7] register_for_each_vma+0x372/0x890 [ 2612.101964][ T8047] __uprobe_register+0x3f4/0x8a0 [ 2612.106935][ T8047] uprobe_register_refctr+0x29/0x40 [ 2612.112154][ T8047] probe_event_enable+0x2be/0x7d0 [ 2612.117194][ T8047] ? __uprobe_trace_func+0x430/0x430 [ 2612.122598][ T8047] trace_uprobe_register+0x88/0x410 [ 2612.127816][ T8047] perf_trace_event_init+0x34e/0x790 [ 2612.133290][ T8047] perf_uprobe_init+0xf5/0x140 [ 2612.139239][ T8047] perf_uprobe_event_init+0xde/0x140 [ 2612.144540][ T8047] perf_try_init_event+0x21a/0x400 [ 2612.149753][ T8047] perf_event_alloc+0xa60/0x1790 [ 2612.154709][ T8047] __se_sys_perf_event_open+0x5c7/0x2740 [ 2612.160356][ T8047] ? vfs_write+0x50c/0x770 [ 2612.164784][ T8047] __x64_sys_perf_event_open+0x63/0x70 [ 2612.170255][ T8047] do_syscall_64+0x4a/0x90 [ 2612.174682][ T8047] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2612.180594][ T8047] RIP: 0033:0x4665d9 [ 2612.184639][ T8047] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2612.204411][ T8047] RSP: 002b:00007fe251c51188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2612.212874][ T8047] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 04:44:18 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = accept(r0, &(0x7f0000000200)=@l2, &(0x7f0000000140)=0x80) sendmsg$TIPC_NL_BEARER_DISABLE(r1, &(0x7f0000000600)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000005c0)={&(0x7f00000002c0)={0x2d0, 0x0, 0x1, 0x70bd2c, 0x25dfdbfd, {}, [@TIPC_NLA_NET={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0xfff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x400}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1000000000}]}, @TIPC_NLA_NET={0x4}, @TIPC_NLA_BEARER={0xfc, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x5}, @TIPC_NLA_BEARER_NAME={0xe, 0x1, @l2={'eth', 0x3a, 'vcan0\x00'}}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x45f5, @mcast2, 0x8}}, {0x14, 0x2, @in={0x2, 0x4e23, @broadcast}}}}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}, @TIPC_NLA_BEARER_NAME={0x13, 0x1, @l2={'eth', 0x3a, 'veth1_vlan\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @multicast1}}, {0x14, 0x2, @in={0x2, 0x4e20, @loopback}}}}]}, @TIPC_NLA_MEDIA={0x5c, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}]}, @TIPC_NLA_PUBL={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1000}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x8}]}, @TIPC_NLA_LINK={0x11c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x480}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x101}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}]}, @TIPC_NLA_LINK_PROP={0x54, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffe}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xe7}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffeff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x101}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1ff}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}]}]}, 0x2d0}, 0x1, 0x0, 0x0, 0x80}, 0x800) r2 = openat$cgroup_int(r0, &(0x7f0000000080)='io.bfq.weight\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r2, 0x80489439, &(0x7f00000000c0)) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2612.220940][ T8047] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2612.228951][ T8047] RBP: 00007fe251c511d0 R08: 0000000000000000 R09: 0000000000000000 [ 2612.237000][ T8047] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2612.245148][ T8047] R13: 00007ffdc0e36b3f R14: 00007fe251c51300 R15: 0000000000022000 04:44:18 executing program 1 (fault-call:4 fault-nth:50): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:18 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019001700ff0400000200000000000006040000000000000000", 0x39}], 0x1) [ 2612.287784][ T8081] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready 04:44:18 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019001b00ff0400000200000000000006040000000000000000", 0x39}], 0x1) [ 2612.454712][ T8091] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready 04:44:18 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:18 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019001c00ff0400000200000000000006040000000000000000", 0x39}], 0x1) [ 2612.551504][ T8097] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready [ 2612.582100][ T8097] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready [ 2612.671755][ T8089] FAULT_INJECTION: forcing a failure. [ 2612.671755][ T8089] name failslab, interval 1, probability 0, space 0, times 0 [ 2612.684439][ T8089] CPU: 0 PID: 8089 Comm: syz-executor.1 Not tainted 5.13.0-rc3-syzkaller #0 [ 2612.693476][ T8089] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2612.703628][ T8089] Call Trace: [ 2612.706941][ T8089] dump_stack+0x137/0x19d [ 2612.711598][ T8089] should_fail+0x23c/0x250 [ 2612.716031][ T8089] __should_failslab+0x81/0x90 [ 2612.720831][ T8089] ? register_for_each_vma+0x372/0x890 [ 2612.726398][ T8089] should_failslab+0x5/0x20 [ 2612.730909][ T8089] kmem_cache_alloc_trace+0x49/0x310 [ 2612.736256][ T8089] ? register_for_each_vma+0x372/0x890 [ 2612.741735][ T8089] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2612.747898][ T8089] register_for_each_vma+0x372/0x890 [ 2612.753207][ T8089] __uprobe_register+0x3f4/0x8a0 [ 2612.758271][ T8089] uprobe_register_refctr+0x29/0x40 [ 2612.763479][ T8089] probe_event_enable+0x2be/0x7d0 [ 2612.768649][ T8089] ? __uprobe_trace_func+0x430/0x430 [ 2612.774031][ T8089] trace_uprobe_register+0x88/0x410 [ 2612.779256][ T8089] perf_trace_event_init+0x34e/0x790 [ 2612.784663][ T8089] perf_uprobe_init+0xf5/0x140 [ 2612.789442][ T8089] perf_uprobe_event_init+0xde/0x140 [ 2612.794912][ T8089] perf_try_init_event+0x21a/0x400 [ 2612.800037][ T8089] perf_event_alloc+0xa60/0x1790 [ 2612.805007][ T8089] __se_sys_perf_event_open+0x5c7/0x2740 [ 2612.810686][ T8089] ? vfs_write+0x50c/0x770 [ 2612.815132][ T8089] __x64_sys_perf_event_open+0x63/0x70 [ 2612.820716][ T8089] do_syscall_64+0x4a/0x90 [ 2612.825168][ T8089] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2612.832010][ T8089] RIP: 0033:0x4665d9 [ 2612.836102][ T8089] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2612.855715][ T8089] RSP: 002b:00007fe251c51188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2612.864138][ T8089] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 04:44:18 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019002c00ff0400000200000000000006040000000000000000", 0x39}], 0x1) 04:44:18 executing program 1 (fault-call:4 fault-nth:51): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2612.872167][ T8089] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2612.880234][ T8089] RBP: 00007fe251c511d0 R08: 0000000000000000 R09: 0000000000000000 [ 2612.888303][ T8089] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2612.896658][ T8089] R13: 00007ffdc0e36b3f R14: 00007fe251c51300 R15: 0000000000022000 04:44:18 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019003700ff0400000200000000000006040000000000000000", 0x39}], 0x1) [ 2612.962546][ T8117] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready [ 2613.196404][ T8126] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready [ 2613.206082][ T8125] FAULT_INJECTION: forcing a failure. [ 2613.206082][ T8125] name failslab, interval 1, probability 0, space 0, times 0 [ 2613.218761][ T8125] CPU: 1 PID: 8125 Comm: syz-executor.1 Not tainted 5.13.0-rc3-syzkaller #0 [ 2613.227639][ T8125] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2613.237744][ T8125] Call Trace: [ 2613.241122][ T8125] dump_stack+0x137/0x19d [ 2613.245525][ T8125] should_fail+0x23c/0x250 [ 2613.249983][ T8125] __should_failslab+0x81/0x90 [ 2613.255058][ T8125] ? register_for_each_vma+0x372/0x890 [ 2613.260538][ T8125] should_failslab+0x5/0x20 [ 2613.265161][ T8125] kmem_cache_alloc_trace+0x49/0x310 [ 2613.270461][ T8125] ? register_for_each_vma+0x372/0x890 [ 2613.276083][ T8125] ? vma_interval_tree_iter_next+0x263/0x280 [ 2613.282099][ T8125] register_for_each_vma+0x372/0x890 [ 2613.287469][ T8125] __uprobe_register+0x3f4/0x8a0 [ 2613.292423][ T8125] uprobe_register_refctr+0x29/0x40 [ 2613.297638][ T8125] probe_event_enable+0x2be/0x7d0 [ 2613.302688][ T8125] ? __uprobe_trace_func+0x430/0x430 [ 2613.308099][ T8125] trace_uprobe_register+0x88/0x410 [ 2613.313402][ T8125] perf_trace_event_init+0x34e/0x790 [ 2613.318908][ T8125] perf_uprobe_init+0xf5/0x140 [ 2613.323774][ T8125] perf_uprobe_event_init+0xde/0x140 [ 2613.329216][ T8125] perf_try_init_event+0x21a/0x400 [ 2613.334427][ T8125] perf_event_alloc+0xa60/0x1790 [ 2613.339532][ T8125] __se_sys_perf_event_open+0x5c7/0x2740 [ 2613.345350][ T8125] ? vfs_write+0x50c/0x770 [ 2613.349772][ T8125] __x64_sys_perf_event_open+0x63/0x70 [ 2613.355257][ T8125] do_syscall_64+0x4a/0x90 [ 2613.359724][ T8125] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2613.365673][ T8125] RIP: 0033:0x4665d9 [ 2613.369577][ T8125] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 04:44:19 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:19 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000401ff0400000200000000000006040000000000000000", 0x39}], 0x1) [ 2613.389198][ T8125] RSP: 002b:00007fe251c51188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2613.397645][ T8125] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2613.405918][ T8125] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2613.414024][ T8125] RBP: 00007fe251c511d0 R08: 0000000000000000 R09: 0000000000000000 [ 2613.422088][ T8125] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2613.430076][ T8125] R13: 00007ffdc0e36b3f R14: 00007fe251c51300 R15: 0000000000022000 04:44:19 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x8, 0x10010, r0, 0x835fa000) sync_file_range(r0, 0x1, 0x4000000000, 0x4) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(&(0x7f0000000080), 0x1, 0x10001) 04:44:19 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2613.509846][ T8139] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready 04:44:19 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000202ff0400000200000000000006040000000000000000", 0x39}], 0x1) 04:44:19 executing program 1 (fault-call:4 fault-nth:52): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:19 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000204ff0400000200000000000006040000000000000000", 0x39}], 0x1) [ 2613.638021][ T8151] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready 04:44:19 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff060000000100000009000000250000001900ff04ff0400000200000000000006040000000000000000", 0x39}], 0x1) [ 2613.916242][ T8157] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready 04:44:19 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) r1 = openat(r0, &(0x7f0000000040)='./file0\x00', 0x900, 0x3) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r1, &(0x7f0000000200)=[{&(0x7f0000000080)=""/248, 0xf8}], 0x1, 0x9, 0x2) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:19 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019007406ff0400000200000000000006040000000000000000", 0x39}], 0x1) [ 2614.010244][ T8162] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready [ 2614.075845][ T8152] FAULT_INJECTION: forcing a failure. [ 2614.075845][ T8152] name failslab, interval 1, probability 0, space 0, times 0 [ 2614.088725][ T8152] CPU: 1 PID: 8152 Comm: syz-executor.1 Not tainted 5.13.0-rc3-syzkaller #0 [ 2614.097436][ T8152] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2614.107544][ T8152] Call Trace: [ 2614.110834][ T8152] dump_stack+0x137/0x19d [ 2614.115284][ T8152] should_fail+0x23c/0x250 [ 2614.119723][ T8152] __should_failslab+0x81/0x90 [ 2614.124506][ T8152] ? register_for_each_vma+0x372/0x890 [ 2614.130086][ T8152] should_failslab+0x5/0x20 [ 2614.134611][ T8152] kmem_cache_alloc_trace+0x49/0x310 [ 2614.139917][ T8152] ? register_for_each_vma+0x372/0x890 [ 2614.145395][ T8152] ? vma_interval_tree_iter_next+0x263/0x280 [ 2614.151649][ T8152] register_for_each_vma+0x372/0x890 [ 2614.157160][ T8152] __uprobe_register+0x3f4/0x8a0 [ 2614.162179][ T8152] uprobe_register_refctr+0x29/0x40 [ 2614.167478][ T8152] probe_event_enable+0x2be/0x7d0 [ 2614.172613][ T8152] ? __uprobe_trace_func+0x430/0x430 [ 2614.177979][ T8152] trace_uprobe_register+0x88/0x410 [ 2614.183214][ T8152] perf_trace_event_init+0x34e/0x790 [ 2614.188544][ T8152] perf_uprobe_init+0xf5/0x140 [ 2614.193461][ T8152] perf_uprobe_event_init+0xde/0x140 [ 2614.198871][ T8152] perf_try_init_event+0x21a/0x400 [ 2614.204055][ T8152] perf_event_alloc+0xa60/0x1790 [ 2614.209011][ T8152] __se_sys_perf_event_open+0x5c7/0x2740 [ 2614.214681][ T8152] ? vfs_write+0x50c/0x770 [ 2614.219124][ T8152] __x64_sys_perf_event_open+0x63/0x70 [ 2614.224612][ T8152] do_syscall_64+0x4a/0x90 [ 2614.229047][ T8152] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2614.234959][ T8152] RIP: 0033:0x4665d9 [ 2614.238875][ T8152] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2614.258756][ T8152] RSP: 002b:00007fe251c51188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2614.267370][ T8152] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2614.275539][ T8152] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2614.283611][ T8152] RBP: 00007fe251c511d0 R08: 0000000000000000 R09: 0000000000000000 [ 2614.291635][ T8152] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2614.299659][ T8152] R13: 00007ffdc0e36b3f R14: 00007fe251c51300 R15: 0000000000022000 04:44:20 executing program 1 (fault-call:4 fault-nth:53): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2614.325618][ T8172] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready 04:44:20 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:20 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019008c09ff0400000200000000000006040000000000000000", 0x39}], 0x1) 04:44:20 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2614.546548][ T8177] FAULT_INJECTION: forcing a failure. [ 2614.546548][ T8177] name failslab, interval 1, probability 0, space 0, times 0 [ 2614.559615][ T8177] CPU: 1 PID: 8177 Comm: syz-executor.1 Not tainted 5.13.0-rc3-syzkaller #0 [ 2614.568388][ T8177] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2614.578800][ T8177] Call Trace: [ 2614.582186][ T8177] dump_stack+0x137/0x19d [ 2614.586616][ T8177] should_fail+0x23c/0x250 [ 2614.591245][ T8177] __should_failslab+0x81/0x90 [ 2614.596113][ T8177] ? register_for_each_vma+0x372/0x890 [ 2614.601590][ T8177] should_failslab+0x5/0x20 [ 2614.606170][ T8177] kmem_cache_alloc_trace+0x49/0x310 [ 2614.611466][ T8177] ? register_for_each_vma+0x372/0x890 [ 2614.616985][ T8177] ? vma_interval_tree_iter_next+0x263/0x280 [ 2614.623066][ T8177] register_for_each_vma+0x372/0x890 [ 2614.628373][ T8177] __uprobe_register+0x3f4/0x8a0 [ 2614.633344][ T8177] uprobe_register_refctr+0x29/0x40 [ 2614.638571][ T8177] probe_event_enable+0x2be/0x7d0 [ 2614.643733][ T8177] ? __uprobe_trace_func+0x430/0x430 [ 2614.649219][ T8177] trace_uprobe_register+0x88/0x410 [ 2614.654524][ T8177] perf_trace_event_init+0x34e/0x790 [ 2614.659833][ T8177] perf_uprobe_init+0xf5/0x140 [ 2614.664854][ T8177] perf_uprobe_event_init+0xde/0x140 [ 2614.670241][ T8177] perf_try_init_event+0x21a/0x400 [ 2614.675452][ T8177] perf_event_alloc+0xa60/0x1790 [ 2614.680661][ T8177] __se_sys_perf_event_open+0x5c7/0x2740 [ 2614.686363][ T8177] ? vfs_write+0x50c/0x770 [ 2614.690834][ T8177] __x64_sys_perf_event_open+0x63/0x70 [ 2614.696307][ T8177] do_syscall_64+0x4a/0x90 [ 2614.700855][ T8177] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2614.706797][ T8177] RIP: 0033:0x4665d9 [ 2614.710693][ T8177] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2614.730380][ T8177] RSP: 002b:00007fe251c51188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2614.738892][ T8177] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 04:44:20 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r2, &(0x7f0000000040)='system_u:object_r:auditd_log_t:s0\x00', 0x22) r3 = socket$netlink(0x10, 0x3, 0x0) writev(r3, &(0x7f00000001c0)=[{&(0x7f0000000340)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400000007fd17e5ffff0606040000000000000000", 0x39}], 0x1) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@private1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000100)=0xe8) r6 = fcntl$getown(r0, 0x9) sendmsg$netlink(r1, &(0x7f0000000140)={&(0x7f0000000080)=@kern={0x10, 0x0, 0x0, 0x40100000}, 0xc, &(0x7f0000002380)=[{&(0x7f0000000380)={0x1d0, 0x3e, 0x200, 0x70bd28, 0x25dfdbfb, "", [@generic="fe8d03f47bc5eea940c6f6ed3e0b31415d00225c3b041a98883b6545ab1aa896ea90e8ada07711e3f27fa0fac07e3201aaf3afce6fa9cd7b2c87647d79199f2e1e6a74630170cdb4f7a6745f7b910169b3be8e3803c7b44105d997d85f603c083e02709f7fea0a582b04a62ab33211eae1709375151a4270a41680b1ced7252611a4ce78850665e5cc6c0318000c7b", @typed={0x8, 0x91, 0x0, 0x0, @ipv4=@multicast1}, @generic="d7d17b837b5e41a98a29814a245332d301a6c2360de7f5cd515c8390cbbe395e2b31a5bbb0505bae66c883c9bd1754f1a57351e6e152d5f7b89fa879fc24c8ba99bb160d88d1065691b7b39db4508f15338ae52e9a9cdf26a8e7d2442601b1e0a4bf944df39b66ebae54e8a5645941cb6adba242bd9102e84dce88fecffb05a8413697875d54bbdd61ba65cf6cc10a6d31b8f1cbf0d3468780372bf7efa9", @typed={0x86, 0x4b, 0x0, 0x0, @binary="87ba98efda46c266023be77ee227c968b51820cc51a2dedd3eab9aa3ce314e8deb85264a8e3787526183e2f4b3cadf0706e862cad2581c7e005cc79433fb8e5dd75ecba10cf628dd1f03f58aae6ac03f0ff8e41f9bbd717ba710b2bb9085272f8ef5484e0e27afc0154053ced04b8a874fd49e7f0a9c162edf8c3a0b78edc61076f4"}]}, 0x1d0}, {&(0x7f0000000580)={0x1094, 0x35, 0x2, 0x70bd26, 0x25dfdbff, "", [@typed={0x8, 0x4a, 0x0, 0x0, @uid=r5}, @nested={0x7c, 0x3b, 0x0, 0x1, [@typed={0x6b, 0x5a, 0x0, 0x0, @binary="02c592d64e7fab507663a2a45bd903e62f1e860fc70c3d6e6aedafdb8df3069f587e164e72e45ace40f3944ddb7193cedf276e88ecc85443c36e4f3695e07ad845a9becf2818c1fdcd818e0709811b0b83a1513123e7818953a02902a8ff215a31c7bc9a3fe8cb"}, @generic="f57047908295b4cc87db7874"]}, @generic="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"]}, 0x1094}, {&(0x7f0000001640)={0x6f4, 0x37, 0x1, 0x70bd28, 0x25dfdbff, "", [@nested={0x402, 0x6, 0x0, 0x1, [@generic="e4c3b53add7a27ea4e9d9704a4a850ae8df73f3696ab6f67d2243c5c2bb744174d4b61ea312d46c31c0a5c389004c47360bed9d00bf836297930602dff6bff55513b8926454bef4899b511e34e39be5b40ef0b04d2c2d496506d749d96df619eeb93423c639218eb0c431735a2ac4a638bfffbda74d92515367788e47a9085f51ebfc9a321e4bfd1750150174300dac04cf8509c45fdf077d0827bc86ea1f82b95995d4cfebb7003687b0067b2694b450808e5c28de644000fbe62fb3d4a6f9083b2cb8b99c59dc79c4822555250ebf33bfda9dcf26abdc5c8040cac352c4fc7b8b8fb256a1c2c6ac1df4b20e90c75", @generic="dd42a781a09f41d3944d5bbc", @generic="832eb126014a8cc654bb3615b19610d5b2a7ebb889d0359b8831789eae2d32e923b7d03911819d02d7e17e09cc239a601c453df111204300ef9b435dce1bfa", @typed={0x8, 0x6c, 0x0, 0x0, @ipv4=@rand_addr=0x64010101}, @generic="ada9b58ca2e09a22a9a1f717204ce3b6af5703239fbe84901e908acbfd54eaa5780c2dfa6198f8d8040a5989375e3cb9ad51af32848c8cd67b8890e533cf265a6998589301f8a3bcceeb1a87a821388d939c40d23a9406a367b9c9ded62c1cebdb552bf0a230ed99ca7d8ae1b891ec445213f0822b6668da48520ae25f6f2d08d3b1e5416761425a4a33a6887544f03ac4e476d470ac2a0fd322b887d61d0efa0585fe9390b8e29995683d3ffb1fdd118811f9578a998e38919cd34943fc", @generic="f283ac483e4f342178f61504424d2c7de9a4e3ec2a2be2c8fc541ca8390dd01414632fd68aa5a80d17ad2ea20d7c93192d802637625b6b2bbfff4a3fc79f341331951e23eeb5b75176748d741576b9e698f85223a6854372582eee5756e38e2616292860fbea3cd435ddd52ce78517ec3b2838579a29fc9d786a1863076a34f0d7cae093b28cf8d6d0dacc6e5a157249b2320ea4e447dc7b292c0993adf3", @generic="ecad47d72ae60506a45c21138faf04c6626e07d8d399e32d0989dc9205c66a684a680b0fe1f9603e70", @typed={0x95, 0x12, 0x0, 0x0, @binary="7fa443340b809ed8118aed2a3bb4f84f381acc07feb852e5231bc96a08ee7a93f86a4be5db714625beacc4558821b7ba85d6d9a8211f8615ce96a9af668fcbcf9d909f1f15b3f3bee035b8e942b2a9ef995f583190b50d17cda32afd7ed5427af673b21d9907ba0be4b5fe33b96e54bb85be18974fff8279f1eea07f9ff7e9da5a03674d624b263560ce00891b3380849b"}, @typed={0x8, 0x8, 0x0, 0x0, @u32=0x8001}, @generic="382f3c18d49af7f81898c42e336e7fb546885804d2e55f1288a08fb565ad19c21cfe3ed4ef3f07f07e72414c567664a351654d8b6bcb67497690d1a2b00bb807bb32c0c407ffb1d7a43cb640e8184cb3171a9acff497e55d82f123a499d25dfaab203828e0343b722e4f9229bf109f1d896a0eef8c56dc8185d0dd8e7e020ff61f96f990aa819134c870bc29d71202fed8460b4c1e2260"]}, @typed={0x4, 0xb}, @nested={0x1b, 0x9, 0x0, 0x1, [@generic="22551aa8337bea188c2a26c8a9affb1266fb5d90091b5b"]}, @generic="102d10f9ed4abd4fb46b98427f5d028d92034c4027298e24df44775069828c4be92efe20abb07d0d30c5c1e98bb3f8a40973f3f08baf8612cf0d9d3808", @generic="c5b856737b300623b718e203f5d2a392e6dba67cf2889db189fc2e03cbdc66ff5a1451617a74837949ac6198a339048aba7b8dad8656073c7f5466fd8a3622a543e46a175e31fc4e500e541948534d3c8be1fa2d818090bc2d5cbd92feaf44a7acdd2fdd0d2711b79c5a5825d6b30b0147751855c6b73de287292dfea10db114bc810401697d1b7461d1f999bbddd86c6622ae165bff1cc05e9c7caf8286549f0e827c3976d1552ce65465753bc29c45355158675a70e6af32333cfdb046f032b19d76a55e65a876e58ca1ffc086ad4bc632e5cb7fc4236571d4f2ae111506b2f322cf1bdeb8c9ae3a933835319e3a758e9bd7", @typed={0xbb, 0x2f, 0x0, 0x0, @binary="2fddf523dfb66de7ff61a4acd6c7a91cbd9631ac330d11f939489d72b79b5bf5e3732332dec580d6f6efea13d42363639adcf01b8e95d6fdbfa8f41f8aff07c0332f144ed47c978b8c0d67ab154f816763ce5ad57ffc3fb2562915e6143d8788c70894c4e3e5cc13e193185cbd12233f177160a6eab11e1c14188f29dda7ae9c3b565d67940184212e01b47259ccde0a5a156d467d450c001a55bfb01812e2b10791f08601f1a3ae415c9eb182401681df8000bf46ab5c"}, @typed={0x8, 0x84, 0x0, 0x0, @fd=r4}, @nested={0xcc, 0x3d, 0x0, 0x1, [@generic="ab2e2126f09a71e6a1b57812c3848692d17e03eedfe44f187453e8f0e87f62469b19fc2dd6939d75d7bc70e44c97d7d6a6bd2d08613e8499b573fdff7fd88df13546b2ca77097dff86d8a19212fba65ebd2cfa5bb688fd090bfa1ab9f77006267e1feda9651bcf2f8a258ce5f0e5c51e1aae40867bcdd8b9e0748bbab8d8398842c40846129edc74484d5719655693132bf3776fb879e12dc918325a2b5aef706a5fd854b0921c148ac1deffa617cc75f74c2c92a08e613c8b764ae8a0c610d8f54188da296a8009"]}]}, 0x6f4}, {&(0x7f0000001d40)={0x2fc, 0x3f, 0x100, 0x70bd25, 0x25dfdbfb, "", [@generic="2cddef23b8847f68e0ddd49e54d892dc269bc899069dfb197a96ad0e64c8b1d3f990cdac979e4164fc43e03a7156eb30eba840e7da030a9f42eb9424d56e45878ee4c3d48fce820379f1da4df7328191cd282f0d189def1170b8d5b32344efb28a2b67dba51773eeee0aa0859928405ec1d84388abbf7e1cf9d1fbb90b30c0aa6428f699fda6", @typed={0x26, 0x69, 0x0, 0x0, @str='/proc/thread-self/attr/sockcreate\x00'}, @typed={0x4, 0x4a}, @typed={0x14, 0x8e, 0x0, 0x0, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @generic="0d16cd4e8dcd36ea36cf449ba5f138ee2478dc96335a0ace4aeb3b94adec3b92377e17b515", @nested={0x200, 0x4b, 0x0, 0x1, [@generic="e387d4d84ef047fa66124fba0b8cba223e9308ffb74d4354b8565a470c93545736262c178f0d40cd9d0e92be84833a902ef043bb9c4cbb349eb08cd3628c18bedd1e1a77d5daadb1f401151455c2ec79e7dbb7ed9ae4951c60a951c52caaa5b4ef4547d59020424113057ff26fffd4d212a741106814cb508f5c917f7a90b2e281fe7b3559890195b2e4d490bf19985dadc6f0935747768ba3ce356e24e3a9f4b022f00042f2c6d43910892d1fd8a5a2c2f83c1a1f2411c98914", @generic="8bbaab9326a0315ff17a231026b6d18bde847d0f57f4c0f31b98a33ab55ff792e3de0587d4750bed23949bea13cb3016c4d3", @typed={0x14, 0x58, 0x0, 0x0, @ipv6=@private2}, @typed={0x8, 0x36, 0x0, 0x0, @ipv4=@local}, @generic="c660ff74484018d23ee7e57d2d04735f90a2f3e6d56be508eb93fa6e029b2464bba0e05bfe4a1e35cf6cdb563fc838fd2426e49e1eb9642ab8a145be3670cb0c7918aa1a9acf1a46b0f8ecbd03ad381c0d08d41aeba3c0da6b6f6b3b1c2236f948a5c1aaf4e35490c4d867ae394209aa6fb2c7690af23f8ede5864b67b8f49e2f12743faaf28b5ca316f838d986e317a324a812ae6b9c992fa52ef7b3e07b4d4d1c149d8b301637a170a26338f206b2837c201daf9cc9ad455cfaa5e1d51080d0409ee11ff3056572506c4db", @typed={0x26, 0x41, 0x0, 0x0, @str='/proc/thread-self/attr/sockcreate\x00'}]}]}, 0x2fc}, {&(0x7f0000002040)={0x27c, 0x39, 0x2, 0x70bd2b, 0x25dfdbfe, "", [@nested={0x1f7, 0x14, 0x0, 0x1, [@typed={0x8, 0x55, 0x0, 0x0, @pid=r6}, @generic="df54b5340afb3a5e955fe68f8cc6a3d32d636f90a15da6f3aea7db7509eb86b06c4d84906c231ec5ca380e75b4b411bfe97384cc920fbebc53747fbd6954", @generic, @typed={0x8, 0x24, 0x0, 0x0, @ipv4=@dev={0xac, 0x14, 0x14, 0x41}}, @generic="3a1542d03cb267d8ca540757f2f4de5565a45077f5dd54cba69d3683d1f264238fa21b450fc47d78b7aa575f45860915104eab2a7babe67338af4234c31497d51712d44e", @generic="634fea1ccd75a08980f388515d6b79472a873850a8d953aa910f99bbd3e68ff070ef82b38acc64877fbf2a7ee5f5a3ab3f5a92c5c0a0eb3f5e6cbf0318396d960b950eb2ecb7ed22cf673920f9b54405660337150c3e85c86f827775a24dcf0320d3cbd37bafd431d7d45db2cdb65773ec", @generic="89aa16e85df3314afa5bbcdd68a742c11045ef65f1487360efc3984b4dfe5ca5d4cfc3cc7b99abebd37b1297c0330d84fb6792dc851c53e8c7fd8227188fe65064843962f528534896965b3b9be72931a82d8d986de41a71411a5be83744a5ab46202af1037c4a436f305a080d6ceb5b6df39cfede3c3abdb6142a0a2d70a4685a0c7da2161ee56996cd3c8551e3a4ea5e57f90ddf7ad9bcc831ac36353bb69855107e4bf832bbf15c4faa072683ebefcc3722369cb852946bfb9b5a21df72104cf9fddfbac94055659fbf35a5914a0e03c754c0101fb598b61a9c", @generic="bc42410d2215599168141ac64f185a36ad96325d47"]}, @generic="d3a326292797a7a4abe71dd1b2eb1ee65411081101bb94c78615bcd327fbe18a718eac4a579cbd9413f145d6872d6484c29ee1d7cfe5fbf83e4cca21e01542e94bbd61e58457c8983922cf95fc34a948a806c0076d441b5b60be98f8550ee3d45c392e69ff56bad306d3804615c0907b2ca10c54"]}, 0x27c}, {&(0x7f00000022c0)={0x84, 0x24, 0x10, 0x70bd26, 0x25dfdbff, "", [@generic="030277df0fdec97e90b41489365392093e47f5bca9f97b99850089420d8a4aeed4b09c8232e739a476aec3b96ec0be9c46c63ed497a32f781311cc36d255d20213f008756bd11085336e55d37ed1185f2ad823f404f05b8b003798328ab7e296a209e2e3c67f930e799f9287566f8608d8"]}, 0x84}], 0x6, 0x0, 0x0, 0x80}, 0x8c1) [ 2614.746998][ T8177] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2614.755013][ T8177] RBP: 00007fe251c511d0 R08: 0000000000000000 R09: 0000000000000000 [ 2614.763082][ T8177] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2614.771068][ T8177] R13: 00007ffdc0e36b3f R14: 00007fe251c51300 R15: 0000000000022000 [ 2614.785507][ T8186] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready 04:44:20 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff060000000100000009000000250000001900140aff0400000200000000000006040000000000000000", 0x39}], 0x1) 04:44:20 executing program 1 (fault-call:4 fault-nth:54): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2614.858432][ T25] audit: type=1400 audit(1622090660.643:256): avc: denied { create } for pid=8193 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:auditd_log_t:s0 tclass=netlink_route_socket permissive=1 04:44:20 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff060000000100000009000000250000001900000cff0400000200000000000006040000000000000000", 0x39}], 0x1) [ 2614.903247][ T8198] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready [ 2614.939873][ T25] audit: type=1400 audit(1622090660.673:257): avc: denied { write } for pid=8193 comm="syz-executor.0" path="socket:[525259]" dev="sockfs" ino=525259 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:auditd_log_t:s0 tclass=netlink_route_socket permissive=1 [ 2615.003681][ T25] audit: type=1400 audit(1622090660.673:258): avc: denied { nlmsg_write } for pid=8193 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:auditd_log_t:s0 tclass=netlink_route_socket permissive=1 04:44:20 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff060000000100000009000000250000001900020cff0400000200000000000006040000000000000000", 0x39}], 0x1) [ 2615.056542][ T8207] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready 04:44:20 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000607000/0x3000)=nil, 0x3000, 0x1, 0x2010, r0, 0x7f26c000) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0xffffffffffffffff, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, r0, 0x0) 04:44:20 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff060000000100000009000000250000001900880cff0400000200000000000006040000000000000000", 0x39}], 0x1) [ 2615.110327][ T8215] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready [ 2615.324216][ T8221] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready [ 2615.332101][ T8208] FAULT_INJECTION: forcing a failure. [ 2615.332101][ T8208] name failslab, interval 1, probability 0, space 0, times 0 [ 2615.344930][ T8208] CPU: 1 PID: 8208 Comm: syz-executor.1 Not tainted 5.13.0-rc3-syzkaller #0 [ 2615.353991][ T8208] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2615.364502][ T8208] Call Trace: [ 2615.368770][ T8208] dump_stack+0x137/0x19d [ 2615.373138][ T8208] should_fail+0x23c/0x250 [ 2615.377688][ T8208] __should_failslab+0x81/0x90 [ 2615.382599][ T8208] ? register_for_each_vma+0x372/0x890 [ 2615.388169][ T8208] should_failslab+0x5/0x20 [ 2615.392685][ T8208] kmem_cache_alloc_trace+0x49/0x310 [ 2615.398110][ T8208] ? register_for_each_vma+0x372/0x890 [ 2615.403661][ T8208] ? vma_interval_tree_iter_next+0x263/0x280 [ 2615.409751][ T8208] register_for_each_vma+0x372/0x890 [ 2615.415066][ T8208] __uprobe_register+0x3f4/0x8a0 [ 2615.420026][ T8208] uprobe_register_refctr+0x29/0x40 [ 2615.425250][ T8208] probe_event_enable+0x2be/0x7d0 [ 2615.430484][ T8208] ? __uprobe_trace_func+0x430/0x430 [ 2615.435803][ T8208] trace_uprobe_register+0x88/0x410 [ 2615.441196][ T8208] perf_trace_event_init+0x34e/0x790 [ 2615.446793][ T8208] perf_uprobe_init+0xf5/0x140 [ 2615.451586][ T8208] perf_uprobe_event_init+0xde/0x140 [ 2615.456912][ T8208] perf_try_init_event+0x21a/0x400 [ 2615.462082][ T8208] perf_event_alloc+0xa60/0x1790 [ 2615.467035][ T8208] __se_sys_perf_event_open+0x5c7/0x2740 [ 2615.472807][ T8208] ? vfs_write+0x50c/0x770 [ 2615.477239][ T8208] __x64_sys_perf_event_open+0x63/0x70 [ 2615.482761][ T8208] do_syscall_64+0x4a/0x90 [ 2615.487386][ T8208] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2615.493319][ T8208] RIP: 0033:0x4665d9 [ 2615.497399][ T8208] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 04:44:21 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000001400)=ANY=[@ANYRES64=0x0, @ANYBLOB="0400000000000000070000000000000003000000000000000500000000000000ffffff7f00000000ffffff7f0000000088000000030000001f000005fcff0b5ee5f388bc281c71e8ed301e519670ffff01000080d340162a9b3400000000a5000000004000000200000000000000800000000000757a000000000000000000000000000000000000e5eb4d0400000000c2ed68e1223b92a5174f811098801155db2e1d44860b2a79cd3dd434"]) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140), 0x200000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000200)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP(r2, 0xd0009412, &(0x7f0000000400)={r3, 0x3ff}) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2615.517282][ T8208] RSP: 002b:00007fe251c51188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2615.525948][ T8208] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2615.534195][ T8208] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2615.542196][ T8208] RBP: 00007fe251c511d0 R08: 0000000000000000 R09: 0000000000000000 [ 2615.550348][ T8208] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2615.558347][ T8208] R13: 00007ffdc0e36b3f R14: 00007fe251c51300 R15: 0000000000022000 04:44:21 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019008c0cff0400000200000000000006040000000000000000", 0x39}], 0x1) [ 2615.583921][ T8225] validate_nla: 45 callbacks suppressed [ 2615.583937][ T8225] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2615.693902][ T8231] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2615.714101][ T8231] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready 04:44:21 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:21 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff060000000100000009000000250000001900980cff0400000200000000000006040000000000000000", 0x39}], 0x1) 04:44:21 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6010000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:21 executing program 1 (fault-call:4 fault-nth:55): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2615.743959][ T8235] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 04:44:21 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f00000ad000/0x2000)=nil, 0x2000, 0xe, 0x80010, r1, 0x2355000) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:21 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff060000000100000009000000250000001900020eff0400000200000000000006040000000000000000", 0x39}], 0x1) [ 2615.877209][ T8245] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2615.894431][ T8245] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready [ 2615.914518][ T8247] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2616.019350][ T8244] FAULT_INJECTION: forcing a failure. [ 2616.019350][ T8244] name failslab, interval 1, probability 0, space 0, times 0 [ 2616.031990][ T8244] CPU: 0 PID: 8244 Comm: syz-executor.1 Not tainted 5.13.0-rc3-syzkaller #0 [ 2616.040847][ T8244] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2616.050930][ T8244] Call Trace: [ 2616.054265][ T8244] dump_stack+0x137/0x19d [ 2616.058751][ T8244] should_fail+0x23c/0x250 [ 2616.063178][ T8244] __should_failslab+0x81/0x90 [ 2616.068002][ T8244] ? register_for_each_vma+0x372/0x890 [ 2616.073517][ T8244] should_failslab+0x5/0x20 [ 2616.078045][ T8244] kmem_cache_alloc_trace+0x49/0x310 [ 2616.083340][ T8244] ? register_for_each_vma+0x372/0x890 [ 2616.088874][ T8244] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2616.094870][ T8244] register_for_each_vma+0x372/0x890 [ 2616.100235][ T8244] __uprobe_register+0x3f4/0x8a0 [ 2616.105369][ T8244] uprobe_register_refctr+0x29/0x40 [ 2616.110593][ T8244] probe_event_enable+0x2be/0x7d0 [ 2616.115664][ T8244] ? __uprobe_trace_func+0x430/0x430 [ 2616.121007][ T8244] trace_uprobe_register+0x88/0x410 [ 2616.126274][ T8244] perf_trace_event_init+0x34e/0x790 [ 2616.131640][ T8244] perf_uprobe_init+0xf5/0x140 [ 2616.136448][ T8244] perf_uprobe_event_init+0xde/0x140 [ 2616.141763][ T8244] perf_try_init_event+0x21a/0x400 [ 2616.146969][ T8244] perf_event_alloc+0xa60/0x1790 [ 2616.152160][ T8244] __se_sys_perf_event_open+0x5c7/0x2740 [ 2616.157805][ T8244] ? vfs_write+0x50c/0x770 [ 2616.162443][ T8244] __x64_sys_perf_event_open+0x63/0x70 [ 2616.167919][ T8244] do_syscall_64+0x4a/0x90 [ 2616.172351][ T8244] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2616.178347][ T8244] RIP: 0033:0x4665d9 [ 2616.182423][ T8244] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2616.202765][ T8244] RSP: 002b:00007fe251c51188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2616.211213][ T8244] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2616.219350][ T8244] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2616.227419][ T8244] RBP: 00007fe251c511d0 R08: 0000000000000000 R09: 0000000000000000 [ 2616.235444][ T8244] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2616.243538][ T8244] R13: 00007ffdc0e36b3f R14: 00007fe251c51300 R15: 0000000000022000 [ 2616.259310][ T8253] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 04:44:22 executing program 1 (fault-call:4 fault-nth:56): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:22 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000210ff0400000200000000000006040000000000000000", 0x39}], 0x1) [ 2616.270245][ T8253] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready [ 2616.281775][ T8255] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 04:44:22 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:22 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r0, 0xc080661a, &(0x7f0000000040)={@id={0x2, 0x0, @b}}) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, r0, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000001c40)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(r2, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000001840)=ANY=[@ANYRES32=r1, @ANYRES32, @ANYRESOCT, @ANYRES32, @ANYRES32, @ANYRES64, @ANYRESHEX], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x40025) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000043940)={0xffffffffffff8000, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x0, "94faa7b504a4be"}) r4 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001a40)={0x0, ""/256, 0x0, 0x0}) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000001480), 0x121401, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r6, 0x84009422, &(0x7f0000001c40)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(r8, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000001840)=ANY=[@ANYRES32=r7, @ANYRES32, @ANYRESOCT, @ANYRES32=r5, @ANYRES32, @ANYRES64, @ANYRESHEX=r4], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x40025) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000044940)={0x5, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3, r5}], 0x3, "06ac63d9b61c60"}) r9 = syz_open_dev$loop(&(0x7f00000000c0), 0x13e60e9f, 0x280) ioctl$LOOP_SET_FD(r9, 0x4c00, 0xffffffffffffffff) 04:44:22 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000212ff0400000200000000000006040000000000000000", 0x39}], 0x1) [ 2616.422996][ T8263] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2616.435678][ T8263] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready [ 2616.445836][ T8267] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 04:44:22 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000214ff0400000200000000000006040000000000000000", 0x39}], 0x1) [ 2616.609013][ T8275] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2616.624487][ T8275] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready [ 2616.678801][ T8257] FAULT_INJECTION: forcing a failure. [ 2616.678801][ T8257] name failslab, interval 1, probability 0, space 0, times 0 [ 2616.691839][ T8257] CPU: 1 PID: 8257 Comm: syz-executor.1 Not tainted 5.13.0-rc3-syzkaller #0 [ 2616.700844][ T8257] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2616.711033][ T8257] Call Trace: [ 2616.714329][ T8257] dump_stack+0x137/0x19d [ 2616.718793][ T8257] should_fail+0x23c/0x250 [ 2616.723564][ T8257] __should_failslab+0x81/0x90 [ 2616.728380][ T8257] ? register_for_each_vma+0x372/0x890 [ 2616.733893][ T8257] should_failslab+0x5/0x20 [ 2616.738504][ T8257] kmem_cache_alloc_trace+0x49/0x310 [ 2616.744057][ T8257] ? register_for_each_vma+0x372/0x890 [ 2616.749844][ T8257] ? vma_interval_tree_iter_next+0x263/0x280 [ 2616.756016][ T8257] register_for_each_vma+0x372/0x890 [ 2616.761709][ T8257] __uprobe_register+0x3f4/0x8a0 [ 2616.766642][ T8257] uprobe_register_refctr+0x29/0x40 [ 2616.772431][ T8257] probe_event_enable+0x2be/0x7d0 [ 2616.777509][ T8257] ? __uprobe_trace_func+0x430/0x430 [ 2616.782947][ T8257] trace_uprobe_register+0x88/0x410 [ 2616.788254][ T8257] perf_trace_event_init+0x34e/0x790 [ 2616.793882][ T8257] perf_uprobe_init+0xf5/0x140 [ 2616.799133][ T8257] perf_uprobe_event_init+0xde/0x140 [ 2616.804585][ T8257] perf_try_init_event+0x21a/0x400 [ 2616.809925][ T8257] perf_event_alloc+0xa60/0x1790 [ 2616.815022][ T8257] __se_sys_perf_event_open+0x5c7/0x2740 [ 2616.820748][ T8257] ? vfs_write+0x50c/0x770 [ 2616.825196][ T8257] __x64_sys_perf_event_open+0x63/0x70 [ 2616.830798][ T8257] do_syscall_64+0x4a/0x90 [ 2616.835308][ T8257] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2616.841692][ T8257] RIP: 0033:0x4665d9 [ 2616.845840][ T8257] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2616.865708][ T8257] RSP: 002b:00007fe251c51188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2616.874217][ T8257] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2616.882181][ T8257] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2616.890192][ T8257] RBP: 00007fe251c511d0 R08: 0000000000000000 R09: 0000000000000000 [ 2616.898357][ T8257] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2616.906414][ T8257] R13: 00007ffdc0e36b3f R14: 00007fe251c51300 R15: 0000000000022000 [ 2616.918971][ T8288] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready 04:44:22 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:22 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000440)={0x90000, &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000200)=0x0, {0x29}, &(0x7f0000000240)=""/233, 0xe9, &(0x7f0000000340)=""/155, &(0x7f0000000400)=[0xffffffffffffffff], 0x1, {r0}}, 0x58) r2 = perf_event_open$cgroup(&(0x7f0000000500)={0x2, 0x80, 0xfd, 0xf8, 0x2, 0x3f, 0x0, 0x7fffffff, 0x10065, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x7ff, 0x0, @perf_bp={&(0x7f00000004c0), 0x8}, 0x9, 0xb970, 0xf1d, 0x9, 0xffffffffffff0000, 0x0, 0x3ff, 0x0, 0x7fffffff, 0x0, 0x101}, r0, 0xb, r0, 0x7) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0xba, 0x20, 0x5, 0x0, 0x0, 0x80006, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000000040), 0x5}, 0x10, 0x7c0, 0x3, 0x9, 0x4, 0x2, 0x2, 0x0, 0x0, 0x0, 0x3}, r1, 0xa, r2, 0xa) 04:44:22 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000216ff0400000200000000000006040000000000000000", 0x39}], 0x1) 04:44:22 executing program 1 (fault-call:4 fault-nth:57): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2616.976277][ T8305] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready 04:44:22 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r2, 0x0) ioctl$SG_GET_KEEP_ORPHAN(r2, 0x2288, &(0x7f0000000080)) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:22 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000218ff0400000200000000000006040000000000000000", 0x39}], 0x1) 04:44:22 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:22 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x402100, 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) 04:44:22 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff060000000100000009000000250000001900021aff0400000200000000000006040000000000000000", 0x39}], 0x1) [ 2617.123922][ T8317] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready [ 2617.197362][ T8309] FAULT_INJECTION: forcing a failure. [ 2617.197362][ T8309] name failslab, interval 1, probability 0, space 0, times 0 [ 2617.210343][ T8309] CPU: 0 PID: 8309 Comm: syz-executor.1 Not tainted 5.13.0-rc3-syzkaller #0 [ 2617.219165][ T8309] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2617.229288][ T8309] Call Trace: [ 2617.232643][ T8309] dump_stack+0x137/0x19d [ 2617.237055][ T8309] should_fail+0x23c/0x250 [ 2617.241594][ T8309] __should_failslab+0x81/0x90 [ 2617.246457][ T8309] ? register_for_each_vma+0x372/0x890 [ 2617.252182][ T8309] should_failslab+0x5/0x20 [ 2617.256685][ T8309] kmem_cache_alloc_trace+0x49/0x310 [ 2617.262095][ T8309] ? register_for_each_vma+0x372/0x890 [ 2617.267700][ T8309] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2617.273794][ T8309] register_for_each_vma+0x372/0x890 [ 2617.279103][ T8309] __uprobe_register+0x3f4/0x8a0 [ 2617.284058][ T8309] uprobe_register_refctr+0x29/0x40 [ 2617.289432][ T8309] probe_event_enable+0x2be/0x7d0 [ 2617.294509][ T8309] ? __uprobe_trace_func+0x430/0x430 [ 2617.299948][ T8309] trace_uprobe_register+0x88/0x410 [ 2617.305183][ T8309] perf_trace_event_init+0x34e/0x790 [ 2617.310474][ T8309] perf_uprobe_init+0xf5/0x140 [ 2617.315243][ T8309] perf_uprobe_event_init+0xde/0x140 [ 2617.320983][ T8309] perf_try_init_event+0x21a/0x400 [ 2617.326146][ T8309] perf_event_alloc+0xa60/0x1790 [ 2617.331101][ T8309] __se_sys_perf_event_open+0x5c7/0x2740 [ 2617.336750][ T8309] ? vfs_write+0x50c/0x770 [ 2617.341168][ T8309] __x64_sys_perf_event_open+0x63/0x70 [ 2617.346631][ T8309] do_syscall_64+0x4a/0x90 [ 2617.351076][ T8309] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2617.357066][ T8309] RIP: 0033:0x4665d9 [ 2617.361038][ T8309] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2617.381087][ T8309] RSP: 002b:00007fe251c51188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2617.389720][ T8309] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 04:44:23 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff060000000100000009000000250000001900021eff0400000200000000000006040000000000000000", 0x39}], 0x1) 04:44:23 executing program 1 (fault-call:4 fault-nth:58): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2617.397973][ T8309] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2617.406233][ T8309] RBP: 00007fe251c511d0 R08: 0000000000000000 R09: 0000000000000000 [ 2617.414214][ T8309] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2617.422290][ T8309] R13: 00007ffdc0e36b3f R14: 00007fe251c51300 R15: 0000000000022000 [ 2617.436777][ T8331] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready 04:44:23 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2617.654796][ T8341] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready [ 2617.670792][ T8342] FAULT_INJECTION: forcing a failure. [ 2617.670792][ T8342] name failslab, interval 1, probability 0, space 0, times 0 [ 2617.683558][ T8342] CPU: 1 PID: 8342 Comm: syz-executor.1 Not tainted 5.13.0-rc3-syzkaller #0 [ 2617.692707][ T8342] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2617.702893][ T8342] Call Trace: [ 2617.706371][ T8342] dump_stack+0x137/0x19d [ 2617.710778][ T8342] should_fail+0x23c/0x250 [ 2617.715554][ T8342] __should_failslab+0x81/0x90 [ 2617.720389][ T8342] ? register_for_each_vma+0x372/0x890 [ 2617.726083][ T8342] should_failslab+0x5/0x20 [ 2617.730794][ T8342] kmem_cache_alloc_trace+0x49/0x310 [ 2617.736249][ T8342] ? register_for_each_vma+0x372/0x890 [ 2617.741952][ T8342] ? vma_interval_tree_iter_next+0x263/0x280 [ 2617.748187][ T8342] register_for_each_vma+0x372/0x890 [ 2617.753597][ T8342] __uprobe_register+0x3f4/0x8a0 [ 2617.758754][ T8342] uprobe_register_refctr+0x29/0x40 [ 2617.763988][ T8342] probe_event_enable+0x2be/0x7d0 [ 2617.769218][ T8342] ? __uprobe_trace_func+0x430/0x430 [ 2617.774614][ T8342] trace_uprobe_register+0x88/0x410 [ 2617.779859][ T8342] perf_trace_event_init+0x34e/0x790 [ 2617.785226][ T8342] perf_uprobe_init+0xf5/0x140 [ 2617.790235][ T8342] perf_uprobe_event_init+0xde/0x140 [ 2617.795550][ T8342] perf_try_init_event+0x21a/0x400 [ 2617.800686][ T8342] perf_event_alloc+0xa60/0x1790 [ 2617.805628][ T8342] __se_sys_perf_event_open+0x5c7/0x2740 [ 2617.811261][ T8342] ? vfs_write+0x50c/0x770 [ 2617.815683][ T8342] __x64_sys_perf_event_open+0x63/0x70 [ 2617.821127][ T8342] do_syscall_64+0x4a/0x90 [ 2617.825544][ T8342] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2617.831529][ T8342] RIP: 0033:0x4665d9 04:44:23 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x200000d, 0x50, r0, 0xae635000) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:23 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000220ff0400000200000000000006040000000000000000", 0x39}], 0x1) [ 2617.835880][ T8342] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2617.856294][ T8342] RSP: 002b:00007fe251c51188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2617.864717][ T8342] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2617.872774][ T8342] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2617.881011][ T8342] RBP: 00007fe251c511d0 R08: 0000000000000000 R09: 0000000000000000 [ 2617.889179][ T8342] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2617.897536][ T8342] R13: 00007ffdc0e36b3f R14: 00007fe251c51300 R15: 0000000000022000 04:44:23 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) r2 = syz_open_dev$usbmon(&(0x7f0000000100), 0x1, 0x2000) preadv(r2, &(0x7f0000000500)=[{&(0x7f0000000200)=""/129, 0x81}, {&(0x7f00000002c0)=""/123, 0x7b}, {&(0x7f0000000340)=""/192, 0xc0}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000480)=""/67, 0x43}], 0x5, 0x5, 0xffffffff) utimes(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={{r0, r1/1000+10000}}) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:23 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000226ff0400000200000000000006040000000000000000", 0x39}], 0x1) [ 2617.924588][ T8353] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready 04:44:23 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:23 executing program 1 (fault-call:4 fault-nth:59): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:23 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000228ff0400000200000000000006040000000000000000", 0x39}], 0x1) [ 2617.978078][ T8368] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready [ 2618.069511][ T8378] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready 04:44:23 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) accept(r0, &(0x7f0000000080)=@nl, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x248efd16, 0x6}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:23 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000229ff0400000200000000000006040000000000000000", 0x39}], 0x1) 04:44:24 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:24 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:24 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff060000000100000009000000250000001900022cff0400000200000000000006040000000000000000", 0x39}], 0x1) [ 2618.324410][ T8390] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready [ 2618.397630][ T8383] FAULT_INJECTION: forcing a failure. [ 2618.397630][ T8383] name failslab, interval 1, probability 0, space 0, times 0 [ 2618.410399][ T8383] CPU: 0 PID: 8383 Comm: syz-executor.1 Not tainted 5.13.0-rc3-syzkaller #0 [ 2618.419388][ T8383] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2618.429971][ T8383] Call Trace: [ 2618.433333][ T8383] dump_stack+0x137/0x19d [ 2618.437846][ T8383] should_fail+0x23c/0x250 [ 2618.442594][ T8383] __should_failslab+0x81/0x90 [ 2618.447384][ T8383] ? register_for_each_vma+0x372/0x890 [ 2618.452873][ T8383] should_failslab+0x5/0x20 [ 2618.457485][ T8383] kmem_cache_alloc_trace+0x49/0x310 [ 2618.462966][ T8383] ? register_for_each_vma+0x372/0x890 [ 2618.468930][ T8383] ? vma_interval_tree_iter_next+0x263/0x280 [ 2618.475029][ T8383] register_for_each_vma+0x372/0x890 [ 2618.480313][ T8383] __uprobe_register+0x3f4/0x8a0 [ 2618.485998][ T8383] uprobe_register_refctr+0x29/0x40 [ 2618.491197][ T8383] probe_event_enable+0x2be/0x7d0 [ 2618.496317][ T8383] ? __uprobe_trace_func+0x430/0x430 [ 2618.501678][ T8383] trace_uprobe_register+0x88/0x410 [ 2618.507302][ T8383] perf_trace_event_init+0x34e/0x790 [ 2618.512620][ T8383] perf_uprobe_init+0xf5/0x140 [ 2618.517901][ T8383] perf_uprobe_event_init+0xde/0x140 [ 2618.523416][ T8383] perf_try_init_event+0x21a/0x400 [ 2618.528799][ T8383] perf_event_alloc+0xa60/0x1790 [ 2618.533750][ T8383] __se_sys_perf_event_open+0x5c7/0x2740 [ 2618.539377][ T8383] ? vfs_write+0x50c/0x770 [ 2618.543998][ T8383] __x64_sys_perf_event_open+0x63/0x70 [ 2618.549554][ T8383] do_syscall_64+0x4a/0x90 [ 2618.553963][ T8383] ? irqentry_exit_to_user_mode+0x5/0x20 [ 2618.559730][ T8383] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2618.565797][ T8383] RIP: 0033:0x4665d9 [ 2618.569695][ T8383] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2618.590135][ T8383] RSP: 002b:00007fe251c51188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2618.599153][ T8383] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2618.607952][ T8383] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2618.616686][ T8383] RBP: 00007fe251c511d0 R08: 0000000000000000 R09: 0000000000000000 [ 2618.625222][ T8383] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2618.633982][ T8383] R13: 00007ffdc0e36b3f R14: 00007fe251c51300 R15: 0000000000022000 04:44:24 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)={0xcc, 0x0, 0x100, 0x70bd29, 0x25dfdbfc, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0xb, 0x200}, {0x6, 0x16, 0x40}, {0x5, 0x12, 0x1}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x3ff}, {0x6, 0x16, 0x100}, {0x5, 0x12, 0x1}}, {{@pci={{0x8}, {0x11}}, {0x8}}, {0x8, 0xb, 0x9}, {0x6}, {0x5}}]}, 0xcc}}, 0x4000010) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x88000, 0x0) preadv(r1, &(0x7f0000000200)=[{&(0x7f0000000080)=""/235, 0xeb}], 0x1, 0x7, 0x80000001) 04:44:24 executing program 1 (fault-call:4 fault-nth:60): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2618.645697][ T8406] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready 04:44:24 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000040)='./file0\x00') 04:44:24 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff060000000100000009000000250000001900022dff0400000200000000000006040000000000000000", 0x39}], 0x1) 04:44:24 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:24 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000230ff0400000200000000000006040000000000000000", 0x39}], 0x1) [ 2618.782577][ T8423] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready 04:44:24 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000231ff0400000200000000000006040000000000000000", 0x39}], 0x1) [ 2618.837800][ T8434] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready [ 2618.886541][ T8421] FAULT_INJECTION: forcing a failure. [ 2618.886541][ T8421] name failslab, interval 1, probability 0, space 0, times 0 [ 2618.899572][ T8421] CPU: 1 PID: 8421 Comm: syz-executor.1 Not tainted 5.13.0-rc3-syzkaller #0 [ 2618.908354][ T8421] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2618.918679][ T8421] Call Trace: [ 2618.921967][ T8421] dump_stack+0x137/0x19d [ 2618.926398][ T8421] should_fail+0x23c/0x250 [ 2618.931212][ T8421] __should_failslab+0x81/0x90 [ 2618.936246][ T8421] ? register_for_each_vma+0x372/0x890 [ 2618.942192][ T8421] should_failslab+0x5/0x20 [ 2618.946944][ T8421] kmem_cache_alloc_trace+0x49/0x310 [ 2618.952751][ T8421] ? register_for_each_vma+0x372/0x890 [ 2618.958308][ T8421] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2618.964851][ T8421] register_for_each_vma+0x372/0x890 [ 2618.970309][ T8421] __uprobe_register+0x3f4/0x8a0 [ 2618.975372][ T8421] uprobe_register_refctr+0x29/0x40 [ 2618.981177][ T8421] probe_event_enable+0x2be/0x7d0 [ 2618.986436][ T8421] ? __uprobe_trace_func+0x430/0x430 [ 2618.992261][ T8421] trace_uprobe_register+0x88/0x410 [ 2618.997576][ T8421] perf_trace_event_init+0x34e/0x790 [ 2619.003078][ T8421] perf_uprobe_init+0xf5/0x140 [ 2619.008006][ T8421] perf_uprobe_event_init+0xde/0x140 [ 2619.013610][ T8421] perf_try_init_event+0x21a/0x400 [ 2619.019314][ T8421] perf_event_alloc+0xa60/0x1790 [ 2619.025060][ T8421] __se_sys_perf_event_open+0x5c7/0x2740 [ 2619.031026][ T8421] ? vfs_write+0x50c/0x770 [ 2619.035607][ T8421] __x64_sys_perf_event_open+0x63/0x70 [ 2619.041162][ T8421] do_syscall_64+0x4a/0x90 [ 2619.045570][ T8421] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2619.051480][ T8421] RIP: 0033:0x4665d9 [ 2619.055640][ T8421] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2619.075999][ T8421] RSP: 002b:00007fe251c51188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2619.084857][ T8421] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2619.093041][ T8421] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2619.101113][ T8421] RBP: 00007fe251c511d0 R08: 0000000000000000 R09: 0000000000000000 [ 2619.109173][ T8421] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2619.117254][ T8421] R13: 00007ffdc0e36b3f R14: 00007fe251c51300 R15: 0000000000022000 04:44:24 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000232ff0400000200000000000006040000000000000000", 0x39}], 0x1) 04:44:24 executing program 1 (fault-call:4 fault-nth:61): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2619.132548][ T8442] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready 04:44:24 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000233ff0400000200000000000006040000000000000000", 0x39}], 0x1) [ 2619.180080][ T8450] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready [ 2619.358731][ T8458] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready [ 2619.450404][ T8452] FAULT_INJECTION: forcing a failure. [ 2619.450404][ T8452] name failslab, interval 1, probability 0, space 0, times 0 [ 2619.463278][ T8452] CPU: 1 PID: 8452 Comm: syz-executor.1 Not tainted 5.13.0-rc3-syzkaller #0 [ 2619.472080][ T8452] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2619.482572][ T8452] Call Trace: [ 2619.485971][ T8452] dump_stack+0x137/0x19d [ 2619.490508][ T8452] should_fail+0x23c/0x250 [ 2619.495118][ T8452] __should_failslab+0x81/0x90 [ 2619.500185][ T8452] ? register_for_each_vma+0x372/0x890 [ 2619.505633][ T8452] should_failslab+0x5/0x20 [ 2619.510219][ T8452] kmem_cache_alloc_trace+0x49/0x310 [ 2619.515695][ T8452] ? register_for_each_vma+0x372/0x890 [ 2619.521176][ T8452] ? vma_interval_tree_iter_next+0x263/0x280 [ 2619.527179][ T8452] register_for_each_vma+0x372/0x890 [ 2619.532563][ T8452] __uprobe_register+0x3f4/0x8a0 [ 2619.537515][ T8452] uprobe_register_refctr+0x29/0x40 [ 2619.542749][ T8452] probe_event_enable+0x2be/0x7d0 [ 2619.547839][ T8452] ? __uprobe_trace_func+0x430/0x430 [ 2619.553178][ T8452] trace_uprobe_register+0x88/0x410 [ 2619.558368][ T8452] perf_trace_event_init+0x34e/0x790 [ 2619.563722][ T8452] perf_uprobe_init+0xf5/0x140 [ 2619.568514][ T8452] perf_uprobe_event_init+0xde/0x140 [ 2619.573799][ T8452] perf_try_init_event+0x21a/0x400 [ 2619.578995][ T8452] perf_event_alloc+0xa60/0x1790 [ 2619.583929][ T8452] __se_sys_perf_event_open+0x5c7/0x2740 [ 2619.589997][ T8452] ? vfs_write+0x50c/0x770 [ 2619.594395][ T8452] __x64_sys_perf_event_open+0x63/0x70 [ 2619.600201][ T8452] do_syscall_64+0x4a/0x90 [ 2619.604849][ T8452] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2619.611042][ T8452] RIP: 0033:0x4665d9 [ 2619.614923][ T8452] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2619.634759][ T8452] RSP: 002b:00007fe251c51188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2619.643377][ T8452] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 04:44:25 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:25 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff060000000100000009000000250000001900003bff0400000200000000000006040000000000000000", 0x39}], 0x1) [ 2619.651557][ T8452] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2619.660005][ T8452] RBP: 00007fe251c511d0 R08: 0000000000000000 R09: 0000000000000000 [ 2619.668400][ T8452] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2619.676491][ T8452] R13: 00007ffdc0e36b3f R14: 00007fe251c51300 R15: 0000000000022000 04:44:25 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:25 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) gettid() r0 = inotify_init1(0x180000) signalfd4(r0, &(0x7f0000001840)={[0x3]}, 0x8, 0x800) 04:44:25 executing program 1 (fault-call:4 fault-nth:62): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:25 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000240ff0400000200000000000006040000000000000000", 0x39}], 0x1) 04:44:25 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r2, 0x0) fcntl$setpipe(r2, 0x407, 0x2) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000200)={0x81, 0x3, 0x1, 'queue0\x00', 0x9}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r3, 0x0) close_range(r0, r3, 0x2) creat(&(0x7f0000000080)='./file0\x00', 0x4) [ 2619.737814][ T8471] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready 04:44:25 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000100), 0x24000, 0x0) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r1, 0x4008941a, &(0x7f0000000140)=0x2) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x35, 0x0, &(0x7f0000000080)) accept$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000000c0)=0x1c) 04:44:25 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000340ff0400000200000000000006040000000000000000", 0x39}], 0x1) [ 2619.826426][ T8491] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready [ 2619.993213][ T8483] FAULT_INJECTION: forcing a failure. [ 2619.993213][ T8483] name failslab, interval 1, probability 0, space 0, times 0 [ 2620.007616][ T8483] CPU: 1 PID: 8483 Comm: syz-executor.1 Not tainted 5.13.0-rc3-syzkaller #0 [ 2620.016357][ T8483] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2620.027036][ T8483] Call Trace: [ 2620.030569][ T8483] dump_stack+0x137/0x19d [ 2620.036225][ T8483] should_fail+0x23c/0x250 [ 2620.040658][ T8483] __should_failslab+0x81/0x90 [ 2620.045505][ T8483] ? register_for_each_vma+0x372/0x890 [ 2620.051080][ T8483] should_failslab+0x5/0x20 [ 2620.055690][ T8483] kmem_cache_alloc_trace+0x49/0x310 [ 2620.061245][ T8483] ? register_for_each_vma+0x372/0x890 [ 2620.066912][ T8483] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2620.072967][ T8483] register_for_each_vma+0x372/0x890 [ 2620.078462][ T8483] __uprobe_register+0x3f4/0x8a0 [ 2620.083514][ T8483] uprobe_register_refctr+0x29/0x40 [ 2620.088742][ T8483] probe_event_enable+0x2be/0x7d0 [ 2620.093872][ T8483] ? __uprobe_trace_func+0x430/0x430 [ 2620.099447][ T8483] trace_uprobe_register+0x88/0x410 [ 2620.104827][ T8483] perf_trace_event_init+0x34e/0x790 [ 2620.110204][ T8483] perf_uprobe_init+0xf5/0x140 [ 2620.114994][ T8483] perf_uprobe_event_init+0xde/0x140 [ 2620.120304][ T8483] perf_try_init_event+0x21a/0x400 [ 2620.125495][ T8483] perf_event_alloc+0xa60/0x1790 [ 2620.130519][ T8483] __se_sys_perf_event_open+0x5c7/0x2740 [ 2620.136437][ T8483] ? vfs_write+0x50c/0x770 [ 2620.141626][ T8483] __x64_sys_perf_event_open+0x63/0x70 [ 2620.147363][ T8483] do_syscall_64+0x4a/0x90 [ 2620.151793][ T8483] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2620.157947][ T8483] RIP: 0033:0x4665d9 [ 2620.161941][ T8483] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2620.182971][ T8483] RSP: 002b:00007fe251c51188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a 04:44:26 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:26 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000246ff0400000200000000000006040000000000000000", 0x39}], 0x1) [ 2620.191396][ T8483] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2620.199853][ T8483] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2620.208068][ T8483] RBP: 00007fe251c511d0 R08: 0000000000000000 R09: 0000000000000000 [ 2620.216223][ T8483] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2620.224596][ T8483] R13: 00007ffdc0e36b3f R14: 00007fe251c51300 R15: 0000000000022000 04:44:26 executing program 1 (fault-call:4 fault-nth:63): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:26 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000247ff0400000200000000000006040000000000000000", 0x39}], 0x1) [ 2620.255795][ T8512] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready 04:44:26 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:26 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff060000000100000009000000250000001900024aff0400000200000000000006040000000000000000", 0x39}], 0x1) [ 2620.361485][ T8523] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready [ 2620.422512][ T8533] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready [ 2620.494427][ T8521] FAULT_INJECTION: forcing a failure. [ 2620.494427][ T8521] name failslab, interval 1, probability 0, space 0, times 0 [ 2620.508449][ T8521] CPU: 1 PID: 8521 Comm: syz-executor.1 Not tainted 5.13.0-rc3-syzkaller #0 [ 2620.517692][ T8521] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2620.528211][ T8521] Call Trace: [ 2620.531848][ T8521] dump_stack+0x137/0x19d [ 2620.536534][ T8521] should_fail+0x23c/0x250 [ 2620.541509][ T8521] __should_failslab+0x81/0x90 [ 2620.546463][ T8521] ? register_for_each_vma+0x372/0x890 [ 2620.552146][ T8521] should_failslab+0x5/0x20 [ 2620.556914][ T8521] kmem_cache_alloc_trace+0x49/0x310 [ 2620.562600][ T8521] ? register_for_each_vma+0x372/0x890 [ 2620.568394][ T8521] ? vma_interval_tree_iter_next+0x263/0x280 [ 2620.575058][ T8521] register_for_each_vma+0x372/0x890 [ 2620.580453][ T8521] __uprobe_register+0x3f4/0x8a0 [ 2620.585865][ T8521] uprobe_register_refctr+0x29/0x40 [ 2620.591107][ T8521] probe_event_enable+0x2be/0x7d0 [ 2620.596219][ T8521] ? __uprobe_trace_func+0x430/0x430 [ 2620.601517][ T8521] trace_uprobe_register+0x88/0x410 [ 2620.607160][ T8521] perf_trace_event_init+0x34e/0x790 [ 2620.612502][ T8521] perf_uprobe_init+0xf5/0x140 [ 2620.617382][ T8521] perf_uprobe_event_init+0xde/0x140 [ 2620.623136][ T8521] perf_try_init_event+0x21a/0x400 [ 2620.628531][ T8521] perf_event_alloc+0xa60/0x1790 [ 2620.633611][ T8521] __se_sys_perf_event_open+0x5c7/0x2740 [ 2620.639490][ T8521] ? vfs_write+0x50c/0x770 [ 2620.643906][ T8521] __x64_sys_perf_event_open+0x63/0x70 [ 2620.649383][ T8521] do_syscall_64+0x4a/0x90 [ 2620.653900][ T8521] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2620.659973][ T8521] RIP: 0033:0x4665d9 [ 2620.664038][ T8521] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2620.684279][ T8521] RSP: 002b:00007fe251c51188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2620.693028][ T8521] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2620.701238][ T8521] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2620.709601][ T8521] RBP: 00007fe251c511d0 R08: 0000000000000000 R09: 0000000000000000 [ 2620.718277][ T8521] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2620.727606][ T8521] R13: 00007ffdc0e36b3f R14: 00007fe251c51300 R15: 0000000000022000 04:44:26 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff060000000100000009000000250000001900024bff0400000200000000000006040000000000000000", 0x39}], 0x1) 04:44:26 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000080)=""/222, 0xde}], 0x1, 0x4, 0x9d) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:26 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0xff, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = fsmount(0xffffffffffffffff, 0x1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) 04:44:26 executing program 1 (fault-call:4 fault-nth:64): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:26 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:26 executing program 3: ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffff9c, 0x40106614, &(0x7f0000000140)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f00000000c0), 0x100000001, 0x102) ioctl$BTRFS_IOC_QUOTA_CTL(r1, 0xc0109428, &(0x7f0000000100)={0x1, 0x5fd3}) r2 = io_uring_setup(0x6c62, &(0x7f0000000040)={0x0, 0x3cb4, 0x1, 0x1, 0x298, 0x0, r0}) ioctl$BTRFS_IOC_DEFRAG(r2, 0x50009402, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp, 0xd0}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:26 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:26 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000252ff0400000200000000000006040000000000000000", 0x39}], 0x1) [ 2621.026448][ T8543] validate_nla: 43 callbacks suppressed [ 2621.026463][ T8543] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2621.044156][ T8543] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready [ 2621.061704][ T8554] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2621.139732][ T8566] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2621.148626][ T8566] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready [ 2621.159151][ T8567] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2621.169755][ T8547] FAULT_INJECTION: forcing a failure. [ 2621.169755][ T8547] name failslab, interval 1, probability 0, space 0, times 0 [ 2621.182426][ T8547] CPU: 0 PID: 8547 Comm: syz-executor.1 Not tainted 5.13.0-rc3-syzkaller #0 [ 2621.191329][ T8547] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2621.201567][ T8547] Call Trace: [ 2621.204963][ T8547] dump_stack+0x137/0x19d [ 2621.209307][ T8547] should_fail+0x23c/0x250 [ 2621.213838][ T8547] __should_failslab+0x81/0x90 [ 2621.218796][ T8547] ? register_for_each_vma+0x372/0x890 [ 2621.224844][ T8547] should_failslab+0x5/0x20 [ 2621.229786][ T8547] kmem_cache_alloc_trace+0x49/0x310 [ 2621.235493][ T8547] ? register_for_each_vma+0x372/0x890 [ 2621.241184][ T8547] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2621.247525][ T8547] register_for_each_vma+0x372/0x890 [ 2621.253172][ T8547] __uprobe_register+0x3f4/0x8a0 [ 2621.258511][ T8547] uprobe_register_refctr+0x29/0x40 [ 2621.264045][ T8547] probe_event_enable+0x2be/0x7d0 [ 2621.269105][ T8547] ? __uprobe_trace_func+0x430/0x430 [ 2621.274508][ T8547] trace_uprobe_register+0x88/0x410 [ 2621.279873][ T8547] perf_trace_event_init+0x34e/0x790 [ 2621.285255][ T8547] perf_uprobe_init+0xf5/0x140 [ 2621.290243][ T8547] perf_uprobe_event_init+0xde/0x140 [ 2621.295715][ T8547] perf_try_init_event+0x21a/0x400 [ 2621.300978][ T8547] perf_event_alloc+0xa60/0x1790 [ 2621.306199][ T8547] __se_sys_perf_event_open+0x5c7/0x2740 [ 2621.312100][ T8547] ? vfs_write+0x50c/0x770 [ 2621.316904][ T8547] __x64_sys_perf_event_open+0x63/0x70 [ 2621.323079][ T8547] do_syscall_64+0x4a/0x90 [ 2621.327897][ T8547] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2621.334014][ T8547] RIP: 0033:0x4665d9 [ 2621.338140][ T8547] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2621.358036][ T8547] RSP: 002b:00007fe251c51188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2621.366477][ T8547] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2621.374719][ T8547] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 04:44:27 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000253ff0400000200000000000006040000000000000000", 0x39}], 0x1) [ 2621.382835][ T8547] RBP: 00007fe251c511d0 R08: 0000000000000000 R09: 0000000000000000 [ 2621.391078][ T8547] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2621.399488][ T8547] R13: 00007ffdc0e36b3f R14: 00007fe251c51300 R15: 0000000000022000 [ 2621.430754][ T8571] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 04:44:27 executing program 1 (fault-call:4 fault-nth:65): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:27 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000054ff0400000200000000000006040000000000000000", 0x39}], 0x1) [ 2621.440179][ T8571] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready [ 2621.458890][ T8572] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 04:44:27 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:27 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000256ff0400000200000000000006040000000000000000", 0x39}], 0x1) [ 2621.548400][ T8577] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2621.557341][ T8577] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready [ 2621.572964][ T8579] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 04:44:27 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) io_setup(0xdf, &(0x7f0000001080)=0x0) io_destroy(r3) io_cancel(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) io_pgetevents(r3, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = syz_io_uring_complete(0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r5, 0x0) r6 = perf_event_open$cgroup(&(0x7f0000000440)={0x4, 0x80, 0xfe, 0x8, 0x8e, 0xb8, 0x0, 0x6, 0x90114, 0x8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000400), 0x1}, 0x8822, 0x2, 0x7ff, 0x5, 0x1, 0x4, 0x1, 0x0, 0xffffffe1, 0x0, 0xfffffffffffffffc}, 0xffffffffffffffff, 0xa, r2, 0x2) r7 = dup3(r0, r0, 0x0) r8 = openat$cgroup_int(r0, &(0x7f0000000600)='net_cls.classid\x00', 0x2, 0x0) r9 = fsmount(r1, 0x0, 0x81) io_submit(r3, 0x6, &(0x7f0000000780)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x5, r4, &(0x7f0000000080)="ab4e0e92db5885e3811db3a18519e3fcaf5509ae96480c99e8d002ccb0d8f0486736b780d48abfe1d7c8f87b7fcc7dca28347cdc4b185b34522cd1047980", 0x3e, 0x400, 0x0, 0x0, r0}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x2, 0x22, r1, &(0x7f0000000100)="c4ca3bbae5a7e7c427c77dd14326644c02b9a124bb690f", 0x17, 0x9, 0x0, 0x3, r1}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x7, 0x0, r5, &(0x7f0000000200)="63393cb4e6459544a9048472c57be4cd275f4ca7286fab8530de1f10e2141217b9e2237703d8f3e2ecbe9da8f17c66d1cb75e851ecfb306b35ecf1b5ec5629c63ab20e2b636b044588ac39dd946695fbe7e29dedf31fcb03d1c54e2a1f9e0c6cdb0979b4d135e1f12013fad839f23896207869954c3efca17fd625ddae9da4b784c8ec42364a62ee2f645fdd8ccdb1430e81ad2fbd6fbebafc07359a10b4468922b81aa22191ce9225f52436c8fea819b32285e66d94c72532d5aaf75d738a1ce2be4b5fe5ea4d93686adb5f4ab66b3a29283e8b16e476fc36bcf77be1d8", 0xde, 0x100000001, 0x0, 0x0, r0}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x6, 0x8000, r0, &(0x7f0000000340)="450e8f4e822f999deb6e63626e3a7d92e67e61fada71f1d2d219a5de9a99c6339104a0d350898b4bf35de0ccd0bbe2f7a8e698e912421cfd6d01bc8b6d5ee5708f6135354cf03889d947ddcef4e0288dd4be376fdb25b6455e9b77ebc442d7a8422ab030b2f65f", 0x67, 0x0, 0x0, 0x3}, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x5, 0x3, r6, &(0x7f00000004c0)="965e0a2188f36c017e7c071c7c24e6ece4617ffe8cba954a5511d6ddf1317d556c6901e0d8025870f74e484e40127d09deedd6249da83e670739daf7a3b3b7e9b5b2397eadd887d1927d5f5bbc61fec7d330222dd6ebed9d8dc61a48f318184b8601f2d2e0f26fb859819239cdc3bcae525ec6955c4bc620849103a688eea565652ae02a847eeef6f3a1d56faefb8c96c5fb3b94bda3a86783199be4e8f9dd30d4d4813d52b67a9368397f776250d82d49124b855f18c0c6fa49134d6961344dcda8eb6d54f3c0a9a859ca6106f8c9076cf06abfdcea5b082614", 0xda, 0xff, 0x0, 0x0, r7}, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x3, 0x1, r8, &(0x7f0000000640)="08f604b7a4ccb8e2c4724b55a24fffc72bccf7232db134bc0432c8531dcd9354ed64f11458c5b22712d2cc950a02ee9fcf9906dab6b8549981c4fea190223502f2dfb347c60a5b393b9346a77dbd2cf45afca214e9cefb1e23a62d2f9c4af48f1b094e34f04d1d2fd160c67f6d60632bb7e956b164312cb9beeb3a171784862fe9951f1ce900f2377a305f58c1d53c58dab05ed37d5e9a97709518faf02361aa27a56d1dd683671c45c904b6f86b29b3b95cc6a5294cc9773bf1e45020141ce700665b3d6f94b9513578af97318fea5a148f6473292b54d689333e60dabddfb82282462b3096755972e678d3179aec1d8130b39258b8", 0xf6, 0x3, 0x0, 0x3, r9}]) [ 2621.795135][ T8587] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2621.805953][ T8587] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready [ 2621.813679][ T8578] FAULT_INJECTION: forcing a failure. [ 2621.813679][ T8578] name failslab, interval 1, probability 0, space 0, times 0 [ 2621.826700][ T8578] CPU: 0 PID: 8578 Comm: syz-executor.1 Not tainted 5.13.0-rc3-syzkaller #0 [ 2621.835360][ T8578] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2621.846698][ T8578] Call Trace: [ 2621.850129][ T8578] dump_stack+0x137/0x19d [ 2621.854574][ T8578] should_fail+0x23c/0x250 [ 2621.859465][ T8578] __should_failslab+0x81/0x90 [ 2621.864434][ T8578] ? register_for_each_vma+0x372/0x890 [ 2621.869977][ T8578] should_failslab+0x5/0x20 [ 2621.874702][ T8578] kmem_cache_alloc_trace+0x49/0x310 [ 2621.880208][ T8578] ? register_for_each_vma+0x372/0x890 [ 2621.886045][ T8578] ? vma_interval_tree_iter_next+0x263/0x280 [ 2621.892124][ T8578] register_for_each_vma+0x372/0x890 [ 2621.897571][ T8578] __uprobe_register+0x3f4/0x8a0 [ 2621.902819][ T8578] uprobe_register_refctr+0x29/0x40 [ 2621.908112][ T8578] probe_event_enable+0x2be/0x7d0 [ 2621.913232][ T8578] ? __uprobe_trace_func+0x430/0x430 [ 2621.918686][ T8578] trace_uprobe_register+0x88/0x410 [ 2621.923959][ T8578] perf_trace_event_init+0x34e/0x790 [ 2621.929510][ T8578] perf_uprobe_init+0xf5/0x140 [ 2621.934386][ T8578] perf_uprobe_event_init+0xde/0x140 [ 2621.939947][ T8578] perf_try_init_event+0x21a/0x400 [ 2621.945065][ T8578] perf_event_alloc+0xa60/0x1790 [ 2621.950448][ T8578] __se_sys_perf_event_open+0x5c7/0x2740 [ 2621.956415][ T8578] ? vfs_write+0x50c/0x770 [ 2621.961113][ T8578] __x64_sys_perf_event_open+0x63/0x70 [ 2621.967057][ T8578] do_syscall_64+0x4a/0x90 [ 2621.971648][ T8578] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2621.979136][ T8578] RIP: 0033:0x4665d9 [ 2621.983391][ T8578] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2622.004070][ T8578] RSP: 002b:00007fe251c51188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2622.013212][ T8578] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2622.021237][ T8578] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2622.029342][ T8578] RBP: 00007fe251c511d0 R08: 0000000000000000 R09: 0000000000000000 [ 2622.037565][ T8578] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 04:44:27 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000257ff0400000200000000000006040000000000000000", 0x39}], 0x1) 04:44:27 executing program 1 (fault-call:4 fault-nth:66): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2622.045688][ T8578] R13: 00007ffdc0e36b3f R14: 00007fe251c51300 R15: 0000000000022000 [ 2622.064266][ T8591] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2622.110352][ T8597] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready [ 2622.217121][ T8603] FAULT_INJECTION: forcing a failure. [ 2622.217121][ T8603] name failslab, interval 1, probability 0, space 0, times 0 [ 2622.230176][ T8603] CPU: 1 PID: 8603 Comm: syz-executor.1 Not tainted 5.13.0-rc3-syzkaller #0 [ 2622.239134][ T8603] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2622.249486][ T8603] Call Trace: [ 2622.252759][ T8603] dump_stack+0x137/0x19d [ 2622.257097][ T8603] should_fail+0x23c/0x250 [ 2622.261565][ T8603] __should_failslab+0x81/0x90 [ 2622.266407][ T8603] ? register_for_each_vma+0x372/0x890 [ 2622.271876][ T8603] should_failslab+0x5/0x20 [ 2622.276391][ T8603] kmem_cache_alloc_trace+0x49/0x310 [ 2622.281702][ T8603] ? register_for_each_vma+0x372/0x890 [ 2622.287301][ T8603] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2622.293351][ T8603] register_for_each_vma+0x372/0x890 [ 2622.298635][ T8603] __uprobe_register+0x3f4/0x8a0 [ 2622.304115][ T8603] uprobe_register_refctr+0x29/0x40 [ 2622.309324][ T8603] probe_event_enable+0x2be/0x7d0 [ 2622.314507][ T8603] ? __uprobe_trace_func+0x430/0x430 [ 2622.319962][ T8603] trace_uprobe_register+0x88/0x410 [ 2622.325242][ T8603] perf_trace_event_init+0x34e/0x790 [ 2622.330653][ T8603] perf_uprobe_init+0xf5/0x140 [ 2622.335776][ T8603] perf_uprobe_event_init+0xde/0x140 [ 2622.341385][ T8603] perf_try_init_event+0x21a/0x400 [ 2622.346502][ T8603] perf_event_alloc+0xa60/0x1790 [ 2622.351630][ T8603] __se_sys_perf_event_open+0x5c7/0x2740 [ 2622.357275][ T8603] ? vfs_write+0x50c/0x770 [ 2622.363021][ T8603] __x64_sys_perf_event_open+0x63/0x70 [ 2622.368551][ T8603] do_syscall_64+0x4a/0x90 [ 2622.373155][ T8603] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2622.379156][ T8603] RIP: 0033:0x4665d9 [ 2622.383031][ T8603] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2622.402623][ T8603] RSP: 002b:00007fe251c51188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a 04:44:28 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:28 executing program 3: pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x84000) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x3ff, @mcast2, 0xffff}, 0x1c) ppoll(&(0x7f00000000c0)=[{0xffffffffffffffff, 0xd200}, {0xffffffffffffffff, 0x80}], 0x2, &(0x7f0000000100), &(0x7f0000000140)={[0x200]}, 0x8) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:28 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff060000000100000009000000250000001900025aff0400000200000000000006040000000000000000", 0x39}], 0x1) 04:44:28 executing program 1 (fault-call:4 fault-nth:67): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2622.411302][ T8603] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2622.419555][ T8603] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2622.427545][ T8603] RBP: 00007fe251c511d0 R08: 0000000000000000 R09: 0000000000000000 [ 2622.435572][ T8603] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2622.443650][ T8603] R13: 00007ffdc0e36b3f R14: 00007fe251c51300 R15: 0000000000022000 04:44:28 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:28 executing program 3: accept(0xffffffffffffffff, &(0x7f0000000040)=@pptp={0x18, 0x2, {0x0, @private}}, &(0x7f00000000c0)=0x80) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, r0, 0x0) 04:44:28 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff060000000100000009000000250000001900025bff0400000200000000000006040000000000000000", 0x39}], 0x1) [ 2622.508103][ T8612] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready 04:44:28 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000040)}, 0x1400}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:28 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff060000000100000009000000250000001900025cff0400000200000000000006040000000000000000", 0x39}], 0x1) 04:44:28 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x82) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x0, 0x0, 0x3, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x2, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2622.600117][ T8621] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready 04:44:28 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb171, 0xc57}, 0x0, 0x8001, 0x0, 0x9, 0x400000000000, 0x384d}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2622.686312][ T8616] FAULT_INJECTION: forcing a failure. [ 2622.686312][ T8616] name failslab, interval 1, probability 0, space 0, times 0 [ 2622.699126][ T8616] CPU: 1 PID: 8616 Comm: syz-executor.1 Not tainted 5.13.0-rc3-syzkaller #0 [ 2622.707964][ T8616] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2622.718218][ T8616] Call Trace: [ 2622.721632][ T8616] dump_stack+0x137/0x19d [ 2622.726091][ T8616] should_fail+0x23c/0x250 [ 2622.730652][ T8616] __should_failslab+0x81/0x90 [ 2622.735602][ T8616] ? register_for_each_vma+0x372/0x890 [ 2622.741380][ T8616] should_failslab+0x5/0x20 [ 2622.745884][ T8616] kmem_cache_alloc_trace+0x49/0x310 [ 2622.751794][ T8616] ? register_for_each_vma+0x372/0x890 [ 2622.757296][ T8616] ? vma_interval_tree_iter_next+0x263/0x280 [ 2622.763431][ T8616] register_for_each_vma+0x372/0x890 [ 2622.768932][ T8616] __uprobe_register+0x3f4/0x8a0 [ 2622.773878][ T8616] uprobe_register_refctr+0x29/0x40 [ 2622.779116][ T8616] probe_event_enable+0x2be/0x7d0 [ 2622.784169][ T8616] ? __uprobe_trace_func+0x430/0x430 [ 2622.789614][ T8616] trace_uprobe_register+0x88/0x410 [ 2622.794830][ T8616] perf_trace_event_init+0x34e/0x790 [ 2622.800153][ T8616] perf_uprobe_init+0xf5/0x140 [ 2622.804977][ T8616] perf_uprobe_event_init+0xde/0x140 [ 2622.810310][ T8616] perf_try_init_event+0x21a/0x400 [ 2622.815405][ T8616] perf_event_alloc+0xa60/0x1790 [ 2622.820330][ T8616] __se_sys_perf_event_open+0x5c7/0x2740 [ 2622.825966][ T8616] ? vfs_write+0x50c/0x770 [ 2622.830398][ T8616] __x64_sys_perf_event_open+0x63/0x70 [ 2622.836053][ T8616] do_syscall_64+0x4a/0x90 [ 2622.840495][ T8616] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2622.846421][ T8616] RIP: 0033:0x4665d9 [ 2622.850421][ T8616] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2622.870037][ T8616] RSP: 002b:00007fe251c51188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2622.878497][ T8616] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 04:44:28 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x8) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x200) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2622.886486][ T8616] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2622.894548][ T8616] RBP: 00007fe251c511d0 R08: 0000000000000000 R09: 0000000000000000 [ 2622.902511][ T8616] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2622.910577][ T8616] R13: 00007ffdc0e36b3f R14: 00007fe251c51300 R15: 0000000000022000 [ 2622.924514][ T8632] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready 04:44:28 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:28 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x2010, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x10100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:28 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff060000000100000009000000250000001900025dff0400000200000000000006040000000000000000", 0x39}], 0x1) 04:44:28 executing program 1 (fault-call:4 fault-nth:68): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:28 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:29 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)=@v2={0x5, 0x0, 0x6, 0x713e, 0xa1, "46b46565cb2e218248cf17355da1e5fe7f8f1ad7830f1879fe3c6ccd2fc123908786b22a0783cb1052ffd742e617b3dae07449a63438b5cfb8adaf557e1f6424c86fd4452de564ed502f65786cbe29ba599bb35894877b501247492e667969f8dbd700aa19ea26586169940b7bfb5e2a9bd6482d19280f8f1b48f08a17ed9c49ff160c9e1565f69a04bab6181dc36a0b224e327530fddf6040fea779556fe8f510"}, 0xaa, 0x2) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xffffffffffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:29 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000262ff0400000200000000000006040000000000000000", 0x39}], 0x1) [ 2623.282305][ T8659] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready 04:44:29 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000263ff0400000200000000000006040000000000000000", 0x39}], 0x1) [ 2623.329431][ T8665] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready [ 2623.364168][ T8657] FAULT_INJECTION: forcing a failure. [ 2623.364168][ T8657] name failslab, interval 1, probability 0, space 0, times 0 [ 2623.377317][ T8657] CPU: 0 PID: 8657 Comm: syz-executor.1 Not tainted 5.13.0-rc3-syzkaller #0 [ 2623.386647][ T8657] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2623.396801][ T8657] Call Trace: [ 2623.400129][ T8657] dump_stack+0x137/0x19d [ 2623.404703][ T8657] should_fail+0x23c/0x250 [ 2623.409226][ T8657] __should_failslab+0x81/0x90 [ 2623.414060][ T8657] ? register_for_each_vma+0x372/0x890 [ 2623.419513][ T8657] should_failslab+0x5/0x20 [ 2623.424491][ T8657] kmem_cache_alloc_trace+0x49/0x310 [ 2623.429913][ T8657] ? register_for_each_vma+0x372/0x890 [ 2623.435894][ T8657] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2623.441894][ T8657] register_for_each_vma+0x372/0x890 [ 2623.447370][ T8657] __uprobe_register+0x3f4/0x8a0 [ 2623.452381][ T8657] uprobe_register_refctr+0x29/0x40 [ 2623.457607][ T8657] probe_event_enable+0x2be/0x7d0 [ 2623.462744][ T8657] ? __uprobe_trace_func+0x430/0x430 [ 2623.468159][ T8657] trace_uprobe_register+0x88/0x410 [ 2623.473361][ T8657] perf_trace_event_init+0x34e/0x790 [ 2623.478745][ T8657] perf_uprobe_init+0xf5/0x140 [ 2623.483704][ T8657] perf_uprobe_event_init+0xde/0x140 [ 2623.489211][ T8657] perf_try_init_event+0x21a/0x400 [ 2623.494336][ T8657] perf_event_alloc+0xa60/0x1790 [ 2623.499302][ T8657] __se_sys_perf_event_open+0x5c7/0x2740 [ 2623.505184][ T8657] ? vfs_write+0x50c/0x770 [ 2623.510300][ T8657] __x64_sys_perf_event_open+0x63/0x70 [ 2623.515774][ T8657] do_syscall_64+0x4a/0x90 [ 2623.520191][ T8657] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2623.526322][ T8657] RIP: 0033:0x4665d9 [ 2623.530508][ T8657] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2623.551243][ T8657] RSP: 002b:00007fe251c51188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2623.560116][ T8657] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2623.568423][ T8657] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 04:44:29 executing program 1 (fault-call:4 fault-nth:69): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:29 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000264ff0400000200000000000006040000000000000000", 0x39}], 0x1) [ 2623.576389][ T8657] RBP: 00007fe251c511d0 R08: 0000000000000000 R09: 0000000000000000 [ 2623.584613][ T8657] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2623.592584][ T8657] R13: 00007ffdc0e36b3f R14: 00007fe251c51300 R15: 0000000000022000 [ 2623.608367][ T8673] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready 04:44:29 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:29 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000265ff0400000200000000000006040000000000000000", 0x39}], 0x1) [ 2623.702562][ T8681] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready 04:44:29 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2623.922618][ T8693] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready [ 2623.980920][ T8680] FAULT_INJECTION: forcing a failure. [ 2623.980920][ T8680] name failslab, interval 1, probability 0, space 0, times 0 [ 2623.994043][ T8680] CPU: 0 PID: 8680 Comm: syz-executor.1 Not tainted 5.13.0-rc3-syzkaller #0 [ 2624.004009][ T8680] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2624.014343][ T8680] Call Trace: [ 2624.017804][ T8680] dump_stack+0x137/0x19d [ 2624.022806][ T8680] should_fail+0x23c/0x250 [ 2624.027229][ T8680] __should_failslab+0x81/0x90 [ 2624.032094][ T8680] ? register_for_each_vma+0x372/0x890 [ 2624.038277][ T8680] should_failslab+0x5/0x20 [ 2624.042781][ T8680] kmem_cache_alloc_trace+0x49/0x310 [ 2624.048150][ T8680] ? register_for_each_vma+0x372/0x890 [ 2624.054078][ T8680] ? vma_interval_tree_iter_next+0x263/0x280 [ 2624.060380][ T8680] register_for_each_vma+0x372/0x890 [ 2624.065666][ T8680] __uprobe_register+0x3f4/0x8a0 [ 2624.070964][ T8680] uprobe_register_refctr+0x29/0x40 [ 2624.076198][ T8680] probe_event_enable+0x2be/0x7d0 [ 2624.081753][ T8680] ? __uprobe_trace_func+0x430/0x430 [ 2624.087158][ T8680] trace_uprobe_register+0x88/0x410 [ 2624.092461][ T8680] perf_trace_event_init+0x34e/0x790 [ 2624.097941][ T8680] perf_uprobe_init+0xf5/0x140 [ 2624.102888][ T8680] perf_uprobe_event_init+0xde/0x140 [ 2624.108357][ T8680] perf_try_init_event+0x21a/0x400 [ 2624.113489][ T8680] perf_event_alloc+0xa60/0x1790 [ 2624.118556][ T8680] __se_sys_perf_event_open+0x5c7/0x2740 [ 2624.124630][ T8680] ? vfs_write+0x50c/0x770 [ 2624.129389][ T8680] __x64_sys_perf_event_open+0x63/0x70 [ 2624.134849][ T8680] do_syscall_64+0x4a/0x90 [ 2624.139848][ T8680] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2624.146401][ T8680] RIP: 0033:0x4665d9 [ 2624.150353][ T8680] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2624.171591][ T8680] RSP: 002b:00007fe251c51188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2624.180448][ T8680] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2624.188615][ T8680] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2624.197787][ T8680] RBP: 00007fe251c511d0 R08: 0000000000000000 R09: 0000000000000000 [ 2624.205992][ T8680] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2624.214486][ T8680] R13: 00007ffdc0e36b3f R14: 00007fe251c51300 R15: 0000000000022000 04:44:30 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000080), 0x2, 0x0) preadv(r2, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/217, 0xd9}], 0x1, 0xa4, 0x1) 04:44:30 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000280ff0400000200000000000006040000000000000000", 0x39}], 0x1) 04:44:30 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:30 executing program 1 (fault-call:4 fault-nth:70): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:30 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0xfffffff7, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x400, r0, 0x0) 04:44:30 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:30 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x5) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000000c0)=0x0) ioprio_get$pid(0x1, r2) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x0, 0x5, 0x9, 0x4, 0x0, 0x40, 0x4400, 0x8, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8000, 0x2, @perf_config_ext={0x3001, 0x80000000}, 0x80000, 0x7, 0x9, 0x4, 0x6, 0x2, 0x9, 0x0, 0x1, 0x0, 0x1}, r1, 0xffffffffffffffff, r0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0xc) r4 = getpgid(r2) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r5, 0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0xfd, 0x2, 0x40, 0x52, 0x0, 0x80, 0x8200, 0xc, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000000200)}, 0x6800, 0x7b, 0x8a, 0x6, 0x3, 0x4, 0x4, 0x0, 0x2139, 0x0, 0x7}, r4, 0x1, r5, 0x2) ptrace$setopts(0x4200, r3, 0x100, 0x40) 04:44:30 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000380ff0400000200000000000006040000000000000000", 0x39}], 0x1) 04:44:30 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x27, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2624.371869][ T8711] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready 04:44:30 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x26020000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:30 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000000900000025000000190001acff0400000200000000000006040000000000000000", 0x39}], 0x1) [ 2624.485836][ T8713] FAULT_INJECTION: forcing a failure. [ 2624.485836][ T8713] name failslab, interval 1, probability 0, space 0, times 0 [ 2624.499413][ T8713] CPU: 1 PID: 8713 Comm: syz-executor.1 Not tainted 5.13.0-rc3-syzkaller #0 [ 2624.509334][ T8713] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2624.522795][ T8713] Call Trace: [ 2624.526081][ T8713] dump_stack+0x137/0x19d [ 2624.530433][ T8713] should_fail+0x23c/0x250 [ 2624.535079][ T8713] __should_failslab+0x81/0x90 [ 2624.539840][ T8713] ? register_for_each_vma+0x372/0x890 [ 2624.545731][ T8713] should_failslab+0x5/0x20 [ 2624.550271][ T8713] kmem_cache_alloc_trace+0x49/0x310 [ 2624.555832][ T8713] ? register_for_each_vma+0x372/0x890 [ 2624.561439][ T8713] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2624.567773][ T8713] register_for_each_vma+0x372/0x890 [ 2624.573219][ T8713] __uprobe_register+0x3f4/0x8a0 [ 2624.578206][ T8713] uprobe_register_refctr+0x29/0x40 [ 2624.583534][ T8713] probe_event_enable+0x2be/0x7d0 [ 2624.588543][ T8713] ? __uprobe_trace_func+0x430/0x430 [ 2624.593819][ T8713] trace_uprobe_register+0x88/0x410 [ 2624.599171][ T8713] perf_trace_event_init+0x34e/0x790 [ 2624.604552][ T8713] perf_uprobe_init+0xf5/0x140 [ 2624.609754][ T8713] perf_uprobe_event_init+0xde/0x140 [ 2624.615334][ T8713] perf_try_init_event+0x21a/0x400 [ 2624.620549][ T8713] perf_event_alloc+0xa60/0x1790 [ 2624.625663][ T8713] __se_sys_perf_event_open+0x5c7/0x2740 [ 2624.631409][ T8713] ? vfs_write+0x50c/0x770 [ 2624.635836][ T8713] __x64_sys_perf_event_open+0x63/0x70 [ 2624.641657][ T8713] do_syscall_64+0x4a/0x90 [ 2624.646198][ T8713] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2624.652796][ T8713] RIP: 0033:0x4665d9 [ 2624.656691][ T8713] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2624.676857][ T8713] RSP: 002b:00007fe251c51188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a 04:44:30 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2624.685652][ T8713] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2624.694023][ T8713] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2624.702118][ T8713] RBP: 00007fe251c511d0 R08: 0000000000000000 R09: 0000000000000000 [ 2624.710083][ T8713] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2624.718175][ T8713] R13: 00007ffdc0e36b3f R14: 00007fe251c51300 R15: 0000000000022000 [ 2624.735611][ T8740] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready 04:44:30 executing program 1 (fault-call:4 fault-nth:71): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:30 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000000900000025000000190001b2ff0400000200000000000006040000000000000000", 0x39}], 0x1) 04:44:30 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:30 executing program 3: prctl$PR_SET_MM(0x23, 0x9, &(0x7f0000ffc000/0x4000)=nil) prctl$PR_SET_MM(0x23, 0x1, &(0x7f0000ffd000/0x1000)=nil) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:30 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:30 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) getsockopt$sock_buf(r1, 0x1, 0x1a, &(0x7f0000000080)=""/54, &(0x7f00000000c0)=0x36) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2624.973761][ T8759] FAULT_INJECTION: forcing a failure. [ 2624.973761][ T8759] name failslab, interval 1, probability 0, space 0, times 0 [ 2624.987034][ T8759] CPU: 1 PID: 8759 Comm: syz-executor.1 Not tainted 5.13.0-rc3-syzkaller #0 [ 2624.995816][ T8759] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2625.006731][ T8759] Call Trace: [ 2625.010120][ T8759] dump_stack+0x137/0x19d [ 2625.014540][ T8759] should_fail+0x23c/0x250 [ 2625.019028][ T8759] __should_failslab+0x81/0x90 [ 2625.023964][ T8759] ? register_for_each_vma+0x372/0x890 [ 2625.029546][ T8759] should_failslab+0x5/0x20 [ 2625.034337][ T8759] kmem_cache_alloc_trace+0x49/0x310 [ 2625.039950][ T8759] ? register_for_each_vma+0x372/0x890 [ 2625.045906][ T8759] ? vma_interval_tree_iter_next+0x263/0x280 [ 2625.051947][ T8759] register_for_each_vma+0x372/0x890 [ 2625.057365][ T8759] __uprobe_register+0x3f4/0x8a0 [ 2625.062453][ T8759] uprobe_register_refctr+0x29/0x40 [ 2625.068024][ T8759] probe_event_enable+0x2be/0x7d0 [ 2625.073348][ T8759] ? __uprobe_trace_func+0x430/0x430 [ 2625.078665][ T8759] trace_uprobe_register+0x88/0x410 [ 2625.083896][ T8759] perf_trace_event_init+0x34e/0x790 [ 2625.089512][ T8759] perf_uprobe_init+0xf5/0x140 [ 2625.094277][ T8759] perf_uprobe_event_init+0xde/0x140 [ 2625.099558][ T8759] perf_try_init_event+0x21a/0x400 [ 2625.104718][ T8759] perf_event_alloc+0xa60/0x1790 [ 2625.109693][ T8759] __se_sys_perf_event_open+0x5c7/0x2740 [ 2625.115401][ T8759] ? vfs_write+0x50c/0x770 [ 2625.119910][ T8759] __x64_sys_perf_event_open+0x63/0x70 [ 2625.125550][ T8759] do_syscall_64+0x4a/0x90 [ 2625.130096][ T8759] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2625.136288][ T8759] RIP: 0033:0x4665d9 [ 2625.140422][ T8759] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2625.160192][ T8759] RSP: 002b:00007fe251c51188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a 04:44:31 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)=@sha1={0x1, "cd8eaff3831d71cfbb31c96b452d8f32dc85231f"}, 0x15, 0x2) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x67, 0x7ffffffd}, 0xa1, 0x0, 0xfffffffe, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:31 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2625.168623][ T8759] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2625.176859][ T8759] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2625.184919][ T8759] RBP: 00007fe251c511d0 R08: 0000000000000000 R09: 0000000000000000 [ 2625.193105][ T8759] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2625.201184][ T8759] R13: 00007ffdc0e36b3f R14: 00007fe251c51300 R15: 0000000000022000 04:44:31 executing program 1 (fault-call:4 fault-nth:72): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:31 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000000900000025000000190001b4ff0400000200000000000006040000000000000000", 0x39}], 0x1) 04:44:31 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:31 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) [ 2625.219908][ T8764] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready 04:44:31 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000000900000025000000190001baff0400000200000000000006040000000000000000", 0x39}], 0x1) 04:44:31 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:31 executing program 3: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) getdents(r0, &(0x7f0000000040)=""/26, 0x1a) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:31 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x74, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2625.319945][ T8781] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready [ 2625.427454][ T8790] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready [ 2625.438062][ T8787] FAULT_INJECTION: forcing a failure. [ 2625.438062][ T8787] name failslab, interval 1, probability 0, space 0, times 0 [ 2625.450733][ T8787] CPU: 0 PID: 8787 Comm: syz-executor.1 Not tainted 5.13.0-rc3-syzkaller #0 [ 2625.459465][ T8787] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2625.469883][ T8787] Call Trace: [ 2625.473380][ T8787] dump_stack+0x137/0x19d [ 2625.477789][ T8787] should_fail+0x23c/0x250 [ 2625.482411][ T8787] __should_failslab+0x81/0x90 [ 2625.487226][ T8787] ? register_for_each_vma+0x372/0x890 [ 2625.492725][ T8787] should_failslab+0x5/0x20 [ 2625.497244][ T8787] kmem_cache_alloc_trace+0x49/0x310 [ 2625.502726][ T8787] ? register_for_each_vma+0x372/0x890 [ 2625.508303][ T8787] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2625.514300][ T8787] register_for_each_vma+0x372/0x890 [ 2625.519888][ T8787] __uprobe_register+0x3f4/0x8a0 [ 2625.525003][ T8787] uprobe_register_refctr+0x29/0x40 [ 2625.530687][ T8787] probe_event_enable+0x2be/0x7d0 [ 2625.535814][ T8787] ? __uprobe_trace_func+0x430/0x430 [ 2625.541153][ T8787] trace_uprobe_register+0x88/0x410 [ 2625.546711][ T8787] perf_trace_event_init+0x34e/0x790 [ 2625.552114][ T8787] perf_uprobe_init+0xf5/0x140 [ 2625.556886][ T8787] perf_uprobe_event_init+0xde/0x140 [ 2625.562706][ T8787] perf_try_init_event+0x21a/0x400 [ 2625.567974][ T8787] perf_event_alloc+0xa60/0x1790 [ 2625.572964][ T8787] __se_sys_perf_event_open+0x5c7/0x2740 [ 2625.578723][ T8787] ? vfs_write+0x50c/0x770 [ 2625.583183][ T8787] __x64_sys_perf_event_open+0x63/0x70 [ 2625.588715][ T8787] do_syscall_64+0x4a/0x90 [ 2625.593198][ T8787] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2625.599177][ T8787] RIP: 0033:0x4665d9 [ 2625.603097][ T8787] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 04:44:31 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:31 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:31 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000000900000025000000190001bcff0400000200000000000006040000000000000000", 0x39}], 0x1) 04:44:31 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x8001) [ 2625.623565][ T8787] RSP: 002b:00007fe251c51188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2625.632145][ T8787] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2625.640239][ T8787] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2625.648247][ T8787] RBP: 00007fe251c511d0 R08: 0000000000000000 R09: 0000000000000000 [ 2625.657075][ T8787] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2625.665091][ T8787] R13: 00007ffdc0e36b3f R14: 00007fe251c51300 R15: 0000000000022000 04:44:31 executing program 1 (fault-call:4 fault-nth:73): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:31 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000000900000025000000190001c0ff0400000200000000000006040000000000000000", 0x39}], 0x1) 04:44:31 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xc0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2625.746743][ T8810] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready 04:44:31 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000000900000025000000190002c0ff0400000200000000000006040000000000000000", 0x39}], 0x1) 04:44:31 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1a6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:31 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:31 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x226, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:31 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000000900000025000000190003c0ff0400000200000000000006040000000000000000", 0x39}], 0x1) [ 2625.903868][ T8832] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready [ 2625.959366][ T8819] FAULT_INJECTION: forcing a failure. [ 2625.959366][ T8819] name failslab, interval 1, probability 0, space 0, times 0 [ 2625.972280][ T8819] CPU: 1 PID: 8819 Comm: syz-executor.1 Not tainted 5.13.0-rc3-syzkaller #0 [ 2625.981156][ T8819] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2625.991681][ T8819] Call Trace: [ 2625.994962][ T8819] dump_stack+0x137/0x19d [ 2625.999360][ T8819] should_fail+0x23c/0x250 [ 2626.003837][ T8819] __should_failslab+0x81/0x90 [ 2626.008796][ T8819] ? register_for_each_vma+0x372/0x890 [ 2626.014309][ T8819] should_failslab+0x5/0x20 [ 2626.018817][ T8819] kmem_cache_alloc_trace+0x49/0x310 [ 2626.024262][ T8819] ? register_for_each_vma+0x372/0x890 [ 2626.029734][ T8819] ? vma_interval_tree_iter_next+0x263/0x280 [ 2626.035757][ T8819] register_for_each_vma+0x372/0x890 [ 2626.041143][ T8819] __uprobe_register+0x3f4/0x8a0 [ 2626.046198][ T8819] uprobe_register_refctr+0x29/0x40 [ 2626.051632][ T8819] probe_event_enable+0x2be/0x7d0 [ 2626.056683][ T8819] ? __uprobe_trace_func+0x430/0x430 [ 2626.061959][ T8819] trace_uprobe_register+0x88/0x410 [ 2626.067171][ T8819] perf_trace_event_init+0x34e/0x790 [ 2626.072659][ T8819] perf_uprobe_init+0xf5/0x140 [ 2626.077437][ T8819] perf_uprobe_event_init+0xde/0x140 [ 2626.082915][ T8819] perf_try_init_event+0x21a/0x400 [ 2626.088109][ T8819] perf_event_alloc+0xa60/0x1790 [ 2626.093131][ T8819] __se_sys_perf_event_open+0x5c7/0x2740 [ 2626.098762][ T8819] ? vfs_write+0x50c/0x770 [ 2626.103182][ T8819] __x64_sys_perf_event_open+0x63/0x70 [ 2626.108625][ T8819] do_syscall_64+0x4a/0x90 [ 2626.113028][ T8819] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2626.119061][ T8819] RIP: 0033:0x4665d9 [ 2626.122949][ T8819] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2626.143081][ T8819] RSP: 002b:00007fe251c51188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2626.151742][ T8819] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 04:44:31 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x258, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2626.159960][ T8819] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2626.168254][ T8819] RBP: 00007fe251c511d0 R08: 0000000000000000 R09: 0000000000000000 [ 2626.176435][ T8819] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2626.184588][ T8819] R13: 00007ffdc0e36b3f R14: 00007fe251c51300 R15: 0000000000022000 [ 2626.197754][ T8841] validate_nla: 36 callbacks suppressed [ 2626.197768][ T8841] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2626.214091][ T8848] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 04:44:32 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ftruncate(r0, 0x8000) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:32 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:32 executing program 1 (fault-call:4 fault-nth:74): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:32 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000000900000025000000190001faff0400000200000000000006040000000000000000", 0x39}], 0x1) 04:44:32 executing program 3: setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000080)="5ee26a8fe6a102fd256ceeb7fc6944f5fef1a81a34196d2041c1e628e74ac26af880138bba1f651938281f03a47328e1eecd169a6c3fe6de67e17bd53fec732c3e01b6a12ec7d71d9c43243b9fbf5e97cfcb7962b2b0", 0x56) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) setsockopt$inet_buf(r0, 0x0, 0x2a, &(0x7f0000000100)="3da8a3d0fccb0f049f9092b5", 0xc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x2, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x861, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0xd0a, 0x3}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xa) r1 = syz_open_dev$loop(&(0x7f0000000040), 0x8, 0x1) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x8010, r1, 0x372dd000) [ 2626.467115][ T8857] FAULT_INJECTION: forcing a failure. [ 2626.467115][ T8857] name failslab, interval 1, probability 0, space 0, times 0 [ 2626.479780][ T8857] CPU: 0 PID: 8857 Comm: syz-executor.1 Not tainted 5.13.0-rc3-syzkaller #0 [ 2626.488730][ T8857] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2626.498815][ T8857] Call Trace: [ 2626.502125][ T8857] dump_stack+0x137/0x19d [ 2626.506442][ T8857] should_fail+0x23c/0x250 [ 2626.510888][ T8857] __should_failslab+0x81/0x90 [ 2626.515700][ T8857] ? register_for_each_vma+0x372/0x890 [ 2626.521214][ T8857] should_failslab+0x5/0x20 [ 2626.525926][ T8857] kmem_cache_alloc_trace+0x49/0x310 [ 2626.531492][ T8857] ? register_for_each_vma+0x372/0x890 [ 2626.536989][ T8857] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2626.543143][ T8857] register_for_each_vma+0x372/0x890 [ 2626.548622][ T8857] __uprobe_register+0x3f4/0x8a0 [ 2626.553680][ T8857] uprobe_register_refctr+0x29/0x40 [ 2626.558937][ T8857] probe_event_enable+0x2be/0x7d0 [ 2626.563997][ T8857] ? __uprobe_trace_func+0x430/0x430 [ 2626.569296][ T8857] trace_uprobe_register+0x88/0x410 [ 2626.574503][ T8857] perf_trace_event_init+0x34e/0x790 [ 2626.579799][ T8857] perf_uprobe_init+0xf5/0x140 [ 2626.584581][ T8857] perf_uprobe_event_init+0xde/0x140 [ 2626.589881][ T8857] perf_try_init_event+0x21a/0x400 [ 2626.595171][ T8857] perf_event_alloc+0xa60/0x1790 [ 2626.600133][ T8857] __se_sys_perf_event_open+0x5c7/0x2740 [ 2626.605777][ T8857] ? vfs_write+0x50c/0x770 [ 2626.610192][ T8857] __x64_sys_perf_event_open+0x63/0x70 [ 2626.615659][ T8857] do_syscall_64+0x4a/0x90 [ 2626.620155][ T8857] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2626.626064][ T8857] RIP: 0033:0x4665d9 [ 2626.630055][ T8857] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2626.649936][ T8857] RSP: 002b:00007fe251c51188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2626.659231][ T8857] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 04:44:32 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:32 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2626.667212][ T8857] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2626.675297][ T8857] RBP: 00007fe251c511d0 R08: 0000000000000000 R09: 0000000000000000 [ 2626.683500][ T8857] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2626.691482][ T8857] R13: 00007ffdc0e36b3f R14: 00007fe251c51300 R15: 0000000000022000 04:44:32 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) vmsplice(r0, &(0x7f0000001300)=[{&(0x7f0000000040)="355b2e0f5e8fe62e7ed242cd10788329fd9df9c2e1bdc0d8bd45", 0x1a}, {&(0x7f0000000200)="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", 0x1000}, {&(0x7f0000000080)="823dc8d84a7bdb99f22ebfb898f77e2ddacb365e7241d216a2a869435c5294b47ffa4c66eb39c4c49f8f5bd54d5c90edda0d2f542808fdd90bb0c73d8f7ab07bf3aee85a15df60ccae6349fb88f4a8ce9169099dceb02b817c27d7c53dcc120e98cdccb608321323e91f0c7ca745f3208b1728448364a1dc49c0cfef03d11edfa4671933df24578c40f25758a421444e40e15bc800426c0966d952ee5d2132924f6bee863da313d2d7180bb73407084e04baa7061800e2bdf79e16405b3b93810f05aec0517f85f45d4a7ca48d6c93d45f7f2edec8aff650fa2c39722faac12bdac425123d028b56", 0xe8}, {&(0x7f0000001380)="5a2f4c1d1512e39eb11d78a0c9133840b32931d387731cdeb566ba3ecfc58cec0c72748b2b8b9eeae70b24d9de5b68b2b898367502d16a7a32fe07c3e100b3cba6208100b37501fdb4f77fb02980f6f4bb2e4d873eec2d0eeea09feb8fea1b791853dec0a5b94672c6fadf1972900df0e2738f88f202f85c01dc50a2d01b3f968d783f30f9187a4d142081c2d6ed561f8bf2862fe818db451f962914f7d2ce30c80c2cc54c39a09b819854aec863a9841558405eb5171516840777191c1375585eab94ea1f61f9b7674009966d54478d19327be585d8fcc7af658f", 0xdb}], 0x4, 0x1) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001340), 0x100, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) 04:44:32 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$IEEE802154_LLSEC_ADD_DEV(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='p\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="00042cbd70000a0001007770616e310001000c0005000200aaaaaaaaaaaa08002f0032000000080002000000000000000000", @ANYRES32=0x0, @ANYBLOB="0c0005000201aaaaaaaaaaea08002f00405c2a00000100050037000100000008", @ANYRES32=0x0, @ANYBLOB="06000400a0aa00000600060000000000"], 0x70}, 0x1, 0x0, 0x0, 0x4c010}, 0x11) sendmsg$NFQNL_MSG_CONFIG(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="07000008080003400000000100"/28], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0xc030) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(r2, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)={0x100, 0x0, 0x200, 0x70bd25, 0x25dfdbfb, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}}]}, 0x100}, 0x1, 0x0, 0x0, 0x4000}, 0x20000010) 04:44:32 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000000900000025000000190001fcff0400000200000000000006040000000000000000", 0x39}], 0x1) 04:44:32 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x600, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2626.718879][ T8860] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2626.735719][ T8860] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready [ 2626.748678][ T8864] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 04:44:32 executing program 1 (fault-call:4 fault-nth:75): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2626.790436][ T8878] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2626.799404][ T8878] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready [ 2626.821690][ T8883] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2626.929353][ T8889] FAULT_INJECTION: forcing a failure. [ 2626.929353][ T8889] name failslab, interval 1, probability 0, space 0, times 0 [ 2626.942326][ T8889] CPU: 0 PID: 8889 Comm: syz-executor.1 Not tainted 5.13.0-rc3-syzkaller #0 [ 2626.951413][ T8889] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2626.962580][ T8889] Call Trace: [ 2626.965964][ T8889] dump_stack+0x137/0x19d [ 2626.970444][ T8889] should_fail+0x23c/0x250 [ 2626.975069][ T8889] __should_failslab+0x81/0x90 [ 2626.979911][ T8889] ? register_for_each_vma+0x372/0x890 [ 2626.985450][ T8889] should_failslab+0x5/0x20 [ 2626.989978][ T8889] kmem_cache_alloc_trace+0x49/0x310 [ 2626.995264][ T8889] ? register_for_each_vma+0x372/0x890 [ 2627.000728][ T8889] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2627.006895][ T8889] register_for_each_vma+0x372/0x890 [ 2627.012359][ T8889] __uprobe_register+0x3f4/0x8a0 [ 2627.017378][ T8889] uprobe_register_refctr+0x29/0x40 [ 2627.022738][ T8889] probe_event_enable+0x2be/0x7d0 [ 2627.027912][ T8889] ? __uprobe_trace_func+0x430/0x430 [ 2627.034108][ T8889] trace_uprobe_register+0x88/0x410 [ 2627.039422][ T8889] perf_trace_event_init+0x34e/0x790 [ 2627.044698][ T8889] perf_uprobe_init+0xf5/0x140 [ 2627.049874][ T8889] perf_uprobe_event_init+0xde/0x140 [ 2627.055517][ T8889] perf_try_init_event+0x21a/0x400 [ 2627.060864][ T8889] perf_event_alloc+0xa60/0x1790 [ 2627.065816][ T8889] __se_sys_perf_event_open+0x5c7/0x2740 [ 2627.071593][ T8889] ? vfs_write+0x50c/0x770 [ 2627.076143][ T8889] __x64_sys_perf_event_open+0x63/0x70 [ 2627.081810][ T8889] do_syscall_64+0x4a/0x90 [ 2627.086237][ T8889] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2627.092176][ T8889] RIP: 0033:0x4665d9 [ 2627.096296][ T8889] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2627.118494][ T8889] RSP: 002b:00007fe251c51188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a 04:44:32 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080), 0x40002, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="24000000000101020004000000000000050000002400"], 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x20000851) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5e92, 0x80000000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:32 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x700, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:32 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400fe0400000200000000000006040000000000000000", 0x39}], 0x1) 04:44:32 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5a020000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2627.127256][ T8889] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2627.135335][ T8889] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2627.143301][ T8889] RBP: 00007fe251c511d0 R08: 0000000000000000 R09: 0000000000000000 [ 2627.153794][ T8889] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2627.161761][ T8889] R13: 00007ffdc0e36b3f R14: 00007fe251c51300 R15: 0000000000022000 04:44:33 executing program 1 (fault-call:4 fault-nth:76): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:33 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x3f, 0x2, &(0x7f0000000300)=[{&(0x7f00000000c0)="035d8b1ac8c8ab852fc768028393cd9501ca9397c55a7bf2deb7dfc1cb578fd9c91cd0922f0474b76f1cef174be7305eca91eafd5f182e3bc41d2578ebc434b47809ce91e0cb8b73ac4a83c8cf8a023010add8df4d4afc4cbe1d7b1bdfb816c52743cc47bea6543e1bcab91a38be2d2320b218d4770db944d65851c315e241031c55414f8c8b4fa4342bf3c0474bf07a1bb0f06a8fb7", 0x96, 0x8}, {&(0x7f0000000200)="3835125a7c7e9e98fc49177dcf01edfac916b5eb090526b9064f0dab29b408664645e51e2b2acc09860b0130a5680b58f5b24a3f4a663e9c1c7d9859ce57c1c90cac21e07391b486be8f640119d33a2e9704fc7d51476c7848a6d8246010bd098fc9110254df822b01069fed07f8d66e7ac51b49e892be135f0d96c0c5f326a60681fb45c165e7c445e7dcb61315055d3df4901b1430d6fe787479aba22e72ccb1ef2c508086fc8cff8e06b9e34a155a6bb10d391cb87a2af0a1f43019e2f8346bd565", 0xc3, 0x88}], 0x100044, &(0x7f0000000340)={[{@shortname_winnt}, {@fat=@discard}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@shortname_win95}], [{@audit}, {@fsuuid={'fsuuid', 0x3d, {[0x63, 0x61, 0x65, 0x30, 0x32, 0x66, 0x32, 0x31], 0x2d, [0x30, 0x30, 0x65, 0x65], 0x2d, [0x63, 0x5c, 0x61, 0x63], 0x2d, [0x38, 0x65, 0x65, 0x36], 0x2d, [0x31, 0x32, 0x32, 0x39, 0x63, 0x62, 0x65, 0x66]}}}, {@dont_appraise}]}) fchmodat(r0, &(0x7f00000003c0)='./file0\x00', 0x10) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) getdents64(r0, &(0x7f0000000400)=""/39, 0x27) 04:44:33 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x900, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:33 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x2d8100, 0x2) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000080)='cpuacct.usage_percpu\x00', 0x0, 0x0) mmap(&(0x7f0000155000/0x2000)=nil, 0x2000, 0xd, 0x10010, r2, 0xe273d000) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r0, &(0x7f00000000c0)='cpuacct.usage_user\x00', 0x0, 0x0) [ 2627.188123][ T8897] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2627.206096][ T8897] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2627.228523][ T8897] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready 04:44:33 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000402ff0400000200000000000006040000000000000000", 0x39}], 0x1) [ 2627.239982][ T8906] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 04:44:33 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:33 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000403ff0400000200000000000006040000000000000000", 0x39}], 0x1) [ 2627.321299][ T8918] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2627.330617][ T8918] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready 04:44:33 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:33 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000404ff0400000200000000000006040000000000000000", 0x39}], 0x1) 04:44:33 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xb00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2627.393003][ T8926] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready [ 2627.467701][ T8916] FAULT_INJECTION: forcing a failure. [ 2627.467701][ T8916] name failslab, interval 1, probability 0, space 0, times 0 [ 2627.480726][ T8916] CPU: 1 PID: 8916 Comm: syz-executor.1 Not tainted 5.13.0-rc3-syzkaller #0 [ 2627.489959][ T8916] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2627.500013][ T8916] Call Trace: [ 2627.503767][ T8916] dump_stack+0x137/0x19d [ 2627.509316][ T8916] should_fail+0x23c/0x250 [ 2627.513743][ T8916] __should_failslab+0x81/0x90 [ 2627.518518][ T8916] ? register_for_each_vma+0x372/0x890 [ 2627.523996][ T8916] should_failslab+0x5/0x20 [ 2627.528505][ T8916] kmem_cache_alloc_trace+0x49/0x310 [ 2627.533799][ T8916] ? register_for_each_vma+0x372/0x890 [ 2627.539330][ T8916] ? vma_interval_tree_iter_next+0x263/0x280 [ 2627.545996][ T8916] register_for_each_vma+0x372/0x890 [ 2627.551554][ T8916] __uprobe_register+0x3f4/0x8a0 [ 2627.556606][ T8916] uprobe_register_refctr+0x29/0x40 [ 2627.561911][ T8916] probe_event_enable+0x2be/0x7d0 [ 2627.567065][ T8916] ? __uprobe_trace_func+0x430/0x430 [ 2627.572609][ T8916] trace_uprobe_register+0x88/0x410 [ 2627.578121][ T8916] perf_trace_event_init+0x34e/0x790 [ 2627.583447][ T8916] perf_uprobe_init+0xf5/0x140 [ 2627.588337][ T8916] perf_uprobe_event_init+0xde/0x140 [ 2627.593791][ T8916] perf_try_init_event+0x21a/0x400 [ 2627.599046][ T8916] perf_event_alloc+0xa60/0x1790 [ 2627.603970][ T8916] __se_sys_perf_event_open+0x5c7/0x2740 [ 2627.609630][ T8916] ? vfs_write+0x50c/0x770 [ 2627.614041][ T8916] __x64_sys_perf_event_open+0x63/0x70 [ 2627.620123][ T8916] do_syscall_64+0x4a/0x90 [ 2627.624982][ T8916] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2627.631243][ T8916] RIP: 0033:0x4665d9 [ 2627.635413][ T8916] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2627.655698][ T8916] RSP: 002b:00007fe251c51188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a 04:44:33 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xc00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:33 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000405ff0400000200000000000006040000000000000000", 0x39}], 0x1) [ 2627.664254][ T8916] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2627.672742][ T8916] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2627.681270][ T8916] RBP: 00007fe251c511d0 R08: 0000000000000000 R09: 0000000000000000 [ 2627.689426][ T8916] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2627.697679][ T8916] R13: 00007ffdc0e36b3f R14: 00007fe251c51300 R15: 0000000000022000 [ 2627.711255][ T8937] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready 04:44:33 executing program 1 (fault-call:4 fault-nth:77): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2627.748746][ T8948] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready [ 2627.815782][ T8951] FAULT_INJECTION: forcing a failure. [ 2627.815782][ T8951] name failslab, interval 1, probability 0, space 0, times 0 [ 2627.828665][ T8951] CPU: 0 PID: 8951 Comm: syz-executor.1 Not tainted 5.13.0-rc3-syzkaller #0 [ 2627.837451][ T8951] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2627.847857][ T8951] Call Trace: [ 2627.851319][ T8951] dump_stack+0x137/0x19d [ 2627.855973][ T8951] should_fail+0x23c/0x250 [ 2627.860465][ T8951] __should_failslab+0x81/0x90 [ 2627.865311][ T8951] ? register_for_each_vma+0x372/0x890 [ 2627.870776][ T8951] should_failslab+0x5/0x20 [ 2627.875352][ T8951] kmem_cache_alloc_trace+0x49/0x310 [ 2627.880631][ T8951] ? register_for_each_vma+0x372/0x890 [ 2627.886280][ T8951] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2627.892362][ T8951] register_for_each_vma+0x372/0x890 [ 2627.897640][ T8951] __uprobe_register+0x3f4/0x8a0 [ 2627.902637][ T8951] uprobe_register_refctr+0x29/0x40 [ 2627.907915][ T8951] probe_event_enable+0x2be/0x7d0 [ 2627.912942][ T8951] ? __uprobe_trace_func+0x430/0x430 [ 2627.918248][ T8951] trace_uprobe_register+0x88/0x410 [ 2627.923435][ T8951] perf_trace_event_init+0x34e/0x790 [ 2627.928725][ T8951] perf_uprobe_init+0xf5/0x140 [ 2627.933551][ T8951] perf_uprobe_event_init+0xde/0x140 [ 2627.938823][ T8951] perf_try_init_event+0x21a/0x400 [ 2627.943921][ T8951] perf_event_alloc+0xa60/0x1790 [ 2627.948876][ T8951] __se_sys_perf_event_open+0x5c7/0x2740 [ 2627.954621][ T8951] ? vfs_write+0x50c/0x770 [ 2627.959023][ T8951] __x64_sys_perf_event_open+0x63/0x70 [ 2627.964469][ T8951] do_syscall_64+0x4a/0x90 [ 2627.968878][ T8951] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2627.974874][ T8951] RIP: 0033:0x4665d9 [ 2627.978764][ T8951] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2627.998926][ T8951] RSP: 002b:00007fe251c51188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2628.007338][ T8951] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2628.015462][ T8951] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2628.023592][ T8951] RBP: 00007fe251c511d0 R08: 0000000000000000 R09: 0000000000000000 [ 2628.031663][ T8951] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2628.039654][ T8951] R13: 00007ffdc0e36b3f R14: 00007fe251c51300 R15: 0000000000022000 04:44:33 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000406ff0400000200000000000006040000000000000000", 0x39}], 0x1) 04:44:33 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xd00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:33 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000004, 0x50, r0, 0x1d51d000) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:33 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:33 executing program 1 (fault-call:4 fault-nth:78): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:33 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x13, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_DISALLOCATE(r1, 0x5608) 04:44:33 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xe00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:33 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000407ff0400000200000000000006040000000000000000", 0x39}], 0x1) [ 2628.162001][ T8974] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready [ 2628.213390][ T8985] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready [ 2628.221428][ T8973] FAULT_INJECTION: forcing a failure. [ 2628.221428][ T8973] name failslab, interval 1, probability 0, space 0, times 0 [ 2628.234590][ T8973] CPU: 1 PID: 8973 Comm: syz-executor.1 Not tainted 5.13.0-rc3-syzkaller #0 [ 2628.243475][ T8973] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2628.253766][ T8973] Call Trace: [ 2628.257153][ T8973] dump_stack+0x137/0x19d [ 2628.261626][ T8973] should_fail+0x23c/0x250 [ 2628.266467][ T8973] __should_failslab+0x81/0x90 [ 2628.271394][ T8973] ? register_for_each_vma+0x372/0x890 [ 2628.277072][ T8973] should_failslab+0x5/0x20 [ 2628.281871][ T8973] kmem_cache_alloc_trace+0x49/0x310 [ 2628.287268][ T8973] ? register_for_each_vma+0x372/0x890 [ 2628.293031][ T8973] ? vma_interval_tree_iter_next+0x263/0x280 [ 2628.299450][ T8973] register_for_each_vma+0x372/0x890 [ 2628.305612][ T8973] __uprobe_register+0x3f4/0x8a0 [ 2628.310643][ T8973] uprobe_register_refctr+0x29/0x40 [ 2628.315854][ T8973] probe_event_enable+0x2be/0x7d0 [ 2628.321629][ T8973] ? __uprobe_trace_func+0x430/0x430 [ 2628.327325][ T8973] trace_uprobe_register+0x88/0x410 [ 2628.332744][ T8973] perf_trace_event_init+0x34e/0x790 [ 2628.338113][ T8973] perf_uprobe_init+0xf5/0x140 [ 2628.342882][ T8973] perf_uprobe_event_init+0xde/0x140 [ 2628.348162][ T8973] perf_try_init_event+0x21a/0x400 [ 2628.353526][ T8973] perf_event_alloc+0xa60/0x1790 [ 2628.358461][ T8973] __se_sys_perf_event_open+0x5c7/0x2740 [ 2628.364156][ T8973] ? vfs_write+0x50c/0x770 [ 2628.368670][ T8973] __x64_sys_perf_event_open+0x63/0x70 [ 2628.374340][ T8973] do_syscall_64+0x4a/0x90 [ 2628.378820][ T8973] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2628.384817][ T8973] RIP: 0033:0x4665d9 [ 2628.388714][ T8973] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 04:44:34 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xf00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:34 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000408ff0400000200000000000006040000000000000000", 0x39}], 0x1) 04:44:34 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2628.409232][ T8973] RSP: 002b:00007fe251c51188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2628.417908][ T8973] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2628.426153][ T8973] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2628.434240][ T8973] RBP: 00007fe251c511d0 R08: 0000000000000000 R09: 0000000000000000 [ 2628.442484][ T8973] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2628.450474][ T8973] R13: 00007ffdc0e36b3f R14: 00007fe251c51300 R15: 0000000000022000 04:44:34 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:34 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000409ff0400000200000000000006040000000000000000", 0x39}], 0x1) 04:44:34 executing program 1 (fault-call:4 fault-nth:79): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2628.516315][ T9001] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready 04:44:34 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x27a, @tick=0x80, 0x7f, {0x40, 0xa1}, 0xfe, 0x1, 0x2}) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:34 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:34 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff060000000100000009000000250000001900040aff0400000200000000000006040000000000000000", 0x39}], 0x1) [ 2628.561285][ T9010] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready [ 2628.678410][ T9012] FAULT_INJECTION: forcing a failure. [ 2628.678410][ T9012] name failslab, interval 1, probability 0, space 0, times 0 [ 2628.691408][ T9012] CPU: 1 PID: 9012 Comm: syz-executor.1 Not tainted 5.13.0-rc3-syzkaller #0 [ 2628.700341][ T9012] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2628.710692][ T9012] Call Trace: [ 2628.714110][ T9012] dump_stack+0x137/0x19d [ 2628.719506][ T9012] should_fail+0x23c/0x250 [ 2628.724021][ T9012] __should_failslab+0x81/0x90 [ 2628.729020][ T9012] ? register_for_each_vma+0x372/0x890 [ 2628.734490][ T9012] should_failslab+0x5/0x20 [ 2628.739260][ T9012] kmem_cache_alloc_trace+0x49/0x310 [ 2628.744840][ T9012] ? register_for_each_vma+0x372/0x890 [ 2628.750441][ T9012] ? vma_interval_tree_iter_next+0x263/0x280 [ 2628.756414][ T9012] register_for_each_vma+0x372/0x890 [ 2628.761903][ T9012] __uprobe_register+0x3f4/0x8a0 [ 2628.766852][ T9012] uprobe_register_refctr+0x29/0x40 [ 2628.772376][ T9012] probe_event_enable+0x2be/0x7d0 [ 2628.777516][ T9012] ? __uprobe_trace_func+0x430/0x430 [ 2628.782807][ T9012] trace_uprobe_register+0x88/0x410 [ 2628.788021][ T9012] perf_trace_event_init+0x34e/0x790 [ 2628.793408][ T9012] perf_uprobe_init+0xf5/0x140 [ 2628.798162][ T9012] perf_uprobe_event_init+0xde/0x140 [ 2628.803493][ T9012] perf_try_init_event+0x21a/0x400 [ 2628.808705][ T9012] perf_event_alloc+0xa60/0x1790 [ 2628.813955][ T9012] __se_sys_perf_event_open+0x5c7/0x2740 [ 2628.819817][ T9012] ? vfs_write+0x50c/0x770 [ 2628.824226][ T9012] __x64_sys_perf_event_open+0x63/0x70 [ 2628.829689][ T9012] do_syscall_64+0x4a/0x90 [ 2628.834137][ T9012] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2628.840087][ T9012] RIP: 0033:0x4665d9 [ 2628.844045][ T9012] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2628.863903][ T9012] RSP: 002b:00007fe251c51188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a 04:44:34 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r1, &(0x7f00000026c0)=[{&(0x7f00000013c0)=""/131, 0x83}, {&(0x7f0000001480)}, {&(0x7f00000014c0)=""/25, 0x19}, {&(0x7f0000001500)=""/98, 0x62}, {&(0x7f0000001580)=""/4096, 0x1000}, {&(0x7f0000002580)=""/203, 0xcb}, {&(0x7f0000002680)}], 0x7, 0x3f, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r2, 0x0) faccessat(r2, &(0x7f0000001480)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/9, 0x9}, {&(0x7f00000000c0)=""/22, 0x16}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000001200)=""/229, 0xe5}, {&(0x7f0000001300)=""/136, 0x88}], 0x5, 0x0, 0x9) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sync_file_range(r3, 0x9fb, 0x1, 0x2) 04:44:34 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:34 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:34 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x80000000000000, 0xffffffffffffffff, 0x0) 04:44:34 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff060000000100000009000000250000001900040bff0400000200000000000006040000000000000000", 0x39}], 0x1) [ 2628.872392][ T9012] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2628.881210][ T9012] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2628.889268][ T9012] RBP: 00007fe251c511d0 R08: 0000000000000000 R09: 0000000000000000 [ 2628.897483][ T9012] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2628.905533][ T9012] R13: 00007ffdc0e36b3f R14: 00007fe251c51300 R15: 0000000000022000 [ 2628.918405][ T9025] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready 04:44:34 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r1, 0xf505, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x35, 0x0, &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000280)={0x7295, 0x1, 0xeb, 0x4, 0x100}, 0xc) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x35, 0x0, &(0x7f0000000080)) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f00000002c0)={'mangle\x00', 0x0, [0x7, 0x3, 0x3, 0x1, 0xfffffff9]}, &(0x7f0000000340)=0x54) accept(r3, &(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000100)=0x80) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000140)=""/8, 0x8, 0x12141, &(0x7f0000000200)=@file={0x1, './file0\x00'}, 0x6e) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:34 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:34 executing program 1 (fault-call:4 fault-nth:80): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:34 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff060000000100000009000000250000001900040cff0400000200000000000006040000000000000000", 0x39}], 0x1) 04:44:34 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2700, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2629.001656][ T9047] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready 04:44:34 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3f00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:34 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:34 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_icmp(0xa, 0x2, 0x3a) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000200)={0x0, 0x0, {0x0, @struct}, {0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_timeval(r1, 0x1, 0x42, &(0x7f0000000080), &(0x7f00000000c0)=0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:34 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff060000000100000009000000250000001900040dff0400000200000000000006040000000000000000", 0x39}], 0x1) [ 2629.091676][ T9060] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready [ 2629.190389][ T9059] FAULT_INJECTION: forcing a failure. [ 2629.190389][ T9059] name failslab, interval 1, probability 0, space 0, times 0 [ 2629.203678][ T9059] CPU: 1 PID: 9059 Comm: syz-executor.1 Not tainted 5.13.0-rc3-syzkaller #0 [ 2629.212561][ T9059] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2629.222756][ T9059] Call Trace: [ 2629.226035][ T9059] dump_stack+0x137/0x19d [ 2629.230426][ T9059] should_fail+0x23c/0x250 [ 2629.234917][ T9059] __should_failslab+0x81/0x90 [ 2629.239931][ T9059] ? register_for_each_vma+0x372/0x890 [ 2629.245501][ T9059] should_failslab+0x5/0x20 [ 2629.249992][ T9059] kmem_cache_alloc_trace+0x49/0x310 [ 2629.255300][ T9059] ? register_for_each_vma+0x372/0x890 [ 2629.260946][ T9059] ? vma_interval_tree_iter_next+0x263/0x280 [ 2629.267046][ T9059] register_for_each_vma+0x372/0x890 [ 2629.272534][ T9059] __uprobe_register+0x3f4/0x8a0 [ 2629.277732][ T9059] uprobe_register_refctr+0x29/0x40 [ 2629.283142][ T9059] probe_event_enable+0x2be/0x7d0 [ 2629.288199][ T9059] ? __uprobe_trace_func+0x430/0x430 [ 2629.293627][ T9059] trace_uprobe_register+0x88/0x410 [ 2629.299076][ T9059] perf_trace_event_init+0x34e/0x790 [ 2629.304386][ T9059] perf_uprobe_init+0xf5/0x140 [ 2629.309141][ T9059] perf_uprobe_event_init+0xde/0x140 [ 2629.314486][ T9059] perf_try_init_event+0x21a/0x400 [ 2629.319774][ T9059] perf_event_alloc+0xa60/0x1790 [ 2629.324860][ T9059] __se_sys_perf_event_open+0x5c7/0x2740 [ 2629.330683][ T9059] ? vfs_write+0x50c/0x770 [ 2629.335188][ T9059] __x64_sys_perf_event_open+0x63/0x70 [ 2629.340811][ T9059] do_syscall_64+0x4a/0x90 [ 2629.345246][ T9059] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2629.351179][ T9059] RIP: 0033:0x4665d9 [ 2629.355181][ T9059] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2629.375028][ T9059] RSP: 002b:00007fe251c51188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a 04:44:35 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2629.383598][ T9059] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2629.391577][ T9059] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2629.399566][ T9059] RBP: 00007fe251c511d0 R08: 0000000000000000 R09: 0000000000000000 [ 2629.407829][ T9059] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2629.415982][ T9059] R13: 00007ffdc0e36b3f R14: 00007fe251c51300 R15: 0000000000022000 [ 2629.429592][ T9080] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready 04:44:35 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x43841, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\x00') 04:44:35 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4c00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:35 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff060000000100000009000000250000001900040eff0400000200000000000006040000000000000000", 0x39}], 0x1) 04:44:35 executing program 1 (fault-call:4 fault-nth:81): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:35 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x5802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:35 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x98010000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:35 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff060000000100000009000000250000001900040fff0400000200000000000006040000000000000000", 0x39}], 0x1) [ 2629.538805][ T9097] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready 04:44:35 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:35 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000410ff0400000200000000000006040000000000000000", 0x39}], 0x1) [ 2629.656328][ T9111] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready [ 2629.701508][ T9099] FAULT_INJECTION: forcing a failure. [ 2629.701508][ T9099] name failslab, interval 1, probability 0, space 0, times 0 [ 2629.714477][ T9099] CPU: 1 PID: 9099 Comm: syz-executor.1 Not tainted 5.13.0-rc3-syzkaller #0 [ 2629.723180][ T9099] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2629.733239][ T9099] Call Trace: [ 2629.736630][ T9099] dump_stack+0x137/0x19d [ 2629.741328][ T9099] should_fail+0x23c/0x250 [ 2629.745742][ T9099] __should_failslab+0x81/0x90 [ 2629.750935][ T9099] ? register_for_each_vma+0x372/0x890 [ 2629.756411][ T9099] should_failslab+0x5/0x20 [ 2629.760956][ T9099] kmem_cache_alloc_trace+0x49/0x310 [ 2629.766245][ T9099] ? register_for_each_vma+0x372/0x890 [ 2629.772017][ T9099] ? vma_interval_tree_iter_next+0x263/0x280 [ 2629.778278][ T9099] register_for_each_vma+0x372/0x890 [ 2629.783753][ T9099] __uprobe_register+0x3f4/0x8a0 [ 2629.788715][ T9099] uprobe_register_refctr+0x29/0x40 [ 2629.793913][ T9099] probe_event_enable+0x2be/0x7d0 [ 2629.798995][ T9099] ? __uprobe_trace_func+0x430/0x430 [ 2629.804320][ T9099] trace_uprobe_register+0x88/0x410 [ 2629.809739][ T9099] perf_trace_event_init+0x34e/0x790 [ 2629.815247][ T9099] perf_uprobe_init+0xf5/0x140 [ 2629.820066][ T9099] perf_uprobe_event_init+0xde/0x140 [ 2629.825476][ T9099] perf_try_init_event+0x21a/0x400 [ 2629.830609][ T9099] perf_event_alloc+0xa60/0x1790 [ 2629.835728][ T9099] __se_sys_perf_event_open+0x5c7/0x2740 [ 2629.841659][ T9099] ? vfs_write+0x50c/0x770 [ 2629.846277][ T9099] __x64_sys_perf_event_open+0x63/0x70 [ 2629.851728][ T9099] do_syscall_64+0x4a/0x90 [ 2629.856267][ T9099] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2629.862264][ T9099] RIP: 0033:0x4665d9 [ 2629.866150][ T9099] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2629.886042][ T9099] RSP: 002b:00007fe251c51188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2629.894621][ T9099] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2629.903004][ T9099] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2629.911351][ T9099] RBP: 00007fe251c511d0 R08: 0000000000000000 R09: 0000000000000000 [ 2629.919469][ T9099] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2629.927531][ T9099] R13: 00007ffdc0e36b3f R14: 00007fe251c51300 R15: 0000000000022000 04:44:35 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6c00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2629.947588][ T9121] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready 04:44:35 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000411ff0400000200000000000006040000000000000000", 0x39}], 0x1) 04:44:35 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) truncate(&(0x7f00000003c0)='./file0\x00', 0x2) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) syz_mount_image$nfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x490, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000100)="214e0e024abd862d2f1d5c75fae4bbda8823c7d6b0f187661feb03e91d15ab7deebd47e14e29ea5112189fddd1fd5effc87de5b251270981c95bf2b3fca3a541b8b99845ce85244df5ec697527819adc44387028410a14a21d3d156d813fb3e98e747a8f7d0fe3fc786bfcab43e6e0037c5cc3baf771c90d82ebf614347fe202", 0x80, 0x9}, {&(0x7f0000000200)="9491785f5219b68e29c25f3d7d086c9d1b752138e2c286c8a2a07d9b59d704d3baa7f7e8ac8df103c5bcff25e9af5886ff880691e11de6785038c31201f91fb1bdc0c88b51f6176b085b939b145a09330e804b85a89e58e8be99f67e5f4487eb30d1b66b75b6b81411de2a1023d476495aa62036f1bf4d1f6e0518c574200bf5a808ab2049", 0x85}], 0x204000, &(0x7f0000000300)={[{'\xbe\xe7,[\x84'}, {}, {}, {'[!{'}, {'#\''}, {'!'}, {'%'}, {':-'}], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@audit}, {@dont_hash}]}) getresuid(&(0x7f0000000000), &(0x7f0000000040)=0x0, &(0x7f0000000080)=0x0) setresuid(r1, 0xee01, r2) r3 = signalfd(r0, &(0x7f00000004c0)={[0x5]}, 0x8) recvmmsg(r3, &(0x7f0000000a40)=[{{&(0x7f0000000500)=@nfc, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000580)=""/167, 0xa7}, {&(0x7f0000000640)=""/128, 0x80}, {&(0x7f00000006c0)=""/206, 0xce}], 0x3, &(0x7f0000000800)=""/146, 0x92}, 0x800}, {{&(0x7f00000008c0)=@isdn, 0x80, &(0x7f0000000980)=[{&(0x7f0000000940)=""/30, 0x1e}], 0x1, &(0x7f00000009c0)=""/113, 0x71}, 0x4}], 0x2, 0x10100, 0x0) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440), &(0x7f0000000480)=@v3={0x3000000, [{0x1, 0xffffffff}, {0x9, 0x7}], r2}, 0x18, 0x1) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x620100, 0x23) openat(r4, &(0x7f0000000000)='/proc/self/exe\x00', 0xa0d81, 0x8e) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4d2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000000040)=0x0, &(0x7f0000000080)=0x0) setresuid(r5, 0xee01, r6) syz_mount_image$ext4(&(0x7f0000000ac0)='ext3\x00', &(0x7f0000000b00)='./file0\x00', 0xffffffff, 0x8, &(0x7f0000000f80)=[{&(0x7f0000000b40)="6043146caa27cd67091369271bd08b361cdb75f8b5e55eab8de67bb60cd9a2c7b0e4127587b78b33868ad109f886b74a0f45f8011ca5d9204e64483a279863c813073119d9e0582cc092fde6e2ebdf56618cb77e853785884d99c881bc7b20889a145cc7f15ac840bd65c0034731616fff77f1a4bf35272d07bace31bcda4eeef64f604792b0bccb05b8c5661cfd9270fef24aaf", 0x94, 0xdb82}, {&(0x7f0000000c00)="d962a995d9af784e29ea2e23e1e541eeb9010a7f03c98c", 0x17, 0x1000}, {&(0x7f0000000c40)="8218810dea9e4e5b200baeff8509cfb995caeb56131929e2fe64e7162e8c65e698e3242d42ed1ffee8ce46c510ead067965c56faf355918bbffa9acef7f32492b70ad88e9ea729bbbd1ce791e3de812330515e514df4d4a868792a15eba233f03d507ceb438e6b3058190ec9ec1f494004efb4a5f22af16bdc359af26347b118aca4e40c5d6e8c04ea5678f51d003600b96763486a9dc85e144841eded08f1af3bfda706ae3f4d86f95bda41a95b615413e0028831ea351d443be3", 0xbb, 0x5}, {&(0x7f0000000d00)="c8bd3efa5c1c463b6f22b60cfa1222b7784eb58cbeb804a56866c164e29fd850338e59108b059e83b37c2a1b71a45bc81b369998c1b75dd61a5d26d00d5743237a5d796d50b30bf3b0b02303cd5855caf7444749fc83eb342f41e3f68ceb4378a0b225e277dd12e6b5c6f68da4584248ad19", 0x72, 0x42}, {&(0x7f0000000d80)="76315fe4b9cae0cb1b3e97dd8f1157b221a208b25fb2430f1e3ef7bc6a207a0bd69f5bec970bb9d65ad82e3a864a581e5c5cc91040e032bfc4857bac2a8fee7d8748e5f32e2d89c4c52512bfe6a7d2ab3d59195d47c0d43880e747d52714bba21d31ca", 0x63}, {&(0x7f0000000e00)="2f6728b16908bd9328cc1672a0bb939ef914dfd7914d83fe2804f7f27710e97668a3ce0cece4fad7754bc86acadae4d37c6aaa83aa494e70c32529e9912896e4ea7997a24f48ac4339006407b21390961453374c3438a53cfa3f7024e227f3600275c2961ea458317c57bb", 0x6b, 0x2}, {&(0x7f0000000e80)="c6c1e16dfe51bb4fa42a3ed6f706c889a3f9955ee088fce935c34f4544ac2bf1932a498958a47dbaebdd86c97bdd34143018ea22a464eb60ef38ceaa58401e5fa335136f65dc2420346d9ce25d7a5f036b6aa583db8f3526d7ee1ed3ff3cd692229c79e58343f5ad346e2220dec36d49f3ef9fd94eefdf41492821de5651e40c5ab59ec5cfcf112436d65e7b623ba564bdb9f79a2340621cbf4ec9c4c73ad3a8923e9d0c3cadd0784902b62e27c3f61222a9c3b196c30317b99d", 0xba}, {&(0x7f0000000f40)="c06f34951383192fd4c83966e9bed3e29fa0aa804f2a2a8872532ff1f4f933ba8590573a5b7e37a86bb6f161168f702e79f6909afa4fda41f956cd5c10", 0x3d, 0x8}], 0x201004, &(0x7f0000001040)={[{@min_batch_time={'min_batch_time', 0x3d, 0x800}}, {@test_dummy_encryption}, {@jqfmt_vfsv1}, {@bsdgroups}, {@mblk_io_submit}, {@minixdf}, {@nolazytime}, {@init_itable_val={'init_itable', 0x3d, 0x8000}}], [{@fowner_gt={'fowner>', r5}}]}) [ 2630.006266][ T9127] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready [ 2630.035838][ T9131] loop0: detected capacity change from 0 to 2 [ 2630.042515][ T9131] nfs: Unknown parameter '' 04:44:35 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:35 executing program 1 (fault-call:4 fault-nth:82): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:35 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000412ff0400000200000000000006040000000000000000", 0x39}], 0x1) 04:44:35 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x100000001, 0x0) mmap(&(0x7f00001c2000/0x2000)=nil, 0x2000, 0x2000003, 0x30, r1, 0x8490e000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:35 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a010000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:35 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001a40)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r2, 0x50009418, &(0x7f0000000400)={{}, r3, 0x14, @inherit={0x88, &(0x7f0000001580)=ANY=[@ANYRES16=r4]}, @devid}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r1, 0xc0c89425, &(0x7f0000000040)={"fb3775c36fcb962f49f99076a7e6122a", r3, 0x0, {0xff, 0x5}, {0x3, 0x6}, 0xffffffffffffff00, [0xad0, 0x1d, 0x489, 0x7fff, 0x6, 0x3, 0xf0, 0xffff, 0x200, 0xfffffffffffffff8, 0x6, 0x9, 0x4, 0x7, 0x8, 0x77]}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000}, 0xffffffffffffffff, 0x0, r1, 0x0) kcmp(0xffffffffffffffff, 0x0, 0x1, r0, r0) 04:44:35 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7a00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:35 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000416ff0400000200000000000006040000000000000000", 0x39}], 0x1) [ 2630.169766][ T9162] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready [ 2630.225560][ T9158] FAULT_INJECTION: forcing a failure. [ 2630.225560][ T9158] name failslab, interval 1, probability 0, space 0, times 0 [ 2630.238359][ T9158] CPU: 0 PID: 9158 Comm: syz-executor.1 Not tainted 5.13.0-rc3-syzkaller #0 [ 2630.247289][ T9158] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2630.257522][ T9158] Call Trace: [ 2630.260829][ T9158] dump_stack+0x137/0x19d [ 2630.265173][ T9158] should_fail+0x23c/0x250 [ 2630.269600][ T9158] __should_failslab+0x81/0x90 [ 2630.274539][ T9158] ? register_for_each_vma+0x372/0x890 [ 2630.280310][ T9158] should_failslab+0x5/0x20 [ 2630.284926][ T9158] kmem_cache_alloc_trace+0x49/0x310 [ 2630.290275][ T9158] ? register_for_each_vma+0x372/0x890 [ 2630.296034][ T9158] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2630.302210][ T9158] register_for_each_vma+0x372/0x890 [ 2630.307695][ T9158] __uprobe_register+0x3f4/0x8a0 [ 2630.312935][ T9158] uprobe_register_refctr+0x29/0x40 [ 2630.318204][ T9158] probe_event_enable+0x2be/0x7d0 [ 2630.323266][ T9158] ? __uprobe_trace_func+0x430/0x430 [ 2630.328561][ T9158] trace_uprobe_register+0x88/0x410 [ 2630.333980][ T9158] perf_trace_event_init+0x34e/0x790 [ 2630.339277][ T9158] perf_uprobe_init+0xf5/0x140 [ 2630.344055][ T9158] perf_uprobe_event_init+0xde/0x140 [ 2630.349451][ T9158] perf_try_init_event+0x21a/0x400 [ 2630.354658][ T9158] perf_event_alloc+0xa60/0x1790 [ 2630.359740][ T9158] __se_sys_perf_event_open+0x5c7/0x2740 [ 2630.365658][ T9158] ? vfs_write+0x50c/0x770 [ 2630.370250][ T9158] __x64_sys_perf_event_open+0x63/0x70 [ 2630.375803][ T9158] do_syscall_64+0x4a/0x90 [ 2630.380215][ T9158] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2630.386304][ T9158] RIP: 0033:0x4665d9 [ 2630.390482][ T9158] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2630.410779][ T9158] RSP: 002b:00007fe251c51188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a 04:44:36 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xa601, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2630.419499][ T9158] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2630.428148][ T9158] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2630.436760][ T9158] RBP: 00007fe251c511d0 R08: 0000000000000000 R09: 0000000000000000 [ 2630.444892][ T9158] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2630.452961][ T9158] R13: 00007ffdc0e36b3f R14: 00007fe251c51300 R15: 0000000000022000 04:44:36 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:36 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000417ff0400000200000000000006040000000000000000", 0x39}], 0x1) 04:44:36 executing program 1 (fault-call:4 fault-nth:83): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2630.470109][ T9170] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready 04:44:36 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:36 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4010000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:36 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000418ff0400000200000000000006040000000000000000", 0x39}], 0x1) [ 2630.531236][ T9179] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready [ 2630.646285][ T9182] FAULT_INJECTION: forcing a failure. [ 2630.646285][ T9182] name failslab, interval 1, probability 0, space 0, times 0 [ 2630.658961][ T9182] CPU: 0 PID: 9182 Comm: syz-executor.1 Not tainted 5.13.0-rc3-syzkaller #0 [ 2630.667837][ T9182] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2630.678292][ T9182] Call Trace: [ 2630.681573][ T9182] dump_stack+0x137/0x19d [ 2630.685972][ T9182] should_fail+0x23c/0x250 [ 2630.690378][ T9182] __should_failslab+0x81/0x90 [ 2630.695144][ T9182] ? register_for_each_vma+0x372/0x890 [ 2630.700720][ T9182] should_failslab+0x5/0x20 [ 2630.705452][ T9182] kmem_cache_alloc_trace+0x49/0x310 [ 2630.710822][ T9182] ? register_for_each_vma+0x372/0x890 [ 2630.716358][ T9182] ? vma_interval_tree_iter_next+0x263/0x280 [ 2630.722408][ T9182] register_for_each_vma+0x372/0x890 [ 2630.728091][ T9182] __uprobe_register+0x3f4/0x8a0 [ 2630.733198][ T9182] uprobe_register_refctr+0x29/0x40 [ 2630.738386][ T9182] probe_event_enable+0x2be/0x7d0 [ 2630.743583][ T9182] ? __uprobe_trace_func+0x430/0x430 [ 2630.748933][ T9182] trace_uprobe_register+0x88/0x410 [ 2630.754752][ T9182] perf_trace_event_init+0x34e/0x790 [ 2630.760451][ T9182] perf_uprobe_init+0xf5/0x140 [ 2630.765296][ T9182] perf_uprobe_event_init+0xde/0x140 [ 2630.770587][ T9182] perf_try_init_event+0x21a/0x400 [ 2630.776217][ T9182] perf_event_alloc+0xa60/0x1790 [ 2630.781203][ T9182] __se_sys_perf_event_open+0x5c7/0x2740 [ 2630.787057][ T9182] ? vfs_write+0x50c/0x770 [ 2630.791569][ T9182] __x64_sys_perf_event_open+0x63/0x70 [ 2630.797190][ T9182] do_syscall_64+0x4a/0x90 [ 2630.801619][ T9182] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2630.807718][ T9182] RIP: 0033:0x4665d9 [ 2630.811612][ T9182] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2630.831332][ T9182] RSP: 002b:00007fe251c51188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2630.840388][ T9182] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2630.848657][ T9182] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2630.856727][ T9182] RBP: 00007fe251c511d0 R08: 0000000000000000 R09: 0000000000000000 [ 2630.864684][ T9182] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2630.872812][ T9182] R13: 00007ffdc0e36b3f R14: 00007fe251c51300 R15: 0000000000022000 [ 2630.893524][ T9192] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready 04:44:36 executing program 0: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x4) r1 = openat(r0, &(0x7f0000000040)='./file0\x00', 0x400080, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x20000, 0x9) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:36 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f0000001780)=[{&(0x7f0000001640)=""/219, 0xdb}, {&(0x7f0000001740)=""/20, 0x14}], 0x2, 0x525509aa, 0x800) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x2840, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r2, 0x0) preadv(r1, &(0x7f0000001540)=[{&(0x7f0000000080)=""/155, 0x9b}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000001200)=""/216, 0xd8}, {&(0x7f0000000140)=""/17, 0x11}, {&(0x7f0000001300)=""/223, 0xdf}, {&(0x7f0000001400)=""/250, 0xfa}, {&(0x7f0000001500)=""/8, 0x8}], 0x7, 0x1, 0x5) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r3, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f00000015c0)={0x4, 0x9, 0xdb, 0x0, 0x6, 0x8}) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000040)={0x6, 0xfffffffffffffff7, 0x0, 0x0, 0x2}) mbind(&(0x7f0000514000/0x4000)=nil, 0x4000, 0x3, &(0x7f0000001600)=0x9, 0xce, 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:36 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x200000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:36 executing program 1 (fault-call:4 fault-nth:84): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:36 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff060000000100000009000000250000001900041eff0400000200000000000006040000000000000000", 0x39}], 0x1) [ 2631.028176][ T9203] FAULT_INJECTION: forcing a failure. [ 2631.028176][ T9203] name failslab, interval 1, probability 0, space 0, times 0 [ 2631.043899][ T9203] CPU: 0 PID: 9203 Comm: syz-executor.1 Not tainted 5.13.0-rc3-syzkaller #0 [ 2631.053378][ T9203] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2631.064705][ T9203] Call Trace: [ 2631.068091][ T9203] dump_stack+0x137/0x19d [ 2631.072563][ T9203] should_fail+0x23c/0x250 [ 2631.076989][ T9203] __should_failslab+0x81/0x90 [ 2631.081894][ T9203] ? register_for_each_vma+0x372/0x890 [ 2631.087738][ T9203] should_failslab+0x5/0x20 [ 2631.092614][ T9203] kmem_cache_alloc_trace+0x49/0x310 [ 2631.098039][ T9203] ? register_for_each_vma+0x372/0x890 [ 2631.103504][ T9203] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2631.109557][ T9203] register_for_each_vma+0x372/0x890 [ 2631.114872][ T9203] __uprobe_register+0x3f4/0x8a0 [ 2631.119896][ T9203] uprobe_register_refctr+0x29/0x40 [ 2631.125224][ T9203] probe_event_enable+0x2be/0x7d0 [ 2631.130464][ T9203] ? __uprobe_trace_func+0x430/0x430 [ 2631.135906][ T9203] trace_uprobe_register+0x88/0x410 [ 2631.141357][ T9203] perf_trace_event_init+0x34e/0x790 [ 2631.146759][ T9203] perf_uprobe_init+0xf5/0x140 [ 2631.151683][ T9203] perf_uprobe_event_init+0xde/0x140 [ 2631.157186][ T9203] perf_try_init_event+0x21a/0x400 [ 2631.162629][ T9203] perf_event_alloc+0xa60/0x1790 [ 2631.167797][ T9203] __se_sys_perf_event_open+0x5c7/0x2740 [ 2631.173561][ T9203] ? vfs_write+0x50c/0x770 [ 2631.178320][ T9203] __x64_sys_perf_event_open+0x63/0x70 [ 2631.183859][ T9203] do_syscall_64+0x4a/0x90 [ 2631.188268][ T9203] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2631.194690][ T9203] RIP: 0033:0x4665d9 [ 2631.198640][ T9203] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2631.219083][ T9203] RSP: 002b:00007fe251c51188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a 04:44:37 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x400001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:37 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd3b60600}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2631.228128][ T9203] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2631.236741][ T9203] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2631.245113][ T9203] RBP: 00007fe251c511d0 R08: 0000000000000000 R09: 0000000000000000 [ 2631.253076][ T9203] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2631.261038][ T9203] R13: 00007ffdc0e36b3f R14: 00007fe251c51300 R15: 0000000000022000 04:44:37 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000200)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0, 0x0, 0x0}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r3, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@private0, @in6=@private2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000640)=0xffffffffffffff6f) r5 = gettid() ptrace$setopts(0x4206, r5, 0x0, 0x5) tkill(r5, 0x34) ptrace$cont(0x18, r5, 0x0, 0x0) ptrace$setregs(0xd, r5, 0x0, &(0x7f0000000080)) sendmsg$nl_netfilter(r3, &(0x7f0000000840)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000800)={&(0x7f0000000680)={0x154, 0xc, 0x3, 0x200, 0x70bd26, 0x25dfdbfc, {0x1, 0x0, 0x3}, [@nested={0x40, 0x4, 0x0, 0x1, [@typed={0x33, 0x4, 0x0, 0x0, @binary="6a67a06ea09ef18c8b65e5234e02ff6eb84a35fda7e0c15381aab7a399ecaac2cc70aecc131a48436d4300bd28a874"}, @typed={0x8, 0x42, 0x0, 0x0, @uid=r4}]}, @typed={0x8, 0x6a, 0x0, 0x0, @pid=r5}, @nested={0x4c, 0x12, 0x0, 0x1, [@generic="093be5919a86a048de9e691d8719c1c2f8fcba3f9e1e8fe124cf9e3fb952d1c91cfd3a32c743839a688fb5448be5f6ddccd987579f6271a500d466375e4fabf3a2e5384c08afd60a"]}, @nested={0xa4, 0x3e, 0x0, 0x1, [@generic="de062562e84ececef663ba3f585d13d0a695b640eed401191c3c4cbbbd7dea796c5012cecfd625fb8e197bece57923da187037c20dee714405a9b0c172b418d4b93628b80777fb7811a287dd50e90c0766cd5b62c380ddfa3d0a93ecc93710878b84d22cabe8de15ee0218d3674a23f4fbc8aa480b10ec0665aea7d0d1d8b7af8f57688192f265856a109709ffd5f0b7d3ed928093225bc74f8d629af6b020ed"]}, @typed={0x8, 0x35, 0x0, 0x0, @ipv4=@broadcast}]}, 0x154}, 0x1, 0x0, 0x0, 0x11}, 0x20000000) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000080)={"29bbe26880930ddbc0502033161035a0", 0x0, 0x0, {0x7, 0x2}, {0x1}, 0x3, [0x8, 0xc00, 0x2, 0x8, 0x5, 0x5, 0x0, 0x5, 0xffffffff, 0x1, 0xef14, 0x0, 0x4, 0x7, 0x0, 0x7a42b388]}) sched_getparam(r5, &(0x7f0000000880)) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r1, 0xc0c89425, &(0x7f0000000400)={"40c8f2d1267cc5df2f59f7a0d10c5ce5", r2, r6, {0x6, 0x9}, {0x0, 0x2}, 0x5, [0x7, 0xff, 0xfff, 0x20, 0xc8, 0x5, 0x34, 0x1, 0x3, 0x5, 0x4, 0x0, 0x3, 0x7fffffff, 0xffffffffffffffe1, 0x100000000]}) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:37 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:37 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f00000013c0)='./file0\x00', &(0x7f0000001400), &(0x7f0000001440)=@v2={0x2000000, [{0xffffffff, 0x8}, {0x8, 0x3}]}, 0x14, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) rename(&(0x7f0000001480)='./file0\x00', &(0x7f00000014c0)='./file0\x00') preadv(r0, &(0x7f0000001340)=[{&(0x7f0000000040)=""/146, 0x92}, {&(0x7f0000000100)=""/87, 0x57}, {&(0x7f0000000200)=""/115, 0x73}, {&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/149, 0x95}], 0x5, 0x0, 0xbb) 04:44:37 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000425ff0400000200000000000006040000000000000000", 0x39}], 0x1) [ 2631.277384][ T9209] validate_nla: 39 callbacks suppressed [ 2631.277476][ T9209] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2631.297828][ T9209] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready [ 2631.319318][ T9217] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 04:44:37 executing program 1 (fault-call:4 fault-nth:85): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2631.362387][ T9231] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2631.372205][ T9231] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready [ 2631.388089][ T9234] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2631.457369][ T9240] FAULT_INJECTION: forcing a failure. [ 2631.457369][ T9240] name failslab, interval 1, probability 0, space 0, times 0 [ 2631.471007][ T9240] CPU: 0 PID: 9240 Comm: syz-executor.1 Not tainted 5.13.0-rc3-syzkaller #0 [ 2631.480079][ T9240] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2631.490369][ T9240] Call Trace: [ 2631.493816][ T9240] dump_stack+0x137/0x19d [ 2631.498174][ T9240] should_fail+0x23c/0x250 [ 2631.502576][ T9240] __should_failslab+0x81/0x90 [ 2631.507374][ T9240] ? register_for_each_vma+0x372/0x890 [ 2631.512837][ T9240] should_failslab+0x5/0x20 [ 2631.517338][ T9240] kmem_cache_alloc_trace+0x49/0x310 [ 2631.522783][ T9240] ? register_for_each_vma+0x372/0x890 [ 2631.528298][ T9240] ? vma_interval_tree_iter_next+0x263/0x280 [ 2631.534266][ T9240] register_for_each_vma+0x372/0x890 [ 2631.539538][ T9240] __uprobe_register+0x3f4/0x8a0 [ 2631.544532][ T9240] uprobe_register_refctr+0x29/0x40 [ 2631.549828][ T9240] probe_event_enable+0x2be/0x7d0 [ 2631.554874][ T9240] ? __uprobe_trace_func+0x430/0x430 [ 2631.560233][ T9240] trace_uprobe_register+0x88/0x410 [ 2631.565517][ T9240] perf_trace_event_init+0x34e/0x790 [ 2631.570855][ T9240] perf_uprobe_init+0xf5/0x140 [ 2631.575717][ T9240] perf_uprobe_event_init+0xde/0x140 [ 2631.581061][ T9240] perf_try_init_event+0x21a/0x400 [ 2631.586425][ T9240] perf_event_alloc+0xa60/0x1790 [ 2631.591477][ T9240] __se_sys_perf_event_open+0x5c7/0x2740 [ 2631.597212][ T9240] ? vfs_write+0x50c/0x770 [ 2631.601649][ T9240] __x64_sys_perf_event_open+0x63/0x70 [ 2631.607231][ T9240] do_syscall_64+0x4a/0x90 [ 2631.611837][ T9240] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2631.617918][ T9240] RIP: 0033:0x4665d9 [ 2631.622073][ T9240] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2631.642009][ T9240] RSP: 002b:00007fe251c51188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2631.650423][ T9240] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2631.658405][ T9240] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2631.666379][ T9240] RBP: 00007fe251c511d0 R08: 0000000000000000 R09: 0000000000000000 [ 2631.674533][ T9240] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2631.682879][ T9240] R13: 00007ffdc0e36b3f R14: 00007fe251c51300 R15: 0000000000022000 04:44:37 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r2, 0x0) preadv(r2, &(0x7f0000002400)=[{&(0x7f0000000080)=""/103, 0x67}, {&(0x7f0000000100)=""/99, 0x63}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000001200)=""/83, 0x53}, {&(0x7f0000001280)=""/39, 0x27}, {&(0x7f00000012c0)=""/125, 0x7d}, {&(0x7f0000001340)=""/101, 0x65}, {&(0x7f00000013c0)=""/4096, 0x1000}, {&(0x7f00000023c0)=""/32, 0x20}], 0x9, 0x5, 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:37 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:37 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000448ff0400000200000000000006040000000000000000", 0x39}], 0x1) 04:44:37 executing program 1 (fault-call:4 fault-nth:86): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:37 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe83a1b00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:37 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:37 executing program 0: writev(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000080)="c9793b1719f12a85b9d203193946d659f64eb1dcbb7f8f7f50674b13b52ed936218cf0799e9f9216c34cb54c36b35b65887fe490833b09c95c75d9b847984b80e68b9be28864ffd8fdee352f06e70019eedf0205337b122d53234cdd71ecd551b6da75a697732fac3be68a3a89ea4cfa937e7321532637699f707bf8a13ec48ab1c10920eb65b16b650764e5db8245593d3c2a6352902e9076ee7749f5b0476d0bd3ed8b3147bd030965b3f7f5", 0xad}, {&(0x7f0000000200)="8ea9d1c6497e1b012e95fa277c1e65186b46c6151f13529f0fee9ba5628976d5b99dc34f490d73b3c2f923906186a3ef8021d7447f6e3d62cc1b0e871f34097577c64ca9f77c47b2671653a3fa479e49759a952f7f2cd62ba5f7f774a46d0d2190c3e6d57243a2466e21", 0x6a}, {&(0x7f0000000280)="e9a1f56dc98691461b362e14954bba245a85f5725a6a9695e1e11d772fd24aa9eaf4a29bc3a3c79c146dfa804d4a1249d786b6679e334184bfc0fb2e4a575c624be13503096e8645ab25c2d2", 0x4c}, {&(0x7f0000000300)="f9dc8d6fdc8c79ef2c0c13088f6cca0480e42b2ea986fb04cd125ccfa5c689e659e149d8a90167b7b2211430d642a90b3f3e44a64bee84541d0ae31916ceee56f950e0f9dbb1b413", 0x48}], 0x4) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:37 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff060000000100000009000000250000001900044cff0400000200000000000006040000000000000000", 0x39}], 0x1) [ 2631.840821][ T9256] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2631.851782][ T9256] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready [ 2631.870539][ T9260] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 04:44:37 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) mq_timedsend(r0, &(0x7f0000000040)="e7b2a05a8fd2efe5c76f749703bc9cee3a38cf174d216e2bcff1e7a17363ab1034d3ed8271fc33ede09b94f66b5abab13950da274e6db0d96cf4c3d0fd50fc016feb02dab562325959c53227578209b0c3fc49b1b7e33244fe9d47ad6e67d52604", 0x61, 0x7, &(0x7f0000000100)={r1, r2+60000000}) 04:44:37 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2631.946442][ T9268] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2631.956086][ T9268] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready [ 2631.974244][ T9272] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2631.993432][ T9257] FAULT_INJECTION: forcing a failure. [ 2631.993432][ T9257] name failslab, interval 1, probability 0, space 0, times 0 [ 2632.007669][ T9257] CPU: 1 PID: 9257 Comm: syz-executor.1 Not tainted 5.13.0-rc3-syzkaller #0 [ 2632.016524][ T9257] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2632.028058][ T9257] Call Trace: [ 2632.031505][ T9257] dump_stack+0x137/0x19d [ 2632.036298][ T9257] should_fail+0x23c/0x250 [ 2632.041187][ T9257] __should_failslab+0x81/0x90 [ 2632.046107][ T9257] ? register_for_each_vma+0x372/0x890 [ 2632.052280][ T9257] should_failslab+0x5/0x20 [ 2632.057161][ T9257] kmem_cache_alloc_trace+0x49/0x310 [ 2632.062677][ T9257] ? register_for_each_vma+0x372/0x890 [ 2632.068351][ T9257] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2632.074560][ T9257] register_for_each_vma+0x372/0x890 [ 2632.080174][ T9257] __uprobe_register+0x3f4/0x8a0 [ 2632.085488][ T9257] uprobe_register_refctr+0x29/0x40 [ 2632.090829][ T9257] probe_event_enable+0x2be/0x7d0 [ 2632.095862][ T9257] ? __uprobe_trace_func+0x430/0x430 [ 2632.101326][ T9257] trace_uprobe_register+0x88/0x410 [ 2632.106535][ T9257] perf_trace_event_init+0x34e/0x790 [ 2632.112147][ T9257] perf_uprobe_init+0xf5/0x140 [ 2632.117465][ T9257] perf_uprobe_event_init+0xde/0x140 [ 2632.123234][ T9257] perf_try_init_event+0x21a/0x400 [ 2632.128770][ T9257] perf_event_alloc+0xa60/0x1790 [ 2632.133814][ T9257] __se_sys_perf_event_open+0x5c7/0x2740 [ 2632.139819][ T9257] ? vfs_write+0x50c/0x770 [ 2632.144363][ T9257] __x64_sys_perf_event_open+0x63/0x70 [ 2632.150308][ T9257] do_syscall_64+0x4a/0x90 [ 2632.155453][ T9257] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2632.161527][ T9257] RIP: 0033:0x4665d9 [ 2632.165431][ T9257] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2632.185334][ T9257] RSP: 002b:00007fe251c51188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a 04:44:38 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000460ff0400000200000000000006040000000000000000", 0x39}], 0x1) 04:44:38 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2632.193764][ T9257] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2632.201748][ T9257] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2632.209852][ T9257] RBP: 00007fe251c511d0 R08: 0000000000000000 R09: 0000000000000000 [ 2632.217835][ T9257] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2632.225807][ T9257] R13: 00007ffdc0e36b3f R14: 00007fe251c51300 R15: 0000000000022000 04:44:38 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:38 executing program 1 (fault-call:4 fault-nth:87): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2632.260374][ T9285] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2632.281443][ T9285] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready 04:44:38 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:38 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:38 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0020000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:38 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000468ff0400000200000000000006040000000000000000", 0x39}], 0x1) [ 2632.304151][ T9290] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 04:44:38 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@dev={0xfe, 0x80, '\x00', 0x3e}, 0xfff, 0x2, 0x0, 0x1, 0x1, 0x7}, 0x20) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x1, 0x0, 0x0, 0x4, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:38 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2632.389225][ T9301] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready [ 2632.466011][ T9292] FAULT_INJECTION: forcing a failure. [ 2632.466011][ T9292] name failslab, interval 1, probability 0, space 0, times 0 [ 2632.479070][ T9292] CPU: 0 PID: 9292 Comm: syz-executor.1 Not tainted 5.13.0-rc3-syzkaller #0 [ 2632.487746][ T9292] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2632.497858][ T9292] Call Trace: [ 2632.501298][ T9292] dump_stack+0x137/0x19d [ 2632.505621][ T9292] should_fail+0x23c/0x250 [ 2632.510127][ T9292] __should_failslab+0x81/0x90 [ 2632.514901][ T9292] ? register_for_each_vma+0x372/0x890 [ 2632.520448][ T9292] should_failslab+0x5/0x20 [ 2632.525039][ T9292] kmem_cache_alloc_trace+0x49/0x310 [ 2632.530413][ T9292] ? register_for_each_vma+0x372/0x890 [ 2632.536053][ T9292] ? vma_interval_tree_iter_next+0x263/0x280 [ 2632.542063][ T9292] register_for_each_vma+0x372/0x890 [ 2632.547467][ T9292] __uprobe_register+0x3f4/0x8a0 [ 2632.552485][ T9292] uprobe_register_refctr+0x29/0x40 [ 2632.557996][ T9292] probe_event_enable+0x2be/0x7d0 [ 2632.563041][ T9292] ? __uprobe_trace_func+0x430/0x430 [ 2632.568360][ T9292] trace_uprobe_register+0x88/0x410 [ 2632.573551][ T9292] perf_trace_event_init+0x34e/0x790 [ 2632.578845][ T9292] perf_uprobe_init+0xf5/0x140 [ 2632.583945][ T9292] perf_uprobe_event_init+0xde/0x140 [ 2632.589390][ T9292] perf_try_init_event+0x21a/0x400 [ 2632.594816][ T9292] perf_event_alloc+0xa60/0x1790 [ 2632.599756][ T9292] __se_sys_perf_event_open+0x5c7/0x2740 [ 2632.605390][ T9292] ? vfs_write+0x50c/0x770 [ 2632.609828][ T9292] __x64_sys_perf_event_open+0x63/0x70 [ 2632.615515][ T9292] do_syscall_64+0x4a/0x90 [ 2632.619944][ T9292] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2632.626055][ T9292] RIP: 0033:0x4665d9 [ 2632.630064][ T9292] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2632.650046][ T9292] RSP: 002b:00007fe251c51188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2632.658559][ T9292] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2632.666662][ T9292] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2632.674765][ T9292] RBP: 00007fe251c511d0 R08: 0000000000000000 R09: 0000000000000000 [ 2632.682821][ T9292] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2632.690782][ T9292] R13: 00007ffdc0e36b3f R14: 00007fe251c51300 R15: 0000000000022000 04:44:38 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 04:44:38 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff060000000100000009000000250000001900046cff0400000200000000000006040000000000000000", 0x39}], 0x1) 04:44:38 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x9000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:38 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) move_pages(0xffffffffffffffff, 0x9, &(0x7f0000000080)=[&(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000036000/0x1000)=nil, &(0x7f0000486000/0x1000)=nil, &(0x7f000067f000/0x2000)=nil, &(0x7f0000096000/0x3000)=nil, &(0x7f000072d000/0x2000)=nil, &(0x7f00007d2000/0x4000)=nil, &(0x7f0000288000/0x3000)=nil], 0x0, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], 0x6) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:38 executing program 1 (fault-call:4 fault-nth:88): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:38 executing program 3: sendmsg$NFT_MSG_GETOBJ_RESET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000280)={0x5c, 0x15, 0xa, 0x3, 0x0, 0x0, {0x1, 0x0, 0x2}, [@NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x5}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x5}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x5}, @NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4008010}, 0x0) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2442000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="c8000000", @ANYRES16=0x0, @ANYBLOB="040028bd7000fbdbdf2501000000080001007063690011000200303030303a30303a31302e30000000000e0001006e657464657673696d0000000f0002006e657464657673696d3000000e0001006e657464657673696d0000000f0002006e657464657673696d3000000e0001006e657464657673696d0000000f0002006e657464657673696d300000080001007063690011000208303030303a30303a31302e3000000000080001007063690011000200303030303a30303a31302e3000000000"], 0xc8}, 0x1, 0x0, 0x0, 0x40080}, 0x10) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_WOWLAN(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="1c0000002f3b0c11dc3bc05d671c57556368b3c33c8532de9a553810ff5fd495d66146dc4583", @ANYRES16=r1, @ANYBLOB="010200000005000000000200000008000300013d"], 0x1c}}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r3, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000a40), r3) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_WOWLAN(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r4, @ANYBLOB="010200000005000000000200000008000300013d"], 0x1c}}, 0x0) sendmsg$NL80211_CMD_SET_BEACON(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000009c0)={&(0x7f0000000540)={0x464, r4, 0x4, 0x70bd2a, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_BEACON_HEAD={0x146, 0xe, {@wo_ht={{0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {0x6}, @device_a, @broadcast, @random="d119fa714cc2", {0x7, 0x9}}, 0xffffffff80000001, @random=0x2, 0x1080, @void, @val={0x1, 0x2, [{0x12}, {0x9, 0x1}]}, @val={0x3, 0x1, 0x3c}, @val={0x4, 0x6, {0x4, 0x6, 0x7ff}}, @val={0x6, 0x2, 0x8}, @val={0x5, 0xf8, {0xf1, 0xea, 0x20, "fbca773fb4ca48a45b71b8431c9b94bf6bda81d142e92259bf9981222bdb6b06436ce82ef7910b4b92ca7483692e58e956c6689a953c0214145a45d7c3cb445fddef3d3fa80d7d66996420a752a790956032dce0d439063bc5c7045b687b69dffd2f041238e77d1f6264e5af77d41061c37f621d2da44f664fb9e7e18ac92e417f128def9be976526a2012687297180e8cff575aebd5352b3715a56fbaef27c0412f3114815e6f8f671f09dc64f426d350fc33dd0425006b40e5756934ca9fd99d729a2454410be81e9141212c8e3e215e446e95652730f3581cf6893cf5bf92ba8f4920a8bf6a22634ea4e51423e82bb9eed7be59"}}, @void, @val={0x2a, 0x1, {0x0, 0x1, 0x1}}, @val={0x3c, 0x4, {0x0, 0x5, 0x6, 0x7f}}, @void, @void, @void, @void, [{0xdd, 0x6, "9e43fab229e6"}]}}, @NL80211_ATTR_FTM_RESPONDER={0x22c, 0x10e, 0x0, 0x1, [@NL80211_FTM_RESP_ATTR_LCI={0xea, 0x2, "385b23c94b9d4f745bdef0ab0458d81ac4697ba9c42e49e659818ff51572675022516fce64620b97b63f83940d41a1dc70c8ec67f46ef8af12abcd7a3253ee6a8c140258e46e22fc68fe9bfdafd4cf5695daad2207d643a5237db4e1443f653f0e0235099d6b014f5fae119925484adb3319b32eff1aac5d036e2359ccac8670fd02d5ff702d68cc3e5844f22b703aaa434b6576db728ccb65cd14c586062c3eaf82d6180dd065d4bebed00b08f69dc7d88c2bdb0b7f830e1e5f458e2bce8d8f5786a316666e964b1dc35aaab3e66ac80e9fb715c9becc8f3ae6858844516a8c2c39a4d945a6"}, @NL80211_FTM_RESP_ATTR_LCI={0x5c, 0x2, "913a3aca89b38bfacdfeec12872bebbe5d0aaf6b3ad337706235c5cb76cc47b384cc4a05cab2bbb10a3ae5717db6ed3c540d78e6168ee1bb5d8f76ed41cb3ad211b00726bcfdd340104e8564564fc0a6bfe8aca71fdcb11a"}, @NL80211_FTM_RESP_ATTR_LCI={0xe0, 0x2, "1f51e361abd8c1527d9dee21713710c24472c17b192e338417edcb1454aa3f889e5c33ecd0fb9f41df16ded7713c1426b26c01a0b129d8631dc667e698ccc06753d3d1a0bde8337d65f22c157cce1bf740267cf59e7c2a56d85511c5e8de3686e07c371d1f3bcaafda3104e306900cd46340c5f81d5d0908be3f5d69ee13753e6822f220f461e054ba811a8b6e018b0238c3de7d854366803adc6a0ac9b4adcc28a7b5d28f8bea71a83a3e6cd7f83f92c8e09487f9cc8418fcaba38c690f76d5d0d0d380f3da2428abf6c9b38670cee8ff0b78905ee9263102cfed6d"}]}, @NL80211_ATTR_IE_ASSOC_RESP={0x52, 0x80, [@rann={0x7e, 0x15, {{0x0, 0x5d}, 0x0, 0x7, @device_b, 0x33, 0x1, 0x7}}, @gcr_ga={0xbd, 0x6, @broadcast}, @ssid={0x0, 0x6, @default_ibss_ssid}, @prep={0x83, 0x25, @ext={{}, 0x1f, 0x3f, @broadcast, 0x2, @broadcast, 0x7fffffff, 0x7, @broadcast, 0x100000}}]}, @NL80211_ATTR_FTM_RESPONDER={0x88, 0x10e, 0x0, 0x1, [@NL80211_FTM_RESP_ATTR_LCI={0x7f, 0x2, "98bbc0aea27c22f2c4ca12355f95aa778ee28626c00b49fc36d649614f11e5cdb6f5f0fa4c4b3456d878e02c556a0c5bea6724bc9d5c2e3effb9789c0532653f1e6e88880fd35177bd37bd5a09c7f281999834ce7890f263b5532aae8257ac5acff464331928c98ecbf7154ef6d62f82c291aeaee2103f0ec189b5"}, @NL80211_FTM_RESP_ATTR_ENABLED={0x4}]}]}, 0x464}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) sendmsg$NL80211_CMD_SET_WIPHY(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r1, 0x10, 0x70bd25, 0x25dfdbfc, {}, [@NL80211_ATTR_WIPHY_FRAG_THRESHOLD={0x8, 0x3f, 0x5f}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000080}, 0x800) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x3}, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:38 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xa000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:38 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000474ff0400000200000000000006040000000000000000", 0x39}], 0x1) 04:44:38 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2632.863568][ T9321] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready [ 2632.927255][ T9327] FAULT_INJECTION: forcing a failure. [ 2632.927255][ T9327] name failslab, interval 1, probability 0, space 0, times 0 [ 2632.940151][ T9327] CPU: 0 PID: 9327 Comm: syz-executor.1 Not tainted 5.13.0-rc3-syzkaller #0 [ 2632.949318][ T9327] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2632.959389][ T9327] Call Trace: [ 2632.962703][ T9327] dump_stack+0x137/0x19d [ 2632.967184][ T9327] should_fail+0x23c/0x250 [ 2632.971841][ T9327] __should_failslab+0x81/0x90 [ 2632.976702][ T9327] ? register_for_each_vma+0x372/0x890 [ 2632.982244][ T9327] should_failslab+0x5/0x20 [ 2632.986958][ T9327] kmem_cache_alloc_trace+0x49/0x310 [ 2632.992259][ T9327] ? register_for_each_vma+0x372/0x890 [ 2632.997914][ T9327] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2633.003910][ T9327] register_for_each_vma+0x372/0x890 [ 2633.009346][ T9327] __uprobe_register+0x3f4/0x8a0 [ 2633.014376][ T9327] uprobe_register_refctr+0x29/0x40 [ 2633.019587][ T9327] probe_event_enable+0x2be/0x7d0 [ 2633.024854][ T9327] ? __uprobe_trace_func+0x430/0x430 [ 2633.030637][ T9327] trace_uprobe_register+0x88/0x410 [ 2633.035931][ T9327] perf_trace_event_init+0x34e/0x790 [ 2633.042042][ T9327] perf_uprobe_init+0xf5/0x140 [ 2633.047235][ T9327] perf_uprobe_event_init+0xde/0x140 [ 2633.053023][ T9327] perf_try_init_event+0x21a/0x400 [ 2633.058590][ T9327] perf_event_alloc+0xa60/0x1790 [ 2633.064860][ T9327] __se_sys_perf_event_open+0x5c7/0x2740 [ 2633.070500][ T9327] ? vfs_write+0x50c/0x770 [ 2633.074916][ T9327] __x64_sys_perf_event_open+0x63/0x70 [ 2633.080815][ T9327] do_syscall_64+0x4a/0x90 [ 2633.085230][ T9327] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2633.091378][ T9327] RIP: 0033:0x4665d9 [ 2633.095300][ T9327] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2633.116749][ T9327] RSP: 002b:00007fe251c51188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a 04:44:38 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xb000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2633.125376][ T9327] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2633.133522][ T9327] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2633.141769][ T9327] RBP: 00007fe251c511d0 R08: 0000000000000000 R09: 0000000000000000 [ 2633.150033][ T9327] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2633.158979][ T9327] R13: 00007ffdc0e36b3f R14: 00007fe251c51300 R15: 0000000000022000 04:44:38 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000100)='./file0\x00', r0, r1) 04:44:38 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff060000000100000009000000250000001900047aff0400000200000000000006040000000000000000", 0x39}], 0x1) [ 2633.174421][ T9336] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready 04:44:39 executing program 1 (fault-call:4 fault-nth:89): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:39 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xc000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:39 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000000900000025000000190004fcff0400000200000000000006040000000000000000", 0x39}], 0x1) [ 2633.237651][ T9353] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready [ 2633.355341][ T9363] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready [ 2633.485540][ T9361] FAULT_INJECTION: forcing a failure. [ 2633.485540][ T9361] name failslab, interval 1, probability 0, space 0, times 0 [ 2633.499651][ T9361] CPU: 1 PID: 9361 Comm: syz-executor.1 Not tainted 5.13.0-rc3-syzkaller #0 [ 2633.508429][ T9361] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2633.518615][ T9361] Call Trace: [ 2633.522005][ T9361] dump_stack+0x137/0x19d [ 2633.526424][ T9361] should_fail+0x23c/0x250 [ 2633.531428][ T9361] __should_failslab+0x81/0x90 [ 2633.536467][ T9361] ? register_for_each_vma+0x372/0x890 [ 2633.542292][ T9361] should_failslab+0x5/0x20 [ 2633.547069][ T9361] kmem_cache_alloc_trace+0x49/0x310 [ 2633.552593][ T9361] ? register_for_each_vma+0x372/0x890 [ 2633.559055][ T9361] ? vma_interval_tree_iter_next+0x263/0x280 [ 2633.565480][ T9361] register_for_each_vma+0x372/0x890 [ 2633.571503][ T9361] __uprobe_register+0x3f4/0x8a0 [ 2633.576775][ T9361] uprobe_register_refctr+0x29/0x40 [ 2633.582191][ T9361] probe_event_enable+0x2be/0x7d0 [ 2633.587228][ T9361] ? __uprobe_trace_func+0x430/0x430 [ 2633.592700][ T9361] trace_uprobe_register+0x88/0x410 [ 2633.598161][ T9361] perf_trace_event_init+0x34e/0x790 [ 2633.603693][ T9361] perf_uprobe_init+0xf5/0x140 [ 2633.608539][ T9361] perf_uprobe_event_init+0xde/0x140 [ 2633.613836][ T9361] perf_try_init_event+0x21a/0x400 [ 2633.619156][ T9361] perf_event_alloc+0xa60/0x1790 [ 2633.624537][ T9361] __se_sys_perf_event_open+0x5c7/0x2740 [ 2633.630557][ T9361] ? vfs_write+0x50c/0x770 [ 2633.635065][ T9361] __x64_sys_perf_event_open+0x63/0x70 [ 2633.640597][ T9361] do_syscall_64+0x4a/0x90 [ 2633.645214][ T9361] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2633.651573][ T9361] RIP: 0033:0x4665d9 [ 2633.656252][ T9361] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2633.676364][ T9361] RSP: 002b:00007fe251c51188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a 04:44:39 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000000900000025000000190004fdff0400000200000000000006040000000000000000", 0x39}], 0x1) 04:44:39 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xd000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:39 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:39 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r4, 0x0) close_range(r3, r4, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000200)) r5 = syz_genetlink_get_family_id$devlink(&(0x7f00000000c0), r1) sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="07000000badff511946a21ececc128229f67d9e806a0f64e60d63cab6649bfe37e36c1097865122ceb9cd753b5b6584bc979aa834e8ec79ddeaa7025c558b48237bb9bda3d8e360b92da48d9cb11e5f493a368c8f11e059ea9737d9bd31b58444913f35df6eae07a39775edbf3fd202b6561e34e4dd2dfd6a80bc205a073e41120977970addcbbff79b7c8dbaf439ece20cd84c4317f484a9a96ac819d6501bf205aca26817fe2f350e7dfe42d0c35e97441c6bac44423bde2d273abbdd73940686790033adb8c315991094a61d341632fcccf5329cb9963e512ad10842aee8e03c040b78dd07107fac49aece3ff39", @ANYRES16=r5, @ANYBLOB="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"/378], 0x170}, 0x1, 0x0, 0x0, 0x40}, 0x20008090) fcntl$setlease(r2, 0x400, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2633.685175][ T9361] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2633.693667][ T9361] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2633.701704][ T9361] RBP: 00007fe251c511d0 R08: 0000000000000000 R09: 0000000000000000 [ 2633.710036][ T9361] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2633.718418][ T9361] R13: 00007ffdc0e36b3f R14: 00007fe251c51300 R15: 0000000000022000 04:44:39 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xe000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:39 executing program 1 (fault-call:4 fault-nth:90): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:39 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x35, 0x0, &(0x7f0000000080)) preadv(r1, &(0x7f0000000140)=[{&(0x7f0000000080)=""/142, 0x8e}], 0x1, 0x0, 0x7) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x4, 0x9) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r3, 0x8982, &(0x7f0000000240)={0x0, 'veth1_to_bond\x00', {}, 0x6}) [ 2633.856073][ T9379] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready [ 2634.008733][ T9391] FAULT_INJECTION: forcing a failure. [ 2634.008733][ T9391] name failslab, interval 1, probability 0, space 0, times 0 [ 2634.021449][ T9391] CPU: 1 PID: 9391 Comm: syz-executor.1 Not tainted 5.13.0-rc3-syzkaller #0 [ 2634.030751][ T9391] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2634.041035][ T9391] Call Trace: [ 2634.044591][ T9391] dump_stack+0x137/0x19d [ 2634.049344][ T9391] should_fail+0x23c/0x250 [ 2634.054075][ T9391] __should_failslab+0x81/0x90 [ 2634.058902][ T9391] ? register_for_each_vma+0x372/0x890 [ 2634.065412][ T9391] should_failslab+0x5/0x20 [ 2634.070143][ T9391] kmem_cache_alloc_trace+0x49/0x310 [ 2634.075854][ T9391] ? register_for_each_vma+0x372/0x890 [ 2634.081677][ T9391] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2634.087788][ T9391] register_for_each_vma+0x372/0x890 [ 2634.093111][ T9391] __uprobe_register+0x3f4/0x8a0 [ 2634.098060][ T9391] uprobe_register_refctr+0x29/0x40 [ 2634.103462][ T9391] probe_event_enable+0x2be/0x7d0 [ 2634.108801][ T9391] ? __uprobe_trace_func+0x430/0x430 [ 2634.114800][ T9391] trace_uprobe_register+0x88/0x410 [ 2634.120224][ T9391] perf_trace_event_init+0x34e/0x790 [ 2634.125828][ T9391] perf_uprobe_init+0xf5/0x140 [ 2634.130741][ T9391] perf_uprobe_event_init+0xde/0x140 [ 2634.136095][ T9391] perf_try_init_event+0x21a/0x400 [ 2634.141883][ T9391] perf_event_alloc+0xa60/0x1790 [ 2634.147021][ T9391] __se_sys_perf_event_open+0x5c7/0x2740 [ 2634.153220][ T9391] ? vfs_write+0x50c/0x770 [ 2634.157893][ T9391] __x64_sys_perf_event_open+0x63/0x70 [ 2634.163615][ T9391] do_syscall_64+0x4a/0x90 [ 2634.168147][ T9391] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2634.174666][ T9391] RIP: 0033:0x4665d9 [ 2634.178567][ T9391] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2634.198561][ T9391] RSP: 002b:00007fe251c51188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a 04:44:40 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/crypto\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000080)=ANY=[@ANYBLOB="0600000013b24ebd43e70357980000000000002d00"/31]) 04:44:40 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400040000000200000000000006040000000000000000", 0x39}], 0x1) 04:44:40 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xf000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2634.207434][ T9391] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2634.215907][ T9391] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2634.223970][ T9391] RBP: 00007fe251c511d0 R08: 0000000000000000 R09: 0000000000000000 [ 2634.232174][ T9391] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2634.240503][ T9391] R13: 00007ffdc0e36b3f R14: 00007fe251c51300 R15: 0000000000022000 04:44:40 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400430000000200000000000006040000000000000000", 0x39}], 0x1) 04:44:40 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff070000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:40 executing program 1 (fault-call:4 fault-nth:91): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:40 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2634.267456][ T9397] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready 04:44:40 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x11000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:40 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400fe0400000200000000000006040000000000000000", 0x39}], 0x1) [ 2634.403673][ T9418] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready 04:44:40 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = fsmount(r0, 0x1, 0x80) renameat(r2, &(0x7f0000000080)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00') preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2634.461325][ T9416] FAULT_INJECTION: forcing a failure. [ 2634.461325][ T9416] name failslab, interval 1, probability 0, space 0, times 0 [ 2634.474058][ T9416] CPU: 0 PID: 9416 Comm: syz-executor.1 Not tainted 5.13.0-rc3-syzkaller #0 [ 2634.482786][ T9416] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2634.492854][ T9416] Call Trace: [ 2634.496158][ T9416] dump_stack+0x137/0x19d [ 2634.500517][ T9416] should_fail+0x23c/0x250 [ 2634.504923][ T9416] __should_failslab+0x81/0x90 [ 2634.509967][ T9416] ? register_for_each_vma+0x372/0x890 [ 2634.515460][ T9416] should_failslab+0x5/0x20 [ 2634.520248][ T9416] kmem_cache_alloc_trace+0x49/0x310 [ 2634.525567][ T9416] ? register_for_each_vma+0x372/0x890 [ 2634.531070][ T9416] ? vma_interval_tree_iter_next+0x263/0x280 [ 2634.537084][ T9416] register_for_each_vma+0x372/0x890 [ 2634.542495][ T9416] __uprobe_register+0x3f4/0x8a0 [ 2634.547483][ T9416] uprobe_register_refctr+0x29/0x40 [ 2634.552691][ T9416] probe_event_enable+0x2be/0x7d0 [ 2634.558010][ T9416] ? __uprobe_trace_func+0x430/0x430 [ 2634.563437][ T9416] trace_uprobe_register+0x88/0x410 [ 2634.568744][ T9416] perf_trace_event_init+0x34e/0x790 [ 2634.574097][ T9416] perf_uprobe_init+0xf5/0x140 [ 2634.578935][ T9416] perf_uprobe_event_init+0xde/0x140 [ 2634.584842][ T9416] perf_try_init_event+0x21a/0x400 [ 2634.589946][ T9416] perf_event_alloc+0xa60/0x1790 [ 2634.599616][ T9416] __se_sys_perf_event_open+0x5c7/0x2740 [ 2634.605284][ T9416] ? vfs_write+0x50c/0x770 [ 2634.610192][ T9416] __x64_sys_perf_event_open+0x63/0x70 [ 2634.615686][ T9416] do_syscall_64+0x4a/0x90 [ 2634.620221][ T9416] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2634.626398][ T9416] RIP: 0033:0x4665d9 [ 2634.630414][ T9416] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2634.650627][ T9416] RSP: 002b:00007fe251c51188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a 04:44:40 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x12000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2634.659584][ T9416] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2634.668241][ T9416] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2634.676287][ T9416] RBP: 00007fe251c511d0 R08: 0000000000000000 R09: 0000000000000000 [ 2634.684293][ T9416] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2634.692274][ T9416] R13: 00007ffdc0e36b3f R14: 00007fe251c51300 R15: 0000000000022000 [ 2634.707721][ T9429] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready 04:44:40 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x20000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:40 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:40 executing program 1 (fault-call:4 fault-nth:92): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:40 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400000500000200000000000006040000000000000000", 0x39}], 0x1) 04:44:40 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:40 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x26020000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:40 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0200000200000000000006040000000000000000", 0x39}], 0x1) 04:44:40 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x27000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2635.020472][ T9461] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready [ 2635.028410][ T9449] FAULT_INJECTION: forcing a failure. [ 2635.028410][ T9449] name failslab, interval 1, probability 0, space 0, times 0 [ 2635.041377][ T9449] CPU: 0 PID: 9449 Comm: syz-executor.1 Not tainted 5.13.0-rc3-syzkaller #0 [ 2635.050256][ T9449] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2635.060570][ T9449] Call Trace: [ 2635.063963][ T9449] dump_stack+0x137/0x19d [ 2635.068424][ T9449] should_fail+0x23c/0x250 [ 2635.072927][ T9449] __should_failslab+0x81/0x90 [ 2635.077690][ T9449] ? register_for_each_vma+0x372/0x890 [ 2635.083498][ T9449] should_failslab+0x5/0x20 [ 2635.088169][ T9449] kmem_cache_alloc_trace+0x49/0x310 [ 2635.093573][ T9449] ? register_for_each_vma+0x372/0x890 [ 2635.099130][ T9449] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2635.105216][ T9449] register_for_each_vma+0x372/0x890 [ 2635.111357][ T9449] __uprobe_register+0x3f4/0x8a0 [ 2635.116381][ T9449] uprobe_register_refctr+0x29/0x40 [ 2635.121699][ T9449] probe_event_enable+0x2be/0x7d0 [ 2635.126819][ T9449] ? __uprobe_trace_func+0x430/0x430 [ 2635.132156][ T9449] trace_uprobe_register+0x88/0x410 [ 2635.137348][ T9449] perf_trace_event_init+0x34e/0x790 [ 2635.142714][ T9449] perf_uprobe_init+0xf5/0x140 [ 2635.147677][ T9449] perf_uprobe_event_init+0xde/0x140 [ 2635.153407][ T9449] perf_try_init_event+0x21a/0x400 [ 2635.158688][ T9449] perf_event_alloc+0xa60/0x1790 [ 2635.163770][ T9449] __se_sys_perf_event_open+0x5c7/0x2740 [ 2635.169743][ T9449] ? vfs_write+0x50c/0x770 [ 2635.174360][ T9449] __x64_sys_perf_event_open+0x63/0x70 [ 2635.180053][ T9449] do_syscall_64+0x4a/0x90 [ 2635.184725][ T9449] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2635.191153][ T9449] RIP: 0033:0x4665d9 [ 2635.195173][ T9449] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 04:44:41 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3f000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:41 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2635.215218][ T9449] RSP: 002b:00007fe251c51188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2635.223774][ T9449] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2635.232188][ T9449] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2635.240450][ T9449] RBP: 00007fe251c511d0 R08: 0000000000000000 R09: 0000000000000000 [ 2635.248785][ T9449] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2635.256800][ T9449] R13: 00007ffdc0e36b3f R14: 00007fe251c51300 R15: 0000000000022000 04:44:41 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x200) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:41 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0300000200000000000006040000000000000000", 0x39}], 0x1) 04:44:41 executing program 1 (fault-call:4 fault-nth:93): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2635.409128][ T9482] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready [ 2635.454283][ T9479] FAULT_INJECTION: forcing a failure. [ 2635.454283][ T9479] name failslab, interval 1, probability 0, space 0, times 0 [ 2635.467173][ T9479] CPU: 1 PID: 9479 Comm: syz-executor.1 Not tainted 5.13.0-rc3-syzkaller #0 [ 2635.476544][ T9479] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2635.487146][ T9479] Call Trace: [ 2635.490456][ T9479] dump_stack+0x137/0x19d [ 2635.495087][ T9479] should_fail+0x23c/0x250 [ 2635.499523][ T9479] __should_failslab+0x81/0x90 [ 2635.504442][ T9479] ? register_for_each_vma+0x372/0x890 [ 2635.510086][ T9479] should_failslab+0x5/0x20 [ 2635.514662][ T9479] kmem_cache_alloc_trace+0x49/0x310 [ 2635.520151][ T9479] ? register_for_each_vma+0x372/0x890 [ 2635.525724][ T9479] ? vma_interval_tree_iter_next+0x263/0x280 [ 2635.531714][ T9479] register_for_each_vma+0x372/0x890 [ 2635.537029][ T9479] __uprobe_register+0x3f4/0x8a0 [ 2635.542650][ T9479] uprobe_register_refctr+0x29/0x40 [ 2635.548271][ T9479] probe_event_enable+0x2be/0x7d0 [ 2635.553381][ T9479] ? __uprobe_trace_func+0x430/0x430 [ 2635.558797][ T9479] trace_uprobe_register+0x88/0x410 [ 2635.564030][ T9479] perf_trace_event_init+0x34e/0x790 [ 2635.569317][ T9479] perf_uprobe_init+0xf5/0x140 [ 2635.574162][ T9479] perf_uprobe_event_init+0xde/0x140 [ 2635.579442][ T9479] perf_try_init_event+0x21a/0x400 [ 2635.584589][ T9479] perf_event_alloc+0xa60/0x1790 [ 2635.589527][ T9479] __se_sys_perf_event_open+0x5c7/0x2740 [ 2635.595145][ T9479] ? vfs_write+0x50c/0x770 [ 2635.603997][ T9479] __x64_sys_perf_event_open+0x63/0x70 [ 2635.609465][ T9479] do_syscall_64+0x4a/0x90 [ 2635.613911][ T9479] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2635.619834][ T9479] RIP: 0033:0x4665d9 [ 2635.623737][ T9479] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2635.643492][ T9479] RSP: 002b:00007fe251c51188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a 04:44:41 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x100, 0x0) unshare(0x40000400) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') pread64(r0, &(0x7f0000000340)=""/114, 0x72, 0x3c) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000200)=""/214, 0xd6) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:41 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:41 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0500000200000000000006040000000000000000", 0x39}], 0x1) [ 2635.651933][ T9479] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2635.660014][ T9479] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2635.668098][ T9479] RBP: 00007fe251c511d0 R08: 0000000000000000 R09: 0000000000000000 [ 2635.676273][ T9479] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2635.684525][ T9479] R13: 00007ffdc0e36b3f R14: 00007fe251c51300 R15: 0000000000022000 04:44:41 executing program 1 (fault-call:4 fault-nth:94): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:41 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:41 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0600000200000000000006040000000000000000", 0x39}], 0x1) [ 2635.827496][ T9494] FAULT_INJECTION: forcing a failure. [ 2635.827496][ T9494] name failslab, interval 1, probability 0, space 0, times 0 [ 2635.840805][ T9494] CPU: 1 PID: 9494 Comm: syz-executor.1 Not tainted 5.13.0-rc3-syzkaller #0 [ 2635.849605][ T9494] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2635.860368][ T9494] Call Trace: [ 2635.864013][ T9494] dump_stack+0x137/0x19d [ 2635.868473][ T9494] should_fail+0x23c/0x250 [ 2635.873001][ T9494] __should_failslab+0x81/0x90 [ 2635.878026][ T9494] ? register_for_each_vma+0x372/0x890 [ 2635.883746][ T9494] should_failslab+0x5/0x20 [ 2635.888780][ T9494] kmem_cache_alloc_trace+0x49/0x310 [ 2635.894199][ T9494] ? register_for_each_vma+0x372/0x890 [ 2635.900018][ T9494] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2635.906115][ T9494] register_for_each_vma+0x372/0x890 [ 2635.911453][ T9494] __uprobe_register+0x3f4/0x8a0 [ 2635.916639][ T9494] uprobe_register_refctr+0x29/0x40 [ 2635.921854][ T9494] probe_event_enable+0x2be/0x7d0 [ 2635.927085][ T9494] ? __uprobe_trace_func+0x430/0x430 [ 2635.932767][ T9494] trace_uprobe_register+0x88/0x410 [ 2635.938051][ T9494] perf_trace_event_init+0x34e/0x790 [ 2635.943341][ T9494] perf_uprobe_init+0xf5/0x140 [ 2635.948570][ T9494] perf_uprobe_event_init+0xde/0x140 [ 2635.953968][ T9494] perf_try_init_event+0x21a/0x400 [ 2635.959312][ T9494] perf_event_alloc+0xa60/0x1790 [ 2635.964455][ T9494] __se_sys_perf_event_open+0x5c7/0x2740 [ 2635.970457][ T9494] ? vfs_write+0x50c/0x770 [ 2635.974969][ T9494] __x64_sys_perf_event_open+0x63/0x70 [ 2635.980493][ T9494] do_syscall_64+0x4a/0x90 [ 2635.985194][ T9494] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2635.991102][ T9494] RIP: 0033:0x4665d9 [ 2635.995012][ T9494] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2636.015563][ T9494] RSP: 002b:00007fe251c51188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a 04:44:41 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x48000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:41 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0700000200000000000006040000000000000000", 0x39}], 0x1) [ 2636.023985][ T9494] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2636.032066][ T9494] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2636.040311][ T9494] RBP: 00007fe251c511d0 R08: 0000000000000000 R09: 0000000000000000 [ 2636.048397][ T9494] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2636.056590][ T9494] R13: 00007ffdc0e36b3f R14: 00007fe251c51300 R15: 0000000000022000 04:44:41 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4c000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:41 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x8100) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f0000000100)=@v1={0x0, @adiantum, 0x2, @desc4}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000080)={0x8800, 0x1f, 0x8, 0x4, 0x7}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x35, 0x0, &(0x7f0000000080)) ioctl$BTRFS_IOC_WAIT_SYNC(r2, 0x40089416, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:41 executing program 1 (fault-call:4 fault-nth:95): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:41 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0800000200000000000006040000000000000000", 0x39}], 0x1) [ 2636.228508][ T9536] FAULT_INJECTION: forcing a failure. [ 2636.228508][ T9536] name failslab, interval 1, probability 0, space 0, times 0 [ 2636.241784][ T9536] CPU: 1 PID: 9536 Comm: syz-executor.1 Not tainted 5.13.0-rc3-syzkaller #0 [ 2636.250793][ T9536] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2636.260934][ T9536] Call Trace: [ 2636.264243][ T9536] dump_stack+0x137/0x19d [ 2636.268747][ T9536] should_fail+0x23c/0x250 [ 2636.273501][ T9536] __should_failslab+0x81/0x90 [ 2636.278557][ T9536] ? register_for_each_vma+0x372/0x890 [ 2636.284049][ T9536] should_failslab+0x5/0x20 [ 2636.288765][ T9536] kmem_cache_alloc_trace+0x49/0x310 [ 2636.294502][ T9536] ? register_for_each_vma+0x372/0x890 [ 2636.300019][ T9536] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2636.306091][ T9536] register_for_each_vma+0x372/0x890 [ 2636.311546][ T9536] __uprobe_register+0x3f4/0x8a0 [ 2636.316731][ T9536] uprobe_register_refctr+0x29/0x40 [ 2636.321951][ T9536] probe_event_enable+0x2be/0x7d0 [ 2636.327057][ T9536] ? __uprobe_trace_func+0x430/0x430 [ 2636.332532][ T9536] trace_uprobe_register+0x88/0x410 [ 2636.337726][ T9536] perf_trace_event_init+0x34e/0x790 [ 2636.343017][ T9536] perf_uprobe_init+0xf5/0x140 [ 2636.347956][ T9536] perf_uprobe_event_init+0xde/0x140 [ 2636.354123][ T9536] perf_try_init_event+0x21a/0x400 [ 2636.359431][ T9536] perf_event_alloc+0xa60/0x1790 [ 2636.364370][ T9536] __se_sys_perf_event_open+0x5c7/0x2740 [ 2636.370038][ T9536] ? vfs_write+0x50c/0x770 [ 2636.374620][ T9536] __x64_sys_perf_event_open+0x63/0x70 [ 2636.380173][ T9536] do_syscall_64+0x4a/0x90 [ 2636.384723][ T9536] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2636.390605][ T9536] RIP: 0033:0x4665d9 [ 2636.394483][ T9536] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2636.414861][ T9536] RSP: 002b:00007fe251c51188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2636.423469][ T9536] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2636.431667][ T9536] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2636.439908][ T9536] RBP: 00007fe251c511d0 R08: 0000000000000000 R09: 0000000000000000 [ 2636.448130][ T9536] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2636.456292][ T9536] R13: 00007ffdc0e36b3f R14: 00007fe251c51300 R15: 0000000000022000 04:44:42 executing program 3: prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x26) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0x47, 0xffffffffffffffff, 0x0) 04:44:42 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x58020000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:42 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socketpair(0x27, 0x2, 0x6, &(0x7f0000000680)={0xffffffffffffffff}) fadvise64(r2, 0x0, 0x8, 0x4) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000340), 0x428000, 0x0) execveat(r3, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)=[&(0x7f00000003c0)='},\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='/!&+!\\!@@,&[}\x00'], 0x400) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r4 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x1, 0x4, &(0x7f0000000940)=[{&(0x7f0000000740)="9b9686247d4c147f4d3e85aea161b46305aaab5da0735d9c1610fa6ca41d3adc616fbba0176f700738dbaf8de70fa7f42346fcdcd7de65cc192762f1b294578352", 0x41, 0x6}, {&(0x7f00000007c0)="1e96e6ef3e0aa62b4f54551c52409b908b2e1773d3edc9cf808c2f7b89973c04bc984a62aeff43785df16887174bbf46134954e91cb43a2e9a1c96fbb2cb32fa517e302bea2854ce1076a840a09f69d30009ad1168b94764cb142174e618e9d3807bdbf9c996d679c3de2db828dbe6e7", 0x70, 0xfffffffffffffff7}, {&(0x7f0000000840)="4d2747758269857988abf2a284611cb3ff376d4a78a01929d3e61f6746a0ae09be03d4370ec7b2467d9da03e004befe54f40738734bc25ea302373ea47bcf9543b1bbced8c5026912f0a7cf4b076b8e9caff688c53fcc6752eedc4275443a59a68b2b02fe7b92afcfdfaec80705230016ca6815047e9e24b183f261b9290cf0bd08009a65537149b2f3284da11032134799e39144cab68050d8a634e2c5b38bc6f15ac63ca5cb7f4b738048f5a", 0xad, 0x190}, {&(0x7f0000000900)="2ed9e46a2debd274a49d4f27234660ea31511bcedd20f9c39f8fd6066da483a2dc4d95a9f0e74de1ecb05c57d3f52a2e54a068", 0x33, 0x2}], 0x2000, &(0x7f00000009c0)={[], [{@smackfsfloor={'smackfsfloor', 0x3d, '%,-'}}]}) execveat(r4, &(0x7f0000000a00)='./file0\x00', &(0x7f0000000c00)=[&(0x7f0000000a40)='nr_blocks', &(0x7f0000000a80)='/dev/autofs\x00', &(0x7f0000000ac0)='\x04!@@-+^^\x00', &(0x7f0000000b00)='\x00', &(0x7f0000000b40)='$\xa4\x00', &(0x7f0000000b80)='#[@{\x00', &(0x7f0000000bc0)='{\x00'], &(0x7f0000000dc0)=[&(0x7f0000000c40)=',\x00', &(0x7f0000000c80)='(:#\x00', &(0x7f0000000cc0)='audit', &(0x7f0000000d00)='obj_user', &(0x7f0000000d40)='/!&+!\\!@@,&[}\x00', &(0x7f0000000d80)='nr_blocks'], 0x100) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r5, 0x0) preadv(r5, &(0x7f0000000300)=[{&(0x7f0000000200)=""/233, 0xe9}, {&(0x7f0000000100)=""/65, 0x41}], 0x2, 0x0, 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0xb4, 0x3f, 0x5, 0xd7, 0x0, 0x1, 0x89188, 0x4, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x453, 0x1, @perf_config_ext={0x8001, 0x6}, 0x1, 0x7d98, 0x1, 0x5, 0x0, 0x1000, 0x7553, 0x0, 0x5}, 0xffffffffffffffff, 0x8, r1, 0x2) mount$tmpfs(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500), 0x1918810, &(0x7f0000000540)={[{@size={'size', 0x3d, [0x36, 0x2d, 0x6b, 0x32, 0x67, 0x32, 0x7eac019ed604e5b1]}}, {@size={'size', 0x3d, [0x34, 0x33, 0x67, 0x39, 0x33]}}, {@huge_within_size}, {@nr_inodes={'nr_inodes', 0x3d, [0x6b, 0x2d]}}, {@nr_blocks={'nr_blocks', 0x3d, [0x37, 0x37, 0x38]}}, {@nr_inodes={'nr_inodes', 0x3d, [0xa, 0x6d]}}], [{@obj_role={'obj_role', 0x3d, '/dev/autofs\x00'}}, {@fowner_lt={'fowner<', 0xee00}}, {@audit}, {@obj_user={'obj_user', 0x3d, '/dev/autofs\x00'}}, {@subj_role={'subj_role', 0x3d, '/dev/autofs\x00'}}, {@smackfsroot={'smackfsroot', 0x3d, 'M]@]*/]\''}}, {@uid_gt={'uid>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '},\x00'}}, {@dont_measure}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}]}) 04:44:42 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0900000200000000000006040000000000000000", 0x39}], 0x1) 04:44:42 executing program 1 (fault-call:4 fault-nth:96): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:42 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:42 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x474747e6ed76ad33}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) name_to_handle_at(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@orangefs_parent={0x28, 0x2, {{"8d9a52ccb1bf86b902eb625b7ad9a093", 0x6}, {"ecb4439eb8ee83fdeec2244b5f48d243", 0x1ff}}}, &(0x7f0000000100), 0x1400) creat(&(0x7f0000000040)='./file0\x00', 0x1c9) 04:44:42 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0a00000200000000000006040000000000000000", 0x39}], 0x1) [ 2636.609130][ T9559] validate_nla: 42 callbacks suppressed [ 2636.609183][ T9559] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2636.624835][ T9559] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2636.635201][ T9567] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 04:44:42 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x68000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2636.653522][ T9564] loop0: detected capacity change from 0 to 16383 [ 2636.694747][ T9557] FAULT_INJECTION: forcing a failure. [ 2636.694747][ T9557] name failslab, interval 1, probability 0, space 0, times 0 [ 2636.707668][ T9557] CPU: 0 PID: 9557 Comm: syz-executor.1 Not tainted 5.13.0-rc3-syzkaller #0 [ 2636.716782][ T9557] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2636.727064][ T9557] Call Trace: [ 2636.730432][ T9557] dump_stack+0x137/0x19d [ 2636.734798][ T9557] should_fail+0x23c/0x250 [ 2636.739372][ T9557] __should_failslab+0x81/0x90 [ 2636.744262][ T9557] ? register_for_each_vma+0x372/0x890 [ 2636.749875][ T9557] should_failslab+0x5/0x20 [ 2636.754436][ T9557] kmem_cache_alloc_trace+0x49/0x310 [ 2636.759914][ T9557] ? register_for_each_vma+0x372/0x890 [ 2636.765618][ T9557] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2636.771679][ T9557] register_for_each_vma+0x372/0x890 [ 2636.776995][ T9557] __uprobe_register+0x3f4/0x8a0 [ 2636.782466][ T9557] uprobe_register_refctr+0x29/0x40 [ 2636.787772][ T9557] probe_event_enable+0x2be/0x7d0 [ 2636.793229][ T9557] ? __uprobe_trace_func+0x430/0x430 [ 2636.798554][ T9557] trace_uprobe_register+0x88/0x410 [ 2636.804089][ T9557] perf_trace_event_init+0x34e/0x790 [ 2636.809370][ T9557] perf_uprobe_init+0xf5/0x140 [ 2636.814844][ T9557] perf_uprobe_event_init+0xde/0x140 [ 2636.820204][ T9557] perf_try_init_event+0x21a/0x400 [ 2636.825421][ T9557] perf_event_alloc+0xa60/0x1790 [ 2636.830366][ T9557] __se_sys_perf_event_open+0x5c7/0x2740 [ 2636.836396][ T9557] ? vfs_write+0x50c/0x770 [ 2636.840932][ T9557] __x64_sys_perf_event_open+0x63/0x70 [ 2636.846656][ T9557] do_syscall_64+0x4a/0x90 [ 2636.851260][ T9557] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2636.857251][ T9557] RIP: 0033:0x4665d9 [ 2636.861285][ T9557] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2636.881155][ T9557] RSP: 002b:00007fe251c51188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a 04:44:42 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x8b) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r2, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_STATION(r2, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0x44, r3, 0x200, 0x70bd2b, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0x7, 0x13}}}}, [@NL80211_ATTR_AIRTIME_WEIGHT={0x6, 0x112, 0x3}, @NL80211_ATTR_STA_PLINK_ACTION={0x5, 0x19, 0x1}, @NL80211_ATTR_STA_WME={0xc, 0x81, [@NL80211_STA_WME_MAX_SP={0x5}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x8080}, 0x20000005) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f0000000280)) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r2, &(0x7f0000000280), 0x0, 0xffffffe0, 0xc5c) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x4, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:42 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6c000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2636.889697][ T9557] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2636.897948][ T9557] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2636.905983][ T9557] RBP: 00007fe251c511d0 R08: 0000000000000000 R09: 0000000000000000 [ 2636.914144][ T9557] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2636.922255][ T9557] R13: 00007ffdc0e36b3f R14: 00007fe251c51300 R15: 0000000000022000 04:44:42 executing program 3: clone3(&(0x7f0000000400)={0x6000000, &(0x7f0000000040), &(0x7f0000000080)=0x0, &(0x7f00000000c0), {0x32}, &(0x7f0000000200)=""/238, 0xee, &(0x7f0000000300)=""/204, &(0x7f0000000100)=[0xffffffffffffffff], 0x1}, 0x58) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) r2 = epoll_create(0x4) r3 = accept$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000480)={r2, r3, 0x483}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:42 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x74000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:42 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0b00000200000000000006040000000000000000", 0x39}], 0x1) 04:44:42 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7a000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2636.947764][ T9583] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2636.964605][ T9583] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2636.983980][ T9598] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 04:44:42 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000080)={0x103, @tick=0x5, 0xff, {0x3, 0xff}, 0x0, 0x2}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:42 executing program 1 (fault-call:4 fault-nth:97): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2637.094190][ T9618] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2637.108783][ T9618] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2637.122167][ T9622] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2637.228112][ T9628] FAULT_INJECTION: forcing a failure. [ 2637.228112][ T9628] name failslab, interval 1, probability 0, space 0, times 0 [ 2637.241320][ T9628] CPU: 1 PID: 9628 Comm: syz-executor.1 Not tainted 5.13.0-rc3-syzkaller #0 [ 2637.250190][ T9628] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2637.260918][ T9628] Call Trace: [ 2637.264282][ T9628] dump_stack+0x137/0x19d [ 2637.268979][ T9628] should_fail+0x23c/0x250 [ 2637.273467][ T9628] __should_failslab+0x81/0x90 [ 2637.278538][ T9628] ? register_for_each_vma+0x372/0x890 [ 2637.284735][ T9628] should_failslab+0x5/0x20 [ 2637.289243][ T9628] kmem_cache_alloc_trace+0x49/0x310 [ 2637.294516][ T9628] ? register_for_each_vma+0x372/0x890 [ 2637.300928][ T9628] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2637.307250][ T9628] register_for_each_vma+0x372/0x890 [ 2637.313036][ T9628] __uprobe_register+0x3f4/0x8a0 [ 2637.318355][ T9628] uprobe_register_refctr+0x29/0x40 [ 2637.323547][ T9628] probe_event_enable+0x2be/0x7d0 [ 2637.328890][ T9628] ? __uprobe_trace_func+0x430/0x430 [ 2637.334201][ T9628] trace_uprobe_register+0x88/0x410 [ 2637.339755][ T9628] perf_trace_event_init+0x34e/0x790 [ 2637.345230][ T9628] perf_uprobe_init+0xf5/0x140 [ 2637.350466][ T9628] perf_uprobe_event_init+0xde/0x140 [ 2637.356002][ T9628] perf_try_init_event+0x21a/0x400 [ 2637.361363][ T9628] perf_event_alloc+0xa60/0x1790 [ 2637.366753][ T9628] __se_sys_perf_event_open+0x5c7/0x2740 [ 2637.373769][ T9628] ? vfs_write+0x50c/0x770 [ 2637.378382][ T9628] __x64_sys_perf_event_open+0x63/0x70 [ 2637.384014][ T9628] do_syscall_64+0x4a/0x90 [ 2637.388656][ T9628] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2637.394914][ T9628] RIP: 0033:0x4665d9 [ 2637.399337][ T9628] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2637.419680][ T9628] RSP: 002b:00007fe251c51188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a 04:44:43 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:43 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x4762a5f6, 0x3, &(0x7f0000000100)=[{&(0x7f0000000200)="bf6f6fd6f77f7f86f0680eb83af8ad68d4c623dda5bca3670caaa457b867e0db17db5430d621421c8151ff08bb6277fe998d74a94d5bd1ccb342be94eeb5be5d45271296f55c056b2b497725936ff4e4456616793863cf6d1bd9e561104c3a7e84bdd50c3f25ad06628d14ca74c294bbd94e6ce179a3fb211c0782bdb16e90828b0c09b76db52a6459c9036aed6cf8de43b3f01f1248559dd95502e7f149e486cbb8b759973ef0394903b865aa12dfe37062ec8d64f5a45f5148247f30225cf9f203cba82dbf4f012d06efd377136d932682e148e4b3c68f025ca4f2", 0xdc, 0x9}, {&(0x7f0000000300)="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", 0x1000, 0x5}, {&(0x7f0000001300)="914da41755ba4dc4f406d0fc6c1cbd3e97ce49f23858191792c1641afff01c71451fa92a29ed25c6945253a2d60a76f2e4f662218555b98b9f88b65dd041a26c225b7fb3e6c94ba8b8e6d3a98972e9e7cda49113ce76eaeaeadb0888d21a74b12b39b0d9135bdccd1eeb28028e715411c5bd7f2095fba4c2c598b268f19ed2e1ea0e07", 0x83, 0xd07}], 0x200000, &(0x7f00000013c0)={[{@iocharset={'iocharset', 0x3d, 'cp861'}}, {@uni_xlateno}, {@nonumtail}, {@numtail}, {@shortname_win95}, {@iocharset={'iocharset', 0x3d, 'cp1255'}}, {@rodir}], [{@obj_role}, {@defcontext={'defcontext', 0x3d, 'user_u'}}]}) chdir(&(0x7f0000001480)='./file0\x00') preadv(r0, &(0x7f0000001480), 0x0, 0x1000, 0x80000000) renameat(r0, &(0x7f0000000040)='./file0\x00', r1, &(0x7f0000001440)='./file0\x00') waitid$P_PIDFD(0x3, r0, 0x0, 0x8, &(0x7f00000014c0)) 04:44:43 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0c00000200000000000006040000000000000000", 0x39}], 0x1) 04:44:43 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x8010, r0, 0x800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x35, 0x0, &(0x7f0000000080)) preadv(r2, &(0x7f0000000200)=[{&(0x7f0000000140)=""/53, 0x35}], 0x1, 0x7fffffff, 0x200) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r3, 0x0) renameat2(r0, &(0x7f00000000c0)='./file0\x00', r3, &(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:43 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8cffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2637.428352][ T9628] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2637.436339][ T9628] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2637.444569][ T9628] RBP: 00007fe251c511d0 R08: 0000000000000000 R09: 0000000000000000 [ 2637.452801][ T9628] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2637.460847][ T9628] R13: 00007ffdc0e36b3f R14: 00007fe251c51300 R15: 0000000000022000 04:44:43 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) ioctl(r0, 0x3ff, &(0x7f0000000080)="ab23989d2193806dbd4947474e3fdb4aab9780fc9503e57b8edc5a3f91c668efa9ed2dad095fffaa36906c5f45d835224244b6b1be1d2d6a619b9f4e5179e2841f2d55ca9ad12fbfcc28b4399dffc570682d97220dd3a59b7dbdd64af1472e550746c4e693213172") r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0xc) r3 = epoll_create(0x6) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, r2, 0x7, 0xffffffffffffffff, &(0x7f0000000200)={r3, r1, 0xc636}) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000240)={0x0, {0x12, 0x2, 0xfba1, 0x805}}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x44208, 0x0, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:43 executing program 1 (fault-call:4 fault-nth:98): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:43 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0d00000200000000000006040000000000000000", 0x39}], 0x1) 04:44:43 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xa6010000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2637.541328][ T9642] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 04:44:43 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:43 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xc0000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:43 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0e00000200000000000006040000000000000000", 0x39}], 0x1) [ 2637.722390][ T9659] FAULT_INJECTION: forcing a failure. [ 2637.722390][ T9659] name failslab, interval 1, probability 0, space 0, times 0 [ 2637.735058][ T9659] CPU: 0 PID: 9659 Comm: syz-executor.1 Not tainted 5.13.0-rc3-syzkaller #0 [ 2637.743979][ T9659] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2637.754323][ T9659] Call Trace: [ 2637.757611][ T9659] dump_stack+0x137/0x19d [ 2637.762028][ T9659] should_fail+0x23c/0x250 [ 2637.766462][ T9659] __should_failslab+0x81/0x90 [ 2637.771294][ T9659] ? register_for_each_vma+0x372/0x890 [ 2637.776771][ T9659] should_failslab+0x5/0x20 [ 2637.781496][ T9659] kmem_cache_alloc_trace+0x49/0x310 [ 2637.786879][ T9659] ? register_for_each_vma+0x372/0x890 [ 2637.792425][ T9659] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2637.798421][ T9659] register_for_each_vma+0x372/0x890 [ 2637.803732][ T9659] __uprobe_register+0x3f4/0x8a0 [ 2637.808793][ T9659] uprobe_register_refctr+0x29/0x40 [ 2637.813989][ T9659] probe_event_enable+0x2be/0x7d0 [ 2637.819360][ T9659] ? __uprobe_trace_func+0x430/0x430 [ 2637.824758][ T9659] trace_uprobe_register+0x88/0x410 [ 2637.830280][ T9659] perf_trace_event_init+0x34e/0x790 [ 2637.836342][ T9659] perf_uprobe_init+0xf5/0x140 [ 2637.841395][ T9659] perf_uprobe_event_init+0xde/0x140 [ 2637.846847][ T9659] perf_try_init_event+0x21a/0x400 [ 2637.852297][ T9659] perf_event_alloc+0xa60/0x1790 [ 2637.857355][ T9659] __se_sys_perf_event_open+0x5c7/0x2740 [ 2637.863520][ T9659] ? vfs_write+0x50c/0x770 [ 2637.867977][ T9659] __x64_sys_perf_event_open+0x63/0x70 [ 2637.873934][ T9659] do_syscall_64+0x4a/0x90 [ 2637.878397][ T9659] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2637.884752][ T9659] RIP: 0033:0x4665d9 [ 2637.888830][ T9659] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2637.908815][ T9659] RSP: 002b:00007fe251c51188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a 04:44:43 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xccffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2637.917435][ T9659] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2637.926320][ T9659] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2637.934289][ T9659] RBP: 00007fe251c511d0 R08: 0000000000000000 R09: 0000000000000000 [ 2637.942260][ T9659] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2637.950840][ T9659] R13: 00007ffdc0e36b3f R14: 00007fe251c51300 R15: 0000000000022000 04:44:43 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x4, 0x80, 0x5, 0x5, 0x0, 0x0, 0x0, 0x1f, 0x8, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xf}, 0x202, 0x2, 0x20, 0x9, 0x1, 0x401, 0x0, 0x0, 0x1, 0x0, 0x10000}, 0xffffffffffffffff, 0x3, r0, 0xa) 04:44:43 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0f00000200000000000006040000000000000000", 0x39}], 0x1) 04:44:43 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xf6ffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:43 executing program 1 (fault-call:4 fault-nth:99): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:43 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x8c) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:43 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfeffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:43 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff1000000200000000000006040000000000000000", 0x39}], 0x1) 04:44:43 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffff7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:43 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:44 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff1100000200000000000006040000000000000000", 0x39}], 0x1) [ 2638.260255][ T9689] FAULT_INJECTION: forcing a failure. [ 2638.260255][ T9689] name failslab, interval 1, probability 0, space 0, times 0 [ 2638.273461][ T9689] CPU: 0 PID: 9689 Comm: syz-executor.1 Not tainted 5.13.0-rc3-syzkaller #0 [ 2638.282497][ T9689] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2638.293109][ T9689] Call Trace: [ 2638.296979][ T9689] dump_stack+0x137/0x19d [ 2638.301498][ T9689] should_fail+0x23c/0x250 [ 2638.306021][ T9689] __should_failslab+0x81/0x90 [ 2638.310982][ T9689] ? register_for_each_vma+0x372/0x890 [ 2638.316535][ T9689] should_failslab+0x5/0x20 [ 2638.321086][ T9689] kmem_cache_alloc_trace+0x49/0x310 [ 2638.326763][ T9689] ? register_for_each_vma+0x372/0x890 [ 2638.332496][ T9689] ? vma_interval_tree_iter_next+0x263/0x280 [ 2638.338609][ T9689] register_for_each_vma+0x372/0x890 [ 2638.344543][ T9689] __uprobe_register+0x3f4/0x8a0 [ 2638.349610][ T9689] uprobe_register_refctr+0x29/0x40 [ 2638.354838][ T9689] probe_event_enable+0x2be/0x7d0 [ 2638.360191][ T9689] ? __uprobe_trace_func+0x430/0x430 [ 2638.365511][ T9689] trace_uprobe_register+0x88/0x410 [ 2638.370806][ T9689] perf_trace_event_init+0x34e/0x790 [ 2638.376314][ T9689] perf_uprobe_init+0xf5/0x140 [ 2638.381531][ T9689] perf_uprobe_event_init+0xde/0x140 [ 2638.387042][ T9689] perf_try_init_event+0x21a/0x400 [ 2638.392240][ T9689] perf_event_alloc+0xa60/0x1790 [ 2638.398135][ T9689] __se_sys_perf_event_open+0x5c7/0x2740 [ 2638.403940][ T9689] ? vfs_write+0x50c/0x770 [ 2638.408812][ T9689] __x64_sys_perf_event_open+0x63/0x70 [ 2638.414300][ T9689] do_syscall_64+0x4a/0x90 [ 2638.418713][ T9689] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2638.424752][ T9689] RIP: 0033:0x4665d9 [ 2638.428877][ T9689] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2638.448726][ T9689] RSP: 002b:00007fe251c51188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a 04:44:44 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:44 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffff8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2638.457520][ T9689] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2638.465584][ T9689] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2638.473886][ T9689] RBP: 00007fe251c511d0 R08: 0000000000000000 R09: 0000000000000000 [ 2638.481866][ T9689] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000003 [ 2638.490261][ T9689] R13: 00007ffdc0e36b3f R14: 00007fe251c51300 R15: 0000000000022000 04:44:44 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:44 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:44 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:44 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff1200000200000000000006040000000000000000", 0x39}], 0x1) 04:44:44 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000080), 0x0, 0x2, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000000, 0x10, r0, 0x459fb000) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:44 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:44 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff1300000200000000000006040000000000000000", 0x39}], 0x1) 04:44:44 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:44 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:44 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:44 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff1400000200000000000006040000000000000000", 0x39}], 0x1) 04:44:44 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:44 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:44 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff1500000200000000000006040000000000000000", 0x39}], 0x1) 04:44:44 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_WOWLAN(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="008134836083fd636ce267f8a55e48a11488c31604701bd229ef1d3914f4d1e11f8148c32f76191cdf560400000000000000f2a04f5ea4595a75949d031fa81d9fc20053de841dbbc0864254b79a9517bfd3703e5a57eac5fbc0d1c95ab70cea449c554890a0756aeaa0dea7", @ANYRES16=r1, @ANYBLOB="010200000005000000000200000008000300013d"], 0x1c}}, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000140), 0x101040, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), r0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_MPATH(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x40, r4, 0x1, 0x70bd28, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r5}, @val={0xc, 0x99, {0x0, 0x4c}}}}, [@NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}]}, 0x40}, 0x1, 0x0, 0x0, 0x4008000}, 0x20040800) sendmsg$NL80211_CMD_SET_NOACK_MAP(r2, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x64, r3, 0x200, 0x70bd2d, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @void}}, [@NL80211_ATTR_NOACK_MAP={0x6, 0x95, 0x401}, @NL80211_ATTR_NOACK_MAP={0x6, 0x95, 0x1}, @NL80211_ATTR_NOACK_MAP={0x6, 0x95, 0x650e}, @NL80211_ATTR_NOACK_MAP={0x6, 0x95, 0x9}, @NL80211_ATTR_NOACK_MAP={0x6, 0x95, 0x70}, @NL80211_ATTR_NOACK_MAP={0x6, 0x95, 0x6}, @NL80211_ATTR_NOACK_MAP={0x6, 0x95, 0xfff}, @NL80211_ATTR_NOACK_MAP={0x6}, @NL80211_ATTR_NOACK_MAP={0x6, 0x95, 0x27e}]}, 0x64}, 0x1, 0x0, 0x0, 0x20000080}, 0x8000) sendmsg$NL80211_CMD_GET_PROTOCOL_FEATURES(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x8, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x200000c0}, 0x8898) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0xff, 0x0, 0x0, 0x4, 0x0, 0x21057}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:44 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:44 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) close(r1) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:44 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:44 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:44 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1000000, 0x8010, r0, 0xf0528000) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:44 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff1600000200000000000006040000000000000000", 0x39}], 0x1) 04:44:44 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:44 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1000001000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:44 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:44 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:44 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff1700000200000000000006040000000000000000", 0x39}], 0x1) 04:44:44 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:44 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff1b00000200000000000006040000000000000000", 0x39}], 0x1) 04:44:45 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000080)={0x1, 0x8000}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:45 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0xa, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:45 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:45 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:45 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x44, 0x0, 0x0, 0x3f, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0xe) 04:44:45 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff1c00000200000000000006040000000000000000", 0x39}], 0x1) 04:44:45 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000080)={0x7, 0x7, 0x2}, &(0x7f00000000c0)=0x28) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:45 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0xf, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:45 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x20ac, 0x4, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='./file0\x00') perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x1f, 0x47, 0x1, 0x2, 0x0, 0x0, 0xc43, 0xc, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_config_ext={0x7, 0x645c}, 0x5005, 0x80000001, 0xffffffff, 0x4, 0x2, 0x5, 0x6483, 0x0, 0x5, 0x0, 0x57e}, 0x0, 0x10, r0, 0xa) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x35, 0x0, &(0x7f0000000080)) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x4010, r1, 0x903c0000) 04:44:45 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:45 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:45 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff2c00000200000000000006040000000000000000", 0x39}], 0x1) 04:44:45 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:45 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:45 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:45 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x10000010000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:45 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:45 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff3700000200000000000006040000000000000000", 0x39}], 0x1) 04:44:45 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0), 0x329240, 0x0) accept$unix(r2, &(0x7f0000000100)=@abs, &(0x7f0000000200)=0x6e) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000080)) 04:44:45 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:45 executing program 3: perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:45 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0401000200000000000006040000000000000000", 0x39}], 0x1) 04:44:45 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:45 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:45 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001740)=ANY=[@ANYRES16, @ANYBLOB="000000000000fc370800140000000c000600080001000000000018000200080001df000000000800010000000000040004006c00140054000600080004000000000008000100000000000800020000000000080001000000a5000800030000000000080002002600000008000200000000000800040018000000080003000020000008000200f571ff070000000000006f61646361f3762d6c696f6b0000580005005400388a8e44a20ce41d08000800efff200000000800020000000000088004000000000008000300000000000800030000000000080101a4000400becf000400010000000800020800000000080002000000001e1400060008000100000500000800010000000000ff609a00080003000000000010000100756470d9027d7a3000000000380004001400010002000000bbc3ffff000000040d78d20100000000209031210508734b0461432b9560f82ee19ff2c6d22851b4b84ea2e743c1ef660000000008aeede4b4548c98e2184300009e00141f042d297700010002000000ac14140000000000000000e61301020002000000ac14140000000009adf4f6776297ee0008000200000000800800030200010000240004000c00010002000000ac14140000000000000000001400020002000000ac144d3d8dac06e58c9c160044000100380804002000000035c6675d46000a00000000000000000000004e230000001400020002000001ac1414bb0000008055510400"/547], 0x2}}, 0x0) write(r1, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d0a0b49ff708800008064280008020100ac14141fbc71176a36ede498534108e58342fa94a235a2a441f9", 0xfcae) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x0) mmap(&(0x7f00006ae000/0x1000)=nil, 0x1000, 0xa, 0x4010, r2, 0x65763000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x8, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) preadv(r4, &(0x7f00000016c0)=[{&(0x7f00000004c0)=""/4096, 0x1000}, {&(0x7f00000014c0)=""/130, 0x82}, {&(0x7f0000001580)=""/165, 0xa5}, {&(0x7f0000000100)=""/86, 0x56}, {&(0x7f0000001640)=""/109, 0x6d}, {&(0x7f0000000200)=""/54, 0x36}], 0x6, 0x6, 0x8) [ 2639.838402][ T9927] netlink: 4608 bytes leftover after parsing attributes in process `syz-executor.0'. 04:44:45 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x20000200, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:45 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:45 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0202000200000000000006040000000000000000", 0x39}], 0x1) 04:44:45 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x40000100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:45 executing program 3: fcntl$getflags(0xffffffffffffffff, 0x40a) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(0xffffffffffffffff, 0x4018f50b, &(0x7f00000012c0)={0x0, 0x1, 0x2}) semget$private(0x0, 0x1, 0x4) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x43) r1 = perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x10002, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x35, 0x0, &(0x7f0000000080)) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, &(0x7f0000000200)={{r1}, 0x0, 0x4, @inherit={0x50, &(0x7f0000001200)=ANY=[@ANYBLOB="00000000000000000100000000000000020000000000000001000000000000002800000000000000080000000000000009000000000000000600000000000000cde05f4c87480ebc060000000000000045bef44de452b53546eac523a34477668083cd97a55fd879b06d73bf8e98b233f5d03224782700ca6d5b084f291525800ce28c229d9e37433692308f45e0ca46eff4338afc5e22a9004ea86ad2214be275464c9761edb742da5e5da937352afe137df113a7eb42ffde983edbd0806bbe"]}, @name="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"}) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f0000000040)) r3 = semget$private(0x0, 0x9, 0x0) semctl$SEM_STAT_ANY(r3, 0x0, 0x14, &(0x7f00000000c0)=""/14) semtimedop(r3, &(0x7f0000000100)=[{0x0, 0x2, 0x3000}, {0x0, 0x3, 0x1000}, {0x1, 0x6, 0x1000}], 0x3, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000001300)={0x7, 0x80, 0x3f, 0x1, 0x1, 0x0, 0x0, 0x3, 0x90010, 0xb, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xab, 0x8}, 0x603, 0x3, 0x0, 0x2, 0x9, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2f}) 04:44:45 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0204000200000000000006040000000000000000", 0x39}], 0x1) 04:44:45 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:45 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:45 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2639.965835][ T9927] netlink: 4608 bytes leftover after parsing attributes in process `syz-executor.0'. 04:44:45 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x503400, 0x100, 0x10}, 0x18) r1 = syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x2, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="41b087544e2091cec5441ae04a6ecd0990035ee9730b9f28575b3b81e6221ac0ca3874456e901b25a20c13", 0x2b, 0x3}], 0x200008, &(0x7f0000000280)={[{@mode={'mode', 0x3d, 0x1f}}, {@huge_never}, {@huge_advise}, {@nr_blocks={'nr_blocks', 0x3d, [0x65, 0x32, 0x38, 0x39]}}, {}, {@nr_blocks={'nr_blocks', 0x3d, [0x25, 0x31, 0x30, 0x35, 0x35, 0x6d, 0x7, 0x31, 0x70]}}, {@mpol={'mpol', 0x3d, {'prefer', '=static', @void}}}, {@nr_blocks={'nr_blocks', 0x3d, [0x39, 0x70, 0x78, 0x65, 0x6d, 0x0]}}, {@nr_inodes={'nr_inodes', 0x3d, [0x35, 0x0, 0x32, 0x25, 0x25, 0x74]}}], [{@measure}]}) renameat2(r0, &(0x7f00000000c0)='./file0\x00', r1, &(0x7f0000000340)='./file0\x00', 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:45 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ffff04000200000000000006040000000000000000", 0x39}], 0x1) 04:44:45 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000001200)=0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000001240)=0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r3, 0x0) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r3, &(0x7f0000001280)={r0, r0, 0x8}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r4, &(0x7f0000000140)=[{&(0x7f0000000080)=""/26, 0x1a}, {&(0x7f00000000c0)=""/86, 0x56}, {&(0x7f0000000200)=""/4096, 0x1000}], 0x3, 0x82, 0x200000) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:45 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:45 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:45 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff7406000200000000000006040000000000000000", 0x39}], 0x1) 04:44:45 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x300000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:45 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:45 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:46 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:46 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff8c09000200000000000006040000000000000000", 0x39}], 0x1) 04:44:46 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:46 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x40, 0x0, 0x0, 0x4, 0x200400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:46 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:46 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff140a000200000000000006040000000000000000", 0x39}], 0x1) 04:44:46 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x500000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:46 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000080), 0x5eb, 0x4000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000002, 0x2010, r2, 0x13272000) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000500)=[{&(0x7f00000002c0)=""/51, 0x33}, {&(0x7f0000000300)=""/166, 0xa6}, {&(0x7f00000003c0)=""/85, 0x55}, {&(0x7f0000000440)=""/157, 0x9d}], 0x4, 0x4, 0x101) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r4, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r3, 0x4, &(0x7f0000000100)='*!/:/\\,[{\xfb-.{&+\x00', &(0x7f0000000140)='./file0\x00', r4) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) getdents64(r0, &(0x7f0000000200)=""/157, 0x9d) sendfile(r0, r0, &(0x7f00000000c0)=0x9, 0xfffffffffffffd5c) r5 = socket$inet6(0xa, 0x3, 0x7) getsockopt$inet6_mreq(r5, 0x29, 0x5, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x100, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x40009, 0x0, 0x4, 0x0, 0x0, 0x0, 0x40000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:46 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:46 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:46 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x1e, r0, 0x64534000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:46 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff000c000200000000000006040000000000000000", 0x39}], 0x1) 04:44:46 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x600000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:46 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff020c000200000000000006040000000000000000", 0x39}], 0x1) 04:44:46 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:46 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='\\-\x00') 04:44:46 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x4, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:46 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff880c000200000000000006040000000000000000", 0x39}], 0x1) 04:44:46 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x700000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:46 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:46 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff8c0c000200000000000006040000000000000000", 0x39}], 0x1) 04:44:46 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x106}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:46 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x800000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:46 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x198}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:46 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff980c000200000000000006040000000000000000", 0x39}], 0x1) 04:44:46 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r2, 0x0) writev(r2, &(0x7f00000015c0)=[{&(0x7f0000000280)="afd36e515f1d115b7c7c3ee09d69c95057a4bf772d48ddb78dbe21b41a0d2846ac264f19008169719d5ff0d04abf46a25f74581e926b7f66f7ec6b3c15ae00c0b97fabbf2841e3f3ddda6b427230c8045bb35bf10cfe73cea7eda8d48f0811ee1290c2027bcf", 0x66}, {&(0x7f0000000300)="2b7aa17f1a7560d70cadaacc1b8d9a904e4a4c013225181d76de1c6c96a88c95d5f3012202db3570b3abcc866001fa94a6cacf25907d298ad8fd27dadde0b80033e8acfb8f3e2542f3d12211e6ee8ac457f4c6c083fd8d47275f1040429316c4be30bf343e876def0057e3d9f693c30f47fc7a959d1a66e484690e1c37828f3b73c7f30bae5684b110b6b600c634b9127de5a3ffd6d28c2172950c7f2ae5a332da781a6daba21d7c1f472ddf1e254a177d13dad60d8e00f301e9dfb66a654e3dc3110fb0d0ea9677e0ff", 0xca}, {&(0x7f0000000400)="3678ceb06f14f15fcb7bab6524817e762f698ebac07212f6301482f9fd9f78c89d25f85aca16a1ff1e8af7cfc7028d73d1c33381c31e6ce8c5f0febe2e4083dbc77665cacfbcb4cfbedf9d61b0e0cd527cca85b07e443f", 0x57}, {&(0x7f0000000200)="f1bade024d3bd6b933656d7b528d3adb186ac42fb4db", 0x16}, {&(0x7f0000000480)="c9ce9a", 0x3}, {&(0x7f00000004c0)="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", 0x1000}, {&(0x7f00000014c0)="234714d6c4d1321a43f55089a163576cc3272fe778fc6bdeb6196d8db1127565bb51577fa4100195dee1da92f4f5df933bec7c7c5cb002e18abfe62af28b5403141449d51c907f2f365872a869d52d005a0cb2e573c6f595979a7331adef22cbf56b52402366c5a401a7b6afe5fa1ac4dd345046d18906d800010573ca89d49aaca92f8be3a62e49ed4ff0b65575692ebd0c20c0d137cc412e05a91b4b77f9154ca56a558f1759f233f42f50bb73d1cf74ef76c64799abe6d3f8a40578ca60a6e0aa2d", 0xc3}], 0x7) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000080)=""/202, 0xca}], 0x100001c8, 0xb033, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:46 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x900000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:46 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:46 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_io_uring_complete(0x0) preadv(r2, &(0x7f0000002480)=[{&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000000080)=""/51, 0x33}, {&(0x7f0000001200)=""/213, 0xd5}, {&(0x7f00000000c0)=""/179, 0xb3}, {&(0x7f0000001300)=""/221, 0xdd}, {&(0x7f0000001400)=""/47, 0x2f}, {&(0x7f0000001440)=""/4096, 0x1000}, {&(0x7f0000002440)}], 0x8, 0x10000, 0x54) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r3, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000002440)={&(0x7f0000110000/0x1000)=nil, 0x1000}, &(0x7f0000002500)=0x10) 04:44:46 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:46 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff020e000200000000000006040000000000000000", 0x39}], 0x1) 04:44:46 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xa00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:46 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x5, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:46 executing program 3: r0 = mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000000, 0x80010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(0x0, r0, &(0x7f0000000040)=@IORING_OP_POLL_REMOVE={0x7, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x174) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:46 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0210000200000000000006040000000000000000", 0x39}], 0x1) 04:44:46 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:46 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xb00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:46 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x6, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:46 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xc00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:46 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0212000200000000000006040000000000000000", 0x39}], 0x1) 04:44:47 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x226}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:47 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xd00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:47 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0214000200000000000006040000000000000000", 0x39}], 0x1) 04:44:47 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r4, 0x0) sendmsg$NL80211_CMD_SET_WOWLAN(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYRES16, @ANYRES16=r3, @ANYRESHEX=r0], 0x1c}, 0x1, 0x0, 0x0, 0x20004000}, 0x0) sendmsg$NL80211_CMD_GET_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r3, 0x4, 0x70bd29, 0x25dfdbff, {{}, {@val={0x8}, @void}}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x4000001) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r5, 0x0) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP6T_SO_GET_INFO(r6, 0x29, 0x35, 0x0, &(0x7f0000000080)) vmsplice(r6, &(0x7f0000002740)=[{&(0x7f0000000200)="30b2ae0d8d21a8ad498615a538e076a12c0f60", 0x13}, {&(0x7f00000002c0)="0583c30c737adce11f89cf3c45ae902fbdbc908f2162321a1efcd170eef1359ab9e870e9c8dca4b6fdc363e822ee69bd7f0a2f08bc487bf9fcf6119b98ec203169fb9b73a792370a955b7e58ef321fc8079886e6bb76c6f691955023ea00d1216b3c0b72a001ac3ba4297ef368b58c49d60207fbec", 0x75}, {&(0x7f0000000340)="8822899732b36b83fa03b3b672d213f900faf22a316e735ceb242515d505eb661ecfb150b729d3138ec37c9994cb4f9b78563ee2e8a93b03b33214c6f3404e4a07ee538e0f37998c410772bce4a07db62c2540abfc3ade1b65acc04e79e3c0db7a261f6a9eb09f3af772b1b9189900f70531ce35d58067d9a416e21c670ad026da8b8cfd2b0400d85fffacb77c2f13fe7a840f1252819a71b214ad577d3bcd2b51cd4ff5296a6ca8297d9264d54cc727", 0xb0}, {&(0x7f0000000400)="d9d599645f9c615ee19e68e6492a411ff76c49ca707816998d0371cd1bbc489399ab53851f63dd801a96edf7824cc1af88dd5b04d69629cfa580d6347c035ba377e2342482cc02d576b9aee4fa7d4ead02db1b05138663a898a58c1e74b6e6ed1b4e29cf50f9db217278e84788fd47eef3247797e93159e1a13a44d3814e80a6206b336c26dc667bdf59b87fdf81821460b61eb40df6d9cf21a165457a21bfd57c4461d7b7709016780815716ec47bcefce95056cc613e83117fab55f689efbb0c7beb9853df4497f87f420961d2c7ce11", 0xd1}, {&(0x7f0000000500)="cee097c3fe05ba23a8a153e76a3f36025246dc4f7a9b85e684f617002ab0f960b4fc81b101ac35292796f5f14a963e4a2aeb9aa39f53bfd6f1a24c5dffe6b9258150379fff2d1f0a2d5d5af3cd04", 0x4e}, {&(0x7f0000000580)="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", 0x1000}, {&(0x7f0000001580)="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", 0x1000}, {&(0x7f0000002580)="aaddd78696f5cec0c613b6164458b8665054fa81285cc6de696d38020ea0de9829c57b5d53be26ebcec0ebf229ad27fa3335044877d4588e736ccee6398b88f30f31f278190a8f2d37fb929b84bff67380f77fd8533933cbdbca4e3b04fd39bf848a2b6f2afd11e61b8c5b1532c9bcdc6cf2738f5127a217857a1f52cc45a24dfc0674bb6d70f3bda398f57185", 0x8d}, {&(0x7f0000002640)="873e7fbe1046721d26a907a9aaaf40ff974daadfc10972c1d2c130c6f19e26bf2f828b5748a19a489fef732c4fd05ad1e4ad13cd4f3d86ba77ebc775dda069d8cb18ce6ad4a8fce3698a2fc36a5e74452389084a81ac933cee171f9e250040a56ff5f419773a8ffb9635434503a886668694a2c1c4e9f1e15837bc02f86308ebe6dc19c7b6b2f1fbb5167876b8e20d8c14b9d2f995d563", 0x97}, {&(0x7f0000002700)="1b6fd6be50f000bab09a988e21935a3fce3faac852898990a9ef6b74afaa59f256c79b5c50502db9b73df059ce7e27b916132fbdee6ea1cecd53e8", 0x3b}], 0xa, 0x4) ioctl$TIOCNOTTY(r5, 0x5422) 04:44:47 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25a}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:47 executing program 3: setns(0xffffffffffffffff, 0x8000000) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) ioctl$NS_GET_USERNS(r0, 0xb701, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) close_range(r1, r1, 0x2) setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x2d, &(0x7f00000000c0)={0x2, {{0xa, 0x4e21, 0x800, @remote, 0x2}}}, 0x88) r2 = syz_open_dev$char_raw(&(0x7f0000000040), 0x0, 0x20000) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x80010, r2, 0xe5113000) io_uring_enter(0xffffffffffffffff, 0x6007, 0x4ab8, 0x2, &(0x7f0000000080)={[0x3ff]}, 0x8) 04:44:47 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xe00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:47 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0216000200000000000006040000000000000000", 0x39}], 0x1) 04:44:47 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) sendto$unix(r0, &(0x7f0000000080)="44234c06c53236ae14edb89134bafcb0df4ff33fa4d14cd06577bb0118e53731b917ef25062cf3d95b831ed5bb422f1a77249c0bacd775bf35299caa7dbe14b3a4e4f8c3571b1492", 0x48, 0x4040804, &(0x7f0000000100)=@abs={0x1, 0x0, 0x4e24}, 0x6e) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:47 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:47 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x10000, 0x1) r1 = syz_genetlink_get_family_id$smc(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$SMC_PNETID_GET(r0, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x78, r1, 0x100, 0x70bd2b, 0x25dfdbfd, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'batadv_slave_1\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'batadv_slave_1\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}]}, 0x78}, 0x1, 0x0, 0x0, 0x20004000}, 0x4000000) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0xc2480, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x54, 0x0, 0x1, 0x70bd2b, 0x25dfdbfb, {}, [@BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x10}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfff}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x6c93}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xfffffc00}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}]}, 0x54}, 0x1, 0x0, 0x0, 0x4}, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:47 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f0}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:47 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xf00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:47 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0218000200000000000006040000000000000000", 0x39}], 0x1) 04:44:47 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:47 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff021a000200000000000006040000000000000000", 0x39}], 0x1) 04:44:47 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:47 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:47 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:47 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff021e000200000000000006040000000000000000", 0x39}], 0x1) [ 2641.615163][T10204] validate_nla: 103 callbacks suppressed [ 2641.615174][T10204] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 04:44:47 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000080)="5a689e21d520bbe5fae4fd053b8771d3a75b6b260c5c2b6d06b6d88f4df8569fb804c3dbf07b7470adfbb8d265af00d6a0312fcd4d2e83817ef63099de495c74ff22", 0x42}, {&(0x7f0000000100)="f6292dc36ffe512c7fe7b3adad8fb02335c522cd39723167a4756d526522432cbf8eb9eafa2d043f4e32bf1a9492ddd05b6be7233ec39b4ff5afafc5c6e3a2dce4767233e1819ed5e3de60c9c0a2c1017cb012", 0x53}, {&(0x7f0000000200)="514f3d068e3d885986786d4684a3ef80e6b8bedbdcfe9d734e9c9ca52da43a0e6ffd5a6526a5364d6d11c04068dafcaec77ad7d486a650b5f8c0b088d08f11d66c52a943b6a99525aad1e5bc2d9e27c86e256d7e17711984", 0x58}, {&(0x7f0000000280)="91f236b4895466c4708e28740b654677f2939ab1e090fa1624f3032d29cee8c6bfe1a42a67895d84290c1c474adf525b2c863feb63ec5c9c36dc592fef8b51cd1cdd497814873d3958fdba09bb5e90b88df8c6a28039e460f5efb0ee3aa94379f769d23264f36ba3b977ae44e2d3f527de4c8853cd14f32c8e674eab9cdf45242297a4d1d747ccf60024bbd0ab0b53883d797338f89595e4cb12f3ba02fe12b2a3c662339c31396e7200f324007001ab44029ccc080240bab2b539967ab04d13ca96d4d1a93723a918aa5a25568961cb5a939b4608dcc2e542c29c0f102343a55af824fd753ee8b4b5c7687b5f07fbabf8cdf3dc189c9e885757a461265a64ce959c7c91666c40713de48f2c1b9dda8c354b0926d99080599ecc12474ac7a775926ab737bd8d6770d65a1da0d8a78dfc7a64c69dedbfa4721638b6a7c76356ddac5647395563fb8050acc859136e33926d48281d20c8b15a45a65f18a789a2e352a78bacbdd55565a250574e0f0fc9ff5ef24ed0389f7bdd7761d21a6bee302195e50261e21b0d49cb466b12868c5ab995cf935da33cf6cccda055ea9ef839d70abb6fa4d1d7def159ca347d6056f53bdf66356185c8b120211fad83d523a6c6ce123c0efd70a6b628051b5cd9a66fdbcdb59002d6e9855569333eed0227e5cdb37ed25ee158d1719507897fb2ec07b9178edaa59b4b22c6147f880a3d6083acbe3b454c2d67daa41695dffee79fc7aa52398cfd771f2b1c4d3b81027bb8397fb9da851895d6ebe680440360b45c87e7de6c6766ff37653cf77caad398985716cd0a759d093f68e729bfcedb519848130b4b7d0fa77ad07998c1c64c4d6872c584a3fcb272878d22e96e1b6b7eed019576ec596c3cb8eb7a59a57d811df7d589e1031cb5599623a4e993a91df9bd4a5ca7d4d1654e3fb8432624765b9dd75a7797de48a7e4e1764fca87aa11492eb1c7cfd05eefddb537d3e109b86e26a4d0eda5b1989955f06c6b98cf648f57ca4b851256650923f19c351e77b0b73b1fcb917372866749a2df86792403eaf856b0224627b6caf3773c9c8488c28c7ec49eab807ac176d7d4b994c708a4887b3e0cc8ae5b084e4e6e228c5a502b5aae34b29240270b35359bc843c6a860d88cdc83941354208ef558bc2da81d531483f801e2e0026adca5e7ec1b035ff809da94434fe3c1e68e39a7c8bf3fcd20f436b667deaf88dce47ce7eb0d5d27ede1e928f5a7108ec9d642f2e12ceffbb66633266393002d2416faa428c1d477465528abf350eda7a10a74fd0839dd9f3b70804f9bf7b3ef0e26c949c008efee7e8ac9d06ac7bfc0fc6870963cbcf62aa0519bec12046e5b7c1bc5321bda243958c87df0a32fdff381d139d1cde3cd6ae9cf7e87ebe06b15b84825303a677b8989374396d9616106cf2aa4406fad26cf0fa1e3322dbadeb6cb88a2d1699667b80522e274007e11b5dc463f88f5dab4748c79ac2204dadaeb6906bef5254b9175ac05011e108047d129e11ebaf03177059563ff71aa3713e5b302e6c6c95135329c06008bb11970bba80527c7ae009b8c6a356a5e40028b290d13f5144cdf551fcb0894fd60b9173b855403a8043849df29699923a7ae8196a75fac2dd96170f25b6bc2ba0e41006794234e60e01f3e7f4adfed7fc2c15a6344aa4adce531f9ab7b8c09c862a64231ffb5a099c358c9b63acbf33b95ef6bbc726ff0fdb9252b12951f3f9c8188f0c7c8b9d4b0ad7580a2ba76bf53798432fca9da675c76b7777687e38dc9e493b43c7b0687dd74608cf2e4260e9e0d7040a9adb40c1a8f3935d0e159d094f9fc8b3ca6a93ddaa54b9f1f272bc7b361a630aa4f3237abf38daa1904e344f7a7173140f58cf75a2a43c2422de724cdb083f2ce387284fe406a567aef8eb9af94f15ec9b0a67923624ed9f7be1bcb9f36319332317fdae05c75094015e5737627ef5d93775c8118a1a72f807a793d4790a1e02271baf0cceccae0aab7b5461db8ba03a1259cb7695b817fc406df63c39def446a433a0a3a7be47e3688247331cfa68240f17e52129c25fe1aa0b14370a6122e1f167c9d8ca7207fb79824f4e8e3a67d3492b461d12aa820e178c845a23082b614dec25dfc7281ecc6f8e321b3a4672cd4071ed86f965457b3e7073228c09783c362445048e5644f0a7caef67966cd313d121d4a48d78564d5227c45e298685808586bdc59b4c984f8e7a51c6ae2419ab17b8804058fc1f894e8826a30d7122ce9881abd31c2a6cd4b79717efd2e1189c2f8dcb2f3ab673a661cd2c0e66a72a829525378e3b9ca06df1aa18fcb1e48e770787008cfbb10e995bac107785102dac7993651a763331ddb857b984ec7d87209048f75e0fd63d0760db727f054cba0b7a30b6281ba90b41bca076a15dc0eaaec6f6b01b93b1770e96cf383b3345acf9054e7939ff1f144c92234afa32abe4eb4741924a1c4f000a92031479c97643d25943fe23a339a9b7b4c3b8354e430e94a382c233d1cb10036a5e663e374feca717f51fbbea18fffd240f0d095cf03c9827903dd13a1af1a8ad66fe98c68d189a3ac021b046d0297f9f56119c76a893020c12c1c89ce346c3f6ea7f895ef153e438ce3e57bbc07377f77764b4ec48c4fa7f010f731924f99b271880f8c6e6fbb377604f7422de0381cbfec67bae3f5af4ed28f2d1e2e59ea2e0be154f1724ef336a3af1cfc5c6529ed78feb8af8f8242cf5390917cea25754ac2aa4948d1b9a6ab7c888db64b54ddbf04c767bbe2b294515d1d2ec5cf9488733695a7a1477040db6c494c5e2e445786cedf6aaba292ee47ecd6ff34472072bf43607b40450ae1bf6f64e6106ca59bb75f664fff579a0662c14ba83ebcb25fa25ab0fe2143289a2d8442669e229be7895b1817338af73ebcf0d16397e49faaa084836177a7fe23dfff168f84342166b2aecb57cc32e6061c580ed345ac8de30fc23b044949219e0ee31f298f0abafa64228f5a9cfd1be9456265527bcf13ba1f87aa9f0ce6474fb1eb4058dd95e25a1560680175599faccd54c14ccfc791b65a9904cfff223bfd08baaee8e1e8b351d2d3274c37320c006ebfa7b4abbd55f91270e32f90c2bb6ccae910c25323b770eebc41a7785a5b7c9e882f7c391e86baf992c5aed12d8adce6a4d601e78fd673a214c661c5ea2ee1b84c7419076f18d91147d658bbad7d59877d3e7d636764fbf83bdcae4319b714e54fe445e3743c1ca86e8657a4caf751aa6d24cc63ce71ce29a9c5c5db2fed150a9886fba1b59384547cdecc4c8e5a8793a3837154892969cdd534278b35f5b297f923b8547534ca87e4f667ef316f0b9a5b3b4907e04709304a458fe87a326cd63a065d46400bf0a04a8673cf9bc88d68975d24f40bcfe6fa10583f6e10afc9c8b5c854f98caf6c318549f46a47e24359cf6fc5b9d15e8babbcb2cb3a89525cbf35d737b61654f2bf79ccbd3c4c714f8c52a42270b3f5d57188bc31f31d11625cdae14255a3bc69e276cccd15e71592f2a38071a91956a279e6f97f92c6ddd8ae76d1f52f4179047f8469b7d313dd6584686971756d9806510f0086e73ef04cad180ebb6788ddafbea2842480fdbf62906edc9b913851fc2170d64139565f48afc89bea9cf756e405bf51660c4c70c98154e4e42ae50d195333e78a6edf7ca17469a3b8b875fce8ad2d51756c9617b521fcdf3425f910eb29ee33f6be8938d1cce5047906b93fe964e04967d2111460f119a1a57fe128944bb962b9fec6da847d3afaf50894b56f6b7d71cfe76d338ec8df444d881af3611afcdd1626504dff9b67a3b57247b56e4de6c0fc155b27603fde5e66427111b8154fd369ba5836b7b2f2a41ff2846d145c1b27c9183a6cc34e9c33bfd737fdd2c94a784226b594e2e6b4ef4f383bcfb13b7eb5f8a2cdc4e5935d5fb3dee2924bd7a6d1a0eadf134c252c1c152ecb66ab76343f9148a3aaba36beda62de1ff9cc6cff49fc7edb795eeabfea15b917f24b8ee61ea76fc33346ed86c98379726bf9f9cb2116513b2d2915f66dec5442bf1e602a8ba337ec39041fb2e606201d70f4238adb948e23abfc040641c2a86116b95ab045d7c1b5dbe23ef1b267477787699329a52596bf271ff97715425b12667c112a85ae47584d6d2801ac4f7f31fd82449fa4fd05dc20ca88ec9898c2bce57b451163cc48965be75bd7b0aa95ba50e6b99375a97647c7fe9b463ba5a74d61b1029bc3a30483e59e4e0f16982bc16a6724b55a96d9c804357817f02c4b86a32e57133fe28909f8edb25679a92097c77b6eee4aef82f52a831a6a9516c932d552c5a4640dec5b2fa09ec94f8dc824a0d733336632ae5905069518002f059b89db4238cc5fe4946e6c026a30942f10ba6c328766b06e4c9ce2bdbe7cf8c5f376ea7d6282f42a2ea1b1917f68e359ec48102e61b073e12738e71c2d6d4e8efdcd2e96a7ae5b924d863c6be1a1d2fbfa5e372930f27e2e21fe8baadadb4e5f9e5b8c28e490b2710789a973dd5c3f28682bb9b0f8b4f48ec3f9c1d6ccb965c47b19abaf961410941d9141c66721bd92d2a80e6979072156806728cd5f50b664d4a4b4c603fb48ba8ba8b8173cebba86d0e2ad6b6554c169de0862d949041e2ce031d5e5968541030c57cd15bc6479473fe8be2a352a6532d6089454560becf0d60515622eeb5f4baa55696178d1d787daebeaa2990d1e652313e19243e941123538fdf35bfc7f6c1a1d54a3c9d7d767036d5326bb7af31578775520f1ba69d0ffc2f5eae880097e3232303f1d715adb573f4e914e026dd43e7ac6deae9497aec098bf456df2f9168ce26fa5f7904c6d88c9392ee0a42d370bac71fc55f65beaed46ec1e47d862426167eb12735e54c0cb97555849fbe1ee9e309fa0e0cab082e7878ce43c9cece0c7c71874bcd2d982356f3c358b2aa3343f199648082ac91fa88b03bfae50c8d73262a6197fc7982eeb3e37de6c289108e2aaa1302d7f47cdec4cf3d7f0139c19b74c31638598834f2a63767589948b1e23d6dfb9ae5526362cba2dcf8e0173fc8ebe646b0501a1a640bcbfa8d8d861a712a8f1b09c1e7925e98cee86653c12a24ac161f1a9dc15037c9c5db24ef1d5477050956b94f6235e0a31c567659d03fd0d6529ab9a9bdb00977a30e434d802fea8b54c9ad4333b8db0aa04f2f55befc904de19902d3c5cbb4e98ccf3ac9fa0521c937887a62695e7f6630c72fb4088c1a577aedc2de9266ba459797484f846aede4325aa8e6c244837b614b7db3e250f8f50c11e08c3239dcbf8b5ee94b07d1319aee446e10a61d7506406e4e4e7bcf0bb7c8477e9db25c47de0b434b12d7fe9d6bd0d81f4ce27368a78661c6e1e9999918b1d7f8d6ca8aff8a6fdec8ce5a25f137822fd1dea5dfe69d6130c8a9a29a8b0659d46da6be8f9de3b23a7d7b058f363b68bc4bbbc65764af583c2a42093ed4fcbc02d9b57a4490796f753db27a5f1aaad9baaf5c709f6345281f43890f4e19e3d6652cf0d3d6246c95cfa91cad0da06a2ba80b7868bb106acdd5fcf9323ac531217c56cacbb16789b4c9d0014c112dce6715c7a6f4e91f44b8b27ef2b0cbb707036415e7e8e98544989c7ecee550038fb98a09696b9252d9a4461f58d7678e00e83421ce8477b87854763ba4813638a562e70b29f72e4368b3e23e18dc609f68854dbd62e78e9a08a92e788121ec89d2d78da6d44c5120b6afefc0c136fe151c2d081e0498ef2cddfd1af18500d38c9302bfe493eee9036858a3a8978c569272c", 0x1000}, {&(0x7f0000001280)="f66d926ea50c9f362dcf69c246ada670a48b9185e2fad2f7a0878a560ad00b8b53eb51b482d3efeb36287597f0fbedade2249196fb6ee86777415c3ddb11214378173459aac80b89c3ae18b87df714a8f644691d7499ebfc04c75f986a0dc081582ccc6ec655b537313b365545c2b3e3e5d1a4a36721b2d912b70cd43dd71a388f72cb2e51fed919c5737c0c05dccb3781dc98ca1ab0ee65f0eb636662a7333b729751a05d7e7939f88b1f2e2da958755876f8268c783dbfaa111742a3e75cac0e5ac07c027eebc282e0e29d6e10fb", 0xcf}], 0x5, 0xda6, 0xd0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:47 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x8, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2641.707005][T10215] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2641.715623][T10215] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2641.726777][T10216] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 04:44:47 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xfffffffc, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:47 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:47 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:47 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0220000200000000000006040000000000000000", 0x39}], 0x1) 04:44:47 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:47 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x601}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:47 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:47 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000140)=[{&(0x7f0000000080)=""/37, 0x25}, {&(0x7f00000003c0)=""/99, 0x63}, {&(0x7f0000000200)=""/137, 0x89}, {&(0x7f00000002c0)=""/226, 0xe2}], 0x4, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:47 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2602000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2641.975497][T10243] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2641.984393][T10243] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 04:44:47 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0226000200000000000006040000000000000000", 0x39}], 0x1) [ 2642.016384][T10252] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 04:44:47 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2700000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:47 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0xa, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2642.082782][T10265] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2642.091651][T10265] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2642.124006][T10269] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 04:44:48 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0228000200000000000006040000000000000000", 0x39}], 0x1) 04:44:48 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:48 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:48 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x35, 0x0, &(0x7f0000000080)) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(r2, 0x80286722, &(0x7f00000000c0)={&(0x7f0000000080)=""/37, 0x25, 0x3800000, 0x3}) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:48 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x2014008, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@debug={'debug', 0x3d, 0x20}}, {@afid}, {@mmap}], [{@appraise_type}, {@hash}]}}) r2 = perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x2, 0x9a, 0x4, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x7, 0xa66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) 04:44:48 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0xb, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:48 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4800000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:48 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x2d8100, 0x2) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000080)='cpuacct.usage_percpu\x00', 0x0, 0x0) mmap(&(0x7f0000155000/0x2000)=nil, 0x2000, 0xd, 0x10010, r2, 0xe273d000) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r0, &(0x7f00000000c0)='cpuacct.usage_user\x00', 0x0, 0x0) 04:44:48 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0229000200000000000006040000000000000000", 0x39}], 0x1) 04:44:48 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:48 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4c00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:48 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff022c000200000000000006040000000000000000", 0x39}], 0x1) 04:44:48 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0xc, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:48 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:48 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x5802000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:48 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r2, 0x0) ioctl$BTRFS_IOC_FS_INFO(r2, 0x8400941f, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:48 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:48 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6800000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:48 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff022d000200000000000006040000000000000000", 0x39}], 0x1) 04:44:48 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0230000200000000000006040000000000000000", 0x39}], 0x1) 04:44:48 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0xd, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:48 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r2, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000009, 0x40010, r2, 0xbee73000) 04:44:48 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:48 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6c00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:48 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019001400ff0400000200000000000006040000000000000000", 0x39}], 0x1) 04:44:48 executing program 0: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f00000002c0)={'sit0\x00', &(0x7f0000000240)={'ip6_vti0\x00', 0x0, 0x2f, 0x1, 0x4, 0x7ff, 0x11, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x10, 0x8000, 0x81, 0x80}}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x101080, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x6) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r3, 0x0) r4 = syz_io_uring_setup(0x3e73, &(0x7f0000000080)={0x0, 0x525, 0x0, 0x0, 0x30d, 0x0, r3}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000720000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000140)) close(r4) 04:44:48 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2642.804770][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready [ 2642.818786][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready 04:44:48 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:48 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000001, 0x100010, r0, 0x79c2e000) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:48 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0231000200000000000006040000000000000000", 0x39}], 0x1) 04:44:48 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0xe, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:48 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:48 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7a00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:48 executing program 3 (fault-call:4 fault-nth:0): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:48 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0232000200000000000006040000000000000000", 0x39}], 0x1) 04:44:48 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8cffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:48 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1200}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2643.012735][T10393] FAULT_INJECTION: forcing a failure. [ 2643.012735][T10393] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2643.026154][T10393] CPU: 0 PID: 10393 Comm: syz-executor.3 Not tainted 5.13.0-rc3-syzkaller #0 [ 2643.034999][T10393] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2643.045234][T10393] Call Trace: [ 2643.048623][T10393] dump_stack+0x137/0x19d [ 2643.052950][T10393] should_fail+0x23c/0x250 [ 2643.057538][T10393] should_fail_usercopy+0x16/0x20 [ 2643.062678][T10393] _copy_from_user+0x1c/0xd0 [ 2643.067280][T10393] perf_copy_attr+0x156/0x650 [ 2643.072105][T10393] __se_sys_perf_event_open+0xb6/0x2740 [ 2643.077665][T10393] ? vfs_write+0x50c/0x770 [ 2643.082093][T10393] __x64_sys_perf_event_open+0x63/0x70 [ 2643.087650][T10393] do_syscall_64+0x4a/0x90 [ 2643.092167][T10393] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2643.098157][T10393] RIP: 0033:0x4665d9 [ 2643.102112][T10393] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2643.121881][T10393] RSP: 002b:00007fe86129e188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2643.130400][T10393] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2643.138449][T10393] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2643.146570][T10393] RBP: 00007fe86129e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2643.154898][T10393] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 2643.162878][T10393] R13: 00007ffe8b2ef00f R14: 00007fe86129e300 R15: 0000000000022000 04:44:49 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0233000200000000000006040000000000000000", 0x39}], 0x1) 04:44:49 executing program 3 (fault-call:4 fault-nth:1): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:49 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) renameat2(r0, &(0x7f0000000140)='./file0\x00', r0, &(0x7f0000000200)='./file0\x00', 0x9) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000240), 0x1, 0x0) preadv(r2, &(0x7f0000000300)=[{&(0x7f0000000280)=""/107, 0x6b}], 0x1, 0x4, 0xffff) r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00003e9000/0x3000)=nil, 0x3000, 0x1, 0x4000010, r3, 0xc000000000000000) newfstatat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x4000) 04:44:49 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:49 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xa601000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:49 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x10, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:49 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2602}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:49 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xc000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:49 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2643.309658][T10419] FAULT_INJECTION: forcing a failure. [ 2643.309658][T10419] name failslab, interval 1, probability 0, space 0, times 0 [ 2643.322885][T10419] CPU: 0 PID: 10419 Comm: syz-executor.3 Not tainted 5.13.0-rc3-syzkaller #0 [ 2643.331861][T10419] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2643.342066][T10419] Call Trace: [ 2643.345424][T10419] dump_stack+0x137/0x19d [ 2643.349897][T10419] should_fail+0x23c/0x250 [ 2643.354370][T10419] __should_failslab+0x81/0x90 [ 2643.359230][T10419] should_failslab+0x5/0x20 [ 2643.363829][T10419] kmem_cache_alloc_node+0x58/0x2b0 [ 2643.369060][T10419] ? cred_has_capability+0x1af/0x210 [ 2643.374505][T10419] ? perf_event_alloc+0x160/0x1790 [ 2643.379814][T10419] perf_event_alloc+0x160/0x1790 [ 2643.384759][T10419] __se_sys_perf_event_open+0x5c7/0x2740 [ 2643.390431][T10419] ? vfs_write+0x50c/0x770 [ 2643.394912][T10419] __x64_sys_perf_event_open+0x63/0x70 [ 2643.400415][T10419] do_syscall_64+0x4a/0x90 [ 2643.404866][T10419] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2643.410772][T10419] RIP: 0033:0x4665d9 [ 2643.414850][T10419] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2643.434832][T10419] RSP: 002b:00007fe86129e188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2643.443333][T10419] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2643.451303][T10419] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 04:44:49 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff003b000200000000000006040000000000000000", 0x39}], 0x1) 04:44:49 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xccffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:49 executing program 3 (fault-call:4 fault-nth:2): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2643.459275][T10419] RBP: 00007fe86129e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2643.467448][T10419] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 2643.475955][T10419] R13: 00007ffe8b2ef00f R14: 00007fe86129e300 R15: 0000000000022000 04:44:49 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xf6ffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2643.552019][T10440] FAULT_INJECTION: forcing a failure. [ 2643.552019][T10440] name failslab, interval 1, probability 0, space 0, times 0 [ 2643.565063][T10440] CPU: 0 PID: 10440 Comm: syz-executor.3 Not tainted 5.13.0-rc3-syzkaller #0 [ 2643.574135][T10440] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2643.584201][T10440] Call Trace: [ 2643.587501][T10440] dump_stack+0x137/0x19d [ 2643.591893][T10440] should_fail+0x23c/0x250 [ 2643.596447][T10440] ? perf_uprobe_init+0x45/0x140 [ 2643.601412][T10440] __should_failslab+0x81/0x90 [ 2643.606203][T10440] should_failslab+0x5/0x20 [ 2643.610697][T10440] __kmalloc_track_caller+0x64/0x340 [ 2643.616086][T10440] ? strnlen_user+0x137/0x1c0 [ 2643.620805][T10440] strndup_user+0x73/0x120 [ 2643.625242][T10440] perf_uprobe_init+0x45/0x140 [ 2643.630025][T10440] perf_uprobe_event_init+0xde/0x140 [ 2643.635370][T10440] perf_try_init_event+0x21a/0x400 [ 2643.640688][T10440] perf_event_alloc+0xa60/0x1790 [ 2643.645746][T10440] __se_sys_perf_event_open+0x5c7/0x2740 04:44:49 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfeffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2643.651477][T10440] ? vfs_write+0x50c/0x770 [ 2643.656057][T10440] __x64_sys_perf_event_open+0x63/0x70 [ 2643.661669][T10440] do_syscall_64+0x4a/0x90 [ 2643.666106][T10440] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2643.672546][T10440] RIP: 0033:0x4665d9 [ 2643.676492][T10440] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2643.699305][T10440] RSP: 002b:00007fe86129e188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2643.713765][T10440] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2643.723946][T10440] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2643.731974][T10440] RBP: 00007fe86129e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2643.740307][T10440] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 2643.748544][T10440] R13: 00007ffe8b2ef00f R14: 00007fe86129e300 R15: 0000000000022000 04:44:49 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffff7f00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:49 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:49 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0240000200000000000006040000000000000000", 0x39}], 0x1) 04:44:49 executing program 3 (fault-call:4 fault-nth:3): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:49 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x11, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:49 executing program 0: io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ptrace$getregset(0x4204, 0xffffffffffffffff, 0xbe451b72b0ee6fcd, &(0x7f0000001440)={&(0x7f0000000440)=""/4096, 0x1000}) creat(&(0x7f0000001480)='./file0\x00', 0x91) sendmsg$sock(r0, &(0x7f0000000400)={&(0x7f0000000200)=@x25={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x2}}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000280)="8bd12b6635be6465843168ab8900ac6a15acf510ab675443e70a3372dce78ae20eb9070aaf2738a5edffb707a94260e5967c789cd1ef8a9c16c12fce930d26b22e1398cfcfa0d31f9056f1dbe2af2ae3a890abb0cd355fa50ec66e9f88f9cca458fcf5818d1948127728b57fb3762af2266df82576269c048781b8475214b425646e922b16fcb581aa808b10150afe4fbd9084bb009bb9028d2ae6e0796fb8357d52d74d56c974cf74d896ca05c4105649dcc95539588b7690f14990a9055cc7a52f00daa9eb5350af9d29bc65845b08cbcf49263a5fc6ac5836f3f94e726d5a2d91a3a7bfa3f3", 0xe7}, {&(0x7f00000000c0)="662914eebe5dcfdb90c5974e82817f000d7ab9e4846c97c9bfbea7dee1eb0b1487fc9521e95a2ea78d648be6d6dd", 0x2e}, {&(0x7f0000000380)="deb0e2c0e8c20dd4b4a6b492e7af58a0db3266fe370c997c7293be1de05a2ab1eb05b6b311d2302f4c6d668025b7b4f61e82647649d34ba82eed725ad92628a58ad3057f4ab59e", 0x47}], 0x3}, 0x24048000) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x60500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x80000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) 04:44:49 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2643.889852][T10465] FAULT_INJECTION: forcing a failure. [ 2643.889852][T10465] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2643.903166][T10465] CPU: 0 PID: 10465 Comm: syz-executor.3 Not tainted 5.13.0-rc3-syzkaller #0 [ 2643.912009][T10465] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2643.922344][T10465] Call Trace: [ 2643.925772][T10465] dump_stack+0x137/0x19d [ 2643.930118][T10465] should_fail+0x23c/0x250 [ 2643.934968][T10465] should_fail_usercopy+0x16/0x20 04:44:49 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:49 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2643.940125][T10465] _copy_from_user+0x1c/0xd0 [ 2643.944773][T10465] strndup_user+0xb0/0x120 [ 2643.949247][T10465] perf_uprobe_init+0x45/0x140 [ 2643.954337][T10465] perf_uprobe_event_init+0xde/0x140 [ 2643.959790][T10465] perf_try_init_event+0x21a/0x400 [ 2643.964925][T10465] perf_event_alloc+0xa60/0x1790 [ 2643.969869][T10465] __se_sys_perf_event_open+0x5c7/0x2740 [ 2643.975753][T10465] ? rb_erase+0x4cb/0x750 [ 2643.980102][T10465] __x64_sys_perf_event_open+0x63/0x70 [ 2643.985917][T10465] do_syscall_64+0x4a/0x90 [ 2643.990652][T10465] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2643.996543][T10465] RIP: 0033:0x4665d9 [ 2644.000461][T10465] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2644.020235][T10465] RSP: 002b:00007fe86129e188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2644.028816][T10465] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 04:44:49 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:49 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:49 executing program 3 (fault-call:4 fault-nth:4): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:49 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) unlink(&(0x7f0000000080)='./file0\x00') preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x80, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:49 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0340000200000000000006040000000000000000", 0x39}], 0x1) 04:44:49 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x12, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2644.036967][T10465] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2644.045096][T10465] RBP: 00007fe86129e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2644.053101][T10465] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 2644.061219][T10465] R13: 00007ffe8b2ef00f R14: 00007fe86129e300 R15: 0000000000022000 04:44:49 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5a02}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2644.152834][T10494] FAULT_INJECTION: forcing a failure. [ 2644.152834][T10494] name failslab, interval 1, probability 0, space 0, times 0 [ 2644.165778][T10494] CPU: 1 PID: 10494 Comm: syz-executor.3 Not tainted 5.13.0-rc3-syzkaller #0 [ 2644.174656][T10494] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2644.185336][T10494] Call Trace: [ 2644.188620][T10494] dump_stack+0x137/0x19d [ 2644.192988][T10494] should_fail+0x23c/0x250 [ 2644.197589][T10494] ? getname_kernel+0x37/0x1d0 [ 2644.202381][T10494] __should_failslab+0x81/0x90 [ 2644.207202][T10494] should_failslab+0x5/0x20 [ 2644.211743][T10494] kmem_cache_alloc+0x46/0x2f0 [ 2644.216519][T10494] getname_kernel+0x37/0x1d0 [ 2644.221132][T10494] kern_path+0x19/0x40 [ 2644.225266][T10494] create_local_trace_uprobe+0x3f/0x3c0 [ 2644.230818][T10494] perf_uprobe_init+0xbe/0x140 [ 2644.235890][T10494] perf_uprobe_event_init+0xde/0x140 [ 2644.241182][T10494] perf_try_init_event+0x21a/0x400 [ 2644.246399][T10494] perf_event_alloc+0xa60/0x1790 [ 2644.251539][T10494] __se_sys_perf_event_open+0x5c7/0x2740 [ 2644.257196][T10494] ? vfs_write+0x50c/0x770 [ 2644.261677][T10494] __x64_sys_perf_event_open+0x63/0x70 [ 2644.267143][T10494] do_syscall_64+0x4a/0x90 [ 2644.271568][T10494] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2644.277557][T10494] RIP: 0033:0x4665d9 [ 2644.281655][T10494] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 04:44:50 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0246000200000000000006040000000000000000", 0x39}], 0x1) 04:44:50 executing program 3 (fault-call:4 fault-nth:5): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2644.301855][T10494] RSP: 002b:00007fe86129e188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2644.310377][T10494] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2644.318375][T10494] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2644.326531][T10494] RBP: 00007fe86129e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2644.335472][T10494] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 2644.344725][T10494] R13: 00007ffe8b2ef00f R14: 00007fe86129e300 R15: 0000000000022000 04:44:50 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2644.402617][T10505] FAULT_INJECTION: forcing a failure. [ 2644.402617][T10505] name failslab, interval 1, probability 0, space 0, times 0 [ 2644.415502][T10505] CPU: 1 PID: 10505 Comm: syz-executor.3 Not tainted 5.13.0-rc3-syzkaller #0 [ 2644.424416][T10505] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2644.435233][T10505] Call Trace: [ 2644.438572][T10505] dump_stack+0x137/0x19d [ 2644.442961][T10505] should_fail+0x23c/0x250 [ 2644.447391][T10505] __should_failslab+0x81/0x90 04:44:50 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2644.452346][T10505] ? proc_self_get_link+0x90/0x100 [ 2644.457540][T10505] should_failslab+0x5/0x20 [ 2644.462057][T10505] kmem_cache_alloc_trace+0x49/0x310 [ 2644.467358][T10505] proc_self_get_link+0x90/0x100 [ 2644.472525][T10505] ? proc_setup_self+0x1d0/0x1d0 [ 2644.477586][T10505] step_into+0x9b4/0xec0 [ 2644.481934][T10505] walk_component+0x190/0x350 [ 2644.486715][T10505] link_path_walk+0x4ba/0x780 [ 2644.491447][T10505] path_lookupat+0x7b/0x570 [ 2644.496048][T10505] filename_lookup+0xff/0x390 [ 2644.500820][T10505] ? kmem_cache_alloc+0x201/0x2f0 [ 2644.505866][T10505] ? getname_kernel+0x37/0x1d0 [ 2644.510667][T10505] kern_path+0x2e/0x40 [ 2644.514743][T10505] create_local_trace_uprobe+0x3f/0x3c0 [ 2644.520308][T10505] perf_uprobe_init+0xbe/0x140 [ 2644.525090][T10505] perf_uprobe_event_init+0xde/0x140 [ 2644.530388][T10505] perf_try_init_event+0x21a/0x400 [ 2644.535511][T10505] perf_event_alloc+0xa60/0x1790 [ 2644.540539][T10505] __se_sys_perf_event_open+0x5c7/0x2740 [ 2644.546289][T10505] ? vfs_write+0x50c/0x770 [ 2644.550799][T10505] __x64_sys_perf_event_open+0x63/0x70 [ 2644.556247][T10505] do_syscall_64+0x4a/0x90 [ 2644.560651][T10505] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2644.566789][T10505] RIP: 0033:0x4665d9 [ 2644.570792][T10505] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2644.593679][T10505] RSP: 002b:00007fe86129e188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2644.602551][T10505] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2644.610859][T10505] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2644.618998][T10505] RBP: 00007fe86129e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2644.627081][T10505] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 2644.635317][T10505] R13: 00007ffe8b2ef00f R14: 00007fe86129e300 R15: 0000000000022000 04:44:50 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:50 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7400}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:50 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0247000200000000000006040000000000000000", 0x39}], 0x1) 04:44:50 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x27, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:50 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x1010, r2, 0x1bf1f000) 04:44:50 executing program 3 (fault-call:4 fault-nth:6): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:50 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:50 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff024a000200000000000006040000000000000000", 0x39}], 0x1) [ 2645.008313][T10541] FAULT_INJECTION: forcing a failure. [ 2645.008313][T10541] name failslab, interval 1, probability 0, space 0, times 0 [ 2645.021265][T10541] CPU: 1 PID: 10541 Comm: syz-executor.3 Not tainted 5.13.0-rc3-syzkaller #0 [ 2645.030426][T10541] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2645.040646][T10541] Call Trace: [ 2645.044020][T10541] dump_stack+0x137/0x19d [ 2645.048454][T10541] should_fail+0x23c/0x250 [ 2645.052988][T10541] __should_failslab+0x81/0x90 [ 2645.057888][T10541] ? create_local_trace_uprobe+0xa9/0x3c0 [ 2645.063626][T10541] should_failslab+0x5/0x20 [ 2645.068146][T10541] kmem_cache_alloc_trace+0x49/0x310 [ 2645.073483][T10541] create_local_trace_uprobe+0xa9/0x3c0 [ 2645.079132][T10541] perf_uprobe_init+0xbe/0x140 [ 2645.083991][T10541] perf_uprobe_event_init+0xde/0x140 [ 2645.089404][T10541] perf_try_init_event+0x21a/0x400 [ 2645.094580][T10541] perf_event_alloc+0xa60/0x1790 [ 2645.099524][T10541] __se_sys_perf_event_open+0x5c7/0x2740 [ 2645.105164][T10541] ? vfs_write+0x50c/0x770 [ 2645.109624][T10541] __x64_sys_perf_event_open+0x63/0x70 [ 2645.115089][T10541] do_syscall_64+0x4a/0x90 [ 2645.119542][T10541] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2645.125579][T10541] RIP: 0033:0x4665d9 [ 2645.129742][T10541] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2645.149460][T10541] RSP: 002b:00007fe86129e188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a 04:44:51 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x48, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2645.158409][T10541] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2645.166481][T10541] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2645.174683][T10541] RBP: 00007fe86129e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2645.182933][T10541] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 2645.191168][T10541] R13: 00007ffe8b2ef00f R14: 00007fe86129e300 R15: 0000000000022000 [ 2645.199387][T10541] trace_uprobe: Failed to allocate trace_uprobe.(-12) 04:44:51 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9801}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:51 executing program 3 (fault-call:4 fault-nth:7): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:51 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff024b000200000000000006040000000000000000", 0x39}], 0x1) [ 2645.310973][T10563] FAULT_INJECTION: forcing a failure. [ 2645.310973][T10563] name failslab, interval 1, probability 0, space 0, times 0 [ 2645.323777][T10563] CPU: 0 PID: 10563 Comm: syz-executor.3 Not tainted 5.13.0-rc3-syzkaller #0 [ 2645.332645][T10563] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2645.342745][T10563] Call Trace: [ 2645.346022][T10563] dump_stack+0x137/0x19d [ 2645.350443][T10563] should_fail+0x23c/0x250 [ 2645.354884][T10563] ? kzalloc+0x16/0x20 [ 2645.359131][T10563] __should_failslab+0x81/0x90 [ 2645.363902][T10563] should_failslab+0x5/0x20 [ 2645.368674][T10563] __kmalloc+0x66/0x340 [ 2645.372842][T10563] kzalloc+0x16/0x20 [ 2645.377021][T10563] trace_probe_init+0x41/0x250 [ 2645.381836][T10563] create_local_trace_uprobe+0xd1/0x3c0 [ 2645.387427][T10563] perf_uprobe_init+0xbe/0x140 [ 2645.392458][T10563] perf_uprobe_event_init+0xde/0x140 [ 2645.397916][T10563] perf_try_init_event+0x21a/0x400 [ 2645.403063][T10563] perf_event_alloc+0xa60/0x1790 [ 2645.408034][T10563] __se_sys_perf_event_open+0x5c7/0x2740 [ 2645.413680][T10563] ? vfs_write+0x50c/0x770 [ 2645.418158][T10563] __x64_sys_perf_event_open+0x63/0x70 [ 2645.423674][T10563] do_syscall_64+0x4a/0x90 [ 2645.428176][T10563] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2645.434256][T10563] RIP: 0033:0x4665d9 [ 2645.438232][T10563] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2645.458419][T10563] RSP: 002b:00007fe86129e188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2645.466989][T10563] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2645.474969][T10563] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2645.483467][T10563] RBP: 00007fe86129e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2645.491444][T10563] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 2645.499598][T10563] R13: 00007ffe8b2ef00f R14: 00007fe86129e300 R15: 0000000000022000 [ 2645.507913][T10563] trace_uprobe: Failed to allocate trace_uprobe.(-12) 04:44:51 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a01}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:51 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x4c, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:51 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:51 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0252000200000000000006040000000000000000", 0x39}], 0x1) 04:44:51 executing program 3 (fault-call:4 fault-nth:8): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:51 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000080), &(0x7f00000000c0), 0x2, 0x1) r2 = dup3(r0, r1, 0x0) getsockopt$IP_SET_OP_GET_FNAME(r2, 0x1, 0x53, &(0x7f0000000100)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f0000000140)=0x2c) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x80000001}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) [ 2645.703446][T10580] FAULT_INJECTION: forcing a failure. [ 2645.703446][T10580] name failslab, interval 1, probability 0, space 0, times 0 [ 2645.716141][T10580] CPU: 1 PID: 10580 Comm: syz-executor.3 Not tainted 5.13.0-rc3-syzkaller #0 [ 2645.725003][T10580] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2645.735085][T10580] Call Trace: [ 2645.738412][T10580] dump_stack+0x137/0x19d [ 2645.742912][T10580] should_fail+0x23c/0x250 [ 2645.747354][T10580] ? trace_probe_init+0x1bd/0x250 [ 2645.752432][T10580] __should_failslab+0x81/0x90 [ 2645.757400][T10580] should_failslab+0x5/0x20 [ 2645.761953][T10580] __kmalloc_track_caller+0x64/0x340 [ 2645.767616][T10580] ? __kmalloc+0x23d/0x340 [ 2645.772049][T10580] ? kzalloc+0x16/0x20 [ 2645.776271][T10580] kstrdup+0x31/0x70 [ 2645.780168][T10580] trace_probe_init+0x1bd/0x250 [ 2645.785032][T10580] create_local_trace_uprobe+0xd1/0x3c0 [ 2645.791278][T10580] perf_uprobe_init+0xbe/0x140 [ 2645.796234][T10580] perf_uprobe_event_init+0xde/0x140 [ 2645.801531][T10580] perf_try_init_event+0x21a/0x400 [ 2645.806676][T10580] perf_event_alloc+0xa60/0x1790 [ 2645.811847][T10580] __se_sys_perf_event_open+0x5c7/0x2740 [ 2645.817511][T10580] ? vfs_write+0x50c/0x770 [ 2645.822039][T10580] __x64_sys_perf_event_open+0x63/0x70 [ 2645.827510][T10580] do_syscall_64+0x4a/0x90 [ 2645.832072][T10580] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2645.838122][T10580] RIP: 0033:0x4665d9 [ 2645.842269][T10580] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2645.862149][T10580] RSP: 002b:00007fe86129e188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2645.870592][T10580] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2645.878725][T10580] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2645.886718][T10580] RBP: 00007fe86129e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2645.894699][T10580] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 04:44:51 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0253000200000000000006040000000000000000", 0x39}], 0x1) 04:44:51 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa401}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:51 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x35, 0x0, &(0x7f0000000080)) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000080)="d55a48944a73462c0085801755355f34ec2c4a40f3112d800b044223f85b6d75c01ce8183f1ad084d3dbdf739e3bf923a5f90d4a315e419b3502650b59b8a9b522ef8975c1192becad247fe234163896190a34f98f6cf36731e5bbc17b1939fb6224a4236484be33a27d30a638ae02f1391a07a719d25737e97521e399ee92d0954b20fa94c98921d9ec833ea8a4989aa487d09643a3c3d5b412bd86d690802e05a812047564f5dc0a5c203774d1930c69ff62943d65a451a26850cf6feea3709ea1bb2114f3a39ad3edcb16761532285d736fc9d22fd4d71ce6b61b5f0c79492218d4164566f5a419f7b5c3187f5e0e7925d75452ac33df3598bb5e88ed3419") r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r2, 0x0) bind$inet6(r2, &(0x7f0000000200)={0xa, 0x4e22, 0x7fffffff, @private0={0xfc, 0x0, '\x00', 0x1}, 0x8}, 0x1c) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x9, 0x0, 0x0, 0x0, 0x4, 0x3, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:51 executing program 3 (fault-call:4 fault-nth:9): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2645.902685][T10580] R13: 00007ffe8b2ef00f R14: 00007fe86129e300 R15: 0000000000022000 [ 2645.910734][T10580] trace_uprobe: Failed to allocate trace_uprobe.(-12) 04:44:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x40010, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x2) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r2, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000200)={0x0, "6ef04d6c7759909fc3b98fc25e284a5f"}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r4, 0x0) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r3, 0x50009417, &(0x7f0000001200)={{r4}, 0x0, 0x0, @inherit={0x50, &(0x7f0000002380)=ANY=[@ANYBLOB="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"]}, @subvolid=0x1}) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000452000/0x1000)=nil, 0x1000, 0x0, 0x20010, r3, 0x0) syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee6000/0x4000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) r8 = socket(0x10, 0x803, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r6, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r6, r7, &(0x7f0000000200)=@IORING_OP_SENDMSG={0x9, 0x6, 0x0, r8, 0x0, 0x0, 0x0, 0xdf81f7198edf77e6}, 0x0) syz_io_uring_submit(r5, r7, &(0x7f0000000100)=@IORING_OP_CLOSE={0x13, 0x0, 0x0, r3}, 0x8) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:51 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2646.005206][T10603] FAULT_INJECTION: forcing a failure. [ 2646.005206][T10603] name failslab, interval 1, probability 0, space 0, times 0 [ 2646.018074][T10603] CPU: 0 PID: 10603 Comm: syz-executor.3 Not tainted 5.13.0-rc3-syzkaller #0 [ 2646.026867][T10603] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2646.036947][T10603] Call Trace: [ 2646.040232][T10603] dump_stack+0x137/0x19d [ 2646.044787][T10603] should_fail+0x23c/0x250 [ 2646.049455][T10603] ? trace_probe_init+0x1e1/0x250 [ 2646.054578][T10603] __should_failslab+0x81/0x90 [ 2646.059381][T10603] should_failslab+0x5/0x20 [ 2646.063896][T10603] __kmalloc_track_caller+0x64/0x340 [ 2646.069348][T10603] ? trace_probe_init+0x1bd/0x250 [ 2646.074492][T10603] kstrdup+0x31/0x70 [ 2646.078399][T10603] trace_probe_init+0x1e1/0x250 [ 2646.083264][T10603] create_local_trace_uprobe+0xd1/0x3c0 [ 2646.088838][T10603] perf_uprobe_init+0xbe/0x140 [ 2646.093759][T10603] perf_uprobe_event_init+0xde/0x140 [ 2646.099056][T10603] perf_try_init_event+0x21a/0x400 04:44:51 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x35, 0x0, &(0x7f0000000080)) finit_module(r1, 0xfffffffffffffffc, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f000070e000/0x1000)=nil, 0x1000, 0x8, 0x100010, r2, 0x6) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2646.104292][T10603] perf_event_alloc+0xa60/0x1790 [ 2646.109378][T10603] __se_sys_perf_event_open+0x5c7/0x2740 [ 2646.115023][T10603] ? vfs_write+0x50c/0x770 [ 2646.119551][T10603] __x64_sys_perf_event_open+0x63/0x70 [ 2646.125025][T10603] do_syscall_64+0x4a/0x90 [ 2646.129575][T10603] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2646.135608][T10603] RIP: 0033:0x4665d9 [ 2646.139537][T10603] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2646.160134][T10603] RSP: 002b:00007fe86129e188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2646.169199][T10603] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2646.177262][T10603] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2646.185612][T10603] RBP: 00007fe86129e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2646.193702][T10603] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 04:44:52 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x68, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2646.201969][T10603] R13: 00007ffe8b2ef00f R14: 00007fe86129e300 R15: 0000000000022000 [ 2646.210288][T10603] trace_uprobe: Failed to allocate trace_uprobe.(-12) 04:44:52 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:52 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff07}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:52 executing program 3 (fault-call:4 fault-nth:10): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:52 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0054000200000000000006040000000000000000", 0x39}], 0x1) 04:44:52 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:52 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6b6d3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2646.513494][T10630] FAULT_INJECTION: forcing a failure. [ 2646.513494][T10630] name failslab, interval 1, probability 0, space 0, times 0 [ 2646.526327][T10630] CPU: 0 PID: 10630 Comm: syz-executor.3 Not tainted 5.13.0-rc3-syzkaller #0 [ 2646.535247][T10630] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2646.545335][T10630] Call Trace: [ 2646.548638][T10630] dump_stack+0x137/0x19d [ 2646.553689][T10630] should_fail+0x23c/0x250 04:44:52 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2646.558239][T10630] ? create_local_trace_uprobe+0x235/0x3c0 [ 2646.564151][T10630] __should_failslab+0x81/0x90 [ 2646.569179][T10630] should_failslab+0x5/0x20 [ 2646.573785][T10630] __kmalloc_track_caller+0x64/0x340 [ 2646.579096][T10630] ? kstrdup+0x4c/0x70 [ 2646.583166][T10630] kstrdup+0x31/0x70 [ 2646.587075][T10630] create_local_trace_uprobe+0x235/0x3c0 [ 2646.592894][T10630] perf_uprobe_init+0xbe/0x140 [ 2646.597879][T10630] perf_uprobe_event_init+0xde/0x140 [ 2646.603208][T10630] perf_try_init_event+0x21a/0x400 [ 2646.608360][T10630] perf_event_alloc+0xa60/0x1790 04:44:52 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1b3ae8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2646.613334][T10630] __se_sys_perf_event_open+0x5c7/0x2740 [ 2646.619071][T10630] ? vfs_write+0x50c/0x770 [ 2646.623500][T10630] __x64_sys_perf_event_open+0x63/0x70 [ 2646.629317][T10630] do_syscall_64+0x4a/0x90 [ 2646.633954][T10630] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2646.639996][T10630] RIP: 0033:0x4665d9 [ 2646.643988][T10630] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 04:44:52 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:52 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400001}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2646.663835][T10630] RSP: 002b:00007fe86129e188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2646.672451][T10630] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2646.680736][T10630] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2646.689099][T10630] RBP: 00007fe86129e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2646.697265][T10630] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2646.705338][T10630] R13: 00007ffe8b2ef00f R14: 00007fe86129e300 R15: 0000000000022000 04:44:52 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x4c, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:52 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0256000200000000000006040000000000000000", 0x39}], 0x1) 04:44:52 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:52 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2647.018350][T10677] validate_nla: 52 callbacks suppressed [ 2647.018383][T10677] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2647.044654][T10677] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2647.060214][T10680] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 04:44:52 executing program 3 (fault-call:4 fault-nth:11): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:52 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x74, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:52 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0257000200000000000006040000000000000000", 0x39}], 0x1) 04:44:52 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1004000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:52 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2647.162101][T10696] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2647.172401][T10697] FAULT_INJECTION: forcing a failure. [ 2647.172401][T10697] name failslab, interval 1, probability 0, space 0, times 0 [ 2647.185152][T10697] CPU: 0 PID: 10697 Comm: syz-executor.3 Not tainted 5.13.0-rc3-syzkaller #0 [ 2647.194109][T10697] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 04:44:53 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2647.194600][T10696] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2647.205316][T10697] Call Trace: [ 2647.205329][T10697] dump_stack+0x137/0x19d [ 2647.221449][T10697] should_fail+0x23c/0x250 [ 2647.226300][T10697] ? traceprobe_set_print_fmt+0x45/0xa0 [ 2647.232364][T10697] __should_failslab+0x81/0x90 [ 2647.237649][T10697] should_failslab+0x5/0x20 [ 2647.242442][T10697] __kmalloc+0x66/0x340 [ 2647.246704][T10697] ? __kmalloc_track_caller+0x23b/0x340 [ 2647.252306][T10697] traceprobe_set_print_fmt+0x45/0xa0 04:44:53 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2647.257832][T10697] create_local_trace_uprobe+0x2eb/0x3c0 [ 2647.263620][T10697] perf_uprobe_init+0xbe/0x140 [ 2647.267444][T10706] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2647.268520][T10697] perf_uprobe_event_init+0xde/0x140 [ 2647.268548][T10697] perf_try_init_event+0x21a/0x400 [ 2647.287225][T10697] perf_event_alloc+0xa60/0x1790 [ 2647.292314][T10697] __se_sys_perf_event_open+0x5c7/0x2740 [ 2647.298165][T10697] ? vfs_write+0x50c/0x770 [ 2647.302677][T10697] __x64_sys_perf_event_open+0x63/0x70 [ 2647.308455][T10697] do_syscall_64+0x4a/0x90 04:44:53 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2647.313029][T10697] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2647.319023][T10697] RIP: 0033:0x4665d9 [ 2647.322924][T10697] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2647.342874][T10697] RSP: 002b:00007fe86129e188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2647.351409][T10697] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 04:44:53 executing program 0 (fault-call:1 fault-nth:0): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:53 executing program 3 (fault-call:4 fault-nth:12): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2647.359497][T10697] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2647.367947][T10697] RBP: 00007fe86129e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2647.375981][T10697] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2647.384530][T10697] R13: 00007ffe8b2ef00f R14: 00007fe86129e300 R15: 0000000000022000 [ 2647.478961][T10728] FAULT_INJECTION: forcing a failure. [ 2647.478961][T10728] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2647.492535][T10728] CPU: 0 PID: 10728 Comm: syz-executor.0 Not tainted 5.13.0-rc3-syzkaller #0 [ 2647.501545][T10728] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2647.511991][T10728] Call Trace: [ 2647.515312][T10728] dump_stack+0x137/0x19d [ 2647.519757][T10728] should_fail+0x23c/0x250 [ 2647.524316][T10728] should_fail_usercopy+0x16/0x20 [ 2647.529377][T10728] _copy_from_user+0x1c/0xd0 [ 2647.534159][T10728] perf_copy_attr+0x156/0x650 [ 2647.539222][T10728] __se_sys_perf_event_open+0xb6/0x2740 [ 2647.544963][T10728] ? vfs_write+0x50c/0x770 [ 2647.549587][T10728] __x64_sys_perf_event_open+0x63/0x70 [ 2647.555146][T10728] do_syscall_64+0x4a/0x90 [ 2647.559860][T10728] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2647.566038][T10728] RIP: 0033:0x4665d9 [ 2647.570031][T10728] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2647.590983][T10728] RSP: 002b:00007fc55cf8b188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2647.599545][T10728] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2647.607572][T10728] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2647.615920][T10728] RBP: 00007fc55cf8b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2647.624015][T10728] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 2647.632318][T10728] R13: 00007fffb6e0760f R14: 00007fc55cf8b300 R15: 0000000000022000 [ 2647.812688][T10729] FAULT_INJECTION: forcing a failure. [ 2647.812688][T10729] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2647.826719][T10729] CPU: 1 PID: 10729 Comm: syz-executor.3 Not tainted 5.13.0-rc3-syzkaller #0 [ 2647.836016][T10729] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2647.847842][T10729] Call Trace: [ 2647.851125][T10729] dump_stack+0x137/0x19d [ 2647.855681][T10729] should_fail+0x23c/0x250 [ 2647.860812][T10729] __alloc_pages+0x102/0x320 [ 2647.865394][T10729] probe_event_enable+0x421/0x7d0 [ 2647.870608][T10729] ? __uprobe_trace_func+0x430/0x430 [ 2647.875882][T10729] trace_uprobe_register+0x88/0x410 [ 2647.881211][T10729] perf_trace_event_init+0x34e/0x790 [ 2647.886769][T10729] perf_uprobe_init+0xf5/0x140 [ 2647.891521][T10729] perf_uprobe_event_init+0xde/0x140 [ 2647.897155][T10729] perf_try_init_event+0x21a/0x400 [ 2647.902377][T10729] perf_event_alloc+0xa60/0x1790 [ 2647.907685][T10729] __se_sys_perf_event_open+0x5c7/0x2740 [ 2647.913910][T10729] ? vfs_write+0x50c/0x770 [ 2647.918323][T10729] __x64_sys_perf_event_open+0x63/0x70 [ 2647.923873][T10729] do_syscall_64+0x4a/0x90 [ 2647.928279][T10729] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2647.935320][T10729] RIP: 0033:0x4665d9 [ 2647.939865][T10729] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 04:44:53 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:53 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:53 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff025a000200000000000006040000000000000000", 0x39}], 0x1) 04:44:53 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:53 executing program 0 (fault-call:1 fault-nth:1): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:53 executing program 3 (fault-call:4 fault-nth:13): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2647.960331][T10729] RSP: 002b:00007fe86129e188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2647.968837][T10729] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2647.977239][T10729] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2647.985754][T10729] RBP: 00007fe86129e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2647.993932][T10729] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2648.002072][T10729] R13: 00007ffe8b2ef00f R14: 00007fe86129e300 R15: 0000000000022000 [ 2648.042691][T10735] FAULT_INJECTION: forcing a failure. [ 2648.042691][T10735] name failslab, interval 1, probability 0, space 0, times 0 [ 2648.055975][T10735] CPU: 0 PID: 10735 Comm: syz-executor.0 Not tainted 5.13.0-rc3-syzkaller #0 [ 2648.064891][T10735] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2648.075493][T10735] Call Trace: [ 2648.078811][T10735] dump_stack+0x137/0x19d [ 2648.083342][T10735] should_fail+0x23c/0x250 [ 2648.083387][T10743] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2648.087801][T10735] __should_failslab+0x81/0x90 [ 2648.097958][T10743] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2648.100815][T10735] should_failslab+0x5/0x20 [ 2648.113716][T10735] kmem_cache_alloc_node+0x58/0x2b0 [ 2648.119037][T10735] ? cred_has_capability+0x1af/0x210 [ 2648.124375][T10735] ? perf_event_alloc+0x160/0x1790 [ 2648.127013][T10746] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2648.129607][T10735] perf_event_alloc+0x160/0x1790 04:44:53 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6010000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:53 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2648.143060][T10735] __se_sys_perf_event_open+0x5c7/0x2740 [ 2648.149297][T10735] ? vfs_write+0x50c/0x770 [ 2648.153882][T10735] __x64_sys_perf_event_open+0x63/0x70 [ 2648.159440][T10735] do_syscall_64+0x4a/0x90 [ 2648.164185][T10735] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2648.170538][T10735] RIP: 0033:0x4665d9 04:44:54 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2648.174562][T10735] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2648.194939][T10735] RSP: 002b:00007fc55cf8b188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2648.203721][T10735] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2648.212113][T10735] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2648.220297][T10735] RBP: 00007fc55cf8b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2648.228711][T10735] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 04:44:54 executing program 0 (fault-call:1 fault-nth:2): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:54 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff025b000200000000000006040000000000000000", 0x39}], 0x1) 04:44:54 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2648.236984][T10735] R13: 00007fffb6e0760f R14: 00007fc55cf8b300 R15: 0000000000022000 [ 2648.324751][T10768] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2648.327476][T10742] FAULT_INJECTION: forcing a failure. [ 2648.327476][T10742] name failslab, interval 1, probability 0, space 0, times 0 [ 2648.346292][T10742] CPU: 1 PID: 10742 Comm: syz-executor.3 Not tainted 5.13.0-rc3-syzkaller #0 [ 2648.355120][T10742] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2648.364622][T10772] FAULT_INJECTION: forcing a failure. [ 2648.364622][T10772] name failslab, interval 1, probability 0, space 0, times 0 [ 2648.365198][T10742] Call Trace: [ 2648.365209][T10742] dump_stack+0x137/0x19d [ 2648.386000][T10742] should_fail+0x23c/0x250 [ 2648.390512][T10742] __should_failslab+0x81/0x90 [ 2648.395367][T10742] ? register_for_each_vma+0x372/0x890 [ 2648.400834][T10742] should_failslab+0x5/0x20 [ 2648.405631][T10742] kmem_cache_alloc_trace+0x49/0x310 [ 2648.411053][T10742] ? percpu_down_write+0x1ed/0x220 [ 2648.416193][T10742] register_for_each_vma+0x372/0x890 [ 2648.421618][T10742] __uprobe_register+0x3f4/0x8a0 [ 2648.426756][T10742] uprobe_register_refctr+0x29/0x40 [ 2648.431983][T10742] probe_event_enable+0x2be/0x7d0 [ 2648.437287][T10742] ? __uprobe_trace_func+0x430/0x430 [ 2648.443211][T10742] trace_uprobe_register+0x88/0x410 [ 2648.448773][T10742] perf_trace_event_init+0x34e/0x790 [ 2648.454073][T10742] perf_uprobe_init+0xf5/0x140 [ 2648.459139][T10742] perf_uprobe_event_init+0xde/0x140 [ 2648.464433][T10742] perf_try_init_event+0x21a/0x400 [ 2648.469738][T10742] perf_event_alloc+0xa60/0x1790 [ 2648.474754][T10742] __se_sys_perf_event_open+0x5c7/0x2740 [ 2648.480487][T10742] ? vfs_write+0x50c/0x770 [ 2648.484985][T10742] __x64_sys_perf_event_open+0x63/0x70 [ 2648.490443][T10742] do_syscall_64+0x4a/0x90 [ 2648.494861][T10742] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2648.500830][T10742] RIP: 0033:0x4665d9 [ 2648.504724][T10742] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2648.524606][T10742] RSP: 002b:00007fe86129e188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2648.533175][T10742] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2648.541198][T10742] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2648.549305][T10742] RBP: 00007fe86129e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2648.557308][T10742] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2648.565354][T10742] R13: 00007ffe8b2ef00f R14: 00007fe86129e300 R15: 0000000000022000 [ 2648.573423][T10772] CPU: 0 PID: 10772 Comm: syz-executor.0 Not tainted 5.13.0-rc3-syzkaller #0 [ 2648.582310][T10772] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2648.592695][T10772] Call Trace: [ 2648.595974][T10772] dump_stack+0x137/0x19d [ 2648.600458][T10772] should_fail+0x23c/0x250 [ 2648.605005][T10772] ? perf_uprobe_init+0x45/0x140 [ 2648.610057][T10772] __should_failslab+0x81/0x90 [ 2648.614848][T10772] should_failslab+0x5/0x20 [ 2648.619528][T10772] __kmalloc_track_caller+0x64/0x340 [ 2648.624912][T10772] ? strnlen_user+0x137/0x1c0 [ 2648.629674][T10772] strndup_user+0x73/0x120 [ 2648.634096][T10772] perf_uprobe_init+0x45/0x140 [ 2648.638927][T10772] perf_uprobe_event_init+0xde/0x140 [ 2648.644289][T10772] perf_try_init_event+0x21a/0x400 [ 2648.649606][T10772] perf_event_alloc+0xa60/0x1790 [ 2648.654673][T10772] __se_sys_perf_event_open+0x5c7/0x2740 [ 2648.660315][T10772] ? vfs_write+0x50c/0x770 [ 2648.664855][T10772] __x64_sys_perf_event_open+0x63/0x70 [ 2648.670406][T10772] do_syscall_64+0x4a/0x90 [ 2648.674910][T10772] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2648.680904][T10772] RIP: 0033:0x4665d9 [ 2648.684878][T10772] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2648.704838][T10772] RSP: 002b:00007fc55cf8b188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2648.713351][T10772] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2648.721325][T10772] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2648.729410][T10772] RBP: 00007fc55cf8b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2648.737394][T10772] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 2648.745456][T10772] R13: 00007fffb6e0760f R14: 00007fc55cf8b300 R15: 0000000000022000 04:44:54 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:54 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0xc0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:54 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:54 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff025c000200000000000006040000000000000000", 0x39}], 0x1) 04:44:54 executing program 0 (fault-call:1 fault-nth:3): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:54 executing program 3 (fault-call:4 fault-nth:14): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:54 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2649.044719][T10796] FAULT_INJECTION: forcing a failure. [ 2649.044719][T10796] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2649.057948][T10796] CPU: 1 PID: 10796 Comm: syz-executor.0 Not tainted 5.13.0-rc3-syzkaller #0 [ 2649.066977][T10796] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2649.077071][T10796] Call Trace: [ 2649.080374][T10796] dump_stack+0x137/0x19d [ 2649.084727][T10796] should_fail+0x23c/0x250 [ 2649.089233][T10796] should_fail_usercopy+0x16/0x20 [ 2649.094378][T10796] _copy_from_user+0x1c/0xd0 [ 2649.098973][T10796] strndup_user+0xb0/0x120 [ 2649.103387][T10796] perf_uprobe_init+0x45/0x140 [ 2649.108152][T10796] perf_uprobe_event_init+0xde/0x140 [ 2649.113614][T10796] perf_try_init_event+0x21a/0x400 [ 2649.118902][T10796] perf_event_alloc+0xa60/0x1790 [ 2649.123855][T10796] __se_sys_perf_event_open+0x5c7/0x2740 [ 2649.129611][T10796] ? vfs_write+0x50c/0x770 [ 2649.134033][T10796] __x64_sys_perf_event_open+0x63/0x70 [ 2649.139655][T10796] do_syscall_64+0x4a/0x90 [ 2649.144123][T10796] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2649.150033][T10796] RIP: 0033:0x4665d9 [ 2649.153927][T10796] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2649.173544][T10796] RSP: 002b:00007fc55cf8b188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2649.182089][T10796] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 04:44:55 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2649.190164][T10796] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2649.198146][T10796] RBP: 00007fc55cf8b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2649.206146][T10796] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 2649.214158][T10796] R13: 00007fffb6e0760f R14: 00007fc55cf8b300 R15: 0000000000022000 [ 2649.231017][T10795] FAULT_INJECTION: forcing a failure. [ 2649.231017][T10795] name failslab, interval 1, probability 0, space 0, times 0 04:44:55 executing program 0 (fault-call:1 fault-nth:4): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2649.243802][T10795] CPU: 1 PID: 10795 Comm: syz-executor.3 Not tainted 5.13.0-rc3-syzkaller #0 [ 2649.252704][T10795] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2649.262894][T10795] Call Trace: [ 2649.266227][T10795] dump_stack+0x137/0x19d [ 2649.270735][T10795] should_fail+0x23c/0x250 [ 2649.275192][T10795] __should_failslab+0x81/0x90 [ 2649.280237][T10795] ? __uprobe_register+0xf8/0x8a0 [ 2649.285392][T10795] should_failslab+0x5/0x20 [ 2649.289905][T10795] kmem_cache_alloc_trace+0x49/0x310 04:44:55 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0xff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2649.295400][T10795] ? get_page_from_freelist+0x53e/0x800 [ 2649.301055][T10795] __uprobe_register+0xf8/0x8a0 [ 2649.305976][T10795] ? __alloc_pages+0x194/0x320 [ 2649.310783][T10795] uprobe_register_refctr+0x29/0x40 [ 2649.310968][T10813] FAULT_INJECTION: forcing a failure. [ 2649.310968][T10813] name failslab, interval 1, probability 0, space 0, times 0 [ 2649.316103][T10795] probe_event_enable+0x2be/0x7d0 [ 2649.316140][T10795] ? __uprobe_trace_func+0x430/0x430 [ 2649.339268][T10795] trace_uprobe_register+0x88/0x410 [ 2649.344730][T10795] perf_trace_event_init+0x34e/0x790 [ 2649.350031][T10795] perf_uprobe_init+0xf5/0x140 [ 2649.354846][T10795] perf_uprobe_event_init+0xde/0x140 [ 2649.360250][T10795] perf_try_init_event+0x21a/0x400 [ 2649.365372][T10795] perf_event_alloc+0xa60/0x1790 [ 2649.370991][T10795] __se_sys_perf_event_open+0x5c7/0x2740 [ 2649.376920][T10795] ? vfs_write+0x50c/0x770 [ 2649.381348][T10795] __x64_sys_perf_event_open+0x63/0x70 [ 2649.386959][T10795] do_syscall_64+0x4a/0x90 [ 2649.391533][T10795] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2649.397440][T10795] RIP: 0033:0x4665d9 [ 2649.401337][T10795] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2649.421037][T10795] RSP: 002b:00007fe86129e188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2649.429517][T10795] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2649.437654][T10795] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2649.445768][T10795] RBP: 00007fe86129e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2649.453917][T10795] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2649.461944][T10795] R13: 00007ffe8b2ef00f R14: 00007fe86129e300 R15: 0000000000022000 [ 2649.469947][T10813] CPU: 0 PID: 10813 Comm: syz-executor.0 Not tainted 5.13.0-rc3-syzkaller #0 [ 2649.478773][T10813] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2649.488836][T10813] Call Trace: [ 2649.492317][T10813] dump_stack+0x137/0x19d [ 2649.496811][T10813] should_fail+0x23c/0x250 [ 2649.501323][T10813] ? getname_kernel+0x37/0x1d0 [ 2649.506094][T10813] __should_failslab+0x81/0x90 [ 2649.510875][T10813] should_failslab+0x5/0x20 [ 2649.515427][T10813] kmem_cache_alloc+0x46/0x2f0 [ 2649.520207][T10813] getname_kernel+0x37/0x1d0 [ 2649.524799][T10813] kern_path+0x19/0x40 [ 2649.528869][T10813] create_local_trace_uprobe+0x3f/0x3c0 [ 2649.534532][T10813] perf_uprobe_init+0xbe/0x140 [ 2649.539336][T10813] perf_uprobe_event_init+0xde/0x140 [ 2649.544719][T10813] perf_try_init_event+0x21a/0x400 [ 2649.549837][T10813] perf_event_alloc+0xa60/0x1790 [ 2649.554867][T10813] __se_sys_perf_event_open+0x5c7/0x2740 [ 2649.560779][T10813] ? vfs_write+0x50c/0x770 [ 2649.565292][T10813] __x64_sys_perf_event_open+0x63/0x70 [ 2649.570755][T10813] do_syscall_64+0x4a/0x90 [ 2649.575296][T10813] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2649.581322][T10813] RIP: 0033:0x4665d9 [ 2649.585219][T10813] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2649.604945][T10813] RSP: 002b:00007fc55cf8b188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2649.613551][T10813] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2649.621719][T10813] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2649.629991][T10813] RBP: 00007fc55cf8b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2649.638070][T10813] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 04:44:55 executing program 3 (fault-call:4 fault-nth:15): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:55 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2649.646501][T10813] R13: 00007fffb6e0760f R14: 00007fc55cf8b300 R15: 0000000000022000 [ 2649.866451][T10824] FAULT_INJECTION: forcing a failure. [ 2649.866451][T10824] name failslab, interval 1, probability 0, space 0, times 0 [ 2649.879298][T10824] CPU: 0 PID: 10824 Comm: syz-executor.3 Not tainted 5.13.0-rc3-syzkaller #0 [ 2649.888099][T10824] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2649.898354][T10824] Call Trace: [ 2649.901633][T10824] dump_stack+0x137/0x19d [ 2649.905968][T10824] should_fail+0x23c/0x250 [ 2649.910664][T10824] __should_failslab+0x81/0x90 [ 2649.915925][T10824] ? register_for_each_vma+0x372/0x890 [ 2649.921723][T10824] should_failslab+0x5/0x20 [ 2649.926240][T10824] kmem_cache_alloc_trace+0x49/0x310 [ 2649.931564][T10824] ? percpu_down_write+0x1ed/0x220 [ 2649.936781][T10824] register_for_each_vma+0x372/0x890 [ 2649.942151][T10824] __uprobe_register+0x3f4/0x8a0 [ 2649.947219][T10824] uprobe_register_refctr+0x29/0x40 [ 2649.952717][T10824] probe_event_enable+0x2be/0x7d0 [ 2649.958155][T10824] ? __uprobe_trace_func+0x430/0x430 [ 2649.963607][T10824] trace_uprobe_register+0x88/0x410 [ 2649.968795][T10824] perf_trace_event_init+0x34e/0x790 [ 2649.974289][T10824] perf_uprobe_init+0xf5/0x140 [ 2649.979132][T10824] perf_uprobe_event_init+0xde/0x140 [ 2649.984485][T10824] perf_try_init_event+0x21a/0x400 [ 2649.989742][T10824] perf_event_alloc+0xa60/0x1790 [ 2649.994683][T10824] __se_sys_perf_event_open+0x5c7/0x2740 [ 2650.000329][T10824] ? vfs_write+0x50c/0x770 [ 2650.004768][T10824] __x64_sys_perf_event_open+0x63/0x70 [ 2650.010321][T10824] do_syscall_64+0x4a/0x90 [ 2650.014759][T10824] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2650.020677][T10824] RIP: 0033:0x4665d9 [ 2650.024944][T10824] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2650.044937][T10824] RSP: 002b:00007fe86129e188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2650.053908][T10824] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2650.062235][T10824] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2650.070252][T10824] RBP: 00007fe86129e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2650.078473][T10824] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2650.086536][T10824] R13: 00007ffe8b2ef00f R14: 00007fe86129e300 R15: 0000000000022000 04:44:55 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:55 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff025d000200000000000006040000000000000000", 0x39}], 0x1) 04:44:55 executing program 0 (fault-call:1 fault-nth:5): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:55 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:55 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2650.222758][T10836] FAULT_INJECTION: forcing a failure. [ 2650.222758][T10836] name failslab, interval 1, probability 0, space 0, times 0 [ 2650.235598][T10836] CPU: 1 PID: 10836 Comm: syz-executor.0 Not tainted 5.13.0-rc3-syzkaller #0 [ 2650.244463][T10836] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2650.254692][T10836] Call Trace: [ 2650.258071][T10836] dump_stack+0x137/0x19d [ 2650.262411][T10836] should_fail+0x23c/0x250 [ 2650.266832][T10836] __should_failslab+0x81/0x90 [ 2650.271629][T10836] ? proc_self_get_link+0x90/0x100 [ 2650.276744][T10836] should_failslab+0x5/0x20 [ 2650.281252][T10836] kmem_cache_alloc_trace+0x49/0x310 [ 2650.287849][T10836] proc_self_get_link+0x90/0x100 [ 2650.292786][T10836] ? proc_setup_self+0x1d0/0x1d0 [ 2650.297826][T10836] step_into+0x9b4/0xec0 [ 2650.302078][T10836] walk_component+0x190/0x350 [ 2650.306785][T10836] link_path_walk+0x4ba/0x780 [ 2650.311733][T10836] path_lookupat+0x7b/0x570 [ 2650.316281][T10836] filename_lookup+0xff/0x390 [ 2650.321158][T10836] ? kmem_cache_alloc+0x201/0x2f0 [ 2650.326190][T10836] ? getname_kernel+0x37/0x1d0 [ 2650.331046][T10836] kern_path+0x2e/0x40 [ 2650.335176][T10836] create_local_trace_uprobe+0x3f/0x3c0 [ 2650.340850][T10836] perf_uprobe_init+0xbe/0x140 [ 2650.345629][T10836] perf_uprobe_event_init+0xde/0x140 [ 2650.350976][T10836] perf_try_init_event+0x21a/0x400 [ 2650.356092][T10836] perf_event_alloc+0xa60/0x1790 [ 2650.361055][T10836] __se_sys_perf_event_open+0x5c7/0x2740 [ 2650.366702][T10836] ? vfs_write+0x50c/0x770 [ 2650.371209][T10836] __x64_sys_perf_event_open+0x63/0x70 [ 2650.376693][T10836] do_syscall_64+0x4a/0x90 [ 2650.381195][T10836] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2650.387360][T10836] RIP: 0033:0x4665d9 [ 2650.391380][T10836] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2650.411360][T10836] RSP: 002b:00007fc55cf8b188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a 04:44:56 executing program 3 (fault-call:4 fault-nth:16): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:56 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0262000200000000000006040000000000000000", 0x39}], 0x1) 04:44:56 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:56 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0263000200000000000006040000000000000000", 0x39}], 0x1) [ 2650.419904][T10836] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2650.427886][T10836] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2650.435860][T10836] RBP: 00007fc55cf8b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2650.443923][T10836] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 2650.451901][T10836] R13: 00007fffb6e0760f R14: 00007fc55cf8b300 R15: 0000000000022000 04:44:56 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x2, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:56 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0264000200000000000006040000000000000000", 0x39}], 0x1) 04:44:56 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2650.713593][T10843] FAULT_INJECTION: forcing a failure. [ 2650.713593][T10843] name failslab, interval 1, probability 0, space 0, times 0 [ 2650.726773][T10843] CPU: 0 PID: 10843 Comm: syz-executor.3 Not tainted 5.13.0-rc3-syzkaller #0 [ 2650.735782][T10843] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2650.745864][T10843] Call Trace: [ 2650.749192][T10843] dump_stack+0x137/0x19d [ 2650.753584][T10843] should_fail+0x23c/0x250 [ 2650.758009][T10843] __should_failslab+0x81/0x90 [ 2650.763252][T10843] ? register_for_each_vma+0x372/0x890 [ 2650.768908][T10843] should_failslab+0x5/0x20 [ 2650.773629][T10843] kmem_cache_alloc_trace+0x49/0x310 [ 2650.779180][T10843] ? register_for_each_vma+0x372/0x890 [ 2650.784760][T10843] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2650.790806][T10843] register_for_each_vma+0x372/0x890 [ 2650.796203][T10843] __uprobe_register+0x3f4/0x8a0 [ 2650.801148][T10843] uprobe_register_refctr+0x29/0x40 [ 2650.806484][T10843] probe_event_enable+0x2be/0x7d0 [ 2650.811797][T10843] ? __uprobe_trace_func+0x430/0x430 [ 2650.817089][T10843] trace_uprobe_register+0x88/0x410 [ 2650.822639][T10843] perf_trace_event_init+0x34e/0x790 [ 2650.827915][T10843] perf_uprobe_init+0xf5/0x140 [ 2650.832743][T10843] perf_uprobe_event_init+0xde/0x140 [ 2650.838182][T10843] perf_try_init_event+0x21a/0x400 [ 2650.843287][T10843] perf_event_alloc+0xa60/0x1790 [ 2650.848381][T10843] __se_sys_perf_event_open+0x5c7/0x2740 [ 2650.854008][T10843] ? vfs_write+0x50c/0x770 [ 2650.858433][T10843] __x64_sys_perf_event_open+0x63/0x70 [ 2650.863900][T10843] do_syscall_64+0x4a/0x90 [ 2650.868320][T10843] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2650.874236][T10843] RIP: 0033:0x4665d9 [ 2650.878349][T10843] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2650.898174][T10843] RSP: 002b:00007fe86129e188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2650.906579][T10843] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2650.915094][T10843] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2650.923523][T10843] RBP: 00007fe86129e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2650.931874][T10843] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2650.940388][T10843] R13: 00007ffe8b2ef00f R14: 00007fe86129e300 R15: 0000000000022000 04:44:56 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:56 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0265000200000000000006040000000000000000", 0x39}], 0x1) 04:44:56 executing program 0 (fault-call:1 fault-nth:6): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:56 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:56 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:56 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0280000200000000000006040000000000000000", 0x39}], 0x1) 04:44:56 executing program 3 (fault-call:4 fault-nth:17): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2651.140754][T10894] FAULT_INJECTION: forcing a failure. [ 2651.140754][T10894] name failslab, interval 1, probability 0, space 0, times 0 [ 2651.153630][T10894] CPU: 0 PID: 10894 Comm: syz-executor.0 Not tainted 5.13.0-rc3-syzkaller #0 [ 2651.162935][T10894] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2651.173648][T10894] Call Trace: [ 2651.177115][T10894] dump_stack+0x137/0x19d [ 2651.181642][T10894] should_fail+0x23c/0x250 [ 2651.186273][T10894] __should_failslab+0x81/0x90 [ 2651.191216][T10894] ? create_local_trace_uprobe+0xa9/0x3c0 [ 2651.197336][T10894] should_failslab+0x5/0x20 [ 2651.202045][T10894] kmem_cache_alloc_trace+0x49/0x310 [ 2651.207561][T10894] create_local_trace_uprobe+0xa9/0x3c0 [ 2651.213261][T10894] perf_uprobe_init+0xbe/0x140 [ 2651.218037][T10894] perf_uprobe_event_init+0xde/0x140 [ 2651.223506][T10894] perf_try_init_event+0x21a/0x400 [ 2651.228668][T10894] perf_event_alloc+0xa60/0x1790 [ 2651.233607][T10894] __se_sys_perf_event_open+0x5c7/0x2740 [ 2651.239340][T10894] ? vfs_write+0x50c/0x770 [ 2651.243896][T10894] __x64_sys_perf_event_open+0x63/0x70 [ 2651.249535][T10894] do_syscall_64+0x4a/0x90 [ 2651.254128][T10894] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2651.260142][T10894] RIP: 0033:0x4665d9 [ 2651.264214][T10894] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2651.284431][T10894] RSP: 002b:00007fc55cf8b188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2651.293550][T10894] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2651.301668][T10894] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2651.309903][T10894] RBP: 00007fc55cf8b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2651.318662][T10894] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 2651.327183][T10894] R13: 00007fffb6e0760f R14: 00007fc55cf8b300 R15: 0000000000022000 04:44:57 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x26020000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:57 executing program 0 (fault-call:1 fault-nth:7): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:57 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0380000200000000000006040000000000000000", 0x39}], 0x1) [ 2651.335661][T10894] trace_uprobe: Failed to allocate trace_uprobe.(-12) [ 2651.390724][T10902] FAULT_INJECTION: forcing a failure. [ 2651.390724][T10902] name failslab, interval 1, probability 0, space 0, times 0 [ 2651.395473][T10896] FAULT_INJECTION: forcing a failure. [ 2651.395473][T10896] name failslab, interval 1, probability 0, space 0, times 0 [ 2651.403893][T10902] CPU: 1 PID: 10902 Comm: syz-executor.0 Not tainted 5.13.0-rc3-syzkaller #0 [ 2651.426201][T10902] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2651.436261][T10902] Call Trace: [ 2651.440236][T10902] dump_stack+0x137/0x19d [ 2651.444577][T10902] should_fail+0x23c/0x250 [ 2651.449188][T10902] ? kzalloc+0x16/0x20 [ 2651.453520][T10902] __should_failslab+0x81/0x90 [ 2651.458469][T10902] should_failslab+0x5/0x20 [ 2651.462968][T10902] __kmalloc+0x66/0x340 [ 2651.467253][T10902] kzalloc+0x16/0x20 [ 2651.471153][T10902] trace_probe_init+0x41/0x250 [ 2651.476086][T10902] create_local_trace_uprobe+0xd1/0x3c0 [ 2651.481748][T10902] perf_uprobe_init+0xbe/0x140 [ 2651.486691][T10902] perf_uprobe_event_init+0xde/0x140 [ 2651.492089][T10902] perf_try_init_event+0x21a/0x400 [ 2651.497381][T10902] perf_event_alloc+0xa60/0x1790 [ 2651.502382][T10902] __se_sys_perf_event_open+0x5c7/0x2740 [ 2651.508016][T10902] ? vfs_write+0x50c/0x770 [ 2651.512733][T10902] __x64_sys_perf_event_open+0x63/0x70 [ 2651.518280][T10902] do_syscall_64+0x4a/0x90 [ 2651.522703][T10902] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2651.528668][T10902] RIP: 0033:0x4665d9 [ 2651.532610][T10902] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2651.552850][T10902] RSP: 002b:00007fc55cf8b188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2651.561265][T10902] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2651.569389][T10902] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2651.577362][T10902] RBP: 00007fc55cf8b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2651.585347][T10902] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 2651.593372][T10902] R13: 00007fffb6e0760f R14: 00007fc55cf8b300 R15: 0000000000022000 [ 2651.601453][T10896] CPU: 0 PID: 10896 Comm: syz-executor.3 Not tainted 5.13.0-rc3-syzkaller #0 [ 2651.601532][T10902] trace_uprobe: Failed to allocate trace_uprobe.(-12) [ 2651.610319][T10896] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2651.610333][T10896] Call Trace: [ 2651.610340][T10896] dump_stack+0x137/0x19d [ 2651.634965][T10896] should_fail+0x23c/0x250 04:44:57 executing program 0 (fault-call:1 fault-nth:8): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2651.639599][T10896] __should_failslab+0x81/0x90 [ 2651.644750][T10896] ? register_for_each_vma+0x372/0x890 [ 2651.650349][T10896] should_failslab+0x5/0x20 [ 2651.655285][T10896] kmem_cache_alloc_trace+0x49/0x310 [ 2651.660967][T10896] ? register_for_each_vma+0x372/0x890 [ 2651.666428][T10896] ? vma_interval_tree_iter_next+0x263/0x280 [ 2651.672441][T10896] register_for_each_vma+0x372/0x890 [ 2651.677789][T10896] __uprobe_register+0x3f4/0x8a0 [ 2651.682769][T10896] uprobe_register_refctr+0x29/0x40 [ 2651.688569][T10896] probe_event_enable+0x2be/0x7d0 [ 2651.693587][T10896] ? __uprobe_trace_func+0x430/0x430 [ 2651.698871][T10896] trace_uprobe_register+0x88/0x410 [ 2651.704260][T10896] perf_trace_event_init+0x34e/0x790 [ 2651.709783][T10896] perf_uprobe_init+0xf5/0x140 [ 2651.714656][T10896] perf_uprobe_event_init+0xde/0x140 [ 2651.719949][T10896] perf_try_init_event+0x21a/0x400 [ 2651.725243][T10896] perf_event_alloc+0xa60/0x1790 [ 2651.730281][T10896] __se_sys_perf_event_open+0x5c7/0x2740 [ 2651.735936][T10896] ? vfs_write+0x50c/0x770 [ 2651.740928][T10896] __x64_sys_perf_event_open+0x63/0x70 [ 2651.746572][T10896] do_syscall_64+0x4a/0x90 [ 2651.751099][T10896] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2651.757584][T10896] RIP: 0033:0x4665d9 [ 2651.761477][T10896] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2651.781076][T10896] RSP: 002b:00007fe86129e188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a 04:44:57 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff01ac000200000000000006040000000000000000", 0x39}], 0x1) [ 2651.789578][T10896] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2651.797551][T10896] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2651.805578][T10896] RBP: 00007fe86129e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2651.813653][T10896] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2651.821632][T10896] R13: 00007ffe8b2ef00f R14: 00007fe86129e300 R15: 0000000000022000 [ 2651.885805][T10917] FAULT_INJECTION: forcing a failure. [ 2651.885805][T10917] name failslab, interval 1, probability 0, space 0, times 0 [ 2651.898548][T10917] CPU: 0 PID: 10917 Comm: syz-executor.0 Not tainted 5.13.0-rc3-syzkaller #0 [ 2651.907340][T10917] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2651.917501][T10917] Call Trace: [ 2651.920780][T10917] dump_stack+0x137/0x19d [ 2651.925211][T10917] should_fail+0x23c/0x250 [ 2651.929687][T10917] ? trace_probe_init+0x1bd/0x250 [ 2651.934734][T10917] __should_failslab+0x81/0x90 [ 2651.939512][T10917] should_failslab+0x5/0x20 [ 2651.944015][T10917] __kmalloc_track_caller+0x64/0x340 [ 2651.949368][T10917] ? __kmalloc+0x23d/0x340 [ 2651.953868][T10917] ? kzalloc+0x16/0x20 [ 2651.957941][T10917] kstrdup+0x31/0x70 [ 2651.961850][T10917] trace_probe_init+0x1bd/0x250 [ 2651.966712][T10917] create_local_trace_uprobe+0xd1/0x3c0 [ 2651.972816][T10917] perf_uprobe_init+0xbe/0x140 [ 2651.977631][T10917] perf_uprobe_event_init+0xde/0x140 [ 2651.982925][T10917] perf_try_init_event+0x21a/0x400 [ 2651.988237][T10917] perf_event_alloc+0xa60/0x1790 [ 2651.993202][T10917] __se_sys_perf_event_open+0x5c7/0x2740 [ 2651.998917][T10917] ? vfs_write+0x50c/0x770 [ 2652.003355][T10917] __x64_sys_perf_event_open+0x63/0x70 [ 2652.009042][T10917] do_syscall_64+0x4a/0x90 [ 2652.013470][T10917] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2652.019386][T10917] RIP: 0033:0x4665d9 [ 2652.023297][T10917] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2652.043413][T10917] RSP: 002b:00007fc55cf8b188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2652.051846][T10917] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2652.059911][T10917] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2652.067894][T10917] RBP: 00007fc55cf8b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2652.075887][T10917] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 2652.083986][T10917] R13: 00007fffb6e0760f R14: 00007fc55cf8b300 R15: 0000000000022000 [ 2652.092146][T10917] trace_uprobe: Failed to allocate trace_uprobe.(-12) 04:44:58 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:58 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:58 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:58 executing program 0 (fault-call:1 fault-nth:9): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:58 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff01b2000200000000000006040000000000000000", 0x39}], 0x1) 04:44:58 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2652.325370][T10931] FAULT_INJECTION: forcing a failure. [ 2652.325370][T10931] name failslab, interval 1, probability 0, space 0, times 0 [ 2652.338039][T10931] CPU: 1 PID: 10931 Comm: syz-executor.0 Not tainted 5.13.0-rc3-syzkaller #0 [ 2652.346818][T10931] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2652.357009][T10931] Call Trace: [ 2652.360407][T10931] dump_stack+0x137/0x19d [ 2652.364778][T10931] should_fail+0x23c/0x250 [ 2652.369270][T10931] ? trace_probe_init+0x1e1/0x250 [ 2652.374310][T10931] __should_failslab+0x81/0x90 [ 2652.379388][T10931] should_failslab+0x5/0x20 [ 2652.383996][T10931] __kmalloc_track_caller+0x64/0x340 [ 2652.389378][T10931] ? trace_probe_init+0x1bd/0x250 [ 2652.394503][T10931] kstrdup+0x31/0x70 [ 2652.398407][T10931] trace_probe_init+0x1e1/0x250 [ 2652.403268][T10931] create_local_trace_uprobe+0xd1/0x3c0 [ 2652.408998][T10931] perf_uprobe_init+0xbe/0x140 [ 2652.413817][T10931] perf_uprobe_event_init+0xde/0x140 [ 2652.419107][T10931] perf_try_init_event+0x21a/0x400 [ 2652.424274][T10931] perf_event_alloc+0xa60/0x1790 [ 2652.429284][T10931] __se_sys_perf_event_open+0x5c7/0x2740 [ 2652.434961][T10931] ? vfs_write+0x50c/0x770 [ 2652.439381][T10931] __x64_sys_perf_event_open+0x63/0x70 [ 2652.444937][T10931] do_syscall_64+0x4a/0x90 [ 2652.449363][T10931] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2652.455313][T10931] RIP: 0033:0x4665d9 [ 2652.459216][T10931] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2652.479136][T10931] RSP: 002b:00007fc55cf8b188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2652.487770][T10931] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2652.495830][T10931] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2652.504248][T10931] RBP: 00007fc55cf8b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2652.512505][T10931] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 04:44:58 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2652.520667][T10931] R13: 00007fffb6e0760f R14: 00007fc55cf8b300 R15: 0000000000022000 [ 2652.529339][T10931] trace_uprobe: Failed to allocate trace_uprobe.(-12) [ 2652.545637][T10936] validate_nla: 29 callbacks suppressed [ 2652.545686][T10936] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2652.562076][T10936] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 04:44:58 executing program 0 (fault-call:1 fault-nth:10): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:58 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:58 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x5, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:58 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff01b4000200000000000006040000000000000000", 0x39}], 0x1) 04:44:58 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2652.577257][T10938] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2652.627545][T10948] FAULT_INJECTION: forcing a failure. [ 2652.627545][T10948] name failslab, interval 1, probability 0, space 0, times 0 [ 2652.640467][T10948] CPU: 0 PID: 10948 Comm: syz-executor.0 Not tainted 5.13.0-rc3-syzkaller #0 [ 2652.649239][T10948] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2652.659363][T10948] Call Trace: [ 2652.662642][T10948] dump_stack+0x137/0x19d [ 2652.667336][T10948] should_fail+0x23c/0x250 [ 2652.671846][T10948] ? create_local_trace_uprobe+0x235/0x3c0 [ 2652.677770][T10948] __should_failslab+0x81/0x90 [ 2652.682633][T10948] should_failslab+0x5/0x20 [ 2652.687151][T10948] __kmalloc_track_caller+0x64/0x340 [ 2652.692496][T10948] ? kstrdup+0x4c/0x70 [ 2652.696652][T10948] kstrdup+0x31/0x70 [ 2652.700560][T10948] create_local_trace_uprobe+0x235/0x3c0 [ 2652.706555][T10948] perf_uprobe_init+0xbe/0x140 [ 2652.711414][T10948] perf_uprobe_event_init+0xde/0x140 [ 2652.716803][T10948] perf_try_init_event+0x21a/0x400 [ 2652.721993][T10948] perf_event_alloc+0xa60/0x1790 [ 2652.726971][T10948] __se_sys_perf_event_open+0x5c7/0x2740 [ 2652.732608][T10948] ? vfs_write+0x50c/0x770 [ 2652.737024][T10948] __x64_sys_perf_event_open+0x63/0x70 [ 2652.742494][T10948] do_syscall_64+0x4a/0x90 [ 2652.746914][T10948] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2652.752815][T10948] RIP: 0033:0x4665d9 [ 2652.756823][T10948] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2652.776764][T10948] RSP: 002b:00007fc55cf8b188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2652.785294][T10948] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2652.793286][T10948] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2652.801371][T10948] RBP: 00007fc55cf8b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2652.809355][T10948] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2652.817402][T10948] R13: 00007fffb6e0760f R14: 00007fc55cf8b300 R15: 0000000000022000 [ 2652.862394][T10959] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2652.873534][T10959] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2652.883919][T10962] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 04:44:58 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:58 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:58 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:58 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff01ba000200000000000006040000000000000000", 0x39}], 0x1) 04:44:58 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5a020000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:58 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:58 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x6, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2653.118688][T10972] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2653.137493][T10972] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2653.165682][T10980] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 04:44:59 executing program 0 (fault-call:1 fault-nth:11): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:59 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:59 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff01bc000200000000000006040000000000000000", 0x39}], 0x1) 04:44:59 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2653.324622][T11000] FAULT_INJECTION: forcing a failure. [ 2653.324622][T11000] name failslab, interval 1, probability 0, space 0, times 0 [ 2653.328156][T10996] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2653.337737][T11000] CPU: 1 PID: 11000 Comm: syz-executor.0 Not tainted 5.13.0-rc3-syzkaller #0 [ 2653.354946][T11000] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2653.365210][T11000] Call Trace: [ 2653.368690][T11000] dump_stack+0x137/0x19d [ 2653.373333][T11000] should_fail+0x23c/0x250 [ 2653.377857][T11000] ? traceprobe_set_print_fmt+0x45/0xa0 [ 2653.383479][T11000] __should_failslab+0x81/0x90 [ 2653.388453][T11000] should_failslab+0x5/0x20 [ 2653.393042][T11000] __kmalloc+0x66/0x340 [ 2653.397292][T11000] ? __kmalloc_track_caller+0x23b/0x340 [ 2653.402849][T11000] traceprobe_set_print_fmt+0x45/0xa0 [ 2653.408453][T11000] create_local_trace_uprobe+0x2eb/0x3c0 [ 2653.414361][T11000] perf_uprobe_init+0xbe/0x140 [ 2653.419234][T11000] perf_uprobe_event_init+0xde/0x140 [ 2653.424590][T11000] perf_try_init_event+0x21a/0x400 [ 2653.429722][T11000] perf_event_alloc+0xa60/0x1790 [ 2653.434671][T11000] __se_sys_perf_event_open+0x5c7/0x2740 [ 2653.440397][T11000] ? vfs_write+0x50c/0x770 [ 2653.444909][T11000] __x64_sys_perf_event_open+0x63/0x70 [ 2653.450371][T11000] do_syscall_64+0x4a/0x90 [ 2653.454797][T11000] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2653.460901][T11000] RIP: 0033:0x4665d9 [ 2653.464895][T11000] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2653.484504][T11000] RSP: 002b:00007fc55cf8b188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2653.492930][T11000] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2653.501007][T11000] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2653.509009][T11000] RBP: 00007fc55cf8b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2653.517160][T11000] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 04:44:59 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0xa, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:59 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x7, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2653.525467][T11000] R13: 00007fffb6e0760f R14: 00007fc55cf8b300 R15: 0000000000022000 04:44:59 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:59 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff01c0000200000000000006040000000000000000", 0x39}], 0x1) 04:44:59 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:59 executing program 0 (fault-call:1 fault-nth:12): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:59 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2653.644366][T11023] FAULT_INJECTION: forcing a failure. [ 2653.644366][T11023] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2653.657976][T11023] CPU: 0 PID: 11023 Comm: syz-executor.0 Not tainted 5.13.0-rc3-syzkaller #0 [ 2653.666775][T11023] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2653.676919][T11023] Call Trace: [ 2653.680315][T11023] dump_stack+0x137/0x19d [ 2653.684745][T11023] should_fail+0x23c/0x250 [ 2653.689261][T11023] __alloc_pages+0x102/0x320 04:44:59 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:59 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x8, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2653.693874][T11023] probe_event_enable+0x421/0x7d0 [ 2653.699003][T11023] ? __uprobe_trace_func+0x430/0x430 [ 2653.704403][T11023] trace_uprobe_register+0x88/0x410 [ 2653.709731][T11023] perf_trace_event_init+0x34e/0x790 [ 2653.715523][T11023] perf_uprobe_init+0xf5/0x140 [ 2653.720319][T11023] perf_uprobe_event_init+0xde/0x140 [ 2653.725618][T11023] perf_try_init_event+0x21a/0x400 [ 2653.730854][T11023] perf_event_alloc+0xa60/0x1790 [ 2653.735796][T11023] __se_sys_perf_event_open+0x5c7/0x2740 04:44:59 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2653.741439][T11023] ? vfs_write+0x50c/0x770 [ 2653.746238][T11023] __x64_sys_perf_event_open+0x63/0x70 [ 2653.751846][T11023] do_syscall_64+0x4a/0x90 [ 2653.756409][T11023] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2653.762312][T11023] RIP: 0033:0x4665d9 [ 2653.766208][T11023] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2653.785923][T11023] RSP: 002b:00007fc55cf8b188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a 04:44:59 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:59 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x98010000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:44:59 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff02c0000200000000000006040000000000000000", 0x39}], 0x1) 04:44:59 executing program 0 (fault-call:1 fault-nth:13): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2653.794447][T11023] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2653.802447][T11023] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2653.810424][T11023] RBP: 00007fc55cf8b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2653.818446][T11023] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2653.826695][T11023] R13: 00007fffb6e0760f R14: 00007fc55cf8b300 R15: 0000000000022000 [ 2654.047399][T11059] FAULT_INJECTION: forcing a failure. [ 2654.047399][T11059] name failslab, interval 1, probability 0, space 0, times 0 [ 2654.060617][T11059] CPU: 0 PID: 11059 Comm: syz-executor.0 Not tainted 5.13.0-rc3-syzkaller #0 [ 2654.069534][T11059] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2654.079575][T11059] Call Trace: [ 2654.082872][T11059] dump_stack+0x137/0x19d [ 2654.087290][T11059] should_fail+0x23c/0x250 [ 2654.091720][T11059] __should_failslab+0x81/0x90 [ 2654.096470][T11059] ? register_for_each_vma+0x372/0x890 [ 2654.102161][T11059] should_failslab+0x5/0x20 [ 2654.106895][T11059] kmem_cache_alloc_trace+0x49/0x310 [ 2654.112194][T11059] ? percpu_down_write+0x1ed/0x220 [ 2654.117426][T11059] register_for_each_vma+0x372/0x890 [ 2654.122766][T11059] __uprobe_register+0x3f4/0x8a0 [ 2654.127880][T11059] uprobe_register_refctr+0x29/0x40 [ 2654.133254][T11059] probe_event_enable+0x2be/0x7d0 [ 2654.138290][T11059] ? __uprobe_trace_func+0x430/0x430 [ 2654.143586][T11059] trace_uprobe_register+0x88/0x410 [ 2654.148783][T11059] perf_trace_event_init+0x34e/0x790 [ 2654.154348][T11059] perf_uprobe_init+0xf5/0x140 [ 2654.159291][T11059] perf_uprobe_event_init+0xde/0x140 [ 2654.164562][T11059] perf_try_init_event+0x21a/0x400 [ 2654.169786][T11059] perf_event_alloc+0xa60/0x1790 [ 2654.174915][T11059] __se_sys_perf_event_open+0x5c7/0x2740 [ 2654.180762][T11059] ? vfs_write+0x50c/0x770 [ 2654.185225][T11059] __x64_sys_perf_event_open+0x63/0x70 [ 2654.190692][T11059] do_syscall_64+0x4a/0x90 [ 2654.195131][T11059] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2654.201892][T11059] RIP: 0033:0x4665d9 [ 2654.205877][T11059] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2654.225941][T11059] RSP: 002b:00007fc55cf8b188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2654.234657][T11059] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2654.242638][T11059] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2654.251068][T11059] RBP: 00007fc55cf8b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2654.259280][T11059] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2654.267617][T11059] R13: 00007fffb6e0760f R14: 00007fc55cf8b300 R15: 0000000000022000 04:45:00 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:00 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a010000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:00 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff03c0000200000000000006040000000000000000", 0x39}], 0x1) 04:45:00 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x20000200, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:00 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x9, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:00 executing program 0 (fault-call:1 fault-nth:14): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:00 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:00 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff01fa000200000000000006040000000000000000", 0x39}], 0x1) 04:45:00 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4010000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2654.641207][T11077] FAULT_INJECTION: forcing a failure. [ 2654.641207][T11077] name failslab, interval 1, probability 0, space 0, times 0 [ 2654.653874][T11077] CPU: 1 PID: 11077 Comm: syz-executor.0 Not tainted 5.13.0-rc3-syzkaller #0 [ 2654.662771][T11077] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2654.672835][T11077] Call Trace: [ 2654.676299][T11077] dump_stack+0x137/0x19d [ 2654.680816][T11077] should_fail+0x23c/0x250 [ 2654.685217][T11077] __should_failslab+0x81/0x90 [ 2654.690168][T11077] ? register_for_each_vma+0x372/0x890 [ 2654.695824][T11077] should_failslab+0x5/0x20 [ 2654.700340][T11077] kmem_cache_alloc_trace+0x49/0x310 [ 2654.705627][T11077] ? register_for_each_vma+0x372/0x890 [ 2654.711177][T11077] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2654.717275][T11077] register_for_each_vma+0x372/0x890 [ 2654.722902][T11077] __uprobe_register+0x3f4/0x8a0 [ 2654.727832][T11077] uprobe_register_refctr+0x29/0x40 [ 2654.733124][T11077] probe_event_enable+0x2be/0x7d0 [ 2654.738419][T11077] ? __uprobe_trace_func+0x430/0x430 [ 2654.744228][T11077] trace_uprobe_register+0x88/0x410 [ 2654.749422][T11077] perf_trace_event_init+0x34e/0x790 [ 2654.754715][T11077] perf_uprobe_init+0xf5/0x140 [ 2654.759629][T11077] perf_uprobe_event_init+0xde/0x140 [ 2654.765069][T11077] perf_try_init_event+0x21a/0x400 [ 2654.770223][T11077] perf_event_alloc+0xa60/0x1790 [ 2654.775152][T11077] __se_sys_perf_event_open+0x5c7/0x2740 [ 2654.780879][T11077] ? vfs_write+0x50c/0x770 [ 2654.785327][T11077] __x64_sys_perf_event_open+0x63/0x70 [ 2654.790963][T11077] do_syscall_64+0x4a/0x90 [ 2654.795370][T11077] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2654.801521][T11077] RIP: 0033:0x4665d9 [ 2654.805416][T11077] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2654.825067][T11077] RSP: 002b:00007fc55cf8b188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2654.833489][T11077] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 04:45:00 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd3b60600}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:00 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff01fc000200000000000006040000000000000000", 0x39}], 0x1) [ 2654.841479][T11077] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2654.850229][T11077] RBP: 00007fc55cf8b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2654.858211][T11077] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2654.866229][T11077] R13: 00007fffb6e0760f R14: 00007fc55cf8b300 R15: 0000000000022000 04:45:00 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0xa, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:01 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:01 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe83a1b00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:01 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0402000200000000000006040000000000000000", 0x39}], 0x1) 04:45:01 executing program 0 (fault-call:1 fault-nth:15): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:01 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0xb, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:01 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0020000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2655.418790][T11128] FAULT_INJECTION: forcing a failure. [ 2655.418790][T11128] name failslab, interval 1, probability 0, space 0, times 0 [ 2655.431553][T11128] CPU: 1 PID: 11128 Comm: syz-executor.0 Not tainted 5.13.0-rc3-syzkaller #0 [ 2655.440344][T11128] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2655.450557][T11128] Call Trace: [ 2655.455656][T11128] dump_stack+0x137/0x19d [ 2655.460385][T11128] should_fail+0x23c/0x250 [ 2655.464984][T11128] __should_failslab+0x81/0x90 [ 2655.469760][T11128] ? register_for_each_vma+0x372/0x890 [ 2655.475453][T11128] should_failslab+0x5/0x20 [ 2655.480129][T11128] kmem_cache_alloc_trace+0x49/0x310 [ 2655.485430][T11128] ? percpu_down_write+0x1ed/0x220 [ 2655.490541][T11128] register_for_each_vma+0x372/0x890 [ 2655.495867][T11128] __uprobe_register+0x3f4/0x8a0 [ 2655.500809][T11128] uprobe_register_refctr+0x29/0x40 [ 2655.506117][T11128] probe_event_enable+0x2be/0x7d0 [ 2655.511530][T11128] ? __uprobe_trace_func+0x430/0x430 [ 2655.516809][T11128] trace_uprobe_register+0x88/0x410 [ 2655.522182][T11128] perf_trace_event_init+0x34e/0x790 [ 2655.527626][T11128] perf_uprobe_init+0xf5/0x140 [ 2655.535048][T11128] perf_uprobe_event_init+0xde/0x140 [ 2655.540654][T11128] perf_try_init_event+0x21a/0x400 [ 2655.545809][T11128] perf_event_alloc+0xa60/0x1790 [ 2655.550877][T11128] __se_sys_perf_event_open+0x5c7/0x2740 [ 2655.556673][T11128] ? vfs_write+0x50c/0x770 [ 2655.561185][T11128] __x64_sys_perf_event_open+0x63/0x70 [ 2655.566877][T11128] do_syscall_64+0x4a/0x90 [ 2655.571326][T11128] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2655.577220][T11128] RIP: 0033:0x4665d9 [ 2655.581208][T11128] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2655.601180][T11128] RSP: 002b:00007fc55cf8b188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2655.609728][T11128] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 04:45:01 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x2, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:01 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0403000200000000000006040000000000000000", 0x39}], 0x1) 04:45:01 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:01 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0xc, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2655.617716][T11128] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2655.625988][T11128] RBP: 00007fc55cf8b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2655.633960][T11128] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2655.642160][T11128] R13: 00007fffb6e0760f R14: 00007fc55cf8b300 R15: 0000000000022000 04:45:01 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0404000200000000000006040000000000000000", 0x39}], 0x1) 04:45:01 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:01 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:01 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0405000200000000000006040000000000000000", 0x39}], 0x1) 04:45:01 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff070000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:01 executing program 0 (fault-call:1 fault-nth:16): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:01 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0xd, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:01 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x3, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2656.120948][T11182] FAULT_INJECTION: forcing a failure. [ 2656.120948][T11182] name failslab, interval 1, probability 0, space 0, times 0 [ 2656.134320][T11182] CPU: 0 PID: 11182 Comm: syz-executor.0 Not tainted 5.13.0-rc3-syzkaller #0 [ 2656.143299][T11182] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2656.153471][T11182] Call Trace: [ 2656.156743][T11182] dump_stack+0x137/0x19d [ 2656.161095][T11182] should_fail+0x23c/0x250 [ 2656.165535][T11182] __should_failslab+0x81/0x90 [ 2656.170380][T11182] ? register_for_each_vma+0x372/0x890 [ 2656.175921][T11182] should_failslab+0x5/0x20 [ 2656.180410][T11182] kmem_cache_alloc_trace+0x49/0x310 [ 2656.185825][T11182] ? register_for_each_vma+0x372/0x890 [ 2656.191377][T11182] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2656.197373][T11182] register_for_each_vma+0x372/0x890 [ 2656.202817][T11182] __uprobe_register+0x3f4/0x8a0 [ 2656.207847][T11182] uprobe_register_refctr+0x29/0x40 [ 2656.213138][T11182] probe_event_enable+0x2be/0x7d0 [ 2656.218353][T11182] ? __uprobe_trace_func+0x430/0x430 [ 2656.224070][T11182] trace_uprobe_register+0x88/0x410 [ 2656.229547][T11182] perf_trace_event_init+0x34e/0x790 [ 2656.235036][T11182] perf_uprobe_init+0xf5/0x140 [ 2656.239907][T11182] perf_uprobe_event_init+0xde/0x140 [ 2656.245303][T11182] perf_try_init_event+0x21a/0x400 [ 2656.250605][T11182] perf_event_alloc+0xa60/0x1790 [ 2656.255566][T11182] __se_sys_perf_event_open+0x5c7/0x2740 [ 2656.261213][T11182] ? vfs_write+0x50c/0x770 [ 2656.265750][T11182] __x64_sys_perf_event_open+0x63/0x70 [ 2656.271640][T11182] do_syscall_64+0x4a/0x90 [ 2656.276574][T11182] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2656.282607][T11182] RIP: 0033:0x4665d9 [ 2656.286638][T11182] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2656.307644][T11182] RSP: 002b:00007fc55cf8b188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a 04:45:02 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0406000200000000000006040000000000000000", 0x39}], 0x1) 04:45:02 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2656.316237][T11182] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2656.325271][T11182] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2656.333592][T11182] RBP: 00007fc55cf8b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2656.342011][T11182] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2656.350232][T11182] R13: 00007fffb6e0760f R14: 00007fc55cf8b300 R15: 0000000000022000 04:45:02 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0407000200000000000006040000000000000000", 0x39}], 0x1) 04:45:02 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:02 executing program 0 (fault-call:1 fault-nth:17): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:02 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0xe, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2656.790506][T11216] FAULT_INJECTION: forcing a failure. [ 2656.790506][T11216] name failslab, interval 1, probability 0, space 0, times 0 [ 2656.804855][T11216] CPU: 1 PID: 11216 Comm: syz-executor.0 Not tainted 5.13.0-rc3-syzkaller #0 [ 2656.813959][T11216] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2656.824325][T11216] Call Trace: [ 2656.827884][T11216] dump_stack+0x137/0x19d [ 2656.832590][T11216] should_fail+0x23c/0x250 [ 2656.837132][T11216] __should_failslab+0x81/0x90 [ 2656.841990][T11216] ? register_for_each_vma+0x372/0x890 [ 2656.847453][T11216] should_failslab+0x5/0x20 [ 2656.851945][T11216] kmem_cache_alloc_trace+0x49/0x310 [ 2656.857365][T11216] ? register_for_each_vma+0x372/0x890 [ 2656.863137][T11216] ? vma_interval_tree_iter_next+0x263/0x280 [ 2656.869239][T11216] register_for_each_vma+0x372/0x890 [ 2656.874591][T11216] __uprobe_register+0x3f4/0x8a0 [ 2656.881960][T11216] uprobe_register_refctr+0x29/0x40 [ 2656.887184][T11216] probe_event_enable+0x2be/0x7d0 [ 2656.892443][T11216] ? __uprobe_trace_func+0x430/0x430 [ 2656.897724][T11216] trace_uprobe_register+0x88/0x410 [ 2656.902918][T11216] perf_trace_event_init+0x34e/0x790 [ 2656.908383][T11216] perf_uprobe_init+0xf5/0x140 [ 2656.913141][T11216] perf_uprobe_event_init+0xde/0x140 [ 2656.918503][T11216] perf_try_init_event+0x21a/0x400 [ 2656.924137][T11216] perf_event_alloc+0xa60/0x1790 [ 2656.929065][T11216] __se_sys_perf_event_open+0x5c7/0x2740 [ 2656.934691][T11216] ? vfs_write+0x50c/0x770 [ 2656.939102][T11216] __x64_sys_perf_event_open+0x63/0x70 [ 2656.944755][T11216] do_syscall_64+0x4a/0x90 [ 2656.949615][T11216] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2656.956205][T11216] RIP: 0033:0x4665d9 [ 2656.960172][T11216] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2656.980840][T11216] RSP: 002b:00007fc55cf8b188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2656.989599][T11216] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2656.997568][T11216] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2657.005919][T11216] RBP: 00007fc55cf8b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2657.014113][T11216] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2657.022891][T11216] R13: 00007fffb6e0760f R14: 00007fc55cf8b300 R15: 0000000000022000 04:45:02 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:02 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0408000200000000000006040000000000000000", 0x39}], 0x1) 04:45:02 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:02 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x4, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:02 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x10, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:02 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:02 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0409000200000000000006040000000000000000", 0x39}], 0x1) 04:45:02 executing program 0 (fault-call:1 fault-nth:18): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:03 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x11, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:03 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff040a000200000000000006040000000000000000", 0x39}], 0x1) 04:45:03 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:03 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff040b000200000000000006040000000000000000", 0x39}], 0x1) [ 2657.338791][T11249] FAULT_INJECTION: forcing a failure. [ 2657.338791][T11249] name failslab, interval 1, probability 0, space 0, times 0 [ 2657.353341][T11249] CPU: 1 PID: 11249 Comm: syz-executor.0 Not tainted 5.13.0-rc3-syzkaller #0 [ 2657.362768][T11249] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2657.374245][T11249] Call Trace: [ 2657.377648][T11249] dump_stack+0x137/0x19d [ 2657.382078][T11249] should_fail+0x23c/0x250 [ 2657.387177][T11249] __should_failslab+0x81/0x90 [ 2657.391962][T11249] ? register_for_each_vma+0x372/0x890 [ 2657.398024][T11249] should_failslab+0x5/0x20 [ 2657.402521][T11249] kmem_cache_alloc_trace+0x49/0x310 [ 2657.407880][T11249] ? register_for_each_vma+0x372/0x890 [ 2657.413501][T11249] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2657.419883][T11249] register_for_each_vma+0x372/0x890 [ 2657.426079][T11249] __uprobe_register+0x3f4/0x8a0 [ 2657.431465][T11249] uprobe_register_refctr+0x29/0x40 [ 2657.437037][T11249] probe_event_enable+0x2be/0x7d0 [ 2657.442295][T11249] ? __uprobe_trace_func+0x430/0x430 [ 2657.447627][T11249] trace_uprobe_register+0x88/0x410 [ 2657.452985][T11249] perf_trace_event_init+0x34e/0x790 [ 2657.458521][T11249] perf_uprobe_init+0xf5/0x140 [ 2657.465408][T11249] perf_uprobe_event_init+0xde/0x140 [ 2657.471079][T11249] perf_try_init_event+0x21a/0x400 [ 2657.476402][T11249] perf_event_alloc+0xa60/0x1790 [ 2657.481483][T11249] __se_sys_perf_event_open+0x5c7/0x2740 [ 2657.487371][T11249] ? vfs_write+0x50c/0x770 [ 2657.491976][T11249] __x64_sys_perf_event_open+0x63/0x70 [ 2657.497610][T11249] do_syscall_64+0x4a/0x90 [ 2657.502807][T11249] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2657.509377][T11249] RIP: 0033:0x4665d9 [ 2657.513531][T11249] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2657.534005][T11249] RSP: 002b:00007fc55cf8b188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2657.543114][T11249] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2657.551416][T11249] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2657.559910][T11249] RBP: 00007fc55cf8b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2657.567980][T11249] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2657.575976][T11249] R13: 00007fffb6e0760f R14: 00007fc55cf8b300 R15: 0000000000022000 [ 2657.594324][T11266] validate_nla: 44 callbacks suppressed [ 2657.594339][T11266] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2657.609332][T11266] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2657.620128][T11269] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 04:45:03 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:03 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:03 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff040c000200000000000006040000000000000000", 0x39}], 0x1) 04:45:03 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x5, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:03 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x12, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:03 executing program 0 (fault-call:1 fault-nth:19): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2657.900066][T11281] FAULT_INJECTION: forcing a failure. [ 2657.900066][T11281] name failslab, interval 1, probability 0, space 0, times 0 [ 2657.913199][T11281] CPU: 1 PID: 11281 Comm: syz-executor.0 Not tainted 5.13.0-rc3-syzkaller #0 [ 2657.922722][T11281] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2657.933357][T11281] Call Trace: [ 2657.936841][T11281] dump_stack+0x137/0x19d [ 2657.941397][T11281] should_fail+0x23c/0x250 [ 2657.945878][T11281] __should_failslab+0x81/0x90 [ 2657.950856][T11281] ? register_for_each_vma+0x372/0x890 [ 2657.956653][T11281] should_failslab+0x5/0x20 [ 2657.961510][T11281] kmem_cache_alloc_trace+0x49/0x310 [ 2657.967144][T11281] ? register_for_each_vma+0x372/0x890 [ 2657.972870][T11281] ? vma_interval_tree_iter_next+0x263/0x280 [ 2657.979147][T11281] register_for_each_vma+0x372/0x890 [ 2657.984668][T11281] __uprobe_register+0x3f4/0x8a0 [ 2657.990199][T11281] uprobe_register_refctr+0x29/0x40 [ 2657.995835][T11281] probe_event_enable+0x2be/0x7d0 [ 2658.001439][T11281] ? __uprobe_trace_func+0x430/0x430 [ 2658.006771][T11281] trace_uprobe_register+0x88/0x410 [ 2658.012112][T11281] perf_trace_event_init+0x34e/0x790 [ 2658.017405][T11281] perf_uprobe_init+0xf5/0x140 [ 2658.023064][T11281] perf_uprobe_event_init+0xde/0x140 [ 2658.029049][T11281] perf_try_init_event+0x21a/0x400 [ 2658.034598][T11281] perf_event_alloc+0xa60/0x1790 [ 2658.039823][T11281] __se_sys_perf_event_open+0x5c7/0x2740 [ 2658.045562][T11281] ? vfs_write+0x50c/0x770 [ 2658.049988][T11281] __x64_sys_perf_event_open+0x63/0x70 [ 2658.055572][T11281] do_syscall_64+0x4a/0x90 [ 2658.060015][T11281] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2658.065901][T11281] RIP: 0033:0x4665d9 [ 2658.069804][T11281] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2658.089596][T11281] RSP: 002b:00007fc55cf8b188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2658.098139][T11281] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2658.106353][T11281] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2658.114318][T11281] RBP: 00007fc55cf8b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2658.122593][T11281] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2658.131014][T11281] R13: 00007fffb6e0760f R14: 00007fc55cf8b300 R15: 0000000000022000 04:45:03 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff040d000200000000000006040000000000000000", 0x39}], 0x1) [ 2658.147983][T11283] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2658.157616][T11283] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2658.169287][T11288] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 04:45:04 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x6, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:04 executing program 0 (fault-call:1 fault-nth:20): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:04 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x27, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2658.244968][T11295] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2658.278251][T11295] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 04:45:04 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff040e000200000000000006040000000000000000", 0x39}], 0x1) [ 2658.288297][T11298] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 04:45:04 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:04 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff040f000200000000000006040000000000000000", 0x39}], 0x1) [ 2658.461887][T11308] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 04:45:04 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:04 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0410000200000000000006040000000000000000", 0x39}], 0x1) [ 2658.606611][T11307] FAULT_INJECTION: forcing a failure. [ 2658.606611][T11307] name failslab, interval 1, probability 0, space 0, times 0 [ 2658.619799][T11307] CPU: 0 PID: 11307 Comm: syz-executor.0 Not tainted 5.13.0-rc3-syzkaller #0 [ 2658.629247][T11307] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2658.640576][T11307] Call Trace: [ 2658.643968][T11307] dump_stack+0x137/0x19d [ 2658.648632][T11307] should_fail+0x23c/0x250 [ 2658.653166][T11307] __should_failslab+0x81/0x90 [ 2658.658517][T11307] ? register_for_each_vma+0x372/0x890 [ 2658.664154][T11307] should_failslab+0x5/0x20 [ 2658.668868][T11307] kmem_cache_alloc_trace+0x49/0x310 [ 2658.674360][T11307] ? register_for_each_vma+0x372/0x890 [ 2658.680440][T11307] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2658.686719][T11307] register_for_each_vma+0x372/0x890 [ 2658.692736][T11307] __uprobe_register+0x3f4/0x8a0 [ 2658.698089][T11307] uprobe_register_refctr+0x29/0x40 [ 2658.703440][T11307] probe_event_enable+0x2be/0x7d0 [ 2658.708461][T11307] ? __uprobe_trace_func+0x430/0x430 [ 2658.713753][T11307] trace_uprobe_register+0x88/0x410 [ 2658.718999][T11307] perf_trace_event_init+0x34e/0x790 [ 2658.724429][T11307] perf_uprobe_init+0xf5/0x140 [ 2658.729587][T11307] perf_uprobe_event_init+0xde/0x140 [ 2658.734907][T11307] perf_try_init_event+0x21a/0x400 [ 2658.740415][T11307] perf_event_alloc+0xa60/0x1790 [ 2658.745483][T11307] __se_sys_perf_event_open+0x5c7/0x2740 [ 2658.752648][T11307] ? vfs_write+0x50c/0x770 [ 2658.757811][T11307] __x64_sys_perf_event_open+0x63/0x70 [ 2658.764292][T11307] do_syscall_64+0x4a/0x90 [ 2658.768841][T11307] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2658.774864][T11307] RIP: 0033:0x4665d9 [ 2658.779179][T11307] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 04:45:04 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0411000200000000000006040000000000000000", 0x39}], 0x1) [ 2658.799127][T11307] RSP: 002b:00007fc55cf8b188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2658.808022][T11307] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2658.816384][T11307] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2658.825183][T11307] RBP: 00007fc55cf8b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2658.833487][T11307] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2658.842103][T11307] R13: 00007fffb6e0760f R14: 00007fc55cf8b300 R15: 0000000000022000 04:45:04 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0412000200000000000006040000000000000000", 0x39}], 0x1) 04:45:04 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x48, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:04 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0416000200000000000006040000000000000000", 0x39}], 0x1) 04:45:05 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:05 executing program 0 (fault-call:1 fault-nth:21): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:05 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0417000200000000000006040000000000000000", 0x39}], 0x1) 04:45:05 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:05 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:05 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0418000200000000000006040000000000000000", 0x39}], 0x1) [ 2659.308914][T11352] FAULT_INJECTION: forcing a failure. [ 2659.308914][T11352] name failslab, interval 1, probability 0, space 0, times 0 [ 2659.322013][T11352] CPU: 0 PID: 11352 Comm: syz-executor.0 Not tainted 5.13.0-rc3-syzkaller #0 [ 2659.331791][T11352] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2659.343543][T11352] Call Trace: [ 2659.347137][T11352] dump_stack+0x137/0x19d [ 2659.352260][T11352] should_fail+0x23c/0x250 [ 2659.357145][T11352] __should_failslab+0x81/0x90 [ 2659.363556][T11352] ? register_for_each_vma+0x372/0x890 [ 2659.369959][T11352] should_failslab+0x5/0x20 [ 2659.375352][T11352] kmem_cache_alloc_trace+0x49/0x310 [ 2659.380741][T11352] ? register_for_each_vma+0x372/0x890 [ 2659.386538][T11352] ? vma_interval_tree_iter_next+0x263/0x280 [ 2659.393177][T11352] register_for_each_vma+0x372/0x890 [ 2659.398897][T11352] __uprobe_register+0x3f4/0x8a0 [ 2659.404394][T11352] uprobe_register_refctr+0x29/0x40 [ 2659.410015][T11352] probe_event_enable+0x2be/0x7d0 [ 2659.415383][T11352] ? __uprobe_trace_func+0x430/0x430 [ 2659.420847][T11352] trace_uprobe_register+0x88/0x410 [ 2659.426310][T11352] perf_trace_event_init+0x34e/0x790 [ 2659.432988][T11352] perf_uprobe_init+0xf5/0x140 [ 2659.437837][T11352] perf_uprobe_event_init+0xde/0x140 [ 2659.443121][T11352] perf_try_init_event+0x21a/0x400 [ 2659.448616][T11352] perf_event_alloc+0xa60/0x1790 [ 2659.454994][T11352] __se_sys_perf_event_open+0x5c7/0x2740 [ 2659.460842][T11352] ? vfs_write+0x50c/0x770 [ 2659.465291][T11352] __x64_sys_perf_event_open+0x63/0x70 [ 2659.471195][T11352] do_syscall_64+0x4a/0x90 [ 2659.475743][T11352] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2659.481922][T11352] RIP: 0033:0x4665d9 [ 2659.485803][T11352] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 04:45:05 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff041e000200000000000006040000000000000000", 0x39}], 0x1) 04:45:05 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x4c, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2659.506015][T11352] RSP: 002b:00007fc55cf8b188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2659.514430][T11352] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2659.522587][T11352] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2659.530599][T11352] RBP: 00007fc55cf8b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2659.539146][T11352] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2659.547260][T11352] R13: 00007fffb6e0760f R14: 00007fc55cf8b300 R15: 0000000000022000 04:45:05 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0425000200000000000006040000000000000000", 0x39}], 0x1) 04:45:05 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0448000200000000000006040000000000000000", 0x39}], 0x1) 04:45:05 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x68, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:05 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x8, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:05 executing program 0 (fault-call:1 fault-nth:22): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:05 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff044c000200000000000006040000000000000000", 0x39}], 0x1) 04:45:05 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:05 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0460000200000000000006040000000000000000", 0x39}], 0x1) 04:45:05 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:05 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0468000200000000000006040000000000000000", 0x39}], 0x1) 04:45:05 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x6c, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:05 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff046c000200000000000006040000000000000000", 0x39}], 0x1) [ 2660.150582][T11406] FAULT_INJECTION: forcing a failure. [ 2660.150582][T11406] name failslab, interval 1, probability 0, space 0, times 0 [ 2660.163422][T11406] CPU: 1 PID: 11406 Comm: syz-executor.0 Not tainted 5.13.0-rc3-syzkaller #0 [ 2660.172253][T11406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2660.182328][T11406] Call Trace: [ 2660.185930][T11406] dump_stack+0x137/0x19d [ 2660.190279][T11406] should_fail+0x23c/0x250 [ 2660.194819][T11406] __should_failslab+0x81/0x90 [ 2660.199698][T11406] ? register_for_each_vma+0x372/0x890 [ 2660.205155][T11406] should_failslab+0x5/0x20 [ 2660.209669][T11406] kmem_cache_alloc_trace+0x49/0x310 [ 2660.214944][T11406] ? register_for_each_vma+0x372/0x890 [ 2660.220495][T11406] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2660.226533][T11406] register_for_each_vma+0x372/0x890 [ 2660.232074][T11406] __uprobe_register+0x3f4/0x8a0 [ 2660.237299][T11406] uprobe_register_refctr+0x29/0x40 [ 2660.242513][T11406] probe_event_enable+0x2be/0x7d0 [ 2660.247714][T11406] ? __uprobe_trace_func+0x430/0x430 [ 2660.253249][T11406] trace_uprobe_register+0x88/0x410 [ 2660.258440][T11406] perf_trace_event_init+0x34e/0x790 [ 2660.263812][T11406] perf_uprobe_init+0xf5/0x140 [ 2660.268625][T11406] perf_uprobe_event_init+0xde/0x140 [ 2660.273933][T11406] perf_try_init_event+0x21a/0x400 [ 2660.279031][T11406] perf_event_alloc+0xa60/0x1790 [ 2660.283989][T11406] __se_sys_perf_event_open+0x5c7/0x2740 [ 2660.289977][T11406] ? vfs_write+0x50c/0x770 [ 2660.294961][T11406] __x64_sys_perf_event_open+0x63/0x70 [ 2660.300492][T11406] do_syscall_64+0x4a/0x90 [ 2660.305046][T11406] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2660.311089][T11406] RIP: 0033:0x4665d9 [ 2660.315164][T11406] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2660.335854][T11406] RSP: 002b:00007fc55cf8b188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a 04:45:06 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0474000200000000000006040000000000000000", 0x39}], 0x1) 04:45:06 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x74, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2660.344266][T11406] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2660.352691][T11406] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2660.360686][T11406] RBP: 00007fc55cf8b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2660.369090][T11406] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2660.377925][T11406] R13: 00007fffb6e0760f R14: 00007fc55cf8b300 R15: 0000000000022000 04:45:06 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff047a000200000000000006040000000000000000", 0x39}], 0x1) 04:45:06 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x9, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:06 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:06 executing program 0 (fault-call:1 fault-nth:23): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:06 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff04fc000200000000000006040000000000000000", 0x39}], 0x1) [ 2660.745052][T11457] FAULT_INJECTION: forcing a failure. [ 2660.745052][T11457] name failslab, interval 1, probability 0, space 0, times 0 [ 2660.758130][T11457] CPU: 1 PID: 11457 Comm: syz-executor.0 Not tainted 5.13.0-rc3-syzkaller #0 [ 2660.767219][T11457] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2660.777526][T11457] Call Trace: [ 2660.780798][T11457] dump_stack+0x137/0x19d [ 2660.785135][T11457] should_fail+0x23c/0x250 [ 2660.790242][T11457] __should_failslab+0x81/0x90 [ 2660.795016][T11457] ? register_for_each_vma+0x372/0x890 [ 2660.800801][T11457] should_failslab+0x5/0x20 [ 2660.805547][T11457] kmem_cache_alloc_trace+0x49/0x310 [ 2660.810868][T11457] ? register_for_each_vma+0x372/0x890 [ 2660.816319][T11457] ? vma_interval_tree_iter_next+0x263/0x280 [ 2660.822443][T11457] register_for_each_vma+0x372/0x890 [ 2660.828192][T11457] __uprobe_register+0x3f4/0x8a0 [ 2660.833185][T11457] uprobe_register_refctr+0x29/0x40 [ 2660.838779][T11457] probe_event_enable+0x2be/0x7d0 [ 2660.844050][T11457] ? __uprobe_trace_func+0x430/0x430 [ 2660.849524][T11457] trace_uprobe_register+0x88/0x410 [ 2660.854928][T11457] perf_trace_event_init+0x34e/0x790 [ 2660.860207][T11457] perf_uprobe_init+0xf5/0x140 [ 2660.865007][T11457] perf_uprobe_event_init+0xde/0x140 [ 2660.870280][T11457] perf_try_init_event+0x21a/0x400 [ 2660.875600][T11457] perf_event_alloc+0xa60/0x1790 [ 2660.880691][T11457] __se_sys_perf_event_open+0x5c7/0x2740 [ 2660.886779][T11457] ? vfs_write+0x50c/0x770 [ 2660.892476][T11457] __x64_sys_perf_event_open+0x63/0x70 [ 2660.899121][T11457] do_syscall_64+0x4a/0x90 [ 2660.904099][T11457] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2660.912047][T11457] RIP: 0033:0x4665d9 [ 2660.916482][T11457] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2660.937753][T11457] RSP: 002b:00007fc55cf8b188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2660.948599][T11457] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2660.959467][T11457] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2660.969120][T11457] RBP: 00007fc55cf8b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2660.977263][T11457] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 04:45:06 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x7a, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:06 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:06 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff04fd000200000000000006040000000000000000", 0x39}], 0x1) [ 2660.986316][T11457] R13: 00007fffb6e0760f R14: 00007fc55cf8b300 R15: 0000000000022000 04:45:06 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff04aa010200000000000006040000000000000000", 0x39}], 0x1) 04:45:06 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0xc0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:06 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff04b2010200000000000006040000000000000000", 0x39}], 0x1) 04:45:06 executing program 0 (fault-call:1 fault-nth:24): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:07 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff04ba010200000000000006040000000000000000", 0x39}], 0x1) [ 2661.472484][T11487] FAULT_INJECTION: forcing a failure. [ 2661.472484][T11487] name failslab, interval 1, probability 0, space 0, times 0 [ 2661.485282][T11487] CPU: 0 PID: 11487 Comm: syz-executor.0 Not tainted 5.13.0-rc3-syzkaller #0 [ 2661.494811][T11487] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2661.505138][T11487] Call Trace: [ 2661.508450][T11487] dump_stack+0x137/0x19d [ 2661.512862][T11487] should_fail+0x23c/0x250 [ 2661.517267][T11487] __should_failslab+0x81/0x90 [ 2661.522085][T11487] ? register_for_each_vma+0x372/0x890 [ 2661.527752][T11487] should_failslab+0x5/0x20 [ 2661.532492][T11487] kmem_cache_alloc_trace+0x49/0x310 [ 2661.538379][T11487] ? register_for_each_vma+0x372/0x890 [ 2661.543992][T11487] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2661.550230][T11487] register_for_each_vma+0x372/0x890 [ 2661.555795][T11487] __uprobe_register+0x3f4/0x8a0 [ 2661.560764][T11487] uprobe_register_refctr+0x29/0x40 [ 2661.566252][T11487] probe_event_enable+0x2be/0x7d0 [ 2661.571307][T11487] ? __uprobe_trace_func+0x430/0x430 [ 2661.576643][T11487] trace_uprobe_register+0x88/0x410 [ 2661.582014][T11487] perf_trace_event_init+0x34e/0x790 [ 2661.587472][T11487] perf_uprobe_init+0xf5/0x140 [ 2661.592529][T11487] perf_uprobe_event_init+0xde/0x140 [ 2661.598794][T11487] perf_try_init_event+0x21a/0x400 [ 2661.604133][T11487] perf_event_alloc+0xa60/0x1790 [ 2661.609309][T11487] __se_sys_perf_event_open+0x5c7/0x2740 [ 2661.614954][T11487] ? vfs_write+0x50c/0x770 [ 2661.619357][T11487] __x64_sys_perf_event_open+0x63/0x70 [ 2661.624903][T11487] do_syscall_64+0x4a/0x90 [ 2661.629311][T11487] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2661.635232][T11487] RIP: 0033:0x4665d9 [ 2661.639127][T11487] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2661.659244][T11487] RSP: 002b:00007fc55cf8b188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2661.667693][T11487] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2661.675833][T11487] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2661.683915][T11487] RBP: 00007fc55cf8b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2661.691873][T11487] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2661.699934][T11487] R13: 00007fffb6e0760f R14: 00007fc55cf8b300 R15: 0000000000022000 04:45:07 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0xa, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:07 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:07 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff04e0010200000000000006040000000000000000", 0x39}], 0x1) 04:45:07 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:07 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0xff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:07 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff04e6010200000000000006040000000000000000", 0x39}], 0x1) 04:45:07 executing program 0 (fault-call:1 fault-nth:25): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:07 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff04ea010200000000000006040000000000000000", 0x39}], 0x1) 04:45:07 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:07 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff04ec010200000000000006040000000000000000", 0x39}], 0x1) 04:45:07 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff04f0010200000000000006040000000000000000", 0x39}], 0x1) [ 2662.164256][T11520] FAULT_INJECTION: forcing a failure. [ 2662.164256][T11520] name failslab, interval 1, probability 0, space 0, times 0 [ 2662.177491][T11520] CPU: 1 PID: 11520 Comm: syz-executor.0 Not tainted 5.13.0-rc3-syzkaller #0 [ 2662.186446][T11520] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2662.196997][T11520] Call Trace: [ 2662.200320][T11520] dump_stack+0x137/0x19d [ 2662.204665][T11520] should_fail+0x23c/0x250 [ 2662.209069][T11520] __should_failslab+0x81/0x90 [ 2662.213914][T11520] ? register_for_each_vma+0x372/0x890 [ 2662.219635][T11520] should_failslab+0x5/0x20 [ 2662.224719][T11520] kmem_cache_alloc_trace+0x49/0x310 [ 2662.230112][T11520] ? register_for_each_vma+0x372/0x890 [ 2662.235642][T11520] ? vma_interval_tree_iter_next+0x263/0x280 [ 2662.241708][T11520] register_for_each_vma+0x372/0x890 [ 2662.247075][T11520] __uprobe_register+0x3f4/0x8a0 [ 2662.252040][T11520] uprobe_register_refctr+0x29/0x40 [ 2662.257375][T11520] probe_event_enable+0x2be/0x7d0 [ 2662.262619][T11520] ? __uprobe_trace_func+0x430/0x430 [ 2662.267982][T11520] trace_uprobe_register+0x88/0x410 [ 2662.273340][T11520] perf_trace_event_init+0x34e/0x790 [ 2662.278714][T11520] perf_uprobe_init+0xf5/0x140 [ 2662.283562][T11520] perf_uprobe_event_init+0xde/0x140 [ 2662.288928][T11520] perf_try_init_event+0x21a/0x400 [ 2662.294295][T11520] perf_event_alloc+0xa60/0x1790 [ 2662.299344][T11520] __se_sys_perf_event_open+0x5c7/0x2740 [ 2662.304964][T11520] ? vfs_write+0x50c/0x770 [ 2662.309486][T11520] __x64_sys_perf_event_open+0x63/0x70 [ 2662.314987][T11520] do_syscall_64+0x4a/0x90 [ 2662.319468][T11520] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2662.325492][T11520] RIP: 0033:0x4665d9 [ 2662.329398][T11520] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2662.350178][T11520] RSP: 002b:00007fc55cf8b188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a 04:45:08 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2662.358759][T11520] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2662.366946][T11520] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2662.375325][T11520] RBP: 00007fc55cf8b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2662.383755][T11520] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2662.391736][T11520] R13: 00007fffb6e0760f R14: 00007fc55cf8b300 R15: 0000000000022000 04:45:08 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0xb, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:08 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff04f2010200000000000006040000000000000000", 0x39}], 0x1) 04:45:08 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:08 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:08 executing program 0 (fault-call:1 fault-nth:26): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:08 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff04fa010200000000000006040000000000000000", 0x39}], 0x1) [ 2662.742189][T11564] validate_nla: 79 callbacks suppressed [ 2662.742202][T11564] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2662.757327][T11564] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2662.767633][T11566] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2662.809741][T11570] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2662.818386][T11570] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2662.826699][T11563] FAULT_INJECTION: forcing a failure. [ 2662.826699][T11563] name failslab, interval 1, probability 0, space 0, times 0 [ 2662.840332][T11563] CPU: 0 PID: 11563 Comm: syz-executor.0 Not tainted 5.13.0-rc3-syzkaller #0 [ 2662.849727][T11563] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2662.859918][T11563] Call Trace: [ 2662.863359][T11563] dump_stack+0x137/0x19d [ 2662.867745][T11563] should_fail+0x23c/0x250 [ 2662.872244][T11563] __should_failslab+0x81/0x90 [ 2662.877148][T11563] ? register_for_each_vma+0x372/0x890 [ 2662.882792][T11563] should_failslab+0x5/0x20 [ 2662.887475][T11563] kmem_cache_alloc_trace+0x49/0x310 [ 2662.892964][T11563] ? register_for_each_vma+0x372/0x890 [ 2662.898502][T11563] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2662.904717][T11563] register_for_each_vma+0x372/0x890 [ 2662.910050][T11563] __uprobe_register+0x3f4/0x8a0 [ 2662.915129][T11563] uprobe_register_refctr+0x29/0x40 [ 2662.920332][T11563] probe_event_enable+0x2be/0x7d0 [ 2662.925485][T11563] ? __uprobe_trace_func+0x430/0x430 [ 2662.931068][T11563] trace_uprobe_register+0x88/0x410 [ 2662.936567][T11563] perf_trace_event_init+0x34e/0x790 [ 2662.942171][T11563] perf_uprobe_init+0xf5/0x140 [ 2662.947125][T11563] perf_uprobe_event_init+0xde/0x140 [ 2662.952887][T11563] perf_try_init_event+0x21a/0x400 [ 2662.958009][T11563] perf_event_alloc+0xa60/0x1790 [ 2662.963067][T11563] __se_sys_perf_event_open+0x5c7/0x2740 [ 2662.969080][T11563] ? vfs_write+0x50c/0x770 [ 2662.973938][T11563] __x64_sys_perf_event_open+0x63/0x70 [ 2662.979570][T11563] do_syscall_64+0x4a/0x90 [ 2662.984568][T11563] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2662.990761][T11563] RIP: 0033:0x4665d9 [ 2662.994805][T11563] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2663.014914][T11563] RSP: 002b:00007fc55cf8b188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2663.024133][T11563] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2663.032816][T11563] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2663.041336][T11563] RBP: 00007fc55cf8b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2663.049482][T11563] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 04:45:08 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x3, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:08 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:08 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff04fc010200000000000006040000000000000000", 0x39}], 0x1) [ 2663.057845][T11563] R13: 00007fffb6e0760f R14: 00007fc55cf8b300 R15: 0000000000022000 [ 2663.071117][T11572] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 04:45:08 executing program 0 (fault-call:1 fault-nth:27): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:08 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0402020200000000000006040000000000000000", 0x39}], 0x1) 04:45:08 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2663.127321][T11579] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2663.139525][T11579] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2663.151283][T11584] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2663.231550][T11592] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2663.305716][T11585] FAULT_INJECTION: forcing a failure. [ 2663.305716][T11585] name failslab, interval 1, probability 0, space 0, times 0 [ 2663.319123][T11585] CPU: 1 PID: 11585 Comm: syz-executor.0 Not tainted 5.13.0-rc3-syzkaller #0 [ 2663.328296][T11585] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2663.338521][T11585] Call Trace: [ 2663.341948][T11585] dump_stack+0x137/0x19d [ 2663.346322][T11585] should_fail+0x23c/0x250 [ 2663.350817][T11585] __should_failslab+0x81/0x90 [ 2663.355867][T11585] ? register_for_each_vma+0x372/0x890 [ 2663.361760][T11585] should_failslab+0x5/0x20 [ 2663.366287][T11585] kmem_cache_alloc_trace+0x49/0x310 [ 2663.371680][T11585] ? register_for_each_vma+0x372/0x890 [ 2663.377279][T11585] ? vma_interval_tree_iter_next+0x263/0x280 [ 2663.383375][T11585] register_for_each_vma+0x372/0x890 [ 2663.389221][T11585] __uprobe_register+0x3f4/0x8a0 [ 2663.394358][T11585] uprobe_register_refctr+0x29/0x40 [ 2663.400057][T11585] probe_event_enable+0x2be/0x7d0 [ 2663.405092][T11585] ? __uprobe_trace_func+0x430/0x430 [ 2663.410501][T11585] trace_uprobe_register+0x88/0x410 [ 2663.415980][T11585] perf_trace_event_init+0x34e/0x790 [ 2663.421550][T11585] perf_uprobe_init+0xf5/0x140 [ 2663.426407][T11585] perf_uprobe_event_init+0xde/0x140 [ 2663.431735][T11585] perf_try_init_event+0x21a/0x400 [ 2663.437315][T11585] perf_event_alloc+0xa60/0x1790 [ 2663.442492][T11585] __se_sys_perf_event_open+0x5c7/0x2740 [ 2663.448638][T11585] ? vfs_write+0x50c/0x770 [ 2663.453077][T11585] __x64_sys_perf_event_open+0x63/0x70 [ 2663.458645][T11585] do_syscall_64+0x4a/0x90 [ 2663.463339][T11585] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2663.469232][T11585] RIP: 0033:0x4665d9 [ 2663.473362][T11585] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2663.493768][T11585] RSP: 002b:00007fc55cf8b188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2663.502209][T11585] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2663.510712][T11585] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2663.518741][T11585] RBP: 00007fc55cf8b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2663.526716][T11585] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2663.535011][T11585] R13: 00007fffb6e0760f R14: 00007fc55cf8b300 R15: 0000000000022000 04:45:09 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0xc, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:09 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0404020200000000000006040000000000000000", 0x39}], 0x1) 04:45:09 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:09 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff040c020200000000000006040000000000000000", 0x39}], 0x1) 04:45:09 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:09 executing program 0 (fault-call:1 fault-nth:28): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:09 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff040e020200000000000006040000000000000000", 0x39}], 0x1) 04:45:09 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:09 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:09 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0412020200000000000006040000000000000000", 0x39}], 0x1) [ 2663.986355][T11617] FAULT_INJECTION: forcing a failure. [ 2663.986355][T11617] name failslab, interval 1, probability 0, space 0, times 0 [ 2663.999012][T11617] CPU: 1 PID: 11617 Comm: syz-executor.0 Not tainted 5.13.0-rc3-syzkaller #0 [ 2664.007917][T11617] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2664.018085][T11617] Call Trace: [ 2664.021377][T11617] dump_stack+0x137/0x19d [ 2664.025833][T11617] should_fail+0x23c/0x250 [ 2664.030501][T11617] __should_failslab+0x81/0x90 [ 2664.035460][T11617] ? register_for_each_vma+0x372/0x890 [ 2664.041182][T11617] should_failslab+0x5/0x20 [ 2664.045847][T11617] kmem_cache_alloc_trace+0x49/0x310 [ 2664.051254][T11617] ? register_for_each_vma+0x372/0x890 [ 2664.056975][T11617] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2664.062987][T11617] register_for_each_vma+0x372/0x890 [ 2664.068415][T11617] __uprobe_register+0x3f4/0x8a0 [ 2664.073603][T11617] uprobe_register_refctr+0x29/0x40 [ 2664.078809][T11617] probe_event_enable+0x2be/0x7d0 [ 2664.083824][T11617] ? __uprobe_trace_func+0x430/0x430 [ 2664.089240][T11617] trace_uprobe_register+0x88/0x410 [ 2664.094662][T11617] perf_trace_event_init+0x34e/0x790 [ 2664.099993][T11617] perf_uprobe_init+0xf5/0x140 [ 2664.104796][T11617] perf_uprobe_event_init+0xde/0x140 [ 2664.110109][T11617] perf_try_init_event+0x21a/0x400 [ 2664.115228][T11617] perf_event_alloc+0xa60/0x1790 [ 2664.120197][T11617] __se_sys_perf_event_open+0x5c7/0x2740 [ 2664.125948][T11617] ? vfs_write+0x50c/0x770 [ 2664.130695][T11617] __x64_sys_perf_event_open+0x63/0x70 [ 2664.136302][T11617] do_syscall_64+0x4a/0x90 [ 2664.140761][T11617] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2664.146736][T11617] RIP: 0033:0x4665d9 [ 2664.151429][T11617] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2664.171572][T11617] RSP: 002b:00007fc55cf8b188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a 04:45:10 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:10 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0414020200000000000006040000000000000000", 0x39}], 0x1) 04:45:10 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0xd, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2664.180345][T11617] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2664.188426][T11617] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2664.196508][T11617] RBP: 00007fc55cf8b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2664.204515][T11617] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2664.212772][T11617] R13: 00007fffb6e0760f R14: 00007fc55cf8b300 R15: 0000000000022000 04:45:10 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0418020200000000000006040000000000000000", 0x39}], 0x1) 04:45:10 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:10 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff041e020200000000000006040000000000000000", 0x39}], 0x1) 04:45:10 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0426020200000000000006040000000000000000", 0x39}], 0x1) 04:45:10 executing program 0 (fault-call:1 fault-nth:29): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:10 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0444020200000000000006040000000000000000", 0x39}], 0x1) [ 2664.778493][T11672] FAULT_INJECTION: forcing a failure. [ 2664.778493][T11672] name failslab, interval 1, probability 0, space 0, times 0 [ 2664.791293][T11672] CPU: 1 PID: 11672 Comm: syz-executor.0 Not tainted 5.13.0-rc3-syzkaller #0 [ 2664.800088][T11672] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2664.810291][T11672] Call Trace: [ 2664.813765][T11672] dump_stack+0x137/0x19d [ 2664.818501][T11672] should_fail+0x23c/0x250 [ 2664.823042][T11672] __should_failslab+0x81/0x90 [ 2664.828006][T11672] ? register_for_each_vma+0x372/0x890 [ 2664.833456][T11672] should_failslab+0x5/0x20 [ 2664.838397][T11672] kmem_cache_alloc_trace+0x49/0x310 [ 2664.843791][T11672] ? register_for_each_vma+0x372/0x890 [ 2664.849259][T11672] ? vma_interval_tree_iter_next+0x263/0x280 [ 2664.855230][T11672] register_for_each_vma+0x372/0x890 [ 2664.860823][T11672] __uprobe_register+0x3f4/0x8a0 [ 2664.865964][T11672] uprobe_register_refctr+0x29/0x40 [ 2664.871366][T11672] probe_event_enable+0x2be/0x7d0 [ 2664.876544][T11672] ? __uprobe_trace_func+0x430/0x430 [ 2664.882012][T11672] trace_uprobe_register+0x88/0x410 [ 2664.887530][T11672] perf_trace_event_init+0x34e/0x790 [ 2664.892903][T11672] perf_uprobe_init+0xf5/0x140 [ 2664.897763][T11672] perf_uprobe_event_init+0xde/0x140 [ 2664.903327][T11672] perf_try_init_event+0x21a/0x400 [ 2664.908738][T11672] perf_event_alloc+0xa60/0x1790 [ 2664.914133][T11672] __se_sys_perf_event_open+0x5c7/0x2740 [ 2664.920183][T11672] ? vfs_write+0x50c/0x770 [ 2664.924626][T11672] __x64_sys_perf_event_open+0x63/0x70 [ 2664.930218][T11672] do_syscall_64+0x4a/0x90 [ 2664.934703][T11672] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2664.940763][T11672] RIP: 0033:0x4665d9 [ 2664.944896][T11672] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2664.965950][T11672] RSP: 002b:00007fc55cf8b188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2664.974731][T11672] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2664.982916][T11672] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2664.991252][T11672] RBP: 00007fc55cf8b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2664.999393][T11672] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2665.007552][T11672] R13: 00007fffb6e0760f R14: 00007fc55cf8b300 R15: 0000000000022000 04:45:10 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:10 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff044c020200000000000006040000000000000000", 0x39}], 0x1) 04:45:10 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x8, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:10 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:10 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0xe, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:10 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0454020200000000000006040000000000000000", 0x39}], 0x1) 04:45:10 executing program 0 (fault-call:1 fault-nth:30): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:11 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:11 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0400030200000000000006040000000000000000", 0x39}], 0x1) 04:45:11 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0402040200000000000006040000000000000000", 0x39}], 0x1) [ 2665.318108][T11699] FAULT_INJECTION: forcing a failure. [ 2665.318108][T11699] name failslab, interval 1, probability 0, space 0, times 0 [ 2665.331297][T11699] CPU: 1 PID: 11699 Comm: syz-executor.0 Not tainted 5.13.0-rc3-syzkaller #0 [ 2665.340060][T11699] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2665.351231][T11699] Call Trace: [ 2665.354969][T11699] dump_stack+0x137/0x19d [ 2665.359944][T11699] should_fail+0x23c/0x250 [ 2665.364763][T11699] __should_failslab+0x81/0x90 [ 2665.369752][T11699] ? register_for_each_vma+0x372/0x890 [ 2665.376249][T11699] should_failslab+0x5/0x20 [ 2665.381110][T11699] kmem_cache_alloc_trace+0x49/0x310 [ 2665.386578][T11699] ? register_for_each_vma+0x372/0x890 [ 2665.392086][T11699] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2665.398498][T11699] register_for_each_vma+0x372/0x890 [ 2665.403870][T11699] __uprobe_register+0x3f4/0x8a0 [ 2665.408806][T11699] uprobe_register_refctr+0x29/0x40 [ 2665.414172][T11699] probe_event_enable+0x2be/0x7d0 [ 2665.419294][T11699] ? __uprobe_trace_func+0x430/0x430 [ 2665.424596][T11699] trace_uprobe_register+0x88/0x410 [ 2665.429966][T11699] perf_trace_event_init+0x34e/0x790 [ 2665.435279][T11699] perf_uprobe_init+0xf5/0x140 [ 2665.440037][T11699] perf_uprobe_event_init+0xde/0x140 [ 2665.445953][T11699] perf_try_init_event+0x21a/0x400 [ 2665.451296][T11699] perf_event_alloc+0xa60/0x1790 [ 2665.456221][T11699] __se_sys_perf_event_open+0x5c7/0x2740 [ 2665.461940][T11699] ? vfs_write+0x50c/0x770 [ 2665.466473][T11699] __x64_sys_perf_event_open+0x63/0x70 [ 2665.472090][T11699] do_syscall_64+0x4a/0x90 [ 2665.476513][T11699] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2665.482475][T11699] RIP: 0033:0x4665d9 [ 2665.486381][T11699] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2665.506292][T11699] RSP: 002b:00007fc55cf8b188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a 04:45:11 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff04ff040200000000000006040000000000000000", 0x39}], 0x1) [ 2665.514760][T11699] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2665.522767][T11699] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2665.530826][T11699] RBP: 00007fc55cf8b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2665.539185][T11699] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2665.547620][T11699] R13: 00007fffb6e0760f R14: 00007fc55cf8b300 R15: 0000000000022000 04:45:11 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0xa, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:11 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:11 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0400050200000000000006040000000000000000", 0x39}], 0x1) 04:45:11 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x10, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:11 executing program 0 (fault-call:1 fault-nth:31): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:11 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2665.902328][T11737] FAULT_INJECTION: forcing a failure. [ 2665.902328][T11737] name failslab, interval 1, probability 0, space 0, times 0 [ 2665.915003][T11737] CPU: 1 PID: 11737 Comm: syz-executor.0 Not tainted 5.13.0-rc3-syzkaller #0 [ 2665.924146][T11737] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2665.934761][T11737] Call Trace: [ 2665.938039][T11737] dump_stack+0x137/0x19d [ 2665.942478][T11737] should_fail+0x23c/0x250 [ 2665.947099][T11737] __should_failslab+0x81/0x90 [ 2665.952269][T11737] ? register_for_each_vma+0x372/0x890 [ 2665.958342][T11737] should_failslab+0x5/0x20 [ 2665.962868][T11737] kmem_cache_alloc_trace+0x49/0x310 [ 2665.969154][T11737] ? register_for_each_vma+0x372/0x890 [ 2665.974901][T11737] ? vma_interval_tree_iter_next+0x263/0x280 [ 2665.981285][T11737] register_for_each_vma+0x372/0x890 [ 2665.986694][T11737] __uprobe_register+0x3f4/0x8a0 [ 2665.991742][T11737] uprobe_register_refctr+0x29/0x40 [ 2665.996944][T11737] probe_event_enable+0x2be/0x7d0 [ 2666.002069][T11737] ? __uprobe_trace_func+0x430/0x430 [ 2666.007555][T11737] trace_uprobe_register+0x88/0x410 [ 2666.012790][T11737] perf_trace_event_init+0x34e/0x790 [ 2666.018092][T11737] perf_uprobe_init+0xf5/0x140 [ 2666.022861][T11737] perf_uprobe_event_init+0xde/0x140 [ 2666.028294][T11737] perf_try_init_event+0x21a/0x400 [ 2666.033609][T11737] perf_event_alloc+0xa60/0x1790 [ 2666.038557][T11737] __se_sys_perf_event_open+0x5c7/0x2740 [ 2666.044230][T11737] ? vfs_write+0x50c/0x770 [ 2666.048670][T11737] __x64_sys_perf_event_open+0x63/0x70 [ 2666.054438][T11737] do_syscall_64+0x4a/0x90 [ 2666.058856][T11737] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2666.065454][T11737] RIP: 0033:0x4665d9 [ 2666.069335][T11737] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2666.089803][T11737] RSP: 002b:00007fc55cf8b188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a 04:45:11 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0xb, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:11 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0400060200000000000006040000000000000000", 0x39}], 0x1) 04:45:11 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0400070200000000000006040000000000000000", 0x39}], 0x1) [ 2666.099009][T11737] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2666.107159][T11737] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2666.115208][T11737] RBP: 00007fc55cf8b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2666.123213][T11737] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2666.131329][T11737] R13: 00007fffb6e0760f R14: 00007fc55cf8b300 R15: 0000000000022000 04:45:12 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0400090200000000000006040000000000000000", 0x39}], 0x1) 04:45:12 executing program 0 (fault-call:1 fault-nth:32): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:12 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0xc, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:12 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:12 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff04000a0200000000000006040000000000000000", 0x39}], 0x1) [ 2666.559348][T11761] FAULT_INJECTION: forcing a failure. [ 2666.559348][T11761] name failslab, interval 1, probability 0, space 0, times 0 [ 2666.572677][T11761] CPU: 0 PID: 11761 Comm: syz-executor.0 Not tainted 5.13.0-rc3-syzkaller #0 [ 2666.581624][T11761] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2666.592264][T11761] Call Trace: [ 2666.595660][T11761] dump_stack+0x137/0x19d [ 2666.600255][T11761] should_fail+0x23c/0x250 [ 2666.604687][T11761] __should_failslab+0x81/0x90 [ 2666.609644][T11761] ? register_for_each_vma+0x372/0x890 [ 2666.615156][T11761] should_failslab+0x5/0x20 [ 2666.619759][T11761] kmem_cache_alloc_trace+0x49/0x310 [ 2666.625038][T11761] ? register_for_each_vma+0x372/0x890 [ 2666.630615][T11761] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2666.636707][T11761] register_for_each_vma+0x372/0x890 [ 2666.642694][T11761] __uprobe_register+0x3f4/0x8a0 [ 2666.647722][T11761] uprobe_register_refctr+0x29/0x40 [ 2666.653243][T11761] probe_event_enable+0x2be/0x7d0 [ 2666.658302][T11761] ? __uprobe_trace_func+0x430/0x430 [ 2666.663730][T11761] trace_uprobe_register+0x88/0x410 [ 2666.668948][T11761] perf_trace_event_init+0x34e/0x790 [ 2666.674228][T11761] perf_uprobe_init+0xf5/0x140 [ 2666.679181][T11761] perf_uprobe_event_init+0xde/0x140 [ 2666.684518][T11761] perf_try_init_event+0x21a/0x400 [ 2666.690129][T11761] perf_event_alloc+0xa60/0x1790 [ 2666.695191][T11761] __se_sys_perf_event_open+0x5c7/0x2740 [ 2666.701040][T11761] ? vfs_write+0x50c/0x770 [ 2666.705754][T11761] __x64_sys_perf_event_open+0x63/0x70 [ 2666.711301][T11761] do_syscall_64+0x4a/0x90 [ 2666.715904][T11761] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2666.722331][T11761] RIP: 0033:0x4665d9 [ 2666.726224][T11761] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2666.746959][T11761] RSP: 002b:00007fc55cf8b188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a 04:45:12 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2666.755550][T11761] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2666.764130][T11761] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2666.772490][T11761] RBP: 00007fc55cf8b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2666.780784][T11761] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2666.788850][T11761] R13: 00007fffb6e0760f R14: 00007fc55cf8b300 R15: 0000000000022000 04:45:12 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x11, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:12 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff04000b0200000000000006040000000000000000", 0x39}], 0x1) 04:45:12 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0xd, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:12 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff04000c0200000000000006040000000000000000", 0x39}], 0x1) 04:45:12 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff04020c0200000000000006040000000000000000", 0x39}], 0x1) 04:45:12 executing program 0 (fault-call:1 fault-nth:33): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:12 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff04000d0200000000000006040000000000000000", 0x39}], 0x1) 04:45:12 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff04000e0200000000000006040000000000000000", 0x39}], 0x1) 04:45:13 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff04020e0200000000000006040000000000000000", 0x39}], 0x1) [ 2667.398322][T11803] FAULT_INJECTION: forcing a failure. [ 2667.398322][T11803] name failslab, interval 1, probability 0, space 0, times 0 [ 2667.411378][T11803] CPU: 1 PID: 11803 Comm: syz-executor.0 Not tainted 5.13.0-rc3-syzkaller #0 [ 2667.420626][T11803] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2667.430773][T11803] Call Trace: [ 2667.434402][T11803] dump_stack+0x137/0x19d [ 2667.438854][T11803] should_fail+0x23c/0x250 [ 2667.443261][T11803] __should_failslab+0x81/0x90 [ 2667.448319][T11803] ? register_for_each_vma+0x372/0x890 [ 2667.453782][T11803] should_failslab+0x5/0x20 [ 2667.458888][T11803] kmem_cache_alloc_trace+0x49/0x310 [ 2667.464227][T11803] ? register_for_each_vma+0x372/0x890 [ 2667.469831][T11803] ? vma_interval_tree_iter_next+0x263/0x280 [ 2667.475823][T11803] register_for_each_vma+0x372/0x890 [ 2667.481331][T11803] __uprobe_register+0x3f4/0x8a0 [ 2667.486403][T11803] uprobe_register_refctr+0x29/0x40 [ 2667.491687][T11803] probe_event_enable+0x2be/0x7d0 [ 2667.496716][T11803] ? __uprobe_trace_func+0x430/0x430 [ 2667.502083][T11803] trace_uprobe_register+0x88/0x410 [ 2667.507395][T11803] perf_trace_event_init+0x34e/0x790 [ 2667.512745][T11803] perf_uprobe_init+0xf5/0x140 [ 2667.517535][T11803] perf_uprobe_event_init+0xde/0x140 [ 2667.523313][T11803] perf_try_init_event+0x21a/0x400 [ 2667.528528][T11803] perf_event_alloc+0xa60/0x1790 [ 2667.533670][T11803] __se_sys_perf_event_open+0x5c7/0x2740 [ 2667.539537][T11803] ? vfs_write+0x50c/0x770 [ 2667.544069][T11803] __x64_sys_perf_event_open+0x63/0x70 [ 2667.549645][T11803] do_syscall_64+0x4a/0x90 [ 2667.554186][T11803] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2667.560669][T11803] RIP: 0033:0x4665d9 [ 2667.564994][T11803] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2667.587407][T11803] RSP: 002b:00007fc55cf8b188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2667.596340][T11803] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2667.604778][T11803] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2667.612780][T11803] RBP: 00007fc55cf8b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2667.621215][T11803] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2667.629604][T11803] R13: 00007fffb6e0760f R14: 00007fc55cf8b300 R15: 0000000000022000 04:45:13 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:13 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0xe, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:13 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:13 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff04000f0200000000000006040000000000000000", 0x39}], 0x1) 04:45:13 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x12, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:13 executing program 0 (fault-call:1 fault-nth:34): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:13 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0400110200000000000006040000000000000000", 0x39}], 0x1) [ 2667.756515][T11830] validate_nla: 78 callbacks suppressed [ 2667.756529][T11830] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2667.778037][T11830] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2667.790400][T11833] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 04:45:13 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x10, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:13 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0400120200000000000006040000000000000000", 0x39}], 0x1) [ 2667.843557][T11841] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2667.852080][T11841] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2667.862851][T11842] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2667.908426][T11836] FAULT_INJECTION: forcing a failure. [ 2667.908426][T11836] name failslab, interval 1, probability 0, space 0, times 0 [ 2667.921865][T11836] CPU: 1 PID: 11836 Comm: syz-executor.0 Not tainted 5.13.0-rc3-syzkaller #0 [ 2667.931240][T11836] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2667.941766][T11836] Call Trace: [ 2667.945122][T11836] dump_stack+0x137/0x19d [ 2667.949822][T11836] should_fail+0x23c/0x250 [ 2667.954653][T11836] __should_failslab+0x81/0x90 [ 2667.959704][T11836] ? register_for_each_vma+0x372/0x890 [ 2667.965212][T11836] should_failslab+0x5/0x20 [ 2667.969831][T11836] kmem_cache_alloc_trace+0x49/0x310 [ 2667.975243][T11836] ? register_for_each_vma+0x372/0x890 [ 2667.981362][T11836] ? vma_interval_tree_iter_next+0x263/0x280 [ 2667.987868][T11836] register_for_each_vma+0x372/0x890 [ 2667.993468][T11836] __uprobe_register+0x3f4/0x8a0 [ 2667.998671][T11836] uprobe_register_refctr+0x29/0x40 [ 2668.004389][T11836] probe_event_enable+0x2be/0x7d0 [ 2668.009424][T11836] ? __uprobe_trace_func+0x430/0x430 [ 2668.014848][T11836] trace_uprobe_register+0x88/0x410 [ 2668.020186][T11836] perf_trace_event_init+0x34e/0x790 [ 2668.025494][T11836] perf_uprobe_init+0xf5/0x140 [ 2668.030385][T11836] perf_uprobe_event_init+0xde/0x140 [ 2668.035681][T11836] perf_try_init_event+0x21a/0x400 [ 2668.041214][T11836] perf_event_alloc+0xa60/0x1790 [ 2668.046338][T11836] __se_sys_perf_event_open+0x5c7/0x2740 [ 2668.051960][T11836] ? vfs_write+0x50c/0x770 [ 2668.056382][T11836] __x64_sys_perf_event_open+0x63/0x70 [ 2668.062589][T11836] do_syscall_64+0x4a/0x90 [ 2668.067311][T11836] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2668.073854][T11836] RIP: 0033:0x4665d9 [ 2668.077932][T11836] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2668.098806][T11836] RSP: 002b:00007fc55cf8b188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2668.108165][T11836] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2668.116216][T11836] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2668.124656][T11836] RBP: 00007fc55cf8b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2668.133132][T11836] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2668.141356][T11836] R13: 00007fffb6e0760f R14: 00007fc55cf8b300 R15: 0000000000022000 [ 2668.151404][T11848] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 04:45:14 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0402120200000000000006040000000000000000", 0x39}], 0x1) [ 2668.160590][T11848] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2668.190800][T11850] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 04:45:14 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0402140200000000000006040000000000000000", 0x39}], 0x1) 04:45:14 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x27, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2668.359370][T11854] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 04:45:14 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:14 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x11, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:14 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0400160200000000000006040000000000000000", 0x39}], 0x1) 04:45:14 executing program 0 (fault-call:1 fault-nth:35): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:14 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:14 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x12, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:14 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0400170200000000000006040000000000000000", 0x39}], 0x1) 04:45:14 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x48, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:14 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0400180200000000000006040000000000000000", 0x39}], 0x1) [ 2668.722148][T11881] FAULT_INJECTION: forcing a failure. [ 2668.722148][T11881] name failslab, interval 1, probability 0, space 0, times 0 [ 2668.734855][T11881] CPU: 0 PID: 11881 Comm: syz-executor.0 Not tainted 5.13.0-rc3-syzkaller #0 [ 2668.743730][T11881] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2668.753790][T11881] Call Trace: [ 2668.757109][T11881] dump_stack+0x137/0x19d [ 2668.761584][T11881] should_fail+0x23c/0x250 [ 2668.766394][T11881] __should_failslab+0x81/0x90 [ 2668.771197][T11881] ? register_for_each_vma+0x372/0x890 [ 2668.776666][T11881] should_failslab+0x5/0x20 [ 2668.781222][T11881] kmem_cache_alloc_trace+0x49/0x310 [ 2668.786515][T11881] ? register_for_each_vma+0x372/0x890 [ 2668.792000][T11881] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2668.797984][T11881] register_for_each_vma+0x372/0x890 [ 2668.803279][T11881] __uprobe_register+0x3f4/0x8a0 [ 2668.808238][T11881] uprobe_register_refctr+0x29/0x40 [ 2668.813517][T11881] probe_event_enable+0x2be/0x7d0 [ 2668.818570][T11881] ? __uprobe_trace_func+0x430/0x430 [ 2668.823871][T11881] trace_uprobe_register+0x88/0x410 [ 2668.829277][T11881] perf_trace_event_init+0x34e/0x790 [ 2668.834641][T11881] perf_uprobe_init+0xf5/0x140 [ 2668.839416][T11881] perf_uprobe_event_init+0xde/0x140 [ 2668.844745][T11881] perf_try_init_event+0x21a/0x400 [ 2668.849962][T11881] perf_event_alloc+0xa60/0x1790 [ 2668.854906][T11881] __se_sys_perf_event_open+0x5c7/0x2740 [ 2668.860560][T11881] ? vfs_write+0x50c/0x770 [ 2668.864980][T11881] __x64_sys_perf_event_open+0x63/0x70 [ 2668.870454][T11881] do_syscall_64+0x4a/0x90 [ 2668.874907][T11881] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2668.880818][T11881] RIP: 0033:0x4665d9 [ 2668.884730][T11881] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2668.904367][T11881] RSP: 002b:00007fc55cf8b188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2668.912880][T11881] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 04:45:14 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0402180200000000000006040000000000000000", 0x39}], 0x1) [ 2668.920859][T11881] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2668.928972][T11881] RBP: 00007fc55cf8b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2668.936968][T11881] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2668.945179][T11881] R13: 00007fffb6e0760f R14: 00007fc55cf8b300 R15: 0000000000022000 04:45:14 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff04001e0200000000000006040000000000000000", 0x39}], 0x1) 04:45:14 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x27, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:15 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:15 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff04021e0200000000000006040000000000000000", 0x39}], 0x1) 04:45:15 executing program 0 (fault-call:1 fault-nth:36): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:15 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x48, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:15 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:15 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff04001f0200000000000006040000000000000000", 0x39}], 0x1) 04:45:15 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x4c, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2669.448800][T11922] FAULT_INJECTION: forcing a failure. [ 2669.448800][T11922] name failslab, interval 1, probability 0, space 0, times 0 [ 2669.462902][T11922] CPU: 1 PID: 11922 Comm: syz-executor.0 Not tainted 5.13.0-rc3-syzkaller #0 [ 2669.471744][T11922] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2669.482284][T11922] Call Trace: [ 2669.485567][T11922] dump_stack+0x137/0x19d [ 2669.490334][T11922] should_fail+0x23c/0x250 [ 2669.494764][T11922] __should_failslab+0x81/0x90 [ 2669.500083][T11922] ? register_for_each_vma+0x372/0x890 [ 2669.505557][T11922] should_failslab+0x5/0x20 [ 2669.510114][T11922] kmem_cache_alloc_trace+0x49/0x310 [ 2669.515601][T11922] ? register_for_each_vma+0x372/0x890 [ 2669.521093][T11922] ? vma_interval_tree_iter_next+0x263/0x280 [ 2669.527264][T11922] register_for_each_vma+0x372/0x890 [ 2669.532660][T11922] __uprobe_register+0x3f4/0x8a0 [ 2669.537622][T11922] uprobe_register_refctr+0x29/0x40 [ 2669.543150][T11922] probe_event_enable+0x2be/0x7d0 [ 2669.548379][T11922] ? __uprobe_trace_func+0x430/0x430 [ 2669.553731][T11922] trace_uprobe_register+0x88/0x410 [ 2669.558993][T11922] perf_trace_event_init+0x34e/0x790 [ 2669.564287][T11922] perf_uprobe_init+0xf5/0x140 [ 2669.569173][T11922] perf_uprobe_event_init+0xde/0x140 [ 2669.574561][T11922] perf_try_init_event+0x21a/0x400 [ 2669.579845][T11922] perf_event_alloc+0xa60/0x1790 [ 2669.584937][T11922] __se_sys_perf_event_open+0x5c7/0x2740 [ 2669.590581][T11922] ? vfs_write+0x50c/0x770 [ 2669.595083][T11922] __x64_sys_perf_event_open+0x63/0x70 [ 2669.600529][T11922] do_syscall_64+0x4a/0x90 [ 2669.604957][T11922] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2669.610856][T11922] RIP: 0033:0x4665d9 [ 2669.614747][T11922] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2669.634566][T11922] RSP: 002b:00007fc55cf8b188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a 04:45:15 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0400200200000000000006040000000000000000", 0x39}], 0x1) [ 2669.643448][T11922] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2669.651549][T11922] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2669.659703][T11922] RBP: 00007fc55cf8b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2669.669264][T11922] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2669.677669][T11922] R13: 00007fffb6e0760f R14: 00007fc55cf8b300 R15: 0000000000022000 04:45:15 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x4c, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:15 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0400250200000000000006040000000000000000", 0x39}], 0x1) 04:45:15 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0402260200000000000006040000000000000000", 0x39}], 0x1) 04:45:15 executing program 0 (fault-call:1 fault-nth:37): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:15 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x68, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:15 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:15 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x68, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:15 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff04003f0200000000000006040000000000000000", 0x39}], 0x1) [ 2670.069287][T11957] FAULT_INJECTION: forcing a failure. [ 2670.069287][T11957] name failslab, interval 1, probability 0, space 0, times 0 [ 2670.082580][T11957] CPU: 1 PID: 11957 Comm: syz-executor.0 Not tainted 5.13.0-rc3-syzkaller #0 [ 2670.091571][T11957] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2670.102108][T11957] Call Trace: [ 2670.105486][T11957] dump_stack+0x137/0x19d [ 2670.110609][T11957] should_fail+0x23c/0x250 [ 2670.115964][T11957] __should_failslab+0x81/0x90 [ 2670.120728][T11957] ? register_for_each_vma+0x372/0x890 [ 2670.126430][T11957] should_failslab+0x5/0x20 [ 2670.131175][T11957] kmem_cache_alloc_trace+0x49/0x310 [ 2670.136640][T11957] ? register_for_each_vma+0x372/0x890 [ 2670.142418][T11957] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2670.148691][T11957] register_for_each_vma+0x372/0x890 [ 2670.154203][T11957] __uprobe_register+0x3f4/0x8a0 [ 2670.159652][T11957] uprobe_register_refctr+0x29/0x40 [ 2670.164896][T11957] probe_event_enable+0x2be/0x7d0 [ 2670.170485][T11957] ? __uprobe_trace_func+0x430/0x430 [ 2670.176149][T11957] trace_uprobe_register+0x88/0x410 [ 2670.181934][T11957] perf_trace_event_init+0x34e/0x790 [ 2670.188076][T11957] perf_uprobe_init+0xf5/0x140 [ 2670.193142][T11957] perf_uprobe_event_init+0xde/0x140 [ 2670.198674][T11957] perf_try_init_event+0x21a/0x400 [ 2670.204103][T11957] perf_event_alloc+0xa60/0x1790 [ 2670.209032][T11957] __se_sys_perf_event_open+0x5c7/0x2740 [ 2670.214749][T11957] ? vfs_write+0x50c/0x770 [ 2670.219396][T11957] __x64_sys_perf_event_open+0x63/0x70 [ 2670.225437][T11957] do_syscall_64+0x4a/0x90 [ 2670.229966][T11957] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2670.236335][T11957] RIP: 0033:0x4665d9 [ 2670.240238][T11957] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2670.259958][T11957] RSP: 002b:00007fc55cf8b188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a 04:45:16 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:16 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0402440200000000000006040000000000000000", 0x39}], 0x1) [ 2670.268518][T11957] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2670.277029][T11957] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2670.284999][T11957] RBP: 00007fc55cf8b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2670.293100][T11957] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2670.301250][T11957] R13: 00007fffb6e0760f R14: 00007fc55cf8b300 R15: 0000000000022000 04:45:16 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0400480200000000000006040000000000000000", 0x39}], 0x1) 04:45:16 executing program 0 (fault-call:1 fault-nth:38): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:16 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x6c, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:16 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff04004c0200000000000006040000000000000000", 0x39}], 0x1) 04:45:16 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:16 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff04024c0200000000000006040000000000000000", 0x39}], 0x1) [ 2670.738138][T11991] FAULT_INJECTION: forcing a failure. [ 2670.738138][T11991] name failslab, interval 1, probability 0, space 0, times 0 [ 2670.751101][T11991] CPU: 1 PID: 11991 Comm: syz-executor.0 Not tainted 5.13.0-rc3-syzkaller #0 [ 2670.760010][T11991] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2670.770195][T11991] Call Trace: [ 2670.773466][T11991] dump_stack+0x137/0x19d [ 2670.777877][T11991] should_fail+0x23c/0x250 [ 2670.782377][T11991] __should_failslab+0x81/0x90 [ 2670.787133][T11991] ? register_for_each_vma+0x372/0x890 [ 2670.792628][T11991] should_failslab+0x5/0x20 [ 2670.797120][T11991] kmem_cache_alloc_trace+0x49/0x310 [ 2670.802447][T11991] ? register_for_each_vma+0x372/0x890 [ 2670.808026][T11991] ? vma_interval_tree_iter_next+0x263/0x280 [ 2670.814193][T11991] register_for_each_vma+0x372/0x890 [ 2670.820218][T11991] __uprobe_register+0x3f4/0x8a0 [ 2670.825201][T11991] uprobe_register_refctr+0x29/0x40 [ 2670.830682][T11991] probe_event_enable+0x2be/0x7d0 [ 2670.835931][T11991] ? __uprobe_trace_func+0x430/0x430 [ 2670.841554][T11991] trace_uprobe_register+0x88/0x410 [ 2670.846977][T11991] perf_trace_event_init+0x34e/0x790 [ 2670.852368][T11991] perf_uprobe_init+0xf5/0x140 [ 2670.857252][T11991] perf_uprobe_event_init+0xde/0x140 [ 2670.862588][T11991] perf_try_init_event+0x21a/0x400 [ 2670.867781][T11991] perf_event_alloc+0xa60/0x1790 [ 2670.872823][T11991] __se_sys_perf_event_open+0x5c7/0x2740 [ 2670.878438][T11991] ? vfs_write+0x50c/0x770 [ 2670.882859][T11991] __x64_sys_perf_event_open+0x63/0x70 [ 2670.888309][T11991] do_syscall_64+0x4a/0x90 [ 2670.892716][T11991] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2670.898764][T11991] RIP: 0033:0x4665d9 [ 2670.902662][T11991] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2670.922377][T11991] RSP: 002b:00007fc55cf8b188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2670.930933][T11991] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 04:45:16 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0402540200000000000006040000000000000000", 0x39}], 0x1) [ 2670.939039][T11991] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2670.947018][T11991] RBP: 00007fc55cf8b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2670.955083][T11991] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2670.963047][T11991] R13: 00007fffb6e0760f R14: 00007fc55cf8b300 R15: 0000000000022000 04:45:16 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:16 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x74, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:16 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0400600200000000000006040000000000000000", 0x39}], 0x1) 04:45:16 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:16 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0400680200000000000006040000000000000000", 0x39}], 0x1) 04:45:16 executing program 0 (fault-call:1 fault-nth:39): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:16 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x74, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:17 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff04006c0200000000000006040000000000000000", 0x39}], 0x1) 04:45:17 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0400740200000000000006040000000000000000", 0x39}], 0x1) 04:45:17 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff04007a0200000000000006040000000000000000", 0x39}], 0x1) [ 2671.333218][T12028] FAULT_INJECTION: forcing a failure. [ 2671.333218][T12028] name failslab, interval 1, probability 0, space 0, times 0 [ 2671.346603][T12028] CPU: 1 PID: 12028 Comm: syz-executor.0 Not tainted 5.13.0-rc3-syzkaller #0 [ 2671.355758][T12028] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2671.365919][T12028] Call Trace: [ 2671.369203][T12028] dump_stack+0x137/0x19d [ 2671.373901][T12028] should_fail+0x23c/0x250 [ 2671.378458][T12028] __should_failslab+0x81/0x90 [ 2671.383261][T12028] ? register_for_each_vma+0x372/0x890 [ 2671.388736][T12028] should_failslab+0x5/0x20 [ 2671.393437][T12028] kmem_cache_alloc_trace+0x49/0x310 [ 2671.398788][T12028] ? register_for_each_vma+0x372/0x890 [ 2671.404353][T12028] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2671.410641][T12028] register_for_each_vma+0x372/0x890 [ 2671.415946][T12028] __uprobe_register+0x3f4/0x8a0 [ 2671.420875][T12028] uprobe_register_refctr+0x29/0x40 [ 2671.426213][T12028] probe_event_enable+0x2be/0x7d0 [ 2671.431255][T12028] ? __uprobe_trace_func+0x430/0x430 [ 2671.436646][T12028] trace_uprobe_register+0x88/0x410 [ 2671.441959][T12028] perf_trace_event_init+0x34e/0x790 [ 2671.447249][T12028] perf_uprobe_init+0xf5/0x140 [ 2671.452030][T12028] perf_uprobe_event_init+0xde/0x140 [ 2671.457335][T12028] perf_try_init_event+0x21a/0x400 [ 2671.462572][T12028] perf_event_alloc+0xa60/0x1790 [ 2671.467754][T12028] __se_sys_perf_event_open+0x5c7/0x2740 [ 2671.473383][T12028] ? vfs_write+0x50c/0x770 [ 2671.477994][T12028] __x64_sys_perf_event_open+0x63/0x70 [ 2671.483547][T12028] do_syscall_64+0x4a/0x90 [ 2671.488274][T12028] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2671.494301][T12028] RIP: 0033:0x4665d9 [ 2671.498276][T12028] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2671.518508][T12028] RSP: 002b:00007fc55cf8b188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a 04:45:17 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0401aa0200000000000006040000000000000000", 0x39}], 0x1) 04:45:17 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x7a, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2671.527074][T12028] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2671.535053][T12028] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2671.543024][T12028] RBP: 00007fc55cf8b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2671.551224][T12028] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2671.559559][T12028] R13: 00007fffb6e0760f R14: 00007fc55cf8b300 R15: 0000000000022000 04:45:17 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:17 executing program 0 (fault-call:1 fault-nth:40): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:17 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0401b20200000000000006040000000000000000", 0x39}], 0x1) 04:45:17 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0xc0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:17 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:17 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:17 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0401ba0200000000000006040000000000000000", 0x39}], 0x1) [ 2671.990278][T12079] FAULT_INJECTION: forcing a failure. [ 2671.990278][T12079] name failslab, interval 1, probability 0, space 0, times 0 [ 2672.003436][T12079] CPU: 0 PID: 12079 Comm: syz-executor.0 Not tainted 5.13.0-rc3-syzkaller #0 [ 2672.012300][T12079] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2672.022344][T12079] Call Trace: [ 2672.025641][T12079] dump_stack+0x137/0x19d [ 2672.030270][T12079] should_fail+0x23c/0x250 [ 2672.034720][T12079] __should_failslab+0x81/0x90 [ 2672.039496][T12079] ? register_for_each_vma+0x372/0x890 [ 2672.045193][T12079] should_failslab+0x5/0x20 [ 2672.049795][T12079] kmem_cache_alloc_trace+0x49/0x310 [ 2672.055179][T12079] ? register_for_each_vma+0x372/0x890 [ 2672.060791][T12079] ? vma_interval_tree_iter_next+0x263/0x280 [ 2672.066852][T12079] register_for_each_vma+0x372/0x890 [ 2672.072179][T12079] __uprobe_register+0x3f4/0x8a0 [ 2672.077138][T12079] uprobe_register_refctr+0x29/0x40 [ 2672.082554][T12079] probe_event_enable+0x2be/0x7d0 [ 2672.087602][T12079] ? __uprobe_trace_func+0x430/0x430 [ 2672.092911][T12079] trace_uprobe_register+0x88/0x410 [ 2672.098118][T12079] perf_trace_event_init+0x34e/0x790 [ 2672.103428][T12079] perf_uprobe_init+0xf5/0x140 [ 2672.108260][T12079] perf_uprobe_event_init+0xde/0x140 [ 2672.113584][T12079] perf_try_init_event+0x21a/0x400 [ 2672.118705][T12079] perf_event_alloc+0xa60/0x1790 [ 2672.123645][T12079] __se_sys_perf_event_open+0x5c7/0x2740 [ 2672.129442][T12079] ? vfs_write+0x50c/0x770 [ 2672.133892][T12079] __x64_sys_perf_event_open+0x63/0x70 [ 2672.139474][T12079] do_syscall_64+0x4a/0x90 [ 2672.143892][T12079] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2672.149795][T12079] RIP: 0033:0x4665d9 [ 2672.153877][T12079] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2672.173980][T12079] RSP: 002b:00007fc55cf8b188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2672.182593][T12079] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 04:45:18 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0xff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:18 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0401e00200000000000006040000000000000000", 0x39}], 0x1) [ 2672.190833][T12079] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2672.199301][T12079] RBP: 00007fc55cf8b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2672.207478][T12079] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2672.215633][T12079] R13: 00007fffb6e0760f R14: 00007fc55cf8b300 R15: 0000000000022000 04:45:18 executing program 0 (fault-call:1 fault-nth:41): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:18 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0401e60200000000000006040000000000000000", 0x39}], 0x1) 04:45:18 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2672.608624][T12105] FAULT_INJECTION: forcing a failure. [ 2672.608624][T12105] name failslab, interval 1, probability 0, space 0, times 0 [ 2672.621588][T12105] CPU: 1 PID: 12105 Comm: syz-executor.0 Not tainted 5.13.0-rc3-syzkaller #0 [ 2672.630336][T12105] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2672.640401][T12105] Call Trace: [ 2672.643686][T12105] dump_stack+0x137/0x19d [ 2672.648025][T12105] should_fail+0x23c/0x250 [ 2672.652533][T12105] __should_failslab+0x81/0x90 [ 2672.657371][T12105] ? register_for_each_vma+0x372/0x890 [ 2672.663147][T12105] should_failslab+0x5/0x20 [ 2672.667967][T12105] kmem_cache_alloc_trace+0x49/0x310 [ 2672.673481][T12105] ? register_for_each_vma+0x372/0x890 [ 2672.679180][T12105] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2672.685270][T12105] register_for_each_vma+0x372/0x890 [ 2672.690882][T12105] __uprobe_register+0x3f4/0x8a0 [ 2672.696004][T12105] uprobe_register_refctr+0x29/0x40 [ 2672.703506][T12105] probe_event_enable+0x2be/0x7d0 [ 2672.708549][T12105] ? __uprobe_trace_func+0x430/0x430 [ 2672.713937][T12105] trace_uprobe_register+0x88/0x410 [ 2672.719143][T12105] perf_trace_event_init+0x34e/0x790 [ 2672.724555][T12105] perf_uprobe_init+0xf5/0x140 [ 2672.729359][T12105] perf_uprobe_event_init+0xde/0x140 [ 2672.734690][T12105] perf_try_init_event+0x21a/0x400 [ 2672.739885][T12105] perf_event_alloc+0xa60/0x1790 [ 2672.745098][T12105] __se_sys_perf_event_open+0x5c7/0x2740 [ 2672.750920][T12105] ? rb_erase+0x4cb/0x750 [ 2672.755497][T12105] __x64_sys_perf_event_open+0x63/0x70 [ 2672.760974][T12105] do_syscall_64+0x4a/0x90 [ 2672.765471][T12105] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2672.771488][T12105] RIP: 0033:0x4665d9 [ 2672.775548][T12105] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2672.795557][T12105] RSP: 002b:00007fc55cf8b188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2672.804013][T12105] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2672.812079][T12105] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2672.820133][T12105] RBP: 00007fc55cf8b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2672.828105][T12105] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2672.836079][T12105] R13: 00007fffb6e0760f R14: 00007fc55cf8b300 R15: 0000000000022000 04:45:18 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:18 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0401ea0200000000000006040000000000000000", 0x39}], 0x1) 04:45:18 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0xff, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:18 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:18 executing program 0 (fault-call:1 fault-nth:42): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:18 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:18 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0401ec0200000000000006040000000000000000", 0x39}], 0x1) [ 2672.976930][T12123] validate_nla: 82 callbacks suppressed [ 2672.976943][T12123] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2672.994311][T12123] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2673.009019][T12126] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2673.044537][T12121] FAULT_INJECTION: forcing a failure. [ 2673.044537][T12121] name failslab, interval 1, probability 0, space 0, times 0 [ 2673.057377][T12121] CPU: 1 PID: 12121 Comm: syz-executor.0 Not tainted 5.13.0-rc3-syzkaller #0 [ 2673.066194][T12121] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2673.076256][T12121] Call Trace: [ 2673.079566][T12121] dump_stack+0x137/0x19d [ 2673.083933][T12121] should_fail+0x23c/0x250 [ 2673.088482][T12121] __should_failslab+0x81/0x90 [ 2673.093302][T12121] ? register_for_each_vma+0x372/0x890 [ 2673.098876][T12121] should_failslab+0x5/0x20 [ 2673.103463][T12121] kmem_cache_alloc_trace+0x49/0x310 [ 2673.108736][T12121] ? register_for_each_vma+0x372/0x890 [ 2673.114337][T12121] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2673.120949][T12121] register_for_each_vma+0x372/0x890 [ 2673.126263][T12121] __uprobe_register+0x3f4/0x8a0 [ 2673.131194][T12121] uprobe_register_refctr+0x29/0x40 [ 2673.136417][T12121] probe_event_enable+0x2be/0x7d0 [ 2673.141456][T12121] ? __uprobe_trace_func+0x430/0x430 [ 2673.146757][T12121] trace_uprobe_register+0x88/0x410 [ 2673.151984][T12121] perf_trace_event_init+0x34e/0x790 [ 2673.157278][T12121] perf_uprobe_init+0xf5/0x140 [ 2673.162055][T12121] perf_uprobe_event_init+0xde/0x140 [ 2673.167454][T12121] perf_try_init_event+0x21a/0x400 [ 2673.172690][T12121] perf_event_alloc+0xa60/0x1790 [ 2673.177668][T12121] __se_sys_perf_event_open+0x5c7/0x2740 [ 2673.183377][T12121] ? vfs_write+0x50c/0x770 [ 2673.187812][T12121] __x64_sys_perf_event_open+0x63/0x70 [ 2673.193259][T12121] do_syscall_64+0x4a/0x90 [ 2673.197816][T12121] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2673.203819][T12121] RIP: 0033:0x4665d9 [ 2673.207707][T12121] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2673.227685][T12121] RSP: 002b:00007fc55cf8b188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2673.236906][T12121] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2673.244958][T12121] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2673.252945][T12121] RBP: 00007fc55cf8b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2673.261114][T12121] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2673.269618][T12121] R13: 00007fffb6e0760f R14: 00007fc55cf8b300 R15: 0000000000022000 [ 2673.281303][T12133] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 04:45:19 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0401f00200000000000006040000000000000000", 0x39}], 0x1) [ 2673.289847][T12133] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2673.307552][T12134] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 04:45:19 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0401f20200000000000006040000000000000000", 0x39}], 0x1) 04:45:19 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2673.359566][T12139] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2673.368362][T12139] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2673.378006][T12140] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 04:45:19 executing program 0 (fault-call:1 fault-nth:43): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:19 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0401fa0200000000000006040000000000000000", 0x39}], 0x1) [ 2673.560794][T12147] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 04:45:19 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:19 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x3, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2673.729248][T12153] FAULT_INJECTION: forcing a failure. [ 2673.729248][T12153] name failslab, interval 1, probability 0, space 0, times 0 [ 2673.742181][T12153] CPU: 0 PID: 12153 Comm: syz-executor.0 Not tainted 5.13.0-rc3-syzkaller #0 [ 2673.751330][T12153] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2673.761565][T12153] Call Trace: [ 2673.764882][T12153] dump_stack+0x137/0x19d [ 2673.769360][T12153] should_fail+0x23c/0x250 [ 2673.773891][T12153] __should_failslab+0x81/0x90 [ 2673.778813][T12153] ? register_for_each_vma+0x372/0x890 [ 2673.784290][T12153] should_failslab+0x5/0x20 [ 2673.788814][T12153] kmem_cache_alloc_trace+0x49/0x310 [ 2673.794125][T12153] ? register_for_each_vma+0x372/0x890 [ 2673.799761][T12153] ? vma_interval_tree_iter_next+0x263/0x280 [ 2673.805881][T12153] register_for_each_vma+0x372/0x890 [ 2673.811204][T12153] __uprobe_register+0x3f4/0x8a0 [ 2673.816368][T12153] uprobe_register_refctr+0x29/0x40 [ 2673.821976][T12153] probe_event_enable+0x2be/0x7d0 [ 2673.827219][T12153] ? __uprobe_trace_func+0x430/0x430 [ 2673.832588][T12153] trace_uprobe_register+0x88/0x410 [ 2673.837920][T12153] perf_trace_event_init+0x34e/0x790 [ 2673.843597][T12153] perf_uprobe_init+0xf5/0x140 [ 2673.848578][T12153] perf_uprobe_event_init+0xde/0x140 [ 2673.854036][T12153] perf_try_init_event+0x21a/0x400 [ 2673.859183][T12153] perf_event_alloc+0xa60/0x1790 [ 2673.864250][T12153] __se_sys_perf_event_open+0x5c7/0x2740 [ 2673.870116][T12153] ? vfs_write+0x50c/0x770 [ 2673.874961][T12153] __x64_sys_perf_event_open+0x63/0x70 [ 2673.880435][T12153] do_syscall_64+0x4a/0x90 [ 2673.884966][T12153] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2673.890972][T12153] RIP: 0033:0x4665d9 [ 2673.894898][T12153] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2673.914541][T12153] RSP: 002b:00007fc55cf8b188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a 04:45:19 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:19 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0400fc0200000000000006040000000000000000", 0x39}], 0x1) [ 2673.923037][T12153] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2673.931020][T12153] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2673.939146][T12153] RBP: 00007fc55cf8b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2673.947173][T12153] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2673.955158][T12153] R13: 00007fffb6e0760f R14: 00007fc55cf8b300 R15: 0000000000022000 04:45:19 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:19 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0401fc0200000000000006040000000000000000", 0x39}], 0x1) 04:45:19 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0400fd0200000000000006040000000000000000", 0x39}], 0x1) 04:45:19 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:19 executing program 0 (fault-call:1 fault-nth:44): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:19 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0400ff0200000000000006040000000000000000", 0x39}], 0x1) 04:45:20 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0404ff0200000000000006040000000000000000", 0x39}], 0x1) 04:45:20 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0400000400000000000006040000000000000000", 0x39}], 0x1) [ 2674.458888][T12202] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready [ 2674.488983][T12202] ================================================================== [ 2674.497102][T12202] BUG: KCSAN: data-race in copy_process / task_dump_owner [ 2674.504225][T12202] [ 2674.506542][T12202] write to 0xffff88813b60b02c of 4 bytes by task 12201 on cpu 0: [ 2674.514339][T12202] copy_process+0x608/0x2e00 [ 2674.518935][T12202] kernel_clone+0x14b/0x680 [ 2674.523440][T12202] __x64_sys_clone+0xb4/0xe0 [ 2674.528035][T12202] do_syscall_64+0x4a/0x90 [ 2674.532805][T12202] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2674.538820][T12202] [ 2674.541145][T12202] read to 0xffff88813b60b02c of 4 bytes by task 12202 on cpu 1: [ 2674.548863][T12202] task_dump_owner+0x2b/0x1d0 [ 2674.553551][T12202] pid_revalidate+0x69/0x110 [ 2674.558513][T12202] lookup_fast+0x1fd/0x350 [ 2674.563034][T12202] walk_component+0x5c/0x350 [ 2674.567629][T12202] link_path_walk+0x4ba/0x780 [ 2674.572329][T12202] path_openat+0x1a0/0x20b0 [ 2674.577026][T12202] do_filp_open+0xd9/0x1f0 [ 2674.581459][T12202] do_sys_openat2+0xa3/0x250 [ 2674.586149][T12202] __x64_sys_openat+0xef/0x110 [ 2674.591005][T12202] do_syscall_64+0x4a/0x90 [ 2674.595425][T12202] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2674.601325][T12202] [ 2674.603641][T12202] Reported by Kernel Concurrency Sanitizer on: [ 2674.609890][T12202] CPU: 1 PID: 12202 Comm: syz-executor.2 Not tainted 5.13.0-rc3-syzkaller #0 [ 2674.618650][T12202] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2674.628789][T12202] ================================================================== [ 2674.671733][T12191] FAULT_INJECTION: forcing a failure. [ 2674.671733][T12191] name failslab, interval 1, probability 0, space 0, times 0 [ 2674.684576][T12191] CPU: 0 PID: 12191 Comm: syz-executor.0 Not tainted 5.13.0-rc3-syzkaller #0 [ 2674.693639][T12191] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2674.704273][T12191] Call Trace: [ 2674.707545][T12191] dump_stack+0x137/0x19d [ 2674.711884][T12191] should_fail+0x23c/0x250 [ 2674.716466][T12191] __should_failslab+0x81/0x90 [ 2674.721292][T12191] ? register_for_each_vma+0x372/0x890 [ 2674.727161][T12191] should_failslab+0x5/0x20 [ 2674.731745][T12191] kmem_cache_alloc_trace+0x49/0x310 [ 2674.737028][T12191] ? register_for_each_vma+0x372/0x890 [ 2674.742865][T12191] ? vma_interval_tree_iter_next+0x263/0x280 [ 2674.749165][T12191] register_for_each_vma+0x372/0x890 [ 2674.754470][T12191] __uprobe_register+0x3f4/0x8a0 [ 2674.759604][T12191] uprobe_register_refctr+0x29/0x40 [ 2674.765114][T12191] probe_event_enable+0x2be/0x7d0 [ 2674.770236][T12191] ? __uprobe_trace_func+0x430/0x430 [ 2674.776269][T12191] trace_uprobe_register+0x88/0x410 [ 2674.781737][T12191] perf_trace_event_init+0x34e/0x790 [ 2674.787300][T12191] perf_uprobe_init+0xf5/0x140 [ 2674.792060][T12191] perf_uprobe_event_init+0xde/0x140 [ 2674.797338][T12191] perf_try_init_event+0x21a/0x400 [ 2674.802531][T12191] perf_event_alloc+0xa60/0x1790 [ 2674.807846][T12191] __se_sys_perf_event_open+0x5c7/0x2740 [ 2674.813661][T12191] ? vfs_write+0x50c/0x770 [ 2674.818065][T12191] __x64_sys_perf_event_open+0x63/0x70 [ 2674.823545][T12191] do_syscall_64+0x4a/0x90 [ 2674.828059][T12191] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2674.834035][T12191] RIP: 0033:0x4665d9 [ 2674.838242][T12191] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2674.859184][T12191] RSP: 002b:00007fc55cf8b188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2674.867668][T12191] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2674.876474][T12191] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2674.884746][T12191] RBP: 00007fc55cf8b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2674.893032][T12191] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2674.901239][T12191] R13: 00007fffb6e0760f R14: 00007fc55cf8b300 R15: 0000000000022000 04:45:20 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:20 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:20 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0400040000000000000006040000000000000000", 0x39}], 0x1) 04:45:20 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:20 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x2, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:20 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0400020200000000000006040000000000000000", 0x39}], 0x1) 04:45:20 executing program 0 (fault-call:1 fault-nth:45): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:20 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0400030200000000000006040000000000000000", 0x39}], 0x1) 04:45:20 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:20 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0400040200000000000006040000000000000000", 0x39}], 0x1) [ 2675.362588][T12229] FAULT_INJECTION: forcing a failure. [ 2675.362588][T12229] name failslab, interval 1, probability 0, space 0, times 0 [ 2675.375709][T12229] CPU: 1 PID: 12229 Comm: syz-executor.0 Not tainted 5.13.0-rc3-syzkaller #0 [ 2675.385218][T12229] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2675.395546][T12229] Call Trace: [ 2675.398879][T12229] dump_stack+0x137/0x19d [ 2675.403348][T12229] should_fail+0x23c/0x250 [ 2675.407783][T12229] __should_failslab+0x81/0x90 [ 2675.412655][T12229] ? register_for_each_vma+0x372/0x890 [ 2675.418142][T12229] should_failslab+0x5/0x20 [ 2675.422674][T12229] kmem_cache_alloc_trace+0x49/0x310 [ 2675.428056][T12229] ? register_for_each_vma+0x372/0x890 [ 2675.433566][T12229] ? vma_interval_tree_iter_next+0x263/0x280 [ 2675.439558][T12229] register_for_each_vma+0x372/0x890 [ 2675.444942][T12229] __uprobe_register+0x3f4/0x8a0 [ 2675.450072][T12229] uprobe_register_refctr+0x29/0x40 [ 2675.455426][T12229] probe_event_enable+0x2be/0x7d0 [ 2675.460449][T12229] ? __uprobe_trace_func+0x430/0x430 [ 2675.465768][T12229] trace_uprobe_register+0x88/0x410 [ 2675.471090][T12229] perf_trace_event_init+0x34e/0x790 [ 2675.476605][T12229] perf_uprobe_init+0xf5/0x140 [ 2675.481425][T12229] perf_uprobe_event_init+0xde/0x140 [ 2675.486728][T12229] perf_try_init_event+0x21a/0x400 [ 2675.492054][T12229] perf_event_alloc+0xa60/0x1790 [ 2675.497010][T12229] __se_sys_perf_event_open+0x5c7/0x2740 [ 2675.502730][T12229] ? vfs_write+0x50c/0x770 [ 2675.507380][T12229] __x64_sys_perf_event_open+0x63/0x70 [ 2675.514970][T12229] do_syscall_64+0x4a/0x90 [ 2675.519513][T12229] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2675.525414][T12229] RIP: 0033:0x4665d9 [ 2675.529314][T12229] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2675.549710][T12229] RSP: 002b:00007fc55cf8b188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a 04:45:21 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0400050200000000000006040000000000000000", 0x39}], 0x1) 04:45:21 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2675.558111][T12229] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2675.566139][T12229] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2675.574105][T12229] RBP: 00007fc55cf8b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2675.582614][T12229] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2675.590862][T12229] R13: 00007fffb6e0760f R14: 00007fc55cf8b300 R15: 0000000000022000 04:45:21 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:21 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0400060200000000000006040000000000000000", 0x39}], 0x1) 04:45:21 executing program 0 (fault-call:1 fault-nth:46): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:21 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:21 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x3, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:21 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0400070200000000000006040000000000000000", 0x39}], 0x1) 04:45:21 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x8, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2675.847862][T12264] FAULT_INJECTION: forcing a failure. [ 2675.847862][T12264] name failslab, interval 1, probability 0, space 0, times 0 [ 2675.860764][T12264] CPU: 0 PID: 12264 Comm: syz-executor.0 Not tainted 5.13.0-rc3-syzkaller #0 [ 2675.870168][T12264] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2675.880562][T12264] Call Trace: [ 2675.883849][T12264] dump_stack+0x137/0x19d [ 2675.888194][T12264] should_fail+0x23c/0x250 [ 2675.892823][T12264] __should_failslab+0x81/0x90 [ 2675.897603][T12264] ? register_for_each_vma+0x372/0x890 [ 2675.903061][T12264] should_failslab+0x5/0x20 [ 2675.907648][T12264] kmem_cache_alloc_trace+0x49/0x310 [ 2675.913391][T12264] ? register_for_each_vma+0x372/0x890 [ 2675.918992][T12264] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2675.925095][T12264] register_for_each_vma+0x372/0x890 [ 2675.930568][T12264] __uprobe_register+0x3f4/0x8a0 [ 2675.935684][T12264] uprobe_register_refctr+0x29/0x40 [ 2675.941013][T12264] probe_event_enable+0x2be/0x7d0 [ 2675.946222][T12264] ? __uprobe_trace_func+0x430/0x430 [ 2675.951525][T12264] trace_uprobe_register+0x88/0x410 [ 2675.956922][T12264] perf_trace_event_init+0x34e/0x790 [ 2675.962432][T12264] perf_uprobe_init+0xf5/0x140 [ 2675.967297][T12264] perf_uprobe_event_init+0xde/0x140 [ 2675.972810][T12264] perf_try_init_event+0x21a/0x400 [ 2675.977956][T12264] perf_event_alloc+0xa60/0x1790 [ 2675.982887][T12264] __se_sys_perf_event_open+0x5c7/0x2740 [ 2675.988524][T12264] ? vfs_write+0x50c/0x770 [ 2675.992983][T12264] __x64_sys_perf_event_open+0x63/0x70 [ 2675.998688][T12264] do_syscall_64+0x4a/0x90 [ 2676.003734][T12264] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2676.010208][T12264] RIP: 0033:0x4665d9 [ 2676.014094][T12264] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2676.034272][T12264] RSP: 002b:00007fc55cf8b188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a 04:45:21 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0400080200000000000006040000000000000000", 0x39}], 0x1) [ 2676.042907][T12264] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2676.051130][T12264] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2676.059428][T12264] RBP: 00007fc55cf8b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2676.067661][T12264] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2676.075963][T12264] R13: 00007fffb6e0760f R14: 00007fc55cf8b300 R15: 0000000000022000 04:45:21 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0400090200000000000006040000000000000000", 0x39}], 0x1) 04:45:22 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff04000a0200000000000006040000000000000000", 0x39}], 0x1) 04:45:22 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:22 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff04000b0200000000000006040000000000000000", 0x39}], 0x1) 04:45:22 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:22 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff04000c0200000000000006040000000000000000", 0x39}], 0x1) 04:45:22 executing program 0 (fault-call:1 fault-nth:47): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:22 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x106}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:22 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x4, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:22 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff04000d0200000000000006040000000000000000", 0x39}], 0x1) [ 2676.753493][T12302] FAULT_INJECTION: forcing a failure. [ 2676.753493][T12302] name failslab, interval 1, probability 0, space 0, times 0 [ 2676.766298][T12302] CPU: 1 PID: 12302 Comm: syz-executor.0 Not tainted 5.13.0-rc3-syzkaller #0 [ 2676.775136][T12302] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2676.785195][T12302] Call Trace: [ 2676.788488][T12302] dump_stack+0x137/0x19d [ 2676.792838][T12302] should_fail+0x23c/0x250 [ 2676.797352][T12302] __should_failslab+0x81/0x90 [ 2676.802109][T12302] ? register_for_each_vma+0x372/0x890 [ 2676.807646][T12302] should_failslab+0x5/0x20 [ 2676.812198][T12302] kmem_cache_alloc_trace+0x49/0x310 [ 2676.817496][T12302] ? register_for_each_vma+0x372/0x890 [ 2676.823235][T12302] ? vma_interval_tree_iter_next+0x263/0x280 [ 2676.829375][T12302] register_for_each_vma+0x372/0x890 [ 2676.834655][T12302] __uprobe_register+0x3f4/0x8a0 [ 2676.839702][T12302] uprobe_register_refctr+0x29/0x40 [ 2676.845039][T12302] probe_event_enable+0x2be/0x7d0 [ 2676.850180][T12302] ? __uprobe_trace_func+0x430/0x430 [ 2676.855512][T12302] trace_uprobe_register+0x88/0x410 [ 2676.860864][T12302] perf_trace_event_init+0x34e/0x790 [ 2676.866200][T12302] perf_uprobe_init+0xf5/0x140 [ 2676.871025][T12302] perf_uprobe_event_init+0xde/0x140 [ 2676.876309][T12302] perf_try_init_event+0x21a/0x400 [ 2676.881431][T12302] perf_event_alloc+0xa60/0x1790 [ 2676.886415][T12302] __se_sys_perf_event_open+0x5c7/0x2740 [ 2676.892045][T12302] ? vfs_write+0x50c/0x770 [ 2676.896574][T12302] __x64_sys_perf_event_open+0x63/0x70 [ 2676.902477][T12302] do_syscall_64+0x4a/0x90 [ 2676.906968][T12302] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2676.913046][T12302] RIP: 0033:0x4665d9 [ 2676.917053][T12302] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2676.936845][T12302] RSP: 002b:00007fc55cf8b188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2676.945366][T12302] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 04:45:22 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:22 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0xa, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:22 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff04000e0200000000000006040000000000000000", 0x39}], 0x1) [ 2676.953331][T12302] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2676.961509][T12302] RBP: 00007fc55cf8b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2676.969798][T12302] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2676.977866][T12302] R13: 00007fffb6e0760f R14: 00007fc55cf8b300 R15: 0000000000022000 04:45:22 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff04000f0200000000000006040000000000000000", 0x39}], 0x1) 04:45:22 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0400100200000000000006040000000000000000", 0x39}], 0x1) 04:45:22 executing program 0 (fault-call:1 fault-nth:48): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:22 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x198}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:22 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0400110200000000000006040000000000000000", 0x39}], 0x1) 04:45:23 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0400120200000000000006040000000000000000", 0x39}], 0x1) 04:45:23 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0xb, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2677.295487][T12344] FAULT_INJECTION: forcing a failure. [ 2677.295487][T12344] name failslab, interval 1, probability 0, space 0, times 0 [ 2677.308438][T12344] CPU: 0 PID: 12344 Comm: syz-executor.0 Not tainted 5.13.0-rc3-syzkaller #0 [ 2677.317299][T12344] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2677.327694][T12344] Call Trace: [ 2677.331090][T12344] dump_stack+0x137/0x19d [ 2677.335425][T12344] should_fail+0x23c/0x250 [ 2677.339862][T12344] __should_failslab+0x81/0x90 [ 2677.344858][T12344] ? register_for_each_vma+0x372/0x890 [ 2677.350854][T12344] should_failslab+0x5/0x20 [ 2677.355537][T12344] kmem_cache_alloc_trace+0x49/0x310 [ 2677.360925][T12344] ? register_for_each_vma+0x372/0x890 [ 2677.366455][T12344] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2677.372837][T12344] register_for_each_vma+0x372/0x890 [ 2677.378212][T12344] __uprobe_register+0x3f4/0x8a0 [ 2677.383175][T12344] uprobe_register_refctr+0x29/0x40 [ 2677.388383][T12344] probe_event_enable+0x2be/0x7d0 [ 2677.393542][T12344] ? __uprobe_trace_func+0x430/0x430 [ 2677.399069][T12344] trace_uprobe_register+0x88/0x410 [ 2677.405018][T12344] perf_trace_event_init+0x34e/0x790 [ 2677.410862][T12344] perf_uprobe_init+0xf5/0x140 [ 2677.415734][T12344] perf_uprobe_event_init+0xde/0x140 [ 2677.421108][T12344] perf_try_init_event+0x21a/0x400 [ 2677.426703][T12344] perf_event_alloc+0xa60/0x1790 [ 2677.431774][T12344] __se_sys_perf_event_open+0x5c7/0x2740 [ 2677.437468][T12344] ? vfs_write+0x50c/0x770 [ 2677.441900][T12344] __x64_sys_perf_event_open+0x63/0x70 [ 2677.447527][T12344] do_syscall_64+0x4a/0x90 [ 2677.451958][T12344] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2677.457858][T12344] RIP: 0033:0x4665d9 [ 2677.461742][T12344] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2677.481440][T12344] RSP: 002b:00007fc55cf8b188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a 04:45:23 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x5, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:23 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0400160200000000000006040000000000000000", 0x39}], 0x1) [ 2677.489907][T12344] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2677.497907][T12344] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2677.505872][T12344] RBP: 00007fc55cf8b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2677.513847][T12344] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2677.521944][T12344] R13: 00007fffb6e0760f R14: 00007fc55cf8b300 R15: 0000000000022000 04:45:23 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:23 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0400170200000000000006040000000000000000", 0x39}], 0x1) 04:45:23 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0xc, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:23 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x6, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:23 executing program 0 (fault-call:1 fault-nth:49): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2677.897782][T12380] FAULT_INJECTION: forcing a failure. [ 2677.897782][T12380] name failslab, interval 1, probability 0, space 0, times 0 [ 2677.910858][T12380] CPU: 1 PID: 12380 Comm: syz-executor.0 Not tainted 5.13.0-rc3-syzkaller #0 [ 2677.920474][T12380] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2677.930740][T12380] Call Trace: [ 2677.934033][T12380] dump_stack+0x137/0x19d [ 2677.938395][T12380] should_fail+0x23c/0x250 [ 2677.942972][T12380] __should_failslab+0x81/0x90 [ 2677.947751][T12380] ? register_for_each_vma+0x372/0x890 [ 2677.953229][T12380] should_failslab+0x5/0x20 [ 2677.957798][T12380] kmem_cache_alloc_trace+0x49/0x310 [ 2677.963427][T12380] ? register_for_each_vma+0x372/0x890 [ 2677.969143][T12380] ? vma_interval_tree_iter_next+0x263/0x280 [ 2677.975275][T12380] register_for_each_vma+0x372/0x890 [ 2677.980788][T12380] __uprobe_register+0x3f4/0x8a0 [ 2677.985933][T12380] uprobe_register_refctr+0x29/0x40 [ 2677.991295][T12380] probe_event_enable+0x2be/0x7d0 [ 2677.996504][T12380] ? __uprobe_trace_func+0x430/0x430 [ 2678.002270][T12380] trace_uprobe_register+0x88/0x410 [ 2678.008139][T12380] perf_trace_event_init+0x34e/0x790 [ 2678.013600][T12380] perf_uprobe_init+0xf5/0x140 [ 2678.018358][T12380] perf_uprobe_event_init+0xde/0x140 [ 2678.023733][T12380] perf_try_init_event+0x21a/0x400 [ 2678.029235][T12380] perf_event_alloc+0xa60/0x1790 [ 2678.036536][T12380] __se_sys_perf_event_open+0x5c7/0x2740 [ 2678.042269][T12380] ? vfs_write+0x50c/0x770 [ 2678.046789][T12380] ? copy_fpregs_to_fpstate+0xd8/0x110 [ 2678.052538][T12380] __x64_sys_perf_event_open+0x63/0x70 [ 2678.058014][T12380] do_syscall_64+0x4a/0x90 [ 2678.062437][T12380] ? irqentry_exit_to_user_mode+0x5/0x20 [ 2678.068377][T12380] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2678.074715][T12380] RIP: 0033:0x4665d9 [ 2678.078693][T12380] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2678.099875][T12380] RSP: 002b:00007fc55cf8b188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2678.108789][T12380] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2678.117426][T12380] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2678.126396][T12380] RBP: 00007fc55cf8b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2678.134572][T12380] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 04:45:23 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0400180200000000000006040000000000000000", 0x39}], 0x1) [ 2678.142982][T12380] R13: 00007fffb6e0760f R14: 00007fc55cf8b300 R15: 0000000000022000 [ 2678.155259][T12384] validate_nla: 82 callbacks suppressed [ 2678.155275][T12384] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2678.214572][T12390] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2678.224101][T12390] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2678.239433][T12392] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 04:45:24 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:24 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff04001e0200000000000006040000000000000000", 0x39}], 0x1) 04:45:24 executing program 0 (fault-call:1 fault-nth:50): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:24 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0xd, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:24 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x7, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:24 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0400250200000000000006040000000000000000", 0x39}], 0x1) [ 2678.405670][T12406] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2678.418709][T12406] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2678.430527][T12409] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 04:45:24 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:24 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0400480200000000000006040000000000000000", 0x39}], 0x1) [ 2678.592035][T12415] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2678.614790][T12415] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2678.626340][T12416] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2678.662345][T12407] FAULT_INJECTION: forcing a failure. [ 2678.662345][T12407] name failslab, interval 1, probability 0, space 0, times 0 [ 2678.675768][T12407] CPU: 0 PID: 12407 Comm: syz-executor.0 Not tainted 5.13.0-rc3-syzkaller #0 [ 2678.685056][T12407] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2678.695833][T12407] Call Trace: [ 2678.699462][T12407] dump_stack+0x137/0x19d [ 2678.704794][T12407] should_fail+0x23c/0x250 [ 2678.709865][T12407] __should_failslab+0x81/0x90 [ 2678.714825][T12407] ? register_for_each_vma+0x372/0x890 [ 2678.720390][T12407] should_failslab+0x5/0x20 [ 2678.725223][T12407] kmem_cache_alloc_trace+0x49/0x310 [ 2678.730884][T12407] ? register_for_each_vma+0x372/0x890 [ 2678.736361][T12407] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2678.744151][T12407] register_for_each_vma+0x372/0x890 [ 2678.750081][T12407] __uprobe_register+0x3f4/0x8a0 [ 2678.755240][T12407] uprobe_register_refctr+0x29/0x40 [ 2678.760477][T12407] probe_event_enable+0x2be/0x7d0 [ 2678.765794][T12407] ? __uprobe_trace_func+0x430/0x430 [ 2678.771361][T12407] trace_uprobe_register+0x88/0x410 [ 2678.776850][T12407] perf_trace_event_init+0x34e/0x790 [ 2678.782490][T12407] perf_uprobe_init+0xf5/0x140 [ 2678.787657][T12407] perf_uprobe_event_init+0xde/0x140 [ 2678.793060][T12407] perf_try_init_event+0x21a/0x400 [ 2678.798292][T12407] perf_event_alloc+0xa60/0x1790 [ 2678.803561][T12407] __se_sys_perf_event_open+0x5c7/0x2740 [ 2678.810300][T12407] ? vfs_write+0x50c/0x770 [ 2678.815290][T12407] __x64_sys_perf_event_open+0x63/0x70 [ 2678.821138][T12407] do_syscall_64+0x4a/0x90 [ 2678.825942][T12407] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2678.832718][T12407] RIP: 0033:0x4665d9 [ 2678.836886][T12407] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 04:45:24 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff04004c0200000000000006040000000000000000", 0x39}], 0x1) [ 2678.856833][T12407] RSP: 002b:00007fc55cf8b188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2678.865529][T12407] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2678.873491][T12407] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2678.881643][T12407] RBP: 00007fc55cf8b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2678.889882][T12407] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2678.897963][T12407] R13: 00007fffb6e0760f R14: 00007fc55cf8b300 R15: 0000000000022000 04:45:24 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0xe, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:24 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:24 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0400600200000000000006040000000000000000", 0x39}], 0x1) 04:45:24 executing program 0 (fault-call:1 fault-nth:51): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:24 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0400680200000000000006040000000000000000", 0x39}], 0x1) 04:45:24 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff04006c0200000000000006040000000000000000", 0x39}], 0x1) 04:45:24 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0400740200000000000006040000000000000000", 0x39}], 0x1) [ 2679.402635][T12449] FAULT_INJECTION: forcing a failure. [ 2679.402635][T12449] name failslab, interval 1, probability 0, space 0, times 0 [ 2679.416804][T12449] CPU: 1 PID: 12449 Comm: syz-executor.0 Not tainted 5.13.0-rc3-syzkaller #0 [ 2679.426222][T12449] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2679.437443][T12449] Call Trace: [ 2679.440722][T12449] dump_stack+0x137/0x19d [ 2679.445093][T12449] should_fail+0x23c/0x250 [ 2679.449627][T12449] __should_failslab+0x81/0x90 [ 2679.454864][T12449] ? register_for_each_vma+0x372/0x890 [ 2679.461044][T12449] should_failslab+0x5/0x20 [ 2679.465798][T12449] kmem_cache_alloc_trace+0x49/0x310 [ 2679.471270][T12449] ? register_for_each_vma+0x372/0x890 [ 2679.477181][T12449] ? vma_interval_tree_iter_next+0x263/0x280 [ 2679.484559][T12449] register_for_each_vma+0x372/0x890 [ 2679.490122][T12449] __uprobe_register+0x3f4/0x8a0 [ 2679.495340][T12449] uprobe_register_refctr+0x29/0x40 [ 2679.500849][T12449] probe_event_enable+0x2be/0x7d0 [ 2679.506353][T12449] ? __uprobe_trace_func+0x430/0x430 [ 2679.511788][T12449] trace_uprobe_register+0x88/0x410 [ 2679.517372][T12449] ? __uprobe_perf_func+0x2f0/0x2f0 [ 2679.523098][T12449] perf_trace_event_init+0x34e/0x790 [ 2679.529688][T12449] perf_uprobe_init+0xf5/0x140 [ 2679.535182][T12449] perf_uprobe_event_init+0xde/0x140 [ 2679.540764][T12449] perf_try_init_event+0x21a/0x400 [ 2679.545908][T12449] perf_event_alloc+0xa60/0x1790 [ 2679.550971][T12449] __se_sys_perf_event_open+0x5c7/0x2740 [ 2679.556856][T12449] ? vfs_write+0x50c/0x770 [ 2679.561346][T12449] __x64_sys_perf_event_open+0x63/0x70 [ 2679.566815][T12449] do_syscall_64+0x4a/0x90 [ 2679.571249][T12449] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2679.577224][T12449] RIP: 0033:0x4665d9 [ 2679.581221][T12449] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 04:45:25 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x8, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:25 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x10, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:25 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff04007a0200000000000006040000000000000000", 0x39}], 0x1) 04:45:25 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2679.602151][T12449] RSP: 002b:00007fc55cf8b188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2679.610901][T12449] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2679.618860][T12449] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2679.627017][T12449] RBP: 00007fc55cf8b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2679.634999][T12449] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2679.643068][T12449] R13: 00007fffb6e0760f R14: 00007fc55cf8b300 R15: 0000000000022000 04:45:25 executing program 0 (fault-call:1 fault-nth:52): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:25 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0400fc0200000000000006040000000000000000", 0x39}], 0x1) 04:45:25 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x226}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:25 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0400fd0200000000000006040000000000000000", 0x39}], 0x1) [ 2679.892924][T12478] FAULT_INJECTION: forcing a failure. [ 2679.892924][T12478] name failslab, interval 1, probability 0, space 0, times 0 [ 2679.905733][T12478] CPU: 1 PID: 12478 Comm: syz-executor.0 Not tainted 5.13.0-rc3-syzkaller #0 [ 2679.914592][T12478] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2679.924661][T12478] Call Trace: [ 2679.927945][T12478] dump_stack+0x137/0x19d [ 2679.932297][T12478] should_fail+0x23c/0x250 [ 2679.936701][T12478] __should_failslab+0x81/0x90 [ 2679.941470][T12478] ? register_for_each_vma+0x372/0x890 [ 2679.947155][T12478] should_failslab+0x5/0x20 [ 2679.951652][T12478] kmem_cache_alloc_trace+0x49/0x310 [ 2679.957045][T12478] ? register_for_each_vma+0x372/0x890 [ 2679.962640][T12478] ? vma_interval_tree_iter_next+0x263/0x280 [ 2679.968627][T12478] register_for_each_vma+0x372/0x890 [ 2679.973907][T12478] __uprobe_register+0x3f4/0x8a0 [ 2679.978938][T12478] uprobe_register_refctr+0x29/0x40 [ 2679.984215][T12478] probe_event_enable+0x2be/0x7d0 [ 2679.989308][T12478] ? __uprobe_trace_func+0x430/0x430 [ 2679.994606][T12478] trace_uprobe_register+0x88/0x410 [ 2679.999813][T12478] perf_trace_event_init+0x34e/0x790 [ 2680.005194][T12478] perf_uprobe_init+0xf5/0x140 [ 2680.010151][T12478] perf_uprobe_event_init+0xde/0x140 [ 2680.015530][T12478] perf_try_init_event+0x21a/0x400 [ 2680.020719][T12478] perf_event_alloc+0xa60/0x1790 [ 2680.025723][T12478] __se_sys_perf_event_open+0x5c7/0x2740 [ 2680.031348][T12478] ? vfs_write+0x50c/0x770 [ 2680.035867][T12478] __x64_sys_perf_event_open+0x63/0x70 [ 2680.041338][T12478] do_syscall_64+0x4a/0x90 [ 2680.045809][T12478] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2680.051880][T12478] RIP: 0033:0x4665d9 [ 2680.055782][T12478] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2680.075682][T12478] RSP: 002b:00007fc55cf8b188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2680.084082][T12478] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 04:45:25 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x11, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:25 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0400000300000000000006040000000000000000", 0x39}], 0x1) [ 2680.092392][T12478] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2680.100407][T12478] RBP: 00007fc55cf8b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2680.108413][T12478] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2680.116760][T12478] R13: 00007fffb6e0760f R14: 00007fc55cf8b300 R15: 0000000000022000 04:45:26 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x9, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:26 executing program 0 (fault-call:1 fault-nth:53): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:26 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:26 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x12, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2680.322410][T12499] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready 04:45:26 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0400000500000000000006040000000000000000", 0x39}], 0x1) 04:45:26 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25a}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:26 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0400000600000000000006040000000000000000", 0x39}], 0x1) [ 2680.476838][T12517] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready [ 2680.523712][T12508] FAULT_INJECTION: forcing a failure. [ 2680.523712][T12508] name failslab, interval 1, probability 0, space 0, times 0 [ 2680.536531][T12508] CPU: 0 PID: 12508 Comm: syz-executor.0 Not tainted 5.13.0-rc3-syzkaller #0 [ 2680.545355][T12508] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2680.555571][T12508] Call Trace: [ 2680.558949][T12508] dump_stack+0x137/0x19d [ 2680.563374][T12508] should_fail+0x23c/0x250 [ 2680.567792][T12508] __should_failslab+0x81/0x90 [ 2680.572600][T12508] ? register_for_each_vma+0x372/0x890 [ 2680.578123][T12508] should_failslab+0x5/0x20 [ 2680.582736][T12508] kmem_cache_alloc_trace+0x49/0x310 [ 2680.588069][T12508] ? register_for_each_vma+0x372/0x890 [ 2680.593531][T12508] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2680.599586][T12508] register_for_each_vma+0x372/0x890 [ 2680.604917][T12508] __uprobe_register+0x3f4/0x8a0 [ 2680.609861][T12508] uprobe_register_refctr+0x29/0x40 [ 2680.615082][T12508] probe_event_enable+0x2be/0x7d0 [ 2680.620243][T12508] ? __uprobe_trace_func+0x430/0x430 [ 2680.625533][T12508] trace_uprobe_register+0x88/0x410 [ 2680.630837][T12508] perf_trace_event_init+0x34e/0x790 [ 2680.636172][T12508] perf_uprobe_init+0xf5/0x140 [ 2680.641115][T12508] perf_uprobe_event_init+0xde/0x140 [ 2680.646674][T12508] perf_try_init_event+0x21a/0x400 [ 2680.651831][T12508] perf_event_alloc+0xa60/0x1790 [ 2680.656783][T12508] __se_sys_perf_event_open+0x5c7/0x2740 [ 2680.662426][T12508] ? vfs_write+0x50c/0x770 [ 2680.666844][T12508] __x64_sys_perf_event_open+0x63/0x70 [ 2680.672309][T12508] do_syscall_64+0x4a/0x90 [ 2680.676741][T12508] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2680.682879][T12508] RIP: 0033:0x4665d9 [ 2680.686848][T12508] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2680.706632][T12508] RSP: 002b:00007fc55cf8b188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2680.715051][T12508] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 04:45:26 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0400000700000000000006040000000000000000", 0x39}], 0x1) [ 2680.723026][T12508] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2680.731004][T12508] RBP: 00007fc55cf8b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2680.739102][T12508] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2680.747080][T12508] R13: 00007fffb6e0760f R14: 00007fc55cf8b300 R15: 0000000000022000 [ 2680.761681][T12526] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready 04:45:26 executing program 0 (fault-call:1 fault-nth:54): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:26 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x27, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:26 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0400000a00000000000006040000000000000000", 0x39}], 0x1) [ 2680.883605][T12532] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready 04:45:26 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:26 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0xa, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:26 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0400000b00000000000006040000000000000000", 0x39}], 0x1) [ 2681.062898][T12542] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready [ 2681.170763][T12541] FAULT_INJECTION: forcing a failure. [ 2681.170763][T12541] name failslab, interval 1, probability 0, space 0, times 0 [ 2681.183841][T12541] CPU: 0 PID: 12541 Comm: syz-executor.0 Not tainted 5.13.0-rc3-syzkaller #0 [ 2681.192893][T12541] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2681.203375][T12541] Call Trace: [ 2681.206881][T12541] dump_stack+0x137/0x19d [ 2681.211661][T12541] should_fail+0x23c/0x250 [ 2681.216219][T12541] __should_failslab+0x81/0x90 [ 2681.220997][T12541] ? register_for_each_vma+0x372/0x890 [ 2681.226602][T12541] should_failslab+0x5/0x20 [ 2681.231480][T12541] kmem_cache_alloc_trace+0x49/0x310 [ 2681.237246][T12541] ? register_for_each_vma+0x372/0x890 [ 2681.243008][T12541] ? vma_interval_tree_iter_next+0x263/0x280 [ 2681.248998][T12541] register_for_each_vma+0x372/0x890 [ 2681.254350][T12541] __uprobe_register+0x3f4/0x8a0 [ 2681.259464][T12541] uprobe_register_refctr+0x29/0x40 [ 2681.265009][T12541] probe_event_enable+0x2be/0x7d0 [ 2681.270371][T12541] ? __uprobe_trace_func+0x430/0x430 [ 2681.275842][T12541] trace_uprobe_register+0x88/0x410 [ 2681.281401][T12541] perf_trace_event_init+0x34e/0x790 [ 2681.287107][T12541] perf_uprobe_init+0xf5/0x140 [ 2681.292017][T12541] perf_uprobe_event_init+0xde/0x140 [ 2681.297308][T12541] perf_try_init_event+0x21a/0x400 [ 2681.302611][T12541] perf_event_alloc+0xa60/0x1790 [ 2681.307573][T12541] __se_sys_perf_event_open+0x5c7/0x2740 [ 2681.313338][T12541] ? vfs_write+0x50c/0x770 [ 2681.317767][T12541] __x64_sys_perf_event_open+0x63/0x70 [ 2681.323490][T12541] do_syscall_64+0x4a/0x90 [ 2681.328060][T12541] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2681.334336][T12541] RIP: 0033:0x4665d9 [ 2681.338343][T12541] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2681.358187][T12541] RSP: 002b:00007fc55cf8b188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2681.367058][T12541] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2681.375280][T12541] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2681.383482][T12541] RBP: 00007fc55cf8b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2681.392225][T12541] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2681.400644][T12541] R13: 00007fffb6e0760f R14: 00007fc55cf8b300 R15: 0000000000022000 04:45:27 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0400002000000000000006040000000000000000", 0x39}], 0x1) [ 2681.418864][T12554] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready 04:45:27 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x48, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:27 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0400003c00000000000006040000000000000000", 0x39}], 0x1) [ 2681.480192][T12560] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready 04:45:27 executing program 0 (fault-call:1 fault-nth:55): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:27 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f0}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:27 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0400006400000000000006040000000000000000", 0x39}], 0x1) [ 2681.567753][T12566] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready 04:45:27 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0400000300000000000006040000000000000000", 0x39}], 0x1) [ 2681.765910][T12577] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready [ 2681.855533][T12585] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready [ 2681.882677][T12576] FAULT_INJECTION: forcing a failure. [ 2681.882677][T12576] name failslab, interval 1, probability 0, space 0, times 0 [ 2681.895609][T12576] CPU: 1 PID: 12576 Comm: syz-executor.0 Not tainted 5.13.0-rc3-syzkaller #0 [ 2681.904848][T12576] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2681.915435][T12576] Call Trace: [ 2681.918843][T12576] dump_stack+0x137/0x19d [ 2681.923254][T12576] should_fail+0x23c/0x250 [ 2681.927812][T12576] __should_failslab+0x81/0x90 [ 2681.932565][T12576] ? register_for_each_vma+0x372/0x890 [ 2681.938023][T12576] should_failslab+0x5/0x20 [ 2681.942585][T12576] kmem_cache_alloc_trace+0x49/0x310 [ 2681.948122][T12576] ? register_for_each_vma+0x372/0x890 [ 2681.953784][T12576] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2681.959918][T12576] register_for_each_vma+0x372/0x890 [ 2681.965337][T12576] __uprobe_register+0x3f4/0x8a0 [ 2681.970439][T12576] uprobe_register_refctr+0x29/0x40 [ 2681.975931][T12576] probe_event_enable+0x2be/0x7d0 [ 2681.980947][T12576] ? __uprobe_trace_func+0x430/0x430 [ 2681.987150][T12576] trace_uprobe_register+0x88/0x410 [ 2681.992881][T12576] perf_trace_event_init+0x34e/0x790 [ 2681.998643][T12576] perf_uprobe_init+0xf5/0x140 [ 2682.003576][T12576] perf_uprobe_event_init+0xde/0x140 [ 2682.009324][T12576] perf_try_init_event+0x21a/0x400 [ 2682.015040][T12576] perf_event_alloc+0xa60/0x1790 [ 2682.021296][T12576] __se_sys_perf_event_open+0x5c7/0x2740 [ 2682.027644][T12576] ? vfs_write+0x50c/0x770 [ 2682.032313][T12576] __x64_sys_perf_event_open+0x63/0x70 [ 2682.038448][T12576] do_syscall_64+0x4a/0x90 [ 2682.042980][T12576] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2682.049159][T12576] RIP: 0033:0x4665d9 [ 2682.053041][T12576] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2682.073791][T12576] RSP: 002b:00007fc55cf8b188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2682.082888][T12576] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2682.091275][T12576] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 04:45:27 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0400000400000000000006040000000000000000", 0x39}], 0x1) 04:45:27 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0xb, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2682.099813][T12576] RBP: 00007fc55cf8b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2682.108284][T12576] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2682.116911][T12576] R13: 00007fffb6e0760f R14: 00007fc55cf8b300 R15: 0000000000022000 [ 2682.152930][T12592] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready 04:45:28 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:28 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x4c, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:28 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0400000500000000000006040000000000000000", 0x39}], 0x1) 04:45:28 executing program 0 (fault-call:1 fault-nth:56): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:28 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:28 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0400000600000000000006040000000000000000", 0x39}], 0x1) [ 2682.279600][T12605] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready [ 2682.363606][T12607] FAULT_INJECTION: forcing a failure. [ 2682.363606][T12607] name failslab, interval 1, probability 0, space 0, times 0 [ 2682.376685][T12607] CPU: 0 PID: 12607 Comm: syz-executor.0 Not tainted 5.13.0-rc3-syzkaller #0 [ 2682.386480][T12607] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2682.397588][T12607] Call Trace: [ 2682.401627][T12607] dump_stack+0x137/0x19d [ 2682.406698][T12607] should_fail+0x23c/0x250 [ 2682.411272][T12607] __should_failslab+0x81/0x90 [ 2682.416519][T12607] ? register_for_each_vma+0x372/0x890 [ 2682.422740][T12607] should_failslab+0x5/0x20 [ 2682.427469][T12607] kmem_cache_alloc_trace+0x49/0x310 [ 2682.432926][T12607] ? register_for_each_vma+0x372/0x890 [ 2682.439927][T12607] ? vma_interval_tree_iter_next+0x263/0x280 [ 2682.446199][T12607] register_for_each_vma+0x372/0x890 [ 2682.452333][T12607] __uprobe_register+0x3f4/0x8a0 [ 2682.458269][T12607] uprobe_register_refctr+0x29/0x40 [ 2682.464019][T12607] probe_event_enable+0x2be/0x7d0 [ 2682.469139][T12607] ? __uprobe_trace_func+0x430/0x430 [ 2682.474817][T12607] trace_uprobe_register+0x88/0x410 [ 2682.480179][T12607] perf_trace_event_init+0x34e/0x790 [ 2682.486276][T12607] perf_uprobe_init+0xf5/0x140 [ 2682.491542][T12607] perf_uprobe_event_init+0xde/0x140 [ 2682.497122][T12607] perf_try_init_event+0x21a/0x400 [ 2682.502828][T12607] perf_event_alloc+0xa60/0x1790 [ 2682.508232][T12607] __se_sys_perf_event_open+0x5c7/0x2740 [ 2682.514607][T12607] ? vfs_write+0x50c/0x770 [ 2682.519728][T12607] __x64_sys_perf_event_open+0x63/0x70 [ 2682.525441][T12607] do_syscall_64+0x4a/0x90 [ 2682.530034][T12607] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2682.536507][T12607] RIP: 0033:0x4665d9 [ 2682.540587][T12607] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2682.561144][T12607] RSP: 002b:00007fc55cf8b188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2682.569827][T12607] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2682.578214][T12607] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2682.586786][T12607] RBP: 00007fc55cf8b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2682.594861][T12607] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2682.602943][T12607] R13: 00007fffb6e0760f R14: 00007fc55cf8b300 R15: 0000000000022000 04:45:28 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x68, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:28 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0400000700000000000006040000000000000000", 0x39}], 0x1) [ 2682.617190][T12619] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready 04:45:28 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x6c, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:28 executing program 0 (fault-call:1 fault-nth:57): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:28 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0400000a00000000000006040000000000000000", 0x39}], 0x1) [ 2682.693026][T12628] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready 04:45:28 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0xc, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:28 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:28 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0400000b00000000000006040000000000000000", 0x39}], 0x1) [ 2682.917123][T12639] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready [ 2683.033488][T12637] FAULT_INJECTION: forcing a failure. [ 2683.033488][T12637] name failslab, interval 1, probability 0, space 0, times 0 [ 2683.046909][T12637] CPU: 0 PID: 12637 Comm: syz-executor.0 Not tainted 5.13.0-rc3-syzkaller #0 [ 2683.055879][T12637] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2683.066231][T12637] Call Trace: [ 2683.069770][T12637] dump_stack+0x137/0x19d [ 2683.074122][T12637] should_fail+0x23c/0x250 [ 2683.078605][T12637] __should_failslab+0x81/0x90 [ 2683.083478][T12637] ? register_for_each_vma+0x372/0x890 [ 2683.088993][T12637] should_failslab+0x5/0x20 [ 2683.094331][T12637] kmem_cache_alloc_trace+0x49/0x310 [ 2683.100216][T12637] ? register_for_each_vma+0x372/0x890 [ 2683.105932][T12637] ? vma_interval_tree_iter_next+0x24c/0x280 [ 2683.112221][T12637] register_for_each_vma+0x372/0x890 [ 2683.117551][T12637] __uprobe_register+0x3f4/0x8a0 [ 2683.123048][T12637] uprobe_register_refctr+0x29/0x40 [ 2683.128577][T12637] probe_event_enable+0x2be/0x7d0 [ 2683.133760][T12637] ? __uprobe_trace_func+0x430/0x430 [ 2683.139078][T12637] trace_uprobe_register+0x88/0x410 [ 2683.144794][T12637] perf_trace_event_init+0x34e/0x790 [ 2683.150349][T12637] perf_uprobe_init+0xf5/0x140 [ 2683.155983][T12637] perf_uprobe_event_init+0xde/0x140 [ 2683.161946][T12637] perf_try_init_event+0x21a/0x400 [ 2683.167082][T12637] perf_event_alloc+0xa60/0x1790 [ 2683.172183][T12637] __se_sys_perf_event_open+0x5c7/0x2740 [ 2683.177863][T12637] ? vfs_write+0x50c/0x770 [ 2683.182342][T12637] __x64_sys_perf_event_open+0x63/0x70 [ 2683.187890][T12637] do_syscall_64+0x4a/0x90 [ 2683.192530][T12637] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2683.198441][T12637] RIP: 0033:0x4665d9 [ 2683.202427][T12637] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2683.222682][T12637] RSP: 002b:00007fc55cf8b188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a 04:45:29 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2683.231264][T12637] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2683.239284][T12637] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2683.247342][T12637] RBP: 00007fc55cf8b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2683.256107][T12637] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2683.264224][T12637] R13: 00007fffb6e0760f R14: 00007fc55cf8b300 R15: 0000000000022000 04:45:29 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x74, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2683.285691][T12649] validate_nla: 72 callbacks suppressed [ 2683.285716][T12649] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2683.310355][T12649] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2683.320376][T12649] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready 04:45:29 executing program 0 (fault-call:1 fault-nth:58): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:29 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0400003c00000000000006040000000000000000", 0x39}], 0x1) [ 2683.333141][T12659] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 04:45:29 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0400006400000000000006040000000000000000", 0x39}], 0x1) [ 2683.415264][T12667] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2683.431478][T12667] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2683.440917][T12667] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready [ 2683.450090][T12671] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2683.626397][T12675] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2683.635451][T12666] FAULT_INJECTION: forcing a failure. [ 2683.635451][T12666] name failslab, interval 1, probability 0, space 0, times 0 [ 2683.648368][T12666] CPU: 1 PID: 12666 Comm: syz-executor.0 Not tainted 5.13.0-rc3-syzkaller #0 [ 2683.657307][T12666] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2683.667846][T12666] Call Trace: [ 2683.671116][T12666] dump_stack+0x137/0x19d [ 2683.675614][T12666] should_fail+0x23c/0x250 [ 2683.680103][T12666] __should_failslab+0x81/0x90 [ 2683.684950][T12666] ? register_for_each_vma+0x372/0x890 [ 2683.690521][T12666] should_failslab+0x5/0x20 [ 2683.695081][T12666] kmem_cache_alloc_trace+0x49/0x310 [ 2683.700370][T12666] ? register_for_each_vma+0x372/0x890 [ 2683.706093][T12666] ? vma_interval_tree_iter_next+0x263/0x280 [ 2683.712410][T12666] register_for_each_vma+0x372/0x890 [ 2683.717817][T12666] __uprobe_register+0x3f4/0x8a0 [ 2683.722747][T12666] uprobe_register_refctr+0x29/0x40 [ 2683.728164][T12666] probe_event_enable+0x2be/0x7d0 [ 2683.733432][T12666] ? __uprobe_trace_func+0x430/0x430 [ 2683.739041][T12666] trace_uprobe_register+0x88/0x410 [ 2683.744440][T12666] perf_trace_event_init+0x34e/0x790 [ 2683.749981][T12666] perf_uprobe_init+0xf5/0x140 [ 2683.754774][T12666] perf_uprobe_event_init+0xde/0x140 [ 2683.760323][T12666] perf_try_init_event+0x21a/0x400 [ 2683.765634][T12666] perf_event_alloc+0xa60/0x1790 [ 2683.770667][T12666] __se_sys_perf_event_open+0x5c7/0x2740 [ 2683.776314][T12666] ? vfs_write+0x50c/0x770 [ 2683.780835][T12666] __x64_sys_perf_event_open+0x63/0x70 [ 2683.786533][T12666] do_syscall_64+0x4a/0x90 [ 2683.790953][T12666] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2683.797104][T12666] RIP: 0033:0x4665d9 [ 2683.801053][T12666] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2683.820888][T12666] RSP: 002b:00007fc55cf8b188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2683.829379][T12666] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2683.837337][T12666] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2683.845337][T12666] RBP: 00007fc55cf8b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2683.853315][T12666] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2683.861280][T12666] R13: 00007fffb6e0760f R14: 00007fc55cf8b300 R15: 0000000000022000 04:45:29 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x7a, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:29 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:29 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa601}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:29 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0xd, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:29 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff04000000dc020000000006040000000000000000", 0x39}], 0x1) [ 2683.870219][T12675] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2683.881056][T12675] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready [ 2683.912617][T12681] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 04:45:29 executing program 0 (fault-call:1 fault-nth:59): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:29 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0400000202000000000006040000000000000000", 0x39}], 0x1) 04:45:29 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0xc0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2684.025339][T12693] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 2684.043832][T12693] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready 04:45:29 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0400000203000000000006040000000000000000", 0x39}], 0x1) [ 2684.129274][T12705] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready [ 2684.169665][T12697] FAULT_INJECTION: forcing a failure. [ 2684.169665][T12697] name failslab, interval 1, probability 0, space 0, times 0 [ 2684.182652][T12697] CPU: 0 PID: 12697 Comm: syz-executor.0 Not tainted 5.13.0-rc3-syzkaller #0 [ 2684.191710][T12697] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2684.202080][T12697] Call Trace: [ 2684.205708][T12697] dump_stack+0x137/0x19d [ 2684.210132][T12697] should_fail+0x23c/0x250 [ 2684.214849][T12697] __should_failslab+0x81/0x90 [ 2684.219728][T12697] ? register_for_each_vma+0x372/0x890 [ 2684.225553][T12697] should_failslab+0x5/0x20 [ 2684.230355][T12697] kmem_cache_alloc_trace+0x49/0x310 [ 2684.235913][T12697] ? register_for_each_vma+0x372/0x890 [ 2684.241393][T12697] ? vma_interval_tree_iter_next+0x263/0x280 [ 2684.247534][T12697] register_for_each_vma+0x372/0x890 [ 2684.252920][T12697] __uprobe_register+0x3f4/0x8a0 [ 2684.257899][T12697] uprobe_register_refctr+0x29/0x40 [ 2684.263178][T12697] probe_event_enable+0x2be/0x7d0 [ 2684.268396][T12697] ? __uprobe_trace_func+0x430/0x430 [ 2684.273695][T12697] trace_uprobe_register+0x88/0x410 [ 2684.279065][T12697] perf_trace_event_init+0x34e/0x790 [ 2684.284955][T12697] perf_uprobe_init+0xf5/0x140 [ 2684.290197][T12697] perf_uprobe_event_init+0xde/0x140 [ 2684.295806][T12697] perf_try_init_event+0x21a/0x400 [ 2684.301130][T12697] perf_event_alloc+0xa60/0x1790 [ 2684.306493][T12697] __se_sys_perf_event_open+0x5c7/0x2740 [ 2684.312234][T12697] ? vfs_write+0x50c/0x770 [ 2684.316746][T12697] __x64_sys_perf_event_open+0x63/0x70 [ 2684.322225][T12697] do_syscall_64+0x4a/0x90 [ 2684.326828][T12697] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2684.332923][T12697] RIP: 0033:0x4665d9 [ 2684.336961][T12697] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2684.357364][T12697] RSP: 002b:00007fc55cf8b188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2684.366339][T12697] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2684.374478][T12697] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 2684.382573][T12697] RBP: 00007fc55cf8b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2684.390559][T12697] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 2684.398702][T12697] R13: 00007fffb6e0760f R14: 00007fc55cf8b300 R15: 0000000000022000 [ 2684.410583][T12709] IPv6: ADDRCONF(NETDEV_CHANGE): Y4`Ҙ: link becomes ready 04:45:30 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0xb, 0xda3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff0600000001000000090000002500000019000400ff0400000204000000000006040000000000000000", 0x39}], 0x1) 04:45:30 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x601}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 04:45:30 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0xff, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x198}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)