) r3 = socket$inet6(0xa, 0x1, 0x8010000400000084) sendto$inet6(r3, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0xfff, 0x52100) ioctl$UFFDIO_UNREGISTER(r4, 0x8010aa01, &(0x7f0000000140)={&(0x7f0000ffa000/0x4000)=nil, 0x4000}) close(r3) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r5, 0x0) write$P9_RWALK(r5, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r6 = openat$cgroup_ro(r5, &(0x7f00000000c0)='cpuacct.usage_all\x00', 0x0, 0x0) r7 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r7, 0x0) write$P9_RWALK(r7, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) ioctl$NBD_SET_SOCK(r6, 0xab00, r7) ioctl$FICLONE(r2, 0x40049409, r3) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x0, 0x0}) r8 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x1, 0x8a) ioctl$VT_WAITACTIVE(r8, 0x5607) 05:22:50 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x300000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:50 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 05:22:50 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x7}}) [ 2977.008492][ T9064] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2977.028592][ T9076] FAULT_INJECTION: forcing a failure. [ 2977.028592][ T9076] name failslab, interval 1, probability 0, space 0, times 0 [ 2977.072001][ T9076] CPU: 0 PID: 9076 Comm: syz-executor.5 Not tainted 5.4.0-rc2+ #0 [ 2977.079845][ T9076] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2977.089902][ T9076] Call Trace: [ 2977.093191][ T9076] dump_stack+0x1d8/0x2f8 [ 2977.097526][ T9076] should_fail+0x555/0x770 [ 2977.101951][ T9076] __should_failslab+0x11a/0x160 [ 2977.106895][ T9076] should_failslab+0x9/0x20 [ 2977.111402][ T9076] kmem_cache_alloc_trace+0x5d/0x2f0 [ 2977.116686][ T9076] ? copy_mount_options+0x5f/0x3c0 [ 2977.121803][ T9076] copy_mount_options+0x5f/0x3c0 [ 2977.126755][ T9076] ksys_mount+0xa0/0x100 [ 2977.131009][ T9076] __x64_sys_mount+0xbf/0xd0 [ 2977.135603][ T9076] do_syscall_64+0xf7/0x1c0 [ 2977.135622][ T9076] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2977.135632][ T9076] RIP: 0033:0x45c4aa [ 2977.135643][ T9076] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 05:22:50 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x400000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:50 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}) [ 2977.135651][ T9076] RSP: 002b:00007fddc3987a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2977.146010][ T9076] RAX: ffffffffffffffda RBX: 00007fddc3987b40 RCX: 000000000045c4aa [ 2977.146018][ T9076] RDX: 00007fddc3987ae0 RSI: 0000000020000100 RDI: 00007fddc3987b00 [ 2977.146024][ T9076] RBP: 0000000000000001 R08: 00007fddc3987b40 R09: 00007fddc3987ae0 [ 2977.146029][ T9076] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2977.146038][ T9076] R13: 00000000004c8da6 R14: 00000000004e0200 R15: 0000000000000003 05:22:50 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}) 05:22:50 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x500000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2977.239507][ T9064] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:22:50 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x8}}) 05:22:50 executing program 1: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RWALK(r1, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) syz_kvm_setup_cpu$x86(r0, r1, &(0x7f0000fe6000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, &(0x7f0000000040)="66b8f1008ec80f01c80fc72c40656666660fe8ebb805000000b9000000000f01d9b805000000b9556b8d6d0f01d9b8000000000f23c80f21f835000070000f23f8360f060f070f01c3", 0x49}], 0x1, 0x4, &(0x7f0000000280), 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r4, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="010000743fd69d92510299863ce1aca1"], 0x28}}, 0x0) 05:22:50 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}) [ 2977.470181][ T9316] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 05:22:50 executing program 5 (fault-call:0 fault-nth:63): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 05:22:50 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x600000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:50 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b50300000000000000") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x4, 0x400200) r3 = socket$inet6(0xa, 0x1, 0x8010000400000084) sendto$inet6(r3, 0x0, 0x0, 0x0, 0x0, 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x6d, &(0x7f0000000000)={r6}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f0000000080)={r6, 0x8}, &(0x7f00000000c0)=0x8) r7 = syz_open_dev$sndpcmc(&(0x7f0000000180)='/dev/snd/pcmC#D#c\x00', 0x6, 0x315400) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r8, 0x0) write$P9_RWALK(r8, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r9, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000840)={0x128, r10, 0x1, 0x0, 0x0, {{}, 0x0, 0x4102, 0x0, {0x10c, 0x13, @l2={'ib\xab\xcd4\x14\xfe\xd2C\xcb\x14\x1e>x\xcb!\x95\xac.h\xd1T\x0f&\xb0\x13\x8c\xb9\xe1*T\xf4q\xc5/\x17\xac\xf0\t\x038\x1fLqa#\xb5\x01\x1f\x01\x98\x12\x06\xab9vWj\x87\x95_8\xb0\xc2\xaa?6)\xb5yY\x8f\xb9\x86\xe1\x86sKk&\xee\xf4\x1b\xf5\xf7\xbd?\xbb\x80\x06\xc9\xb2\xf4}\xf0\xdb\xf7\xb3,_\x9b#\t&%[\xd0\xa7\x16(`\xb7\xc1~n\xb3\x00\x13\xcd\x8c`r\xc1@\xf9\xcf\xa2\xab\x83}\xaa\xf9x\x8d\xae\a&D\x10\x96}\xfcK\xd3;\xe4q\x8a\x06\x8cY\v\xa9\x93=H\x9a\xc2\xe6\xc7\xb46\xf9M_\x0e,c\x95\xf6\a\xc4I\x06\xd7GF\xfc\\e+]\x19|\xcc\xc8\xa4\xe3\x14\xb6|\xdb\xa4g\x81\xa0\xfaKKw\xa5\xdf\x9b\x82\x17\xdcs@\x95\x91\b\x8e\xe9G%\xfb\xa3\xcd\xba8\xde\xe4\x9d~\xa5w9\x86\x0f\xa7F\x99\xd3\x12\x8a\xd7V0X\xcdc\xd7\x8a2\xf9\xdb\xd0\xec\x9b', 0x3a, 'veth1_to_hsr\x00'}}}}, 0x128}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r8, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x30, r10, 0x2, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4109, 0x0, {0x14, 0x18, {0x6cf4, @bearer=@udp='udp:syz0\x00'}}}, ["", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x4005}, 0x8000) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r8, 0xc1205531, &(0x7f0000000240)={0x8, 0x10000, 0xffff, 0x8, [], [], [], 0x7f, 0x7, 0x8, 0x3, "beeac46da5d591e49ddffd389152e1de"}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r7, 0x84, 0x76, &(0x7f00000001c0)={r6, 0x7}, &(0x7f0000000200)=0x8) ioctl$VIDIOC_QUERYSTD(r2, 0x8008563f, &(0x7f0000000140)) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:22:50 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) 05:22:50 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x9}}) 05:22:50 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) socket$inet6_sctp(0xa, 0x2, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x70bd2c, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 2977.527298][ T9405] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 05:22:50 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x604000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2977.636516][ T9410] binder: 9406:9410 ioctl c0306201 20000000 returned -14 [ 2977.648871][ T9427] FAULT_INJECTION: forcing a failure. [ 2977.648871][ T9427] name failslab, interval 1, probability 0, space 0, times 0 [ 2977.669437][ T9427] CPU: 0 PID: 9427 Comm: syz-executor.5 Not tainted 5.4.0-rc2+ #0 [ 2977.677260][ T9427] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2977.687315][ T9427] Call Trace: [ 2977.690613][ T9427] dump_stack+0x1d8/0x2f8 [ 2977.695051][ T9427] should_fail+0x555/0x770 [ 2977.699479][ T9427] __should_failslab+0x11a/0x160 [ 2977.704425][ T9427] ? getname_flags+0xba/0x640 [ 2977.709103][ T9427] should_failslab+0x9/0x20 [ 2977.709173][ T9497] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2977.713604][ T9427] kmem_cache_alloc+0x56/0x2e0 [ 2977.713617][ T9427] ? retint_kernel+0x2b/0x2b [ 2977.713631][ T9427] getname_flags+0xba/0x640 [ 2977.713647][ T9427] user_path_at_empty+0x2d/0x50 [ 2977.713659][ T9427] do_mount+0xd7/0x2510 [ 2977.713670][ T9427] ? copy_mount_options+0x278/0x3c0 [ 2977.713680][ T9427] ? copy_mount_options+0x25e/0x3c0 [ 2977.713693][ T9427] ? copy_mount_options+0x264/0x3c0 [ 2977.713705][ T9427] ? copy_mount_options+0x308/0x3c0 [ 2977.713717][ T9427] ksys_mount+0xcc/0x100 [ 2977.713730][ T9427] __x64_sys_mount+0xbf/0xd0 [ 2977.713743][ T9427] do_syscall_64+0xf7/0x1c0 [ 2977.713754][ T9427] entry_SYSCALL_64_after_hwframe+0x49/0xbe 05:22:51 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0xa}}) 05:22:51 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}) [ 2977.713763][ T9427] RIP: 0033:0x45c4aa [ 2977.713774][ T9427] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2977.713779][ T9427] RSP: 002b:00007fddc3987a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2977.713788][ T9427] RAX: ffffffffffffffda RBX: 00007fddc3987b40 RCX: 000000000045c4aa [ 2977.713793][ T9427] RDX: 00007fddc3987ae0 RSI: 0000000020000100 RDI: 00007fddc3987b00 05:22:51 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x700000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2977.713799][ T9427] RBP: 0000000000000001 R08: 00007fddc3987b40 R09: 00007fddc3987ae0 [ 2977.713804][ T9427] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2977.713810][ T9427] R13: 00000000004c8da6 R14: 00000000004e0200 R15: 0000000000000003 05:22:51 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x80100, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b00717094298e0b541e830942ca2e9734cb34aeb0d55d69dc017b151002f78aa0de0eb728e0c09a5899d36d6d39e13bc0a077357278885d01fa8f063fbb918e56447d6150dbdbf7e9dc25842e967870051c476835af20df2cfc") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x0, 0x0}) [ 2977.900583][ T9497] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:22:51 executing program 5 (fault-call:0 fault-nth:64): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 05:22:51 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}) 05:22:51 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x800000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2977.973637][ T9632] binder: 9629:9632 ioctl c0306201 20000000 returned -14 [ 2978.022156][ T9651] FAULT_INJECTION: forcing a failure. [ 2978.022156][ T9651] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2978.035376][ T9651] CPU: 1 PID: 9651 Comm: syz-executor.5 Not tainted 5.4.0-rc2+ #0 [ 2978.035385][ T9651] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2978.035388][ T9651] Call Trace: [ 2978.035404][ T9651] dump_stack+0x1d8/0x2f8 [ 2978.035420][ T9651] should_fail+0x555/0x770 [ 2978.035439][ T9651] should_fail_alloc_page+0x55/0x60 [ 2978.053293][ T9651] prepare_alloc_pages+0x283/0x460 [ 2978.053311][ T9651] __alloc_pages_nodemask+0xb2/0x5d0 [ 2978.053333][ T9651] kmem_getpages+0x4d/0xa00 [ 2978.053347][ T9651] cache_grow_begin+0x7e/0x2c0 [ 2978.053361][ T9651] cache_alloc_refill+0x311/0x3f0 [ 2978.053375][ T9651] ? check_preemption_disabled+0xb7/0x2a0 [ 2978.078685][ T9677] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2978.081136][ T9651] kmem_cache_alloc+0x2b9/0x2e0 [ 2978.081148][ T9651] ? getname_flags+0xba/0x640 [ 2978.081160][ T9651] getname_flags+0xba/0x640 [ 2978.081177][ T9651] user_path_at_empty+0x2d/0x50 [ 2978.081187][ T9651] do_mount+0xd7/0x2510 [ 2978.081202][ T9651] ? copy_mount_options+0x278/0x3c0 [ 2978.095437][ T9651] ? copy_mount_options+0x25e/0x3c0 [ 2978.095453][ T9651] ? copy_mount_options+0x26b/0x3c0 [ 2978.095465][ T9651] ? copy_mount_options+0x308/0x3c0 [ 2978.095480][ T9651] ksys_mount+0xcc/0x100 [ 2978.117858][ T9651] __x64_sys_mount+0xbf/0xd0 [ 2978.117876][ T9651] do_syscall_64+0xf7/0x1c0 [ 2978.117892][ T9651] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2978.117903][ T9651] RIP: 0033:0x45c4aa [ 2978.175118][ T9651] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2978.194722][ T9651] RSP: 002b:00007fddc3987a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2978.203132][ T9651] RAX: ffffffffffffffda RBX: 00007fddc3987b40 RCX: 000000000045c4aa [ 2978.211099][ T9651] RDX: 00007fddc3987ae0 RSI: 0000000020000100 RDI: 00007fddc3987b00 [ 2978.219062][ T9651] RBP: 0000000000000001 R08: 00007fddc3987b40 R09: 00007fddc3987ae0 [ 2978.227025][ T9651] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2978.235000][ T9651] R13: 00000000004c8da6 R14: 00000000004e0200 R15: 0000000000000003 [ 2978.271557][ T9677] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:22:51 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x900000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:51 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x0, 0x400200) r1 = socket$inet6(0xa, 0x3, 0x7) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000000)={@remote, r3}, 0x14) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r3, 0x1, 0x6, @remote}, 0x10) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r6, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYBLOB="010000000000000008001b0000000000"], 0x28}}, 0x0) r7 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r7, 0x0) write$P9_RWALK(r7, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) getsockopt$inet_udp_int(r7, 0x11, 0x66, &(0x7f0000000040), &(0x7f0000000080)=0x4) 05:22:51 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0xb}}) 05:22:51 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}) 05:22:51 executing program 5 (fault-call:0 fault-nth:65): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 05:22:51 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") r2 = socket(0x10, 0x1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r3) close(r4) pipe(&(0x7f0000000240)) splice(r2, 0x0, r4, 0x0, 0x2, 0x0) write(r2, &(0x7f0000000080)="2400000012005f3414f9f40700090400818a0400"/36, 0x24) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = syz_open_dev$binderN(&(0x7f00000000c0)='/dev/binder#\x00', 0x0, 0xc07) r6 = gettid() ptrace$setopts(0x4206, r6, 0x0, 0x0) tkill(r6, 0x20040018) ptrace$cont(0x18, r6, 0x0, 0x0) ptrace$setregs(0xd, r6, 0x3, &(0x7f0000000080)) ptrace$cont(0x9, r6, 0x0, 0x0) ptrace$setopts(0x4200, r6, 0xaeaf, 0x20) ioctl$BINDER_WRITE_READ(r5, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:22:51 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xa00000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:51 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}) [ 2978.512812][ T9856] FAULT_INJECTION: forcing a failure. [ 2978.512812][ T9856] name failslab, interval 1, probability 0, space 0, times 0 [ 2978.530529][ T9858] binder: 9857:9858 ioctl c0306201 20000000 returned -14 [ 2978.546091][ T9856] CPU: 0 PID: 9856 Comm: syz-executor.5 Not tainted 5.4.0-rc2+ #0 [ 2978.553919][ T9856] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2978.563977][ T9856] Call Trace: [ 2978.567271][ T9856] dump_stack+0x1d8/0x2f8 [ 2978.571607][ T9856] should_fail+0x555/0x770 [ 2978.576034][ T9856] __should_failslab+0x11a/0x160 [ 2978.580980][ T9856] ? tomoyo_encode2+0x273/0x5a0 [ 2978.585830][ T9856] should_failslab+0x9/0x20 [ 2978.590334][ T9856] __kmalloc+0x7a/0x340 [ 2978.594491][ T9856] tomoyo_encode2+0x273/0x5a0 [ 2978.599169][ T9856] tomoyo_encode+0x29/0x40 [ 2978.603587][ T9856] tomoyo_mount_permission+0x216/0xa30 [ 2978.609058][ T9856] ? filename_lookup+0x4b0/0x690 [ 2978.614008][ T9856] ? kmem_cache_free+0xd8/0xf0 [ 2978.618803][ T9856] tomoyo_sb_mount+0x35/0x40 [ 2978.623398][ T9856] security_sb_mount+0x84/0xe0 [ 2978.628173][ T9856] do_mount+0x10a/0x2510 [ 2978.632417][ T9856] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 2978.637961][ T9856] ? copy_mount_options+0x5f/0x3c0 [ 2978.643078][ T9856] ? copy_mount_options+0x308/0x3c0 [ 2978.648283][ T9856] ksys_mount+0xcc/0x100 [ 2978.652528][ T9856] __x64_sys_mount+0xbf/0xd0 [ 2978.657130][ T9856] do_syscall_64+0xf7/0x1c0 [ 2978.661650][ T9856] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2978.667541][ T9856] RIP: 0033:0x45c4aa [ 2978.671434][ T9856] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2978.691036][ T9856] RSP: 002b:00007fddc3987a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2978.699448][ T9856] RAX: ffffffffffffffda RBX: 00007fddc3987b40 RCX: 000000000045c4aa 05:22:51 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0xc}}) 05:22:52 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb]}) 05:22:52 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0xd}}) 05:22:52 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xb00000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2978.707418][ T9856] RDX: 00007fddc3987ae0 RSI: 0000000020000100 RDI: 00007fddc3987b00 [ 2978.715395][ T9856] RBP: 0000000000000001 R08: 00007fddc3987b40 R09: 00007fddc3987ae0 [ 2978.723370][ T9856] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2978.731346][ T9856] R13: 00000000004c8da6 R14: 00000000004e0200 R15: 0000000000000003 05:22:52 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r3, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r4 = socket$inet6(0xa, 0x1, 0x8010000400000084) sendto$inet6(r4, 0x0, 0x0, 0x0, 0x0, 0x0) close(r4) getsockopt$sock_linger(r4, 0x1, 0xd, &(0x7f0000000500), &(0x7f0000000540)=0x8) setsockopt$bt_hci_HCI_DATA_DIR(r3, 0x0, 0x1, &(0x7f0000000040)=0x10001, 0x4) getpeername(r1, &(0x7f0000000340)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000400)=0x80) sendmsg$inet(r0, &(0x7f00000004c0)={&(0x7f0000000080)={0x2, 0x4e22, @multicast1}, 0x10, &(0x7f00000000c0)=[{&(0x7f0000000280)="d36942d597d7300b410356cb351a0203365ef9a33ccae92153129e7a943b22a4bfad1a822a8bc388837145046a79d536d64fb2f8682fd8c96a2602b2f62cf19b8920707421f3284b1586881dc006824e055796c5cc649c69e0024260248d6f3f62f6889d7861e92be1b525d1b895b2b5ffbff2225ad3493791144ec48712591c3596e319db5bfb500263a51352743a496c4fbff7b602349c664f2b32133f98ad884b095cd89b608e069bff47151ba0d52a21", 0xb2}], 0x1, &(0x7f0000000440)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x3}}, @ip_ttl={{0x14, 0x0, 0x2, 0x8}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0xfd}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @multicast1, @dev={0xac, 0x14, 0x14, 0x29}}}}], 0x80}, 0x20000000) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 05:22:52 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xc00000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:52 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc]}) 05:22:52 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6(0xa, 0x1, 0x8010000400000084) sendto$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) close(r1) r2 = accept(r1, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @random}}, &(0x7f0000000100)=0x80) getsockname$netlink(r2, &(0x7f0000000140), &(0x7f0000000180)=0xc) r3 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) r4 = socket$inet6(0xa, 0x1, 0x8010000400000084) sendto$inet6(r4, 0x0, 0x0, 0x0, 0x0, 0x0) close(r4) ftruncate(r4, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x0, 0x0}) r5 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ubi_ctrl\x00', 0x400000, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r6, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)={0x28, r7, 0x101, 0x0, 0x0, {0x6}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r5, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80040000}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0xa8, r7, 0x404, 0x70bd2c, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1000}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_DEST={0x6c, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x80}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x11b360ba}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e21}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xdc39}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x7fffffff}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@empty}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@ipv4={[], [], @rand_addr=0xfffffc01}}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x3}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x8000}, 0x40010) 05:22:52 executing program 5 (fault-call:0 fault-nth:66): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2978.972526][T10232] binder: 10223:10232 ioctl c0306201 20000000 returned -14 [ 2979.003340][T10234] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2979.014754][T10282] FAULT_INJECTION: forcing a failure. 05:22:52 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0xe}}) [ 2979.014754][T10282] name failslab, interval 1, probability 0, space 0, times 0 05:22:52 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xd00000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:52 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000100), 0x0, 0x407) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x0, 0x0}) r2 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x341000) write$P9_RMKNOD(r2, &(0x7f00000000c0)={0x14, 0x13, 0x2, {0x2, 0x802, 0x2}}, 0x14) connect$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x4e23, @broadcast}, 0x10) [ 2979.090306][T10234] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2979.099985][T10282] CPU: 1 PID: 10282 Comm: syz-executor.5 Not tainted 5.4.0-rc2+ #0 [ 2979.113588][T10282] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2979.123641][T10282] Call Trace: [ 2979.126934][T10282] dump_stack+0x1d8/0x2f8 [ 2979.131262][T10282] should_fail+0x555/0x770 [ 2979.135679][T10282] __should_failslab+0x11a/0x160 [ 2979.140617][T10282] should_failslab+0x9/0x20 [ 2979.145116][T10282] kmem_cache_alloc_trace+0x5d/0x2f0 [ 2979.150396][T10282] ? alloc_fs_context+0x65/0x640 [ 2979.155336][T10282] alloc_fs_context+0x65/0x640 [ 2979.160098][T10282] ? _raw_read_unlock+0x2c/0x50 [ 2979.164946][T10282] ? get_fs_type+0x47f/0x500 [ 2979.169533][T10282] fs_context_for_mount+0x24/0x30 [ 2979.174553][T10282] do_mount+0x10a7/0x2510 [ 2979.178886][T10282] ? copy_mount_options+0x308/0x3c0 [ 2979.184084][T10282] ksys_mount+0xcc/0x100 [ 2979.188330][T10282] __x64_sys_mount+0xbf/0xd0 [ 2979.192928][T10282] do_syscall_64+0xf7/0x1c0 [ 2979.197439][T10282] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2979.203324][T10282] RIP: 0033:0x45c4aa [ 2979.207218][T10282] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2979.226812][T10282] RSP: 002b:00007fddc3987a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 05:22:52 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}) [ 2979.235650][T10282] RAX: ffffffffffffffda RBX: 00007fddc3987b40 RCX: 000000000045c4aa [ 2979.243616][T10282] RDX: 00007fddc3987ae0 RSI: 0000000020000100 RDI: 00007fddc3987b00 [ 2979.251581][T10282] RBP: 0000000000000001 R08: 00007fddc3987b40 R09: 00007fddc3987ae0 [ 2979.259546][T10282] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2979.267513][T10282] R13: 00000000004c8da6 R14: 00000000004e0200 R15: 0000000000000003 05:22:52 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xe00000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:52 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000540)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000500)={&(0x7f0000000580)={0x90, r1, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x0, 0x2, 0x3f}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x6}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x20000004}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x0, 0x1, 0x3}]}, @TIPC_NLA_MEDIA={0x1c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_BEARER={0x30, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @remote}}, {0x14, 0x2, @in={0x2, 0x4e22, @local}}}}]}]}, 0x90}, 0x1, 0x0, 0x0, 0x40}, 0x5c0318bf2b2af04b) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x2) r7 = syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r6, &(0x7f0000000780)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc4, r7, 0x200, 0x70bd2a, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x401}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xef3}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x1}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x8}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x10001}, @IPVS_CMD_ATTR_DEST={0x50, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x6}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x20}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x9}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast2}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x8}, @IPVS_DEST_ATTR_TUN_TYPE={0x8}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x9}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xed6}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x41}, 0x40800) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000040)='./file0\x00', r5, r8) r9 = socket$inet6(0xa, 0x6, 0x8010000400000084) sendto$inet6(r9, 0x0, 0x0, 0x0, 0x0, 0x0) close(r9) r10 = socket$inet6(0xa, 0x1, 0x8010000400000084) sendto$inet6(r10, 0x0, 0x0, 0x0, 0x0, 0x0) close(r10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r10, 0x6612) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="2c000000140009aa000000000000000a0000000080d27a9d45fe5eeaefc3ebe13f6404d5428a5419dda04d2406ba4452ffb807ef99167a7a369185a5651378c3f272b9e8bd10a53fdc8301742b36c64886eeee3f632e21868bff214836b3a0e68ad7cbfa5c52b56e6fb85d183cf1b2", @ANYRES32=r4, @ANYRESOCT=r9], 0x3}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 05:22:52 executing program 5 (fault-call:0 fault-nth:67): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 05:22:52 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe]}) 05:22:52 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = socket$inet6(0xa, 0x1, 0x8010000400000084) sendto$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) close(r1) r2 = socket$inet6(0xa, 0x1, 0x8010000400000084) sendto$inet6(r2, 0x0, 0x0, 0x0, 0x0, 0x0) close(r2) sendfile(r1, r2, &(0x7f0000000080), 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r3, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) ioctl$KVM_PPC_GET_PVINFO(r3, 0x4080aea1, &(0x7f00000000c0)=""/81) r4 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:22:52 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2979.503664][T10604] FAULT_INJECTION: forcing a failure. [ 2979.503664][T10604] name failslab, interval 1, probability 0, space 0, times 0 [ 2979.549337][T10604] CPU: 0 PID: 10604 Comm: syz-executor.5 Not tainted 5.4.0-rc2+ #0 [ 2979.557263][T10604] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2979.567318][T10604] Call Trace: [ 2979.570616][T10604] dump_stack+0x1d8/0x2f8 [ 2979.574956][T10604] should_fail+0x555/0x770 [ 2979.579379][T10604] __should_failslab+0x11a/0x160 [ 2979.584316][T10604] should_failslab+0x9/0x20 [ 2979.588817][T10604] kmem_cache_alloc_trace+0x5d/0x2f0 [ 2979.594103][T10604] ? legacy_init_fs_context+0x51/0xc0 [ 2979.599475][T10604] legacy_init_fs_context+0x51/0xc0 [ 2979.604672][T10604] alloc_fs_context+0x53a/0x640 [ 2979.609527][T10604] fs_context_for_mount+0x24/0x30 [ 2979.614547][T10604] do_mount+0x10a7/0x2510 [ 2979.618880][T10604] ? copy_mount_options+0x308/0x3c0 [ 2979.624077][T10604] ksys_mount+0xcc/0x100 [ 2979.628315][T10604] __x64_sys_mount+0xbf/0xd0 [ 2979.632904][T10604] do_syscall_64+0xf7/0x1c0 [ 2979.637403][T10604] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2979.643291][T10604] RIP: 0033:0x45c4aa 05:22:52 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}) [ 2979.647181][T10604] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2979.666773][T10604] RSP: 002b:00007fddc3987a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2979.666784][T10604] RAX: ffffffffffffffda RBX: 00007fddc3987b40 RCX: 000000000045c4aa [ 2979.666790][T10604] RDX: 00007fddc3987ae0 RSI: 0000000020000100 RDI: 00007fddc3987b00 [ 2979.666797][T10604] RBP: 0000000000000001 R08: 00007fddc3987b40 R09: 00007fddc3987ae0 [ 2979.666803][T10604] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2979.666809][T10604] R13: 00000000004c8da6 R14: 00000000004e0200 R15: 0000000000000003 [ 2979.685431][T10607] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:22:53 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x10}}) 05:22:53 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1100000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:53 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}) [ 2979.800370][T10607] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:22:53 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1200000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:53 executing program 5 (fault-call:0 fault-nth:68): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 05:22:53 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) epoll_create1(0x40000) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x4000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r2, 0x0) write$P9_RWALK(r2, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r3 = socket$inet6(0xa, 0x1, 0x8010000400000084) sendto$inet6(r3, 0x0, 0x0, 0x0, 0x0, 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000280)=ANY=[@ANYBLOB="0100d37d33ced320f5575df5311afadb2e467c3daaeb5d26c5cf430c151f5b0344fb4395b6cf5e1d8ca8a977b6d8fcbbcff511819e5d5449997c3ca5ce", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x6d, &(0x7f0000000000)={r6}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000140)={r6, 0x7fff, 0x1000, 0xa15, 0x7}, &(0x7f0000000180)=0x14) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f00000001c0)={r7, 0x9}, &(0x7f0000000200)=0x8) write$P9_RWALK(r1, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000080), 0x4) r8 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) write$eventfd(r2, &(0x7f0000000240)=0x80, 0x8) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, &(0x7f00000000c0)={0x8, 0x20000002, {0x54, 0x0, 0x401, {0x1000, 0x81}, {0x93a, 0x8}, @ramp={0x6, 0x2, {0xfff7, 0x3, 0x9, 0x1ff}}}, {0x52, 0x81, 0x2, {0x2, 0xfce}, {0x3, 0x8}, @cond=[{0xc8fa, 0xfffd, 0x6, 0x1, 0x7, 0x100}, {0x8, 0xfff, 0x4, 0x1f, 0x9, 0xffe}]}}) ioctl$BINDER_WRITE_READ(r8, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x0, 0x0}) [ 2980.012052][T10831] FAULT_INJECTION: forcing a failure. [ 2980.012052][T10831] name failslab, interval 1, probability 0, space 0, times 0 [ 2980.037068][T10831] CPU: 0 PID: 10831 Comm: syz-executor.5 Not tainted 5.4.0-rc2+ #0 [ 2980.044991][T10831] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2980.055047][T10831] Call Trace: [ 2980.058339][T10831] dump_stack+0x1d8/0x2f8 [ 2980.062682][T10831] should_fail+0x555/0x770 [ 2980.067113][T10831] __should_failslab+0x11a/0x160 [ 2980.072055][T10831] ? vfs_parse_fs_string+0xed/0x1a0 [ 2980.077265][T10831] should_failslab+0x9/0x20 [ 2980.081771][T10831] __kmalloc_track_caller+0x79/0x340 [ 2980.087065][T10831] kmemdup_nul+0x2a/0xa0 [ 2980.091304][T10831] vfs_parse_fs_string+0xed/0x1a0 [ 2980.096330][T10831] do_mount+0x11b8/0x2510 [ 2980.100671][T10831] ? copy_mount_options+0x308/0x3c0 [ 2980.105873][T10831] ksys_mount+0xcc/0x100 [ 2980.110118][T10831] __x64_sys_mount+0xbf/0xd0 [ 2980.114716][T10831] do_syscall_64+0xf7/0x1c0 [ 2980.119216][T10831] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2980.125101][T10831] RIP: 0033:0x45c4aa [ 2980.128986][T10831] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2980.148585][T10831] RSP: 002b:00007fddc3987a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 05:22:53 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vcan0\x00'}) r2 = socket$inet6(0xa, 0x1, 0x8010000400000084) sendto$inet6(r2, 0x0, 0x0, 0x0, 0x0, 0x0) close(r2) r3 = socket$inet6(0xa, 0x1, 0x8010000400000084) sendto$inet6(r3, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f00000000c0)={0x87, @remote, 0x4e23, 0x4, 'fo\x00', 0x4c, 0x65, 0x1}, 0x2c) close(r3) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'syz_tun\x00\b\xa1\xe4;\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r5, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 05:22:53 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x17b, 0x0, &(0x7f0000000080), 0x385, 0x0, 0x0}) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$SIOCX25SFACILITIES(r2, 0x89e3, &(0x7f0000000080)={0x42, 0x2, 0xc, 0xa, 0x101}) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r4 = socket$inet6(0xa, 0x1, 0x8010000400000084) sendto$inet6(r4, 0x0, 0x0, 0x0, 0x0, 0x0) close(r4) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x1000004, 0x2010, r4, 0x0) r5 = socket$inet6(0xa, 0x1, 0x8010000400000084) sendto$inet6(r5, 0x0, 0x0, 0x0, 0x0, 0x0) close(r5) sendfile(r5, r1, &(0x7f0000000140)=0x4c, 0x1ff) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r3, 0x10f, 0x84, &(0x7f00000000c0), &(0x7f0000000100)=0x4) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r2, 0x0) r6 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r6, 0x0) write$P9_RWALK(r6, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) write$P9_RWALK(r6, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x100000001) 05:22:53 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x11}}) 05:22:53 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12]}) 05:22:53 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2500000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2980.156991][T10831] RAX: ffffffffffffffda RBX: 00007fddc3987b40 RCX: 000000000045c4aa [ 2980.164963][T10831] RDX: 00007fddc3987ae0 RSI: 0000000020000100 RDI: 00007fddc3987b00 [ 2980.172925][T10831] RBP: 0000000000000001 R08: 00007fddc3987b40 R09: 00007fddc3987ae0 [ 2980.172932][T10831] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2980.172938][T10831] R13: 00000000004c8da6 R14: 00000000004e0200 R15: 0000000000000003 05:22:53 executing program 5 (fault-call:0 fault-nth:69): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 05:22:53 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x3f00000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2980.279107][T10944] binder: 10936:10944 unknown command 0 [ 2980.310811][T10944] binder: 10936:10944 ioctl c0306201 20000000 returned -22 05:22:53 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25]}) [ 2980.337929][T11014] FAULT_INJECTION: forcing a failure. [ 2980.337929][T11014] name failslab, interval 1, probability 0, space 0, times 0 [ 2980.351547][T10943] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2980.401343][T11014] CPU: 0 PID: 11014 Comm: syz-executor.5 Not tainted 5.4.0-rc2+ #0 [ 2980.409274][T11014] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2980.419327][T11014] Call Trace: [ 2980.422620][T11014] dump_stack+0x1d8/0x2f8 [ 2980.426958][T11014] should_fail+0x555/0x770 [ 2980.431387][T11014] __should_failslab+0x11a/0x160 [ 2980.436326][T11014] should_failslab+0x9/0x20 [ 2980.440829][T11014] kmem_cache_alloc_trace+0x5d/0x2f0 [ 2980.446110][T11014] ? legacy_init_fs_context+0x51/0xc0 05:22:53 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x12}}) 05:22:53 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2980.451483][T11014] legacy_init_fs_context+0x51/0xc0 [ 2980.456678][T11014] alloc_fs_context+0x53a/0x640 [ 2980.461541][T11014] fs_context_for_mount+0x24/0x30 [ 2980.466564][T11014] do_mount+0x10a7/0x2510 [ 2980.470903][T11014] ? copy_mount_options+0x308/0x3c0 [ 2980.476103][T11014] ksys_mount+0xcc/0x100 [ 2980.480353][T11014] __x64_sys_mount+0xbf/0xd0 [ 2980.484949][T11014] do_syscall_64+0xf7/0x1c0 [ 2980.489458][T11014] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2980.495348][T11014] RIP: 0033:0x45c4aa 05:22:53 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c]}) [ 2980.499232][T11014] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2980.518830][T11014] RSP: 002b:00007fddc3987a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2980.527236][T11014] RAX: ffffffffffffffda RBX: 00007fddc3987b40 RCX: 000000000045c4aa [ 2980.535901][T11014] RDX: 00007fddc3987ae0 RSI: 0000000020000100 RDI: 00007fddc3987b00 [ 2980.543872][T11014] RBP: 0000000000000001 R08: 00007fddc3987b40 R09: 00007fddc3987ae0 [ 2980.551846][T11014] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2980.559825][T11014] R13: 00000000004c8da6 R14: 00000000004e0200 R15: 0000000000000003 05:22:53 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x5c00000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2980.590322][T10943] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2980.706157][T11163] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:22:54 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x203}}, 0x0) 05:22:54 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)) 05:22:54 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.swap.current\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000000c0)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000140)={r2, @in={{0x2, 0x4e24, @loopback}}, [0x1, 0x100000001, 0xff, 0x3f, 0x9, 0x8001, 0x80000001, 0x7, 0xf2b, 0x7fff, 0x10001, 0x2, 0x100000000, 0x7fff, 0x3]}, &(0x7f0000000240)=0x100) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:22:54 executing program 5 (fault-call:0 fault-nth:70): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 05:22:54 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x8000000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:54 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x25}}) [ 2980.799532][T11163] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:22:54 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 05:22:54 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfeffffff00000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2980.892225][T11273] FAULT_INJECTION: forcing a failure. [ 2980.892225][T11273] name failslab, interval 1, probability 0, space 0, times 0 [ 2980.907102][T11274] binder: 11266:11274 ioctl c0306201 20000000 returned -14 [ 2980.997875][T11273] CPU: 1 PID: 11273 Comm: syz-executor.5 Not tainted 5.4.0-rc2+ #0 [ 2981.005812][T11273] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2981.015870][T11273] Call Trace: [ 2981.019170][T11273] dump_stack+0x1d8/0x2f8 [ 2981.023502][T11273] should_fail+0x555/0x770 [ 2981.027930][T11273] __should_failslab+0x11a/0x160 [ 2981.032873][T11273] should_failslab+0x9/0x20 [ 2981.037378][T11273] kmem_cache_alloc_trace+0x5d/0x2f0 [ 2981.042664][T11273] ? legacy_init_fs_context+0x51/0xc0 [ 2981.048036][T11273] legacy_init_fs_context+0x51/0xc0 [ 2981.053231][T11273] alloc_fs_context+0x53a/0x640 [ 2981.058088][T11273] fs_context_for_mount+0x24/0x30 [ 2981.063108][T11273] vfs_kern_mount+0x2c/0x160 [ 2981.067761][T11273] btrfs_mount+0x34f/0x18e0 [ 2981.072276][T11273] ? check_preemption_disabled+0x47/0x2a0 [ 2981.077999][T11273] ? vfs_parse_fs_string+0x13b/0x1a0 [ 2981.083280][T11273] ? cap_capable+0x250/0x290 [ 2981.087865][T11273] ? safesetid_security_capable+0x89/0xf0 [ 2981.093583][T11273] legacy_get_tree+0xf9/0x1a0 [ 2981.098254][T11273] ? btrfs_resize_thread_pool+0x290/0x290 [ 2981.103984][T11273] vfs_get_tree+0x8b/0x2a0 [ 2981.108402][T11273] do_mount+0x16c0/0x2510 [ 2981.112737][T11273] ? copy_mount_options+0x308/0x3c0 [ 2981.117976][T11273] ksys_mount+0xcc/0x100 [ 2981.122220][T11273] __x64_sys_mount+0xbf/0xd0 [ 2981.126809][T11273] do_syscall_64+0xf7/0x1c0 [ 2981.131312][T11273] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2981.137199][T11273] RIP: 0033:0x45c4aa [ 2981.141091][T11273] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2981.160687][T11273] RSP: 002b:00007fddc3987a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2981.169100][T11273] RAX: ffffffffffffffda RBX: 00007fddc3987b40 RCX: 000000000045c4aa [ 2981.177064][T11273] RDX: 00007fddc3987ae0 RSI: 0000000020000100 RDI: 00007fddc3987b00 [ 2981.185029][T11273] RBP: 0000000000000001 R08: 00007fddc3987b40 R09: 00007fddc3987ae0 05:22:54 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}) 05:22:54 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x48}}) [ 2981.192995][T11273] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2981.200958][T11273] R13: 00000000004c8da6 R14: 00000000004e0200 R15: 0000000000000003 05:22:54 executing program 4: arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x3) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:22:54 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff00000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2981.262331][T11326] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2981.329883][T11326] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2981.366890][T11491] binder: 11490:11491 ioctl c0306201 20000000 returned -14 05:22:54 executing program 5 (fault-call:0 fault-nth:71): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 05:22:54 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}) 05:22:54 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:54 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x4c}}) 05:22:54 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6(0xa, 0x1, 0x8010000400000084) sendto$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) close(r1) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000080)={{{@in, @in=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0xe8) r2 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000000)={0x1e8, 0x0, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:22:54 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}) 05:22:54 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000400000084) sendto$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) close(r1) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x20001, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000280)=0xc) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000300)={{0x1, 0x0, 0x3, 0x3, '\x00', 0xffffff7f}, 0x2, 0x4, 0x8, r3, 0x8, 0xc1c, 'syz0\x00', &(0x7f00000002c0)=['\x00', '\x00', 'sit0\x00', 'sit0\x00', 'sit0\x00', 'sit0\x00', '\x00', '\x00'], 0x18, [], [0x0, 0x5, 0x3, 0x1]}) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000040)=0x200, 0x4) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x86c3, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r4, 0x29, 0xd3, &(0x7f0000000580)={{0xa, 0x4e24, 0x7, @dev={0xfe, 0x80, [], 0x13}}, {0xa, 0x4e21, 0xfffffffa, @mcast2, 0xe53}, 0x74, [0x1, 0xe57, 0x400, 0x1, 0x7, 0x6, 0x5, 0x7]}, 0x5c) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c000000140009000000000a000000", @ANYRES32=r6, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) r7 = socket$inet6(0xa, 0x1, 0x8010000400000084) sendto$inet6(r7, 0x0, 0x0, 0x0, 0x0, 0x0) close(r7) r8 = socket$inet6(0xa, 0x1, 0x8010000400000084) sendto$inet6(r8, 0x0, 0x0, 0x0, 0x0, 0x0) close(r8) r9 = socket$inet6(0xa, 0x1, 0x8010000400000084) sendto$inet6(r9, 0x0, 0x0, 0x0, 0x0, 0x0) close(r9) r10 = socket$inet6(0xa, 0x1, 0x8010000400000084) sendto$inet6(r10, 0x0, 0x0, 0x0, 0x0, 0x0) close(r10) r11 = socket$inet6(0xa, 0x1, 0x8010000400000084) sendto$inet6(r11, 0x0, 0x0, 0x0, 0x0, 0x0) close(r11) r12 = socket$inet6(0xa, 0x1, 0x8010000400000084) sendto$inet6(r12, 0x0, 0x0, 0x0, 0x0, 0x0) close(r12) r13 = socket$inet6(0xa, 0x1, 0x8010000400000084) sendto$inet6(r13, 0x0, 0x0, 0x0, 0x0, 0x0) close(r13) r14 = syz_open_dev$dspn(&(0x7f00000008c0)='/dev/dsp#\x00', 0x2, 0x4c01c0) sendmsg$nl_route(r14, &(0x7f0000000100)={0x0, 0x3a0, &(0x7f0000000880)={&(0x7f0000000700)=ANY=[], 0x7}}, 0x0) [ 2981.497818][T11704] FAULT_INJECTION: forcing a failure. [ 2981.497818][T11704] name failslab, interval 1, probability 0, space 0, times 0 05:22:54 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2981.586492][T11704] CPU: 1 PID: 11704 Comm: syz-executor.5 Not tainted 5.4.0-rc2+ #0 [ 2981.594533][T11704] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2981.597049][T11718] binder: 11714:11718 unknown command 0 [ 2981.604583][T11704] Call Trace: [ 2981.604602][T11704] dump_stack+0x1d8/0x2f8 [ 2981.604619][T11704] should_fail+0x555/0x770 [ 2981.604638][T11704] __should_failslab+0x11a/0x160 [ 2981.604652][T11704] ? btrfs_mount+0x83/0x18e0 [ 2981.624499][T11718] binder: 11714:11718 ioctl c0306201 20000000 returned -22 [ 2981.627092][T11704] should_failslab+0x9/0x20 [ 2981.627106][T11704] __kmalloc_track_caller+0x79/0x340 [ 2981.627123][T11704] kstrdup+0x34/0x70 [ 2981.627136][T11704] btrfs_mount+0x83/0x18e0 [ 2981.627156][T11704] ? check_preemption_disabled+0x47/0x2a0 [ 2981.662738][T11704] ? vfs_parse_fs_string+0x13b/0x1a0 [ 2981.668026][T11704] ? cap_capable+0x250/0x290 [ 2981.672644][T11704] ? safesetid_security_capable+0x89/0xf0 [ 2981.678372][T11704] legacy_get_tree+0xf9/0x1a0 [ 2981.683049][T11704] ? btrfs_resize_thread_pool+0x290/0x290 [ 2981.688779][T11704] vfs_get_tree+0x8b/0x2a0 [ 2981.693198][T11704] do_mount+0x16c0/0x2510 [ 2981.697550][T11704] ? copy_mount_options+0x308/0x3c0 [ 2981.702759][T11704] ksys_mount+0xcc/0x100 [ 2981.707000][T11704] __x64_sys_mount+0xbf/0xd0 [ 2981.711602][T11704] do_syscall_64+0xf7/0x1c0 [ 2981.716115][T11704] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2981.722002][T11704] RIP: 0033:0x45c4aa [ 2981.725888][T11704] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2981.745619][T11704] RSP: 002b:00007fddc3987a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2981.754032][T11704] RAX: ffffffffffffffda RBX: 00007fddc3987b40 RCX: 000000000045c4aa [ 2981.762000][T11704] RDX: 00007fddc3987ae0 RSI: 0000000020000100 RDI: 00007fddc3987b00 [ 2981.769973][T11704] RBP: 0000000000000001 R08: 00007fddc3987b40 R09: 00007fddc3987ae0 [ 2981.777940][T11704] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 05:22:54 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x5c}}) 05:22:55 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RWALK(r1, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r2, 0x0) write$P9_RWALK(r2, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000080), 0xfffffeaf, 0x0, 0x0}) 05:22:55 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) finit_module(r1, &(0x7f0000000080)='sit0\x00', 0x0) r2 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/current\x00', 0x2, 0x0) lseek(r2, 0x0, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r4, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba000020000000000000000000", @ANYRES32=0x0, @ANYBLOB="010000000000000008001b0000000000"], 0x28}}, 0x0) [ 2981.785910][T11704] R13: 00000000004c8da6 R14: 00000000004e0200 R15: 0000000000000003 05:22:55 executing program 5 (fault-call:0 fault-nth:72): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 05:22:55 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) [ 2981.933646][T11927] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:22:55 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x68}}) 05:22:55 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2981.978001][T12100] FAULT_INJECTION: forcing a failure. [ 2981.978001][T12100] name failslab, interval 1, probability 0, space 0, times 0 [ 2981.999532][T11927] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2982.046180][T12100] CPU: 0 PID: 12100 Comm: syz-executor.5 Not tainted 5.4.0-rc2+ #0 [ 2982.054108][T12100] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2982.064164][T12100] Call Trace: [ 2982.067458][T12100] dump_stack+0x1d8/0x2f8 [ 2982.071793][T12100] should_fail+0x555/0x770 [ 2982.076216][T12100] __should_failslab+0x11a/0x160 [ 2982.081160][T12100] should_failslab+0x9/0x20 [ 2982.085662][T12100] kmem_cache_alloc_trace+0x5d/0x2f0 [ 2982.090945][T12100] ? alloc_fs_context+0x65/0x640 [ 2982.095881][T12100] alloc_fs_context+0x65/0x640 [ 2982.100653][T12100] ? kfree+0x194/0x200 [ 2982.104728][T12100] fs_context_for_mount+0x24/0x30 [ 2982.109755][T12100] vfs_kern_mount+0x2c/0x160 [ 2982.114346][T12100] btrfs_mount+0x34f/0x18e0 [ 2982.118851][T12100] ? check_preemption_disabled+0x47/0x2a0 [ 2982.124571][T12100] ? vfs_parse_fs_string+0x13b/0x1a0 [ 2982.129849][T12100] ? cap_capable+0x250/0x290 [ 2982.134437][T12100] ? safesetid_security_capable+0x89/0xf0 [ 2982.140157][T12100] legacy_get_tree+0xf9/0x1a0 [ 2982.144826][T12100] ? btrfs_resize_thread_pool+0x290/0x290 [ 2982.150542][T12100] vfs_get_tree+0x8b/0x2a0 [ 2982.154950][T12100] do_mount+0x16c0/0x2510 [ 2982.159275][T12100] ? copy_mount_options+0x308/0x3c0 [ 2982.164472][T12100] ksys_mount+0xcc/0x100 [ 2982.168711][T12100] __x64_sys_mount+0xbf/0xd0 [ 2982.173307][T12100] do_syscall_64+0xf7/0x1c0 [ 2982.177813][T12100] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2982.183703][T12100] RIP: 0033:0x45c4aa [ 2982.187595][T12100] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2982.207278][T12100] RSP: 002b:00007fddc3987a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2982.215681][T12100] RAX: ffffffffffffffda RBX: 00007fddc3987b40 RCX: 000000000045c4aa [ 2982.223651][T12100] RDX: 00007fddc3987ae0 RSI: 0000000020000100 RDI: 00007fddc3987b00 [ 2982.231621][T12100] RBP: 0000000000000001 R08: 00007fddc3987b40 R09: 00007fddc3987ae0 05:22:55 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:55 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) r2 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r2, 0xc0485619, &(0x7f00000000c0)={0x401, 0x3200e0, "9c7ecfeb09795a97f1006c0a5a5a4e17606b87a538337990", {0x7}, 0x9}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:22:55 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}) [ 2982.239589][T12100] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2982.247560][T12100] R13: 00000000004c8da6 R14: 00000000004e0200 R15: 0000000000000003 05:22:55 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:55 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 2982.316319][T12146] binder: 12145:12146 ioctl c0306201 20000000 returned -14 05:22:55 executing program 5 (fault-call:0 fault-nth:73): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 05:22:55 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:55 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}) 05:22:55 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x0, 0x2) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) ioctl$VIDIOC_PREPARE_BUF(r1, 0xc058565d, &(0x7f0000000100)={0x9, 0x0, 0x4, 0x20000, {r2, r3/1000+10000}, {0x7, 0x0, 0x1, 0x81, 0x1, 0xff, "7cf5e1e4"}, 0x100, 0x1, @userptr=0x4, 0x4}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x0, 0x0}) [ 2982.507094][T12357] FAULT_INJECTION: forcing a failure. [ 2982.507094][T12357] name failslab, interval 1, probability 0, space 0, times 0 [ 2982.513426][T12334] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:22:55 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x300, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2982.592209][T12334] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2982.606594][T12357] CPU: 0 PID: 12357 Comm: syz-executor.5 Not tainted 5.4.0-rc2+ #0 [ 2982.615491][T12357] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2982.625544][T12357] Call Trace: [ 2982.628842][T12357] dump_stack+0x1d8/0x2f8 [ 2982.633177][T12357] should_fail+0x555/0x770 [ 2982.637604][T12357] __should_failslab+0x11a/0x160 [ 2982.642547][T12357] ? tomoyo_encode2+0x273/0x5a0 [ 2982.647394][T12357] should_failslab+0x9/0x20 [ 2982.651896][T12357] __kmalloc+0x7a/0x340 [ 2982.656049][T12357] tomoyo_encode2+0x273/0x5a0 [ 2982.660727][T12357] tomoyo_realpath_from_path+0x769/0x7c0 [ 2982.666371][T12357] tomoyo_mount_permission+0x923/0xa30 [ 2982.671845][T12357] ? kmem_cache_free+0xd8/0xf0 [ 2982.676626][T12357] tomoyo_sb_mount+0x35/0x40 [ 2982.681228][T12357] security_sb_mount+0x84/0xe0 [ 2982.685993][T12357] do_mount+0x10a/0x2510 [ 2982.690229][T12357] ? copy_mount_options+0x278/0x3c0 [ 2982.695426][T12357] ? copy_mount_options+0x292/0x3c0 [ 2982.700632][T12357] ? copy_mount_options+0x308/0x3c0 [ 2982.705830][T12357] ksys_mount+0xcc/0x100 [ 2982.710074][T12357] __x64_sys_mount+0xbf/0xd0 [ 2982.711556][T12364] binder: 12363:12364 ioctl c0306201 20000000 returned -14 [ 2982.714663][T12357] do_syscall_64+0xf7/0x1c0 [ 2982.714680][T12357] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2982.714689][T12357] RIP: 0033:0x45c4aa [ 2982.714701][T12357] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2982.755705][T12357] RSP: 002b:00007fddc3987a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2982.764118][T12357] RAX: ffffffffffffffda RBX: 00007fddc3987b40 RCX: 000000000045c4aa [ 2982.772098][T12357] RDX: 00007fddc3987ae0 RSI: 0000000020000100 RDI: 00007fddc3987b00 [ 2982.780073][T12357] RBP: 0000000000000001 R08: 00007fddc3987b40 R09: 00007fddc3987ae0 05:22:56 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x6c}}) 05:22:56 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}) [ 2982.788043][T12357] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2982.796015][T12357] R13: 00000000004c8da6 R14: 00000000004e0200 R15: 0000000000000003 [ 2982.810362][T12370] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:22:56 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x3800000000, 0x8000) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x0, 0x0}) [ 2982.859860][T12370] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2982.879495][T12357] ERROR: Out of memory at tomoyo_realpath_from_path. 05:22:56 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}) 05:22:56 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x18deea, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:56 executing program 5 (fault-call:0 fault-nth:74): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 05:22:56 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="2c0000001400a051dae76d43e50678e2fceaf9ffff090000130000020000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 2982.984206][T12511] binder: 12503:12511 ioctl c0306201 20000000 returned -14 05:22:56 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x74}}) 05:22:56 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb]}) 05:22:56 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000100)=0x40a7, 0x4) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x2e8, 0x32b40) ioctl$SIOCRSSCAUSE(r1, 0x89e1, &(0x7f00000000c0)=0x20) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x0, 0x0}) [ 2983.172903][T12642] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2983.191900][T12691] FAULT_INJECTION: forcing a failure. [ 2983.191900][T12691] name failslab, interval 1, probability 0, space 0, times 0 [ 2983.218600][T12691] CPU: 1 PID: 12691 Comm: syz-executor.5 Not tainted 5.4.0-rc2+ #0 [ 2983.226517][T12691] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2983.236573][T12691] Call Trace: [ 2983.239887][T12691] dump_stack+0x1d8/0x2f8 [ 2983.244223][T12691] should_fail+0x555/0x770 [ 2983.248645][T12691] __should_failslab+0x11a/0x160 [ 2983.253586][T12691] should_failslab+0x9/0x20 [ 2983.258087][T12691] kmem_cache_alloc_trace+0x5d/0x2f0 [ 2983.263367][T12691] ? btrfs_mount_root+0x12c/0x1040 [ 2983.268475][T12691] btrfs_mount_root+0x12c/0x1040 [ 2983.273420][T12691] ? vfs_parse_fs_string+0x13b/0x1a0 [ 2983.278702][T12691] ? rcu_read_lock_sched_held+0x10b/0x170 [ 2983.284415][T12691] ? trace_kfree+0xb2/0x110 [ 2983.288916][T12691] legacy_get_tree+0xf9/0x1a0 [ 2983.293588][T12691] ? btrfs_control_open+0x40/0x40 [ 2983.298608][T12691] vfs_get_tree+0x8b/0x2a0 [ 2983.303021][T12691] vfs_kern_mount+0xc2/0x160 [ 2983.307612][T12691] btrfs_mount+0x34f/0x18e0 [ 2983.312122][T12691] ? check_preemption_disabled+0x47/0x2a0 [ 2983.317840][T12691] ? vfs_parse_fs_string+0x13b/0x1a0 [ 2983.323121][T12691] ? cap_capable+0x250/0x290 [ 2983.327706][T12691] ? safesetid_security_capable+0x89/0xf0 [ 2983.333424][T12691] legacy_get_tree+0xf9/0x1a0 [ 2983.338093][T12691] ? btrfs_resize_thread_pool+0x290/0x290 [ 2983.343816][T12691] vfs_get_tree+0x8b/0x2a0 [ 2983.348228][T12691] do_mount+0x16c0/0x2510 [ 2983.352550][T12691] ? copy_mount_options+0x278/0x3c0 [ 2983.357751][T12691] ? copy_mount_options+0x250/0x3c0 [ 2983.362947][T12691] ? copy_mount_options+0x308/0x3c0 [ 2983.368148][T12691] ksys_mount+0xcc/0x100 [ 2983.372391][T12691] __x64_sys_mount+0xbf/0xd0 [ 2983.376982][T12691] do_syscall_64+0xf7/0x1c0 [ 2983.381488][T12691] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2983.387374][T12691] RIP: 0033:0x45c4aa [ 2983.391262][T12691] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2983.410883][T12691] RSP: 002b:00007fddc3987a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 05:22:56 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc]}) 05:22:56 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffffff1f, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2983.419285][T12691] RAX: ffffffffffffffda RBX: 00007fddc3987b40 RCX: 000000000045c4aa [ 2983.427247][T12691] RDX: 00007fddc3987ae0 RSI: 0000000020000100 RDI: 00007fddc3987b00 [ 2983.435212][T12691] RBP: 0000000000000001 R08: 00007fddc3987b40 R09: 00007fddc3987ae0 [ 2983.443175][T12691] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2983.451136][T12691] R13: 00000000004c8da6 R14: 00000000004e0200 R15: 0000000000000003 [ 2983.489697][T12642] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:22:56 executing program 5 (fault-call:0 fault-nth:75): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 05:22:56 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x3, 0x7) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000000)={@remote, r3}, 0x14) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000100)={{{@in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000200)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@mcast1, @in=@local, 0x4e20, 0x51, 0x4e23, 0x9, 0xa, 0x0, 0x0, 0x11, r3, r4}, {0xb67e, 0xfa, 0x5, 0x80000001, 0xaa6, 0x3ff, 0x0, 0x9}, {0x1, 0x9, 0x6, 0x7f}, 0xe7, 0x6e6bb9, 0x0, 0x1, 0x1, 0x2}, {{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4d2, 0x2b}, 0xa, @in=@remote, 0x3, 0x4, 0x0, 0x6, 0x1, 0x4, 0x3}}, 0xe8) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) r6 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffa000/0x4000)=nil) shmctl$IPC_RMID(r6, 0x0) ioctl$BINDER_WRITE_READ(r5, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x0, 0x0}) r7 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r7, 0x0) write$P9_RWALK(r7, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) getsockopt$inet_mreqn(r7, 0x0, 0x20, &(0x7f0000000080)={@empty, @multicast1}, &(0x7f00000000c0)=0xc) [ 2983.551091][T12831] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:22:56 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x7a}}) 05:22:56 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}) [ 2983.630111][T12831] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:22:57 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="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"], 0x28}}, 0x0) [ 2983.692227][T12907] binder: 12905:12907 ioctl c0306201 20000000 returned -14 [ 2983.710875][T12910] FAULT_INJECTION: forcing a failure. [ 2983.710875][T12910] name failslab, interval 1, probability 0, space 0, times 0 [ 2983.769931][T12910] CPU: 0 PID: 12910 Comm: syz-executor.5 Not tainted 5.4.0-rc2+ #0 [ 2983.777949][T12910] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2983.788006][T12910] Call Trace: [ 2983.791303][T12910] dump_stack+0x1d8/0x2f8 [ 2983.795637][T12910] should_fail+0x555/0x770 [ 2983.800068][T12910] __should_failslab+0x11a/0x160 [ 2983.805013][T12910] ? vfs_parse_fs_string+0xed/0x1a0 [ 2983.806479][T12964] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 05:22:57 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2983.810215][T12910] should_failslab+0x9/0x20 [ 2983.810228][T12910] __kmalloc_track_caller+0x79/0x340 [ 2983.810244][T12910] kmemdup_nul+0x2a/0xa0 [ 2983.810256][T12910] vfs_parse_fs_string+0xed/0x1a0 [ 2983.810276][T12910] vfs_kern_mount+0x77/0x160 [ 2983.810289][T12910] btrfs_mount+0x34f/0x18e0 [ 2983.810309][T12910] ? check_preemption_disabled+0x47/0x2a0 [ 2983.810325][T12910] ? vfs_parse_fs_string+0x13b/0x1a0 [ 2983.858631][T12910] ? cap_capable+0x250/0x290 [ 2983.863229][T12910] ? safesetid_security_capable+0x89/0xf0 [ 2983.868957][T12910] legacy_get_tree+0xf9/0x1a0 [ 2983.873634][T12910] ? btrfs_resize_thread_pool+0x290/0x290 [ 2983.879365][T12910] vfs_get_tree+0x8b/0x2a0 [ 2983.883788][T12910] do_mount+0x16c0/0x2510 [ 2983.888153][T12910] ? copy_mount_options+0x308/0x3c0 [ 2983.893355][T12910] ksys_mount+0xcc/0x100 [ 2983.897600][T12910] __x64_sys_mount+0xbf/0xd0 [ 2983.902195][T12910] do_syscall_64+0xf7/0x1c0 [ 2983.906703][T12910] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2983.912593][T12910] RIP: 0033:0x45c4aa 05:22:57 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x100, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r2, 0x4010ae68, &(0x7f0000000080)={0x4, 0x11d000}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r3, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 2983.916492][T12910] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2983.936216][T12910] RSP: 002b:00007fddc3987a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2983.944636][T12910] RAX: ffffffffffffffda RBX: 00007fddc3987b40 RCX: 000000000045c4aa [ 2983.952610][T12910] RDX: 00007fddc3987ae0 RSI: 0000000020000100 RDI: 00007fddc3987b00 [ 2983.960581][T12910] RBP: 0000000000000001 R08: 00007fddc3987b40 R09: 00007fddc3987ae0 05:22:57 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe]}) [ 2983.968558][T12910] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2983.976531][T12910] R13: 00000000004c8da6 R14: 00000000004e0200 R15: 0000000000000003 05:22:57 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}) 05:22:57 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x0, 0x0}) r2 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x1, 0x24ad00) ioctl$USBDEVFS_SETINTERFACE(r2, 0x80085504, &(0x7f00000000c0)={0xfffffffd, 0x1}) 05:22:57 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4365cc0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:57 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}) [ 2984.154765][T13127] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2984.231564][T13127] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:22:57 executing program 5 (fault-call:0 fault-nth:76): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 05:22:57 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0f00000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:57 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12]}) 05:22:57 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) getpriority(0x1, 0xffffffffffffffff) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:22:57 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RWALK(r1, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) ioctl$IMDELTIMER(r1, 0x80044941, &(0x7f0000000040)=0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r3, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 05:22:57 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x300}}) 05:22:57 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0edb401000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2984.585661][T13241] binder: 13238:13241 ioctl c0306201 20000000 returned -14 05:22:57 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25]}) [ 2984.663453][T13242] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:22:58 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x500}}) 05:22:58 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0202000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2984.737947][T13242] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2984.768222][T13412] FAULT_INJECTION: forcing a failure. [ 2984.768222][T13412] name failslab, interval 1, probability 0, space 0, times 0 [ 2984.813359][T13412] CPU: 0 PID: 13412 Comm: syz-executor.5 Not tainted 5.4.0-rc2+ #0 [ 2984.821299][T13412] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2984.831364][T13412] Call Trace: [ 2984.834661][T13412] dump_stack+0x1d8/0x2f8 [ 2984.839002][T13412] should_fail+0x555/0x770 [ 2984.843439][T13412] __should_failslab+0x11a/0x160 [ 2984.848377][T13412] should_failslab+0x9/0x20 [ 2984.848392][T13412] kmem_cache_alloc_trace+0x5d/0x2f0 [ 2984.848402][T13412] ? alloc_fs_context+0x65/0x640 [ 2984.848417][T13412] alloc_fs_context+0x65/0x640 [ 2984.848436][T13412] ? kfree+0x194/0x200 [ 2984.858185][T13412] fs_context_for_mount+0x24/0x30 [ 2984.858198][T13412] vfs_kern_mount+0x2c/0x160 [ 2984.858213][T13412] btrfs_mount+0x34f/0x18e0 [ 2984.858235][T13412] ? check_preemption_disabled+0x47/0x2a0 [ 2984.858251][T13412] ? vfs_parse_fs_string+0x13b/0x1a0 [ 2984.897039][T13412] ? cap_capable+0x250/0x290 [ 2984.901632][T13412] ? safesetid_security_capable+0x89/0xf0 [ 2984.907356][T13412] legacy_get_tree+0xf9/0x1a0 [ 2984.912037][T13412] ? btrfs_resize_thread_pool+0x290/0x290 [ 2984.917829][T13412] vfs_get_tree+0x8b/0x2a0 [ 2984.922258][T13412] do_mount+0x16c0/0x2510 [ 2984.926596][T13412] ? copy_mount_options+0x308/0x3c0 [ 2984.931797][T13412] ksys_mount+0xcc/0x100 [ 2984.936043][T13412] __x64_sys_mount+0xbf/0xd0 [ 2984.940640][T13412] do_syscall_64+0xf7/0x1c0 [ 2984.945149][T13412] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2984.951038][T13412] RIP: 0033:0x45c4aa 05:22:58 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0203000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:58 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x508, 0x8000) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x0, 0x0}) epoll_create1(0x40000) [ 2984.954936][T13412] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2984.974544][T13412] RSP: 002b:00007fddc3987a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2984.982959][T13412] RAX: ffffffffffffffda RBX: 00007fddc3987b40 RCX: 000000000045c4aa [ 2984.990932][T13412] RDX: 00007fddc3987ae0 RSI: 0000000020000100 RDI: 00007fddc3987b00 [ 2984.998899][T13412] RBP: 0000000000000001 R08: 00007fddc3987b40 R09: 00007fddc3987ae0 [ 2985.006871][T13412] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2985.014838][T13412] R13: 00000000004c8da6 R14: 00000000004e0200 R15: 0000000000000003 [ 2985.056351][T13497] binder: 13479:13497 ioctl c0306201 20000000 returned -14 05:22:58 executing program 5 (fault-call:0 fault-nth:77): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 05:22:58 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c]}) 05:22:58 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31b85f, 0x1, 0x4, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINK_NETNSID={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x40}, 0x0) 05:22:58 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x600}}) 05:22:58 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0204000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:58 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x0, 0x2) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x7, 0x4) r2 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0}) 05:22:58 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)) 05:22:58 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0205000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:58 executing program 1: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 05:22:58 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x700}}) [ 2985.316973][T13787] FAULT_INJECTION: forcing a failure. [ 2985.316973][T13787] name fail_page_alloc, interval 1, probability 0, space 0, times 0 05:22:58 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./bus/file0\x00', &(0x7f0000000100)='trusted.overlay.opaque\x00', &(0x7f0000000140)='y\x00', 0x2, 0x3) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RWALK(r1, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) ioctl$USBDEVFS_CLEAR_HALT(r1, 0x80045515, &(0x7f0000000080)={0x1}) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r2, 0x0) write$P9_RWALK(r2, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) getsockopt$inet_sctp_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000000200), &(0x7f0000000240)=0x4) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x22100400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x0, 0x0}) ioctl$MON_IOCX_MFETCH(r1, 0xc0109207, &(0x7f00000001c0)={&(0x7f0000000180)=[0x0, 0x0, 0x0], 0x3, 0x7fff}) [ 2985.393181][T13787] CPU: 0 PID: 13787 Comm: syz-executor.5 Not tainted 5.4.0-rc2+ #0 [ 2985.401112][T13787] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2985.411174][T13787] Call Trace: [ 2985.414473][T13787] dump_stack+0x1d8/0x2f8 [ 2985.418810][T13787] should_fail+0x555/0x770 [ 2985.423236][T13787] should_fail_alloc_page+0x55/0x60 [ 2985.428441][T13787] prepare_alloc_pages+0x283/0x460 [ 2985.433567][T13787] __alloc_pages_nodemask+0xb2/0x5d0 05:22:58 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0206000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2985.438857][T13787] ? rcu_lock_release+0x26/0x30 [ 2985.443719][T13787] alloc_pages_current+0x2db/0x500 [ 2985.448894][T13787] __page_cache_alloc+0x7d/0x1e0 [ 2985.453839][T13787] do_read_cache_page+0x1f8/0xcb0 [ 2985.458871][T13787] read_cache_page_gfp+0x29/0x30 [ 2985.463864][T13787] btrfs_scan_one_device+0x16a/0x450 [ 2985.469156][T13787] ? trace_hardirqs_on+0x74/0x80 [ 2985.474101][T13787] btrfs_mount_root+0x4af/0x1040 [ 2985.479049][T13787] ? trace_kfree+0xb2/0x110 [ 2985.483558][T13787] legacy_get_tree+0xf9/0x1a0 [ 2985.488236][T13787] ? btrfs_control_open+0x40/0x40 [ 2985.493266][T13787] vfs_get_tree+0x8b/0x2a0 [ 2985.497690][T13787] vfs_kern_mount+0xc2/0x160 [ 2985.502280][T13787] btrfs_mount+0x34f/0x18e0 [ 2985.506794][T13787] ? check_preemption_disabled+0x47/0x2a0 [ 2985.512514][T13787] ? vfs_parse_fs_string+0x13b/0x1a0 [ 2985.517793][T13787] ? cap_capable+0x250/0x290 [ 2985.522385][T13787] ? safesetid_security_capable+0x89/0xf0 [ 2985.528122][T13787] legacy_get_tree+0xf9/0x1a0 [ 2985.532805][T13787] ? btrfs_resize_thread_pool+0x290/0x290 [ 2985.537989][T13888] binder: 13887:13888 ioctl c0306201 20000000 returned -14 [ 2985.538528][T13787] vfs_get_tree+0x8b/0x2a0 [ 2985.538555][T13787] do_mount+0x16c0/0x2510 [ 2985.554497][T13787] ? copy_mount_options+0x308/0x3c0 [ 2985.559696][T13787] ksys_mount+0xcc/0x100 [ 2985.563942][T13787] __x64_sys_mount+0xbf/0xd0 [ 2985.568536][T13787] do_syscall_64+0xf7/0x1c0 [ 2985.573049][T13787] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2985.579023][T13787] RIP: 0033:0x45c4aa [ 2985.582915][T13787] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2985.593568][T13963] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2985.602509][T13787] RSP: 002b:00007fddc3987a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2985.602521][T13787] RAX: ffffffffffffffda RBX: 00007fddc3987b40 RCX: 000000000045c4aa [ 2985.602527][T13787] RDX: 00007fddc3987ae0 RSI: 0000000020000100 RDI: 00007fddc3987b00 [ 2985.602533][T13787] RBP: 0000000000000001 R08: 00007fddc3987b40 R09: 00007fddc3987ae0 [ 2985.602539][T13787] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2985.602544][T13787] R13: 00000000004c8da6 R14: 00000000004e0200 R15: 0000000000000003 [ 2985.720513][T13963] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:22:59 executing program 5 (fault-call:0 fault-nth:78): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 05:22:59 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 05:22:59 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0207000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:59 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0x900}}) 05:22:59 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x200, 0x800) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f00000000c0)) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x1, 0x8010000400000084) sendto$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) close(r1) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x0, 0x0}) [ 2985.767874][T14095] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2985.827606][T14095] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:22:59 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}) 05:22:59 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0208000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2985.885936][T14103] binder: 14099:14103 ioctl c0306201 20000000 returned -14 05:22:59 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="efc09a280000", @ANYRES32=0x0, @ANYBLOB="010000000000000008001b0000000000"], 0x28}}, 0x0) [ 2986.010080][T14279] FAULT_INJECTION: forcing a failure. [ 2986.010080][T14279] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2986.023316][T14279] CPU: 0 PID: 14279 Comm: syz-executor.5 Not tainted 5.4.0-rc2+ #0 [ 2986.031203][T14279] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2986.041258][T14279] Call Trace: [ 2986.044561][T14279] dump_stack+0x1d8/0x2f8 [ 2986.048900][T14279] should_fail+0x555/0x770 [ 2986.053323][T14279] should_fail_alloc_page+0x55/0x60 [ 2986.053334][T14279] prepare_alloc_pages+0x283/0x460 [ 2986.053350][T14279] __alloc_pages_nodemask+0xb2/0x5d0 [ 2986.053373][T14279] kmem_getpages+0x4d/0xa00 [ 2986.063651][T14279] cache_grow_begin+0x7e/0x2c0 [ 2986.078156][T14279] cache_alloc_refill+0x311/0x3f0 [ 2986.083185][T14279] ? check_preemption_disabled+0xb7/0x2a0 [ 2986.088911][T14279] kmem_cache_alloc_trace+0x2d0/0x2f0 [ 2986.094281][T14279] ? btrfs_mount_root+0x12c/0x1040 [ 2986.099395][T14279] btrfs_mount_root+0x12c/0x1040 [ 2986.099415][T14279] ? vfs_parse_fs_string+0x13b/0x1a0 [ 2986.099426][T14279] ? rcu_read_lock_sched_held+0x10b/0x170 [ 2986.099438][T14279] ? trace_kfree+0xb2/0x110 [ 2986.099453][T14279] legacy_get_tree+0xf9/0x1a0 [ 2986.099461][T14279] ? btrfs_control_open+0x40/0x40 [ 2986.099472][T14279] vfs_get_tree+0x8b/0x2a0 [ 2986.099486][T14279] vfs_kern_mount+0xc2/0x160 [ 2986.099497][T14279] btrfs_mount+0x34f/0x18e0 [ 2986.099515][T14279] ? check_preemption_disabled+0x47/0x2a0 [ 2986.099530][T14279] ? vfs_parse_fs_string+0x13b/0x1a0 [ 2986.099539][T14279] ? cap_capable+0x250/0x290 [ 2986.099553][T14279] ? safesetid_security_capable+0x89/0xf0 [ 2986.099566][T14279] legacy_get_tree+0xf9/0x1a0 [ 2986.115454][T14279] ? btrfs_resize_thread_pool+0x290/0x290 [ 2986.115469][T14279] vfs_get_tree+0x8b/0x2a0 [ 2986.115482][T14279] do_mount+0x16c0/0x2510 [ 2986.115500][T14279] ? copy_mount_options+0x308/0x3c0 [ 2986.115512][T14279] ksys_mount+0xcc/0x100 [ 2986.115525][T14279] __x64_sys_mount+0xbf/0xd0 [ 2986.115541][T14279] do_syscall_64+0xf7/0x1c0 [ 2986.115557][T14279] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2986.115569][T14279] RIP: 0033:0x45c4aa [ 2986.211776][T14279] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2986.231384][T14279] RSP: 002b:00007fddc3987a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2986.239794][T14279] RAX: ffffffffffffffda RBX: 00007fddc3987b40 RCX: 000000000045c4aa [ 2986.247764][T14279] RDX: 00007fddc3987ae0 RSI: 0000000020000100 RDI: 00007fddc3987b00 05:22:59 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0xa00}}) 05:22:59 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}) 05:22:59 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0209000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:59 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) unshare(0x2a000400) pipe(&(0x7f0000000000)={0xffffffffffffffff}) splice(r2, 0x0, r1, &(0x7f0000000100), 0x81, 0x0) r3 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x0, 0x0}) [ 2986.255733][T14279] RBP: 0000000000000001 R08: 00007fddc3987b40 R09: 00007fddc3987ae0 [ 2986.263702][T14279] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2986.271672][T14279] R13: 00000000004c8da6 R14: 00000000004e0200 R15: 0000000000000003 [ 2986.351139][T14325] binder: 14324:14325 ioctl c0306201 20000000 returned -14 05:22:59 executing program 5 (fault-call:0 fault-nth:79): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 05:22:59 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed020a000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:22:59 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}) 05:22:59 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0xb00}}) 05:22:59 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x7, 0xb296dc3314c7f7eb) bind$tipc(r1, &(0x7f00000000c0)=@nameseq={0x1e, 0x1, 0x2, {0x40, 0x3}}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) r4 = socket$inet6(0xa, 0x1, 0x8010000400000084) sendto$inet6(r4, 0x0, 0x0, 0x0, 0x0, 0x0) close(r4) sendto(r4, &(0x7f0000000400)="1e61e2358ee2c7018c8e5ab4ba754588b87b9f2b99b5ea35e972a5783fea129a02d6318d09c1869ec5030fceb9e80a3aa1a646a8ee157b1cf03a7410d3b600c6c531061b195902cd488ffea89a2f90b2ca9b69b52a643e88445d374a434ae8a9fa10f8c3c5e6a471ca8853814835f7044747a0593f23d5ea4f6afc3acc824c6cf03dfe0287a00be65167819f59ce4af41c9a757f14e3", 0x96, 0x40050041, &(0x7f0000000140)=@tipc=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x1}}, 0x80) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r3, @ANYBLOB="14000100fe80000000000000e8ff2ddd5084edcbdc485efd9d944f0c81f535f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0ff0f969d5e3531b52a99867817879908035c4ca9b3da4772d295115e93f3139978f8e718c14b1121b0c352305c54697ed0d591564bff4e801edcc7d0dfa4dce8fed9ed94"], 0x2c}}, 0x0) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000040)={0x0, 0x8, 0x3, 0x2}, 0x10) r5 = socket$inet6(0xa, 0x1, 0x8010000400000084) socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x0, 0x0, 0x0) close(r5) r6 = socket$inet6(0xa, 0x1, 0x8010000400000084) sendto$inet6(r6, 0x0, 0x0, 0x0, 0x0, 0x0) close(r6) sendmsg(r5, &(0x7f0000000a80)={&(0x7f0000000340)=@pppol2tpv3={0x18, 0x1, {0x0, r6, {0x2, 0x4e22, @remote}, 0x0, 0x1, 0x4, 0x4}}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000004c0)="068d36e0d136942ae119930a57a6ed970d860cacdde024b195bc5de3f41506cda7c548ac5251d32b232dbd57cdf1f0edfc0dde11a62936d27250dec7464f0784616444c1154aabc23eb5a516ca5fdcc071b8f85dc6a6450ed71ac7", 0x5b}, {&(0x7f0000000540)="e78e82811cbd1940501ae29d6cd74cb0cde26ef9f1a007f5c8c19852a3d7833fe913a6dc010a77fa298a5922a88f442a6954978f92f31d9ee40085f5b480bc8d2d605ea45d5d0c7d2c4941e462b3cb25b617f6f832dcffcff13e6754525090e6387c5603934db01a49f63fbbad74239ae59e59d3d87fd1d1eea25a207770c3698bb965dbdb92768fd853af09f5e73535ab032efcb4905dc6ae824890cf949214de8131785b87a56203bcffcc04d0c79ea4ec1a", 0xb3}, {&(0x7f0000000600)="4df7de0e14811da883e5fed186a66b4e8105ffc364215bb7894f484453f67e006dbe2309ce7cbfb1b2f51681b04c6a311013060b4121180d286836d728c57ca6b95512567aff11830e2c72d15a729971974bb7ab8034cea7c3c09fa74b520fb8bd52bef126ecd2d298452d484b9f061dfbf6809bcb49cdf8f5128a491c998184cda1043a5bf3", 0x86}, {&(0x7f00000006c0)="2a5777d8597ba1fe7bc82d71b38d45c57c65c426170f905a6f3e4bb973ab8b111efde96bf05d692c5762dbff0a3c4d5e6027d97ed6de6670e8bc6673cfb1df91f88630236105583c2efac58fcceb22b3f41a13c842ca655edaf4e431c77288ad13854ead21acc791c2aa136e2bde02001395c088c386c9bd05a87fffc683c05ab04c34b14e1bcb6a2b1301d6bb2ff5107eeb67", 0x93}, {&(0x7f0000000780)="d3ad57a46ed424ae8da81e082a52decd7239d42795fbfcb888615d58e0325ff389abf10c2e68cba3fa3983c43d655ea64ddd4d7ff36f0d09692a", 0x3a}], 0x5, &(0x7f0000000840)=[{0xd8, 0xd987052ba042281, 0x1, "bdc98d476c93fe620a907ee21ee343a0c388332a552ab0ad4731c9f2eca9111347fd97ebae605a97cf786342ef010a5e0470ebc92fd0b742474389a04839af2bf8ad0be74642d528d0aa8921e8264af73cdf016be25d90645ef418fb2da2e2bf8c4874cdb57fe15660997315881c5ff509fa4c1ebfb65423f7212e80bb444da8afe05479b7269fd7e38b2335c8947a3ead632a7c46dffeac9682001268c07c6fe93890ebc41b1036e306fbe83aad3ba65a3f4fa60889ceed9c58cd6e214d2bf25f9b"}, {0x68, 0x10f, 0x9, "78c90be4c354223626066f2a39e8577025cb914a9d40de8a588de798ecaeae0cfb6d9b6a99de70dea57ae5f344bc5c94758db68d4f28ce4a25c3b5a17c517f606ec395a111050ee13deb936b202d994c5ede94f5"}, {0x60, 0x0, 0x2, "3d0a1405b7397c7ed5c0b02a0713ede1cfdd420185188a7641463bc9424e8effef0ad416e073ec9854573956fb927b8e9caf0dbbf8e23d69274d0ae97a8b5bdf90e444fb9bd7d2169190673704"}, {0x88, 0x11, 0x80000000, "24783b57529ebf4fa0334889132414a57b90c6b6f94621d6dda974208c5caa4d956da3492a03f95e001ca40edacf10120fc2a281811f9f6c6eb8eb8ccc9ee16f73070de10b1b971e5d3b0c6fdfe679af01930e4c188a576add1bea51b8f749a2cf58d3ce00ede3fbc69b03cd915e3200664d"}], 0x228}, 0x8000) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r7 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r7, 0x0) write$P9_RWALK(r7, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) ioctl$INOTIFY_IOC_SETNEXTWD(r7, 0x40044900, 0x5) socket$inet6_sctp(0xa, 0x5, 0x84) 05:22:59 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x0, 0x0}) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r2, 0x0) write$P9_RWALK(r2, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) ioctl$TIOCGSERIAL(r2, 0x541e, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/32}) 05:22:59 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) 05:22:59 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed020b000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2986.546187][T14539] binder: 14536:14539 ioctl c0306201 20000000 returned -14 [ 2986.588759][T14538] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2986.593363][T14587] FAULT_INJECTION: forcing a failure. [ 2986.593363][T14587] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2986.609169][T14587] CPU: 1 PID: 14587 Comm: syz-executor.5 Not tainted 5.4.0-rc2+ #0 [ 2986.617053][T14587] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2986.627102][T14587] Call Trace: [ 2986.630395][T14587] dump_stack+0x1d8/0x2f8 [ 2986.634726][T14587] should_fail+0x555/0x770 [ 2986.639152][T14587] should_fail_alloc_page+0x55/0x60 [ 2986.644348][T14587] prepare_alloc_pages+0x283/0x460 [ 2986.649468][T14587] __alloc_pages_nodemask+0xb2/0x5d0 [ 2986.654769][T14587] kmem_getpages+0x4d/0xa00 [ 2986.659272][T14587] cache_grow_begin+0x7e/0x2c0 [ 2986.664035][T14587] cache_alloc_refill+0x311/0x3f0 [ 2986.669056][T14587] ? check_preemption_disabled+0xb7/0x2a0 [ 2986.674780][T14587] kmem_cache_alloc_trace+0x2d0/0x2f0 [ 2986.680144][T14587] ? btrfs_mount_root+0x1b2/0x1040 [ 2986.685252][T14587] btrfs_mount_root+0x1b2/0x1040 [ 2986.690195][T14587] ? vfs_parse_fs_string+0x13b/0x1a0 [ 2986.695475][T14587] ? rcu_read_lock_sched_held+0x10b/0x170 [ 2986.701189][T14587] ? trace_kfree+0xb2/0x110 [ 2986.705693][T14587] legacy_get_tree+0xf9/0x1a0 [ 2986.710366][T14587] ? btrfs_control_open+0x40/0x40 [ 2986.715387][T14587] vfs_get_tree+0x8b/0x2a0 [ 2986.719802][T14587] vfs_kern_mount+0xc2/0x160 [ 2986.724405][T14587] btrfs_mount+0x34f/0x18e0 [ 2986.728918][T14587] ? check_preemption_disabled+0x47/0x2a0 [ 2986.734647][T14587] ? vfs_parse_fs_string+0x13b/0x1a0 [ 2986.739929][T14587] ? cap_capable+0x250/0x290 [ 2986.744522][T14587] ? safesetid_security_capable+0x89/0xf0 [ 2986.750277][T14587] legacy_get_tree+0xf9/0x1a0 [ 2986.754969][T14587] ? btrfs_resize_thread_pool+0x290/0x290 [ 2986.760691][T14587] vfs_get_tree+0x8b/0x2a0 [ 2986.765108][T14587] do_mount+0x16c0/0x2510 [ 2986.769432][T14587] ? copy_mount_options+0x278/0x3c0 [ 2986.774622][T14587] ? copy_mount_options+0x25e/0x3c0 [ 2986.779819][T14587] ? copy_mount_options+0x26b/0x3c0 [ 2986.785014][T14587] ? copy_mount_options+0x308/0x3c0 [ 2986.790211][T14587] ksys_mount+0xcc/0x100 [ 2986.794463][T14587] __x64_sys_mount+0xbf/0xd0 [ 2986.799060][T14587] do_syscall_64+0xf7/0x1c0 [ 2986.803568][T14587] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2986.809459][T14587] RIP: 0033:0x45c4aa [ 2986.813349][T14587] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2986.832944][T14587] RSP: 002b:00007fddc3987a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2986.841352][T14587] RAX: ffffffffffffffda RBX: 00007fddc3987b40 RCX: 000000000045c4aa [ 2986.849322][T14587] RDX: 00007fddc3987ae0 RSI: 0000000020000100 RDI: 00007fddc3987b00 [ 2986.857292][T14587] RBP: 0000000000000001 R08: 00007fddc3987b40 R09: 00007fddc3987ae0 [ 2986.865278][T14587] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2986.873252][T14587] R13: 00000000004c8da6 R14: 00000000004e0200 R15: 0000000000000003 05:23:00 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}) [ 2986.929544][T14538] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 05:23:00 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed020c000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:23:00 executing program 5 (fault-call:0 fault-nth:80): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 05:23:00 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}) 05:23:00 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = socket$inet6(0xa, 0x1, 0x8010000400000084) sendto$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) close(r1) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000080)='ifb0\x00', 0x10) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:23:00 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed020d000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) [ 2987.183902][T14756] FAULT_INJECTION: forcing a failure. [ 2987.183902][T14756] name failslab, interval 1, probability 0, space 0, times 0 [ 2987.210778][T14597] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 05:23:00 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}) [ 2987.259715][T14756] CPU: 0 PID: 14756 Comm: syz-executor.5 Not tainted 5.4.0-rc2+ #0 [ 2987.267636][T14756] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2987.277690][T14756] Call Trace: [ 2987.280983][T14756] dump_stack+0x1d8/0x2f8 [ 2987.285318][T14756] should_fail+0x555/0x770 [ 2987.289741][T14756] __should_failslab+0x11a/0x160 [ 2987.294684][T14756] should_failslab+0x9/0x20 [ 2987.299192][T14756] kmem_cache_alloc_trace+0x5d/0x2f0 [ 2987.304480][T14756] ? btrfs_alloc_device+0x78/0x580 [ 2987.309606][T14756] btrfs_alloc_device+0x78/0x580 [ 2987.314552][T14756] ? blkdev_put+0x2c8/0x3b0 [ 2987.319065][T14756] close_fs_devices+0x4ae/0x8d0 [ 2987.323929][T14756] btrfs_close_devices+0x33/0x130 [ 2987.328957][T14756] btrfs_mount_root+0xa9d/0x1040 [ 2987.333901][T14756] ? trace_kfree+0xb2/0x110 [ 2987.333930][T14756] legacy_get_tree+0xf9/0x1a0 [ 2987.333941][T14756] ? btrfs_control_open+0x40/0x40 [ 2987.333955][T14756] vfs_get_tree+0x8b/0x2a0 [ 2987.333974][T14756] vfs_kern_mount+0xc2/0x160 [ 2987.348131][T14756] btrfs_mount+0x34f/0x18e0 [ 2987.348154][T14756] ? check_preemption_disabled+0x47/0x2a0 [ 2987.348174][T14756] ? vfs_parse_fs_string+0x13b/0x1a0 [ 2987.348184][T14756] ? cap_capable+0x250/0x290 [ 2987.348202][T14756] ? safesetid_security_capable+0x89/0xf0 [ 2987.382939][T14756] legacy_get_tree+0xf9/0x1a0 [ 2987.387623][T14756] ? btrfs_resize_thread_pool+0x290/0x290 [ 2987.393348][T14756] vfs_get_tree+0x8b/0x2a0 [ 2987.397767][T14756] do_mount+0x16c0/0x2510 [ 2987.402110][T14756] ? copy_mount_options+0x308/0x3c0 05:23:00 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0xc00}}) [ 2987.407310][T14756] ksys_mount+0xcc/0x100 [ 2987.411556][T14756] __x64_sys_mount+0xbf/0xd0 [ 2987.416158][T14756] do_syscall_64+0xf7/0x1c0 [ 2987.420672][T14756] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2987.426566][T14756] RIP: 0033:0x45c4aa [ 2987.430466][T14756] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2987.450076][T14756] RSP: 002b:00007fddc3987a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2987.458573][T14756] RAX: ffffffffffffffda RBX: 00007fddc3987b40 RCX: 000000000045c4aa [ 2987.466548][T14756] RDX: 00007fddc3987ae0 RSI: 0000000020000100 RDI: 00007fddc3987b00 [ 2987.474517][T14756] RBP: 0000000000000001 R08: 00007fddc3987b40 R09: 00007fddc3987ae0 [ 2987.482490][T14756] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2987.490465][T14756] R13: 00000000004c8da6 R14: 00000000004e0200 R15: 0000000000000003 [ 2987.507507][T14756] ------------[ cut here ]------------ [ 2987.513001][T14756] kernel BUG at fs/btrfs/volumes.c:1266! [ 2987.526113][T14756] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 2987.531377][ T3892] kobject: 'loop3' (00000000a754c25c): kobject_uevent_env [ 2987.532201][T14756] CPU: 0 PID: 14756 Comm: syz-executor.5 Not tainted 5.4.0-rc2+ #0 [ 2987.532206][T14756] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2987.532223][T14756] RIP: 0010:close_fs_devices+0x8c1/0x8d0 [ 2987.532232][T14756] Code: 63 fa fe 48 8b 5d c0 e9 73 ff ff ff 89 d9 80 e1 07 80 c1 03 38 c1 7c 87 48 89 df e8 b9 63 fa fe e9 7a ff ff ff e8 ef 29 c1 fe <0f> 0b e8 e8 29 c1 fe 0f 0b 66 0f 1f 44 00 00 55 48 89 e5 41 57 41 [ 2987.532240][T14756] RSP: 0018:ffff8880a96ff9a0 EFLAGS: 00010246 [ 2987.548681][ T3892] kobject: 'loop3' (00000000a754c25c): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 2987.557320][T14756] RAX: ffffffff82b206c1 RBX: ffff8880a7de60e8 RCX: 0000000000040000 [ 2987.557326][T14756] RDX: ffffc900109d6000 RSI: 000000000003ffff RDI: 0000000000040000 [ 2987.557332][T14756] RBP: ffff8880a96ffa30 R08: ffffffff82b2dac8 R09: ffffed1015d46b05 [ 2987.557337][T14756] R10: ffffed1015d46b05 R11: 0000000000000000 R12: dffffc0000000000 [ 2987.557342][T14756] R13: ffff8880a7de60f0 R14: ffff8880a7de6000 R15: ffff888068077000 [ 2987.557349][T14756] FS: 00007fddc3988700(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 2987.557355][T14756] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2987.557360][T14756] CR2: 000000000046f070 CR3: 000000002fe40000 CR4: 00000000001426f0 [ 2987.557368][T14756] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2987.557374][T14756] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2987.557378][T14756] Call Trace: [ 2987.557401][T14756] btrfs_close_devices+0x33/0x130 [ 2987.557413][T14756] btrfs_mount_root+0xa9d/0x1040 [ 2987.557431][T14756] ? trace_kfree+0xb2/0x110 [ 2987.597316][ T3892] kobject: 'loop4' (000000000711e0b9): kobject_uevent_env [ 2987.598856][T14756] legacy_get_tree+0xf9/0x1a0 [ 2987.598868][T14756] ? btrfs_control_open+0x40/0x40 [ 2987.598881][T14756] vfs_get_tree+0x8b/0x2a0 [ 2987.607333][ T3892] kobject: 'loop4' (000000000711e0b9): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2987.614800][T14756] vfs_kern_mount+0xc2/0x160 [ 2987.614813][T14756] btrfs_mount+0x34f/0x18e0 [ 2987.614829][T14756] ? check_preemption_disabled+0x47/0x2a0 [ 2987.614842][T14756] ? vfs_parse_fs_string+0x13b/0x1a0 [ 2987.614851][T14756] ? cap_capable+0x250/0x290 [ 2987.614861][T14756] ? safesetid_security_capable+0x89/0xf0 [ 2987.614872][T14756] legacy_get_tree+0xf9/0x1a0 [ 2987.614879][T14756] ? btrfs_resize_thread_pool+0x290/0x290 [ 2987.614889][T14756] vfs_get_tree+0x8b/0x2a0 [ 2987.614900][T14756] do_mount+0x16c0/0x2510 [ 2987.776488][T14756] ? copy_mount_options+0x308/0x3c0 [ 2987.781686][T14756] ksys_mount+0xcc/0x100 [ 2987.785925][T14756] __x64_sys_mount+0xbf/0xd0 [ 2987.790520][T14756] do_syscall_64+0xf7/0x1c0 [ 2987.795026][T14756] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2987.800920][T14756] RIP: 0033:0x45c4aa [ 2987.804816][T14756] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2987.824415][T14756] RSP: 002b:00007fddc3987a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2987.832817][T14756] RAX: ffffffffffffffda RBX: 00007fddc3987b40 RCX: 000000000045c4aa [ 2987.840782][T14756] RDX: 00007fddc3987ae0 RSI: 0000000020000100 RDI: 00007fddc3987b00 [ 2987.848745][T14756] RBP: 0000000000000001 R08: 00007fddc3987b40 R09: 00007fddc3987ae0 [ 2987.856710][T14756] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2987.864671][T14756] R13: 00000000004c8da6 R14: 00000000004e0200 R15: 0000000000000003 [ 2987.872644][T14756] Modules linked in: [ 2987.880739][T14597] chnl_net:chnl_flowctrl_cb(): NET flowctrl func called flow: CLOSE/DEINIT [ 2987.891206][T14756] ---[ end trace 57adc15e35c186d2 ]--- [ 2987.896679][T14756] RIP: 0010:close_fs_devices+0x8c1/0x8d0 [ 2987.903966][T14597] chnl_net:chnl_net_open(): state disconnected [ 2987.909294][T14756] Code: 63 fa fe 48 8b 5d c0 e9 73 ff ff ff 89 d9 80 e1 07 80 c1 03 38 c1 7c 87 48 89 df e8 b9 63 fa fe e9 7a ff ff ff e8 ef 29 c1 fe <0f> 0b e8 e8 29 c1 fe 0f 0b 66 0f 1f 44 00 00 55 48 89 e5 41 57 41 [ 2987.911570][T14597] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2987.948520][T14756] RSP: 0018:ffff8880a96ff9a0 EFLAGS: 00010246 [ 2987.954658][T14756] RAX: ffffffff82b206c1 RBX: ffff8880a7de60e8 RCX: 0000000000040000 05:23:01 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RWALK(r1, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) ioctl$KVM_GET_PIT(r1, 0xc048ae65, &(0x7f0000000040)) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001400090100000000000000000a000000", @ANYRES32=r3, @ANYBLOB="14000100fe8000000000000000004bdd5084edcbdc485efd9d944f0c81f550f43ea23ee5fc244a353d334b881954a5bfe40607e77b474a4d305dc6f0e29b969d5e3531b5"], 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 05:23:01 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x9, 0x123000) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x385, 0x0, 0x0}) 05:23:01 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}) 05:23:01 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed020e000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 05:23:01 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xf, 0x0, 0x0, 0x0, 0xd00}}) [ 2987.959990][ T3892] kobject: 'loop5' (00000000f0624b50): kobject_uevent_env [ 2987.970233][ T3892] kobject: 'loop5' (00000000f0624b50): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2987.974951][T14756] RDX: ffffc900109d6000 RSI: 000000000003ffff RDI: 0000000000040000 [ 2987.989265][T14756] RBP: ffff8880a96ffa30 R08: ffffffff82b2dac8 R09: ffffed1015d46b05 05:23:01 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000000)={0x0, 0x0, {}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb]}) [ 2988.025508][T14974] binder: 14968:14974 ioctl c0306201 20000000 returned -14 [ 2988.033283][T14756] R10: ffffed1015d46b05 R11: 0000000000000000 R12: dffffc0000000000 [ 2988.065412][T14756] R13: ffff8880a7de60f0 R14: ffff8880a7de6000 R15: ffff888068077000 [ 2988.081716][T14756] FS: 00007fddc3988700(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 2988.101831][T14756] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2988.115876][T14756] CR2: 00000000026c7978 CR3: 000000002fe40000 CR4: 00000000001426e0 [ 2988.116897][T14995] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2988.141407][T14756] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2988.150716][T14756] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2988.151511][ T3892] kobject: 'loop3' (00000000a754c25c): kobject_uevent_env [ 2988.164270][T14756] Kernel panic - not syncing: Fatal exception [ 2988.173190][T14756] Kernel Offset: disabled [ 2988.177530][T14756] Rebooting in 86400 seconds..