[ 42.077427][ T26] audit: type=1800 audit(1561153065.497:26): pid=7804 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 42.115327][ T26] audit: type=1800 audit(1561153065.497:27): pid=7804 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [ 42.134774][ T26] audit: type=1800 audit(1561153065.507:28): pid=7804 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2417 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [....] startpar: service(s) returned failure: rsyslog ...[?25l[?1c7[FAIL8[?25h[?0c failed! Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.135' (ECDSA) to the list of known hosts. 2019/06/21 21:37:53 fuzzer started 2019/06/21 21:37:56 dialing manager at 10.128.0.26:41373 2019/06/21 21:37:56 syscalls: 2465 2019/06/21 21:37:56 code coverage: enabled 2019/06/21 21:37:56 comparison tracing: enabled 2019/06/21 21:37:56 extra coverage: extra coverage is not supported by the kernel 2019/06/21 21:37:56 setuid sandbox: enabled 2019/06/21 21:37:56 namespace sandbox: enabled 2019/06/21 21:37:56 Android sandbox: /sys/fs/selinux/policy does not exist 2019/06/21 21:37:56 fault injection: enabled 2019/06/21 21:37:56 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/06/21 21:37:56 net packet injection: enabled 2019/06/21 21:37:56 net device setup: enabled 21:40:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000100)=""/99, 0x63}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5}, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xfd1d, 0x0, 0x0, 0x800e0057d) shutdown(r0, 0x0) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000000)=""/116, 0x74}], 0x1) shutdown(r1, 0x0) syzkaller login: [ 178.121647][ T7991] IPVS: ftp: loaded support on port[0] = 21 21:40:01 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x200000000a, 0xffffffffffffffff) fcntl$dupfd(r1, 0xa, 0xffffffffffffffff) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r3, 0x0) connect$unix(r2, &(0x7f0000000440)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r4 = accept$inet(r3, 0x0, 0x0) sendto(r4, &(0x7f0000000040), 0xfe81, 0x0, 0x0, 0x100000118) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0x69, 0x0, 0x0) [ 178.239868][ T7991] chnl_net:caif_netlink_parms(): no params data found [ 178.312429][ T7991] bridge0: port 1(bridge_slave_0) entered blocking state [ 178.328205][ T7991] bridge0: port 1(bridge_slave_0) entered disabled state [ 178.348434][ T7991] device bridge_slave_0 entered promiscuous mode [ 178.360022][ T7991] bridge0: port 2(bridge_slave_1) entered blocking state [ 178.368835][ T7991] bridge0: port 2(bridge_slave_1) entered disabled state [ 178.376795][ T7991] device bridge_slave_1 entered promiscuous mode [ 178.399420][ T7991] bond0: Enslaving bond_slave_0 as an active interface with an up link 21:40:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000100)=""/99, 0x63}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6}, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00496) shutdown(r0, 0x0) poll(0x0, 0x0, 0x101) shutdown(r1, 0x0) [ 178.410548][ T7991] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 178.435658][ T7991] team0: Port device team_slave_0 added [ 178.443469][ T7991] team0: Port device team_slave_1 added [ 178.454894][ T7994] IPVS: ftp: loaded support on port[0] = 21 [ 178.530659][ T7991] device hsr_slave_0 entered promiscuous mode 21:40:02 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) fsetxattr$system_posix_acl(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) [ 178.647540][ T7991] device hsr_slave_1 entered promiscuous mode [ 178.716844][ T7991] bridge0: port 2(bridge_slave_1) entered blocking state [ 178.719963][ T7996] IPVS: ftp: loaded support on port[0] = 21 [ 178.724066][ T7991] bridge0: port 2(bridge_slave_1) entered forwarding state [ 178.737669][ T7991] bridge0: port 1(bridge_slave_0) entered blocking state [ 178.744745][ T7991] bridge0: port 1(bridge_slave_0) entered forwarding state [ 178.803166][ T7999] IPVS: ftp: loaded support on port[0] = 21 21:40:02 executing program 4: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) poll(&(0x7f0000000000)=[{r0}], 0x1, 0x800000000004a) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xfffffeb1, 0x0, 0x0, 0x800e00711) recvmsg(r1, &(0x7f0000001980)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000001c0)=""/4096, 0x1000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0xa}, 0x0) shutdown(r1, 0x0) [ 179.116707][ T7994] chnl_net:caif_netlink_parms(): no params data found [ 179.158690][ T7991] 8021q: adding VLAN 0 to HW filter on device bond0 [ 179.165820][ T7996] chnl_net:caif_netlink_parms(): no params data found [ 179.195161][ T7999] chnl_net:caif_netlink_parms(): no params data found 21:40:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000340)=""/92, 0x5c}], 0x1) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xe809ab81, 0x0, 0x0, 0x800e008c6) shutdown(r1, 0x0) shutdown(r2, 0x0) [ 179.213552][ T7991] 8021q: adding VLAN 0 to HW filter on device team0 [ 179.237408][ T8004] IPVS: ftp: loaded support on port[0] = 21 [ 179.244054][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 179.255323][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 179.281525][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 179.292648][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 179.352579][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 179.362493][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 179.371183][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 179.378294][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 179.385925][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 179.394498][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 179.402795][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 179.409877][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 179.444519][ T7994] bridge0: port 1(bridge_slave_0) entered blocking state [ 179.452999][ T7994] bridge0: port 1(bridge_slave_0) entered disabled state [ 179.460721][ T7994] device bridge_slave_0 entered promiscuous mode [ 179.471727][ T3487] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 179.500124][ T7996] bridge0: port 1(bridge_slave_0) entered blocking state [ 179.507471][ T8009] IPVS: ftp: loaded support on port[0] = 21 [ 179.508222][ T7996] bridge0: port 1(bridge_slave_0) entered disabled state [ 179.521535][ T7996] device bridge_slave_0 entered promiscuous mode [ 179.529545][ T7996] bridge0: port 2(bridge_slave_1) entered blocking state [ 179.536625][ T7996] bridge0: port 2(bridge_slave_1) entered disabled state [ 179.544510][ T7996] device bridge_slave_1 entered promiscuous mode [ 179.559854][ T7994] bridge0: port 2(bridge_slave_1) entered blocking state [ 179.566943][ T7994] bridge0: port 2(bridge_slave_1) entered disabled state [ 179.574874][ T7994] device bridge_slave_1 entered promiscuous mode [ 179.596787][ T7994] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 179.607814][ T3487] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 179.616363][ T3487] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 179.625133][ T3487] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 179.633639][ T3487] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 179.642347][ T3487] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 179.650952][ T3487] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 179.658881][ T7999] bridge0: port 1(bridge_slave_0) entered blocking state [ 179.665943][ T7999] bridge0: port 1(bridge_slave_0) entered disabled state [ 179.673736][ T7999] device bridge_slave_0 entered promiscuous mode [ 179.684107][ T7999] bridge0: port 2(bridge_slave_1) entered blocking state [ 179.691498][ T7999] bridge0: port 2(bridge_slave_1) entered disabled state [ 179.699502][ T7999] device bridge_slave_1 entered promiscuous mode [ 179.715275][ T7996] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 179.724981][ T7994] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 179.747470][ T7996] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 179.759057][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 179.768450][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 179.776631][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 179.785628][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 179.825220][ T7994] team0: Port device team_slave_0 added [ 179.833586][ T7999] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 179.847788][ T7991] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 179.862193][ T7996] team0: Port device team_slave_0 added [ 179.869529][ T7994] team0: Port device team_slave_1 added [ 179.876104][ T7996] team0: Port device team_slave_1 added [ 179.883706][ T7999] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 179.912672][ T7999] team0: Port device team_slave_0 added [ 179.941668][ T7999] team0: Port device team_slave_1 added [ 180.000108][ T7994] device hsr_slave_0 entered promiscuous mode [ 180.037774][ T7994] device hsr_slave_1 entered promiscuous mode [ 180.168930][ T7996] device hsr_slave_0 entered promiscuous mode [ 180.217783][ T7996] device hsr_slave_1 entered promiscuous mode [ 180.359847][ T7999] device hsr_slave_0 entered promiscuous mode [ 180.397636][ T7999] device hsr_slave_1 entered promiscuous mode [ 180.470587][ T7991] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 180.501633][ T8004] chnl_net:caif_netlink_parms(): no params data found [ 180.579204][ T8009] chnl_net:caif_netlink_parms(): no params data found [ 180.604672][ T8004] bridge0: port 1(bridge_slave_0) entered blocking state [ 180.611951][ T8004] bridge0: port 1(bridge_slave_0) entered disabled state [ 180.619991][ T8004] device bridge_slave_0 entered promiscuous mode [ 180.640330][ T8004] bridge0: port 2(bridge_slave_1) entered blocking state [ 180.652751][ T8004] bridge0: port 2(bridge_slave_1) entered disabled state [ 180.663058][ T8004] device bridge_slave_1 entered promiscuous mode [ 180.684379][ T8004] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 180.712961][ T8004] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 180.780183][ T8009] bridge0: port 1(bridge_slave_0) entered blocking state [ 180.788388][ T8009] bridge0: port 1(bridge_slave_0) entered disabled state [ 180.796254][ T8009] device bridge_slave_0 entered promiscuous mode [ 180.817938][ T7994] 8021q: adding VLAN 0 to HW filter on device bond0 [ 180.834855][ T8004] team0: Port device team_slave_0 added [ 180.840764][ T8009] bridge0: port 2(bridge_slave_1) entered blocking state [ 180.849131][ T8009] bridge0: port 2(bridge_slave_1) entered disabled state [ 180.856706][ T8009] device bridge_slave_1 entered promiscuous mode 21:40:04 executing program 0: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 180.886322][ T7999] 8021q: adding VLAN 0 to HW filter on device bond0 [ 180.898601][ T8004] team0: Port device team_slave_1 added [ 180.928419][ T8005] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 180.942468][ T8005] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 180.960029][ T7994] 8021q: adding VLAN 0 to HW filter on device team0 21:40:04 executing program 0: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 180.973758][ T8009] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 180.992640][ T8005] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 181.000653][ T8005] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 21:40:04 executing program 0: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 181.050113][ T8004] device hsr_slave_0 entered promiscuous mode [ 181.078034][ T8004] device hsr_slave_1 entered promiscuous mode 21:40:04 executing program 0: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 181.174762][ T8009] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 181.185922][ T7999] 8021q: adding VLAN 0 to HW filter on device team0 [ 181.199255][ T3487] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 181.209975][ T3487] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 21:40:04 executing program 0: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 181.218616][ T3487] bridge0: port 1(bridge_slave_0) entered blocking state [ 181.225764][ T3487] bridge0: port 1(bridge_slave_0) entered forwarding state [ 181.241592][ T3487] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 181.255995][ T3487] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 181.264879][ T3487] bridge0: port 2(bridge_slave_1) entered blocking state 21:40:04 executing program 0: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 181.272018][ T3487] bridge0: port 2(bridge_slave_1) entered forwarding state [ 181.279732][ T3487] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 181.288620][ T3487] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 181.324859][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 181.333902][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 181.342799][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 181.351480][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 181.368118][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 181.376524][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 181.387766][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 181.395955][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 181.404668][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 21:40:04 executing program 0: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 181.429824][ T7994] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 181.442175][ T7996] 8021q: adding VLAN 0 to HW filter on device bond0 [ 181.451266][ T8009] team0: Port device team_slave_0 added [ 181.462860][ T7998] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 181.473763][ T7998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 181.485163][ T7998] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 181.495193][ T7998] bridge0: port 1(bridge_slave_0) entered blocking state [ 181.502318][ T7998] bridge0: port 1(bridge_slave_0) entered forwarding state [ 181.538326][ T7994] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 181.561778][ T8009] team0: Port device team_slave_1 added [ 181.583420][ T7996] 8021q: adding VLAN 0 to HW filter on device team0 [ 181.608027][ T8052] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 181.616014][ T8052] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 181.625446][ T8052] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 181.634091][ T8052] bridge0: port 2(bridge_slave_1) entered blocking state [ 181.641192][ T8052] bridge0: port 2(bridge_slave_1) entered forwarding state [ 181.650017][ T8052] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 181.658815][ T8052] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 181.667272][ T8052] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 181.674784][ T8052] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 181.703281][ T8004] 8021q: adding VLAN 0 to HW filter on device bond0 [ 181.715341][ T8005] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 181.724927][ T8005] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 181.736875][ T8005] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 181.745877][ T8005] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 181.757488][ T8005] bridge0: port 1(bridge_slave_0) entered blocking state [ 181.764632][ T8005] bridge0: port 1(bridge_slave_0) entered forwarding state [ 181.819082][ T8009] device hsr_slave_0 entered promiscuous mode [ 181.867572][ T8009] device hsr_slave_1 entered promiscuous mode [ 181.932380][ T7999] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 181.943215][ T7999] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 181.954486][ T8005] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 181.962350][ T8005] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 181.970438][ T8005] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 181.978908][ T8005] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 181.987060][ T8005] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 181.995413][ T8005] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 182.004275][ T8005] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 182.013425][ T8005] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 182.021766][ T8005] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.028848][ T8005] bridge0: port 2(bridge_slave_1) entered forwarding state [ 182.036290][ T8005] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 182.044663][ T8005] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 182.052823][ T8005] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 21:40:05 executing program 1: poll(&(0x7f0000000100)=[{}], 0x22ba, 0x800000000004a) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0xfffffeb1, 0x0, 0x0, 0x800e00711) readv(r0, &(0x7f0000000340)=[{&(0x7f0000000000)=""/69, 0x45}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6) shutdown(r0, 0x0) [ 182.101310][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 182.112324][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 182.121346][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 182.130843][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 182.141706][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 182.149485][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 182.157110][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 182.186354][ T7999] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 182.197833][ T8004] 8021q: adding VLAN 0 to HW filter on device team0 [ 182.219907][ T8052] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 182.235070][ T8052] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 182.245423][ T8052] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 182.254073][ T8052] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 182.262706][ T8052] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 182.272991][ T8052] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 182.281616][ T8052] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.288698][ T8052] bridge0: port 1(bridge_slave_0) entered forwarding state [ 182.314438][ T8052] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 182.322522][ T8052] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 182.337083][ T8052] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 182.370865][ T8052] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.378110][ T8052] bridge0: port 2(bridge_slave_1) entered forwarding state [ 182.386055][ T8052] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 182.394963][ T8052] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 182.403924][ T8052] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 182.412239][ T8052] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 182.438448][ T7996] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 182.454624][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 182.463816][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 182.500726][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 182.515988][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 182.524967][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 182.534320][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 182.545468][ T2993] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 182.559935][ T7996] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 182.576313][ T7998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 182.588125][ T7998] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 182.598544][ T8004] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 182.622988][ T8009] 8021q: adding VLAN 0 to HW filter on device bond0 [ 182.646286][ T8009] 8021q: adding VLAN 0 to HW filter on device team0 [ 182.670815][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 182.679559][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 182.688068][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 182.696685][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 182.705358][ T8008] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.712635][ T8008] bridge0: port 1(bridge_slave_0) entered forwarding state [ 182.721050][ T8008] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 182.749282][ T7998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 182.772061][ T7998] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 182.786599][ T7998] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.793737][ T7998] bridge0: port 2(bridge_slave_1) entered forwarding state [ 182.802036][ T7998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 182.810688][ T7998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 182.819453][ T7998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 182.828122][ T7998] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 182.836294][ T7998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 182.844834][ T7998] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 182.853464][ T7998] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 182.869201][ T8004] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 182.879952][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 182.897957][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 182.906432][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 182.916568][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 182.928287][ T8009] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 182.963661][ T8009] 8021q: adding VLAN 0 to HW filter on device batadv0 21:40:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f00000001c0)=""/148, 0x4b}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x1, 0x0, 0xffffffffffffff3d}, 0x0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000380)=""/108, 0x6c}], 0x1) recvfrom$inet(r3, 0x0, 0xffffff2e, 0x0, 0x0, 0x800e006a9) shutdown(r2, 0x0) readv(r1, &(0x7f00000004c0)=[{&(0x7f0000000100)=""/66, 0x42}, {0x0}], 0x2) shutdown(r3, 0x0) 21:40:06 executing program 0: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 21:40:06 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") ioctl$EVIOCSKEYCODE(r0, 0x40084504, 0x0) 21:40:06 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, 0x0, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) write(0xffffffffffffffff, 0x0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x6, 0x22080) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, &(0x7f0000000080)={{0x20, 0x0, 0x4, 0x4, 0x3, 0x800}, 0x5, 0x8, 0x3}) 21:40:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) readv(r0, &(0x7f0000001380)=[{&(0x7f0000000000)=""/21, 0x15}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0xfffffd1d, 0x0, 0x0, 0x800e0055d) shutdown(r2, 0x0) readv(r1, &(0x7f00000016c0)=[{&(0x7f0000000040)=""/40, 0x28}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9) shutdown(r3, 0x0) 21:40:06 executing program 0: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 21:40:06 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x200000000a, 0xffffffffffffffff) fcntl$dupfd(r1, 0xa, 0xffffffffffffffff) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r3, 0x0) connect$unix(r2, &(0x7f0000000440)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r4 = accept$inet(r3, 0x0, 0x0) sendto(r4, &(0x7f0000000040), 0xfe81, 0x0, 0x0, 0x100000118) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x80000000010c0000) 21:40:06 executing program 2: creat(&(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, 0x0) 21:40:06 executing program 0: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 21:40:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000100)=""/99, 0x63}, {0x0}, {0x0}, {0x0}], 0x4}, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00496) shutdown(r0, 0x0) poll(&(0x7f00000000c0)=[{r1}], 0x1, 0x101) shutdown(r1, 0x0) 21:40:06 executing program 1: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) close(r0) close(r1) socketpair$unix(0x1, 0x20000000005, 0x0, &(0x7f0000000140)) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x55, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x27d, 0x0, 0x0, 0x800e00f80) [ 183.478860][ T8153] EXT4-fs (sda1): re-mounted. Opts: 21:40:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) fchdir(r0) recvfrom$inet(r0, 0x0, 0x2cc, 0x2, 0x0, 0x800e00746) shutdown(r0, 0x0) [ 183.558462][ T8161] EXT4-fs (sda1): re-mounted. Opts: 21:40:07 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 21:40:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) readv(r0, &(0x7f0000001380)=[{&(0x7f0000000000)=""/21, 0x15}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x7) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0xfffffd1d, 0x0, 0x0, 0x800e0055d) shutdown(r2, 0x0) readv(r1, &(0x7f00000016c0)=[{&(0x7f0000000040)=""/40, 0x28}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9) shutdown(r3, 0x0) 21:40:07 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmsg(r0, &(0x7f0000000780)={&(0x7f00000004c0)=@tipc=@id, 0x80, 0x0}, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="200000001900ffff0000000000000000050000000c000300060000000080000022bcffbf7b2ab65ca9c2926fcdafea3d4f6d6339b259cb76351f99b0e350376a13fe07af1239b97379c00d922c3590c068dc82b322f7d16daefcebba9b18c854dd2391b736bbdfdae5fa30d3900a7e6bc8917d10c433ed46289f941b4c0087faf061b8bd7e1cd2356c1858bbc1d56243122cd2fc534b225669ddf89efea7dfb73fbb4a9df2c343196abb895ba90537019a76636e09a47f6b02313edd4c10e07cb1f0b0a4be5798c6adcaf000"/218], 0x1}}, 0x0) 21:40:07 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) poll(&(0x7f00000000c0)=[{r0, 0x100}], 0x1, 0x0) 21:40:07 executing program 0: lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 21:40:07 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000002c0)) 21:40:07 executing program 0: lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 21:40:07 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x200000000a, 0xffffffffffffffff) fcntl$dupfd(r1, 0xa, 0xffffffffffffffff) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r3, 0x0) connect$unix(r2, &(0x7f0000000440)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r4 = accept$inet(r3, 0x0, 0x0) sendto(r4, &(0x7f0000000040), 0xfe81, 0x0, 0x0, 0x100000118) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) socket(0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 21:40:07 executing program 5: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) poll(&(0x7f0000000040), 0x2000000000000014, 0x4e) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x2af4, 0x0, 0x0, 0x800e00738) shutdown(r1, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x6c9, 0x0, 0x0, 0x800e0051a) ppoll(&(0x7f0000000100)=[{r0}], 0x1, 0x0, 0x0, 0x0) 21:40:07 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="10000000290000002f"], 0x9}, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x18, 0x2, 0x0) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) 21:40:07 executing program 0: lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 21:40:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000640)=""/4096, 0x1000}, {0x0}], 0x2}, 0x40002) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xffffff2e, 0x0, 0x0, 0x800e009d1) shutdown(r1, 0x0) shutdown(r2, 0x0) 21:40:07 executing program 0: mknod$loop(0x0, 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 21:40:07 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r1, &(0x7f0000000000), 0xe) listen(r1, 0x0) 21:40:08 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) r2 = socket$kcm(0x29, 0x2, 0x0) sendfile(r2, r1, 0x0, 0x63) 21:40:08 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) close(r0) close(r1) 21:40:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x1000040, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@flushsa={0x20, 0x1c, 0x113, 0x0, 0x0, {}, [@tmpl={0x4}, @proto={0x8, 0x19, 0x32}]}, 0x20}}, 0x0) 21:40:08 executing program 0: mknod$loop(0x0, 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 21:40:08 executing program 2: poll(&(0x7f0000000100)=[{}], 0x22ba, 0x800000000004a) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0xfffffeb1, 0x0, 0x0, 0x800e00711) readv(r0, &(0x7f0000000400)=[{&(0x7f0000000140)=""/255, 0xff}, {0x0}, {0x0}, {0x0}], 0x4) shutdown(r0, 0x0) 21:40:08 executing program 0: mknod$loop(0x0, 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 184.748492][ T8258] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 184.829787][ T8258] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. 21:40:08 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x200000000a, 0xffffffffffffffff) fcntl$dupfd(r1, 0xa, 0xffffffffffffffff) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r3, 0x0) connect$unix(r2, &(0x7f0000000040)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xd) r4 = accept$inet(r3, 0x0, 0x0) sendto(r4, &(0x7f0000000040), 0xfe81, 0x0, 0x0, 0x100000118) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 21:40:08 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @broadcast=0xe0000001}, @icmp}}}}, 0x0) r1 = fcntl$dupfd(r0, 0x2, 0xffffffffffffffff) accept4$inet6(r1, 0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x800e00731) 21:40:08 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x200000000a, 0xffffffffffffffff) fcntl$dupfd(r1, 0xa, 0xffffffffffffffff) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r3, 0x0) connect$unix(r2, &(0x7f0000000440)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r4 = accept$inet(r3, 0x0, 0x0) sendto(r4, &(0x7f0000000040), 0xfe81, 0x0, 0x0, 0x100000118) open(0x0, 0x0, 0x0) fcntl$setstatus(r3, 0x4, 0x80008) 21:40:08 executing program 0: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x0, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 21:40:08 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000240)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdb3) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f00000000c0)=0x6002) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x400000, 0x0) getsockopt$SO_COOKIE(r3, 0x1, 0x39, &(0x7f0000000040), &(0x7f0000000080)=0x8) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x5) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000100)="460f300f07c483614804ee08440f20c03506000000440f22c0c402f93473230f09f20f013cb9b805000000b9c00000000f01d90fc728c4c1f9e79f2e000000", 0x3f}], 0x0, 0x4, 0x0, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f00000002c0)={"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"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:40:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f00000001c0)=[{&(0x7f0000000040)=""/37, 0x25}, {0x0}, {0x0}], 0x3) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x100000206, 0x0, 0x0, 0x800e006dd) shutdown(r1, 0x0) ppoll(&(0x7f0000000080)=[{r2}, {r0}], 0x2, 0x0, 0x0, 0x0) shutdown(r2, 0x0) [ 184.962323][ T8284] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 21:40:08 executing program 0: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x0, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 21:40:08 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x200000000a, 0xffffffffffffffff) r2 = fcntl$dupfd(r1, 0xa, 0xffffffffffffffff) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) bind$unix(r4, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xd) write(r4, &(0x7f0000000000)="243f8e5417e3e4e8574a66c4e0c60a710cf397da82d9800b0d6be517473ae631fb74f51a22a3e62d8f8fe610c9b94bfa", 0x30) dup2(r2, r2) listen(r4, 0x0) connect$unix(r3, &(0x7f0000000440)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r5 = accept$inet(r4, 0x0, 0x0) sendto(r5, &(0x7f0000000040), 0xfe81, 0x0, 0x0, 0x100000118) truncate(0x0, 0x0) 21:40:08 executing program 4: 21:40:08 executing program 0: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x0, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 185.150192][ C1] hrtimer: interrupt took 51192 ns 21:40:08 executing program 4: 21:40:08 executing program 5: 21:40:08 executing program 0: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(0x0, &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 21:40:09 executing program 1: 21:40:09 executing program 4: poll(&(0x7f0000000080)=[{}, {}], 0x2, 0x4e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0xff8c, 0x0, 0x0, 0x800e004c5) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) shutdown(r0, 0x0) 21:40:09 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x0) poll(&(0x7f0000000040), 0x2000000000000014, 0x4e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x6c9, 0x0, 0x0, 0x800e00465) poll(&(0x7f0000000000)=[{r0, 0x2}], 0x1, 0x0) ppoll(&(0x7f0000000080), 0x1, 0x0, 0x0, 0x20) shutdown(r0, 0x0) 21:40:09 executing program 0: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(0x0, &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 21:40:09 executing program 3: 21:40:09 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000140)=@nat={'nat\x00', 0x19, 0x2, 0x268, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="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"]}, 0x2e0) 21:40:09 executing program 1: 21:40:09 executing program 0: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(0x0, &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 21:40:09 executing program 3: 21:40:09 executing program 1: [ 185.981345][ T8341] xt_helper: cannot load conntrack support for proto=7 21:40:09 executing program 2: 21:40:09 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x200000000a, 0xffffffffffffffff) r2 = fcntl$dupfd(r1, 0xa, 0xffffffffffffffff) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) bind$unix(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="0100e91f7189591e9233614b006b98faba8491d00500000000000000ac2e97f8863d69451e5994a1dbb9e36bc7e015f694c0fbb351"], 0x1) listen(r4, 0x0) connect$unix(r3, &(0x7f0000000440)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r5 = accept$inet(r4, 0x0, 0x0) sendto(r5, &(0x7f0000000040), 0xfe81, 0x0, 0x0, 0x100000118) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r6 = socket$inet(0x2, 0x0, 0x0) fcntl$setstatus(r6, 0x4, 0x80000) read(r2, &(0x7f0000000480)=""/4096, 0x1000) poll(0x0, 0x0, 0x0) dup2(r0, r0) 21:40:09 executing program 2: 21:40:10 executing program 4: 21:40:10 executing program 1: 21:40:10 executing program 0: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', 0x0, &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 21:40:10 executing program 2: 21:40:10 executing program 3: 21:40:10 executing program 5: 21:40:10 executing program 2: 21:40:10 executing program 5: 21:40:10 executing program 3: 21:40:10 executing program 1: 21:40:10 executing program 4: 21:40:10 executing program 2: 21:40:10 executing program 3: 21:40:10 executing program 1: 21:40:10 executing program 0: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', 0x0, &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 21:40:10 executing program 4: 21:40:10 executing program 5: 21:40:10 executing program 2: 21:40:10 executing program 3: 21:40:10 executing program 1: 21:40:10 executing program 5: 21:40:10 executing program 4: 21:40:10 executing program 2: 21:40:10 executing program 3: 21:40:10 executing program 5: 21:40:10 executing program 4: 21:40:10 executing program 0: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', 0x0, &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 21:40:10 executing program 1: 21:40:10 executing program 2: 21:40:10 executing program 3: 21:40:10 executing program 1: 21:40:10 executing program 5: 21:40:10 executing program 4: 21:40:11 executing program 3: 21:40:11 executing program 2: 21:40:11 executing program 1: 21:40:11 executing program 5: 21:40:11 executing program 4: 21:40:11 executing program 0: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', 0x0, 0x0, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 21:40:11 executing program 2: 21:40:11 executing program 5: 21:40:11 executing program 3: 21:40:11 executing program 1: 21:40:11 executing program 5: [ 187.896841][ T8472] Invalid argument reading file caps for ./file0 21:40:11 executing program 2: 21:40:11 executing program 3: 21:40:11 executing program 1: 21:40:11 executing program 4: 21:40:11 executing program 5: 21:40:11 executing program 0: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', 0x0, 0x0, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 21:40:11 executing program 2: 21:40:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_emit_ethernet(0x2a, &(0x7f0000000080)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223, 0x223}, @local}, @igmp={0x0, 0x0, 0x0, @broadcast}}}}}, 0x0) 21:40:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca505600bcf0d7ce070") r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f00000002c0)={'exec ', ':=\x02\xd0\x9c\xd3r\xc2\xefU\t\xdb\x8a\xb2N0\rYD\xdf\x8f4d\x97\xda\x98\xf0\xb4S\xadm\x8a/\xcb\x12s-\xb2\xae\x8b\xfc\x03\x0e\x9a#\x05\x14(\x9d0\v\x06wD\x94\xf1\xee\x8a\xd57\x9d\xfe\xd2\x04\xddN\xe8\xd1\xbb\x83\xd5\x94\xcc \x86\xc6uu\rL.\x9a\xf2\x81\xfa\x93}\x1b\x01\x00\x00\x80\x00\x00\x02\x00\xba\xecsb\x02\xc1\x83\xa1\xa0h\x9c`\x94\x8f<\xd9\xc5\xf3\x18\xfe\x02\xa9\x8c\xbe\xfa\xd7\xc7\xe6\xf3\xf4\xcd\x05\xf5\xf1\xe0\xd2;n=$_\xc7aS\xe6\x13\xae\x18r\"\xe4\xd5\xf25#x\xcf\x04C\xfc\xd2K\x9aLB\x93\x1d\xc0\xbcX\xc3\xbfS\xca+\x0f4\xd8EW\xf9\xbaMy\xa9\xe8wsMB\xaac\xa9\xd6p\x02n\xa1f\xae2X 5Oam\xebW\x14O\x83\x7fX9\xb0\xb3\x90\x1c1_r\xc8s=\xc6\xb5\xb3'}, 0xe5) 21:40:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000100)=""/99, 0x63}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00496) shutdown(r0, 0x0) poll(&(0x7f00000000c0)=[{}], 0x1, 0x101) shutdown(r1, 0x0) 21:40:11 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x7) [ 188.204221][ T8491] Invalid argument reading file caps for ./file0 21:40:11 executing program 2: r0 = socket$kcm(0x11, 0xc000000000000003, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f00000001c0)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000240)="e1a28ee691c015498dd60fdd0800", 0xe}], 0x1}, 0x0) 21:40:11 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = accept$unix(0xffffffffffffffff, 0x0, 0x0) fchdir(0xffffffffffffffff) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, 0x0) 21:40:11 executing program 4: open$dir(&(0x7f0000000000)='./file0\x00', 0x40000400000002c1, 0x0) open$dir(&(0x7f00000001c0)='./file0\x00', 0x1000018, 0x0) 21:40:11 executing program 0: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', 0x0, 0x0, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 188.388980][ T8502] sp0: Synchronizing with TNC 21:40:11 executing program 2: r0 = open(&(0x7f0000000480)='./file0\x00', 0x8000000000020a, 0xfffffffffffffffd) writev(r0, &(0x7f0000000500)=[{&(0x7f0000000100)="c8", 0x1}], 0x1) 21:40:11 executing program 4: poll(&(0x7f0000000100)=[{}], 0x22ba, 0x800000000004a) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0xfffffeb1, 0x0, 0x0, 0x800e00711) recvmsg(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000004c0)=[{0x0}, {&(0x7f0000000200)=""/131, 0x83}, {0x0}], 0x3}, 0x0) shutdown(r0, 0x0) [ 188.440368][ T26] kauditd_printk_skb: 2 callbacks suppressed [ 188.440378][ T26] audit: type=1804 audit(1561153211.897:31): pid=8518 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir868575399/syzkaller.askQha/18/file0" dev="sda1" ino=16593 res=1 [ 188.473359][ T8521] Invalid argument reading file caps for ./file0 21:40:12 executing program 0: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 21:40:12 executing program 3: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000040)={0x1}, 0x6) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @rand_addr="ff3e6808e92b7abafc47d822996f60e4"}, 0x1c) sendmmsg(r0, &(0x7f0000006d00), 0x400000000000007, 0x6000000) [ 188.621214][ T8502] sp0: Synchronizing with TNC 21:40:12 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, 0x0, 0x0) 21:40:12 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000040)=[0x0, 0xfffffffffffffffe]) 21:40:12 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000100)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000080), 0x1c) r3 = dup2(r2, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, 0xfffffffffffffffe, 0x0) ioctl$sock_TIOCOUTQ(r1, 0x5411, 0x0) 21:40:12 executing program 1: open(0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x40000400000002c1, 0x0) writev(r0, &(0x7f0000000340)=[{&(0x7f0000000180), 0x80000}], 0x1000000000000013) writev(0xffffffffffffffff, 0x0, 0x0) 21:40:12 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @broadcast=0xe0000001}, @icmp}}}}, 0x0) getresgid(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x800e00c9f) dup(0xffffffffffffffff) 21:40:12 executing program 0: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 21:40:12 executing program 5: r0 = socket$inet6(0xa, 0x20400000004001, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_int(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000280)=0x1a) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="020700001000000000000000000000000800120000000100000000000000000006000000000000000000000000000200e00040e0ff00000020000000000000000000ada8008004000000200000000000030006000000000002000080ac14ffbbf00000000000000003000500000000000200423b1d632bd7b8200000000000c7"], 0x80}}, 0x0) accept(r0, 0x0, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmmsg(r2, &(0x7f0000000180), 0x32bc45944b084a6, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) 21:40:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000100)=""/99, 0x63}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5}, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00496) shutdown(r0, 0x0) poll(&(0x7f00000000c0)=[{r1}], 0x1, 0x101) shutdown(r1, 0x0) 21:40:12 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:12 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:12 executing program 0: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 21:40:12 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:13 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, 0x0, 0x0) 21:40:13 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:14 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9e, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000080)='-', 0x1) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) 21:40:14 executing program 0: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(0x0, 0x0, 0x0) 21:40:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) listen(0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xd02d, 0x0, 0x0, 0x800e00741) shutdown(r0, 0x0) 21:40:14 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 21:40:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_timeval(r0, 0xffff, 0x400001006, &(0x7f0000000000)={0x0, 0x10008}, 0x10) readv(r0, &(0x7f0000000280)=[{&(0x7f0000000200)=""/43, 0x2b}], 0x15) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xfffffd26, 0x0, 0x0, 0x800e00707) readv(r1, &(0x7f0000000240)=[{&(0x7f00000003c0)=""/110, 0x6e}, {0x0}], 0x2) shutdown(r1, 0x0) 21:40:14 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = dup(r0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000000)=@gcm_128={{}, "6f9ff536e3dfc040", "c230d511a900bd218f17106d047955ae", "7aa2c99c", "8d3038ab8ac01762"}, 0x28) 21:40:14 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 21:40:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_sctp(0x2, 0x5, 0x84) shutdown(r1, 0x0) recvfrom$inet(r0, 0x0, 0xd66, 0x4003e, 0x0, 0x800e00435) shutdown(r0, 0x0) 21:40:14 executing program 0: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(0x0, 0x0, 0x0) 21:40:14 executing program 3: 21:40:14 executing program 3: 21:40:14 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 21:40:14 executing program 4: 21:40:14 executing program 0: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(0x0, 0x0, 0x0) 21:40:14 executing program 5: 21:40:14 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={0x0, 0x0}, 0x20) 21:40:14 executing program 2: 21:40:14 executing program 3: 21:40:14 executing program 5: 21:40:14 executing program 0: 21:40:14 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={0x0, 0x0}, 0x20) 21:40:14 executing program 4: 21:40:14 executing program 5: 21:40:14 executing program 4: 21:40:14 executing program 3: 21:40:14 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={0x0, 0x0}, 0x20) 21:40:14 executing program 0: 21:40:15 executing program 2: 21:40:15 executing program 4: 21:40:15 executing program 5: 21:40:15 executing program 3: 21:40:15 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") gettid() r2 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x0) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0x87bb09c6) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(0x0, 0x0) keyctl$get_security(0x11, 0x0, 0x0, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000080), 0x1) 21:40:15 executing program 2: r0 = socket(0x18, 0x3, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000240)}], 0x1) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) 21:40:15 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) 21:40:15 executing program 5: perf_event_open(&(0x7f0000000100)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x14104a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x2) sendfile(r1, r0, &(0x7f0000000000), 0x0) 21:40:15 executing program 4: timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) r0 = socket$inet6(0xa, 0x800000003, 0x5) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x40001e0, 0x0, 0x0) 21:40:15 executing program 3 (fault-call:3 fault-nth:0): mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 21:40:15 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) 21:40:15 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f0000000000)={@remote}) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) r3 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) getegid() stat(0xfffffffffffffffe, 0x0) fcntl$setstatus(r2, 0x4, 0x40000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000640)) geteuid() openat$vcs(0xffffffffffffff9c, &(0x7f0000001440)='/dev/vcs\x00', 0x1, 0x0) mount(0x0, &(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='cgroup2\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_SAREA_CTX(r3, 0xc010641d, &(0x7f00000000c0)={0x0, 0x0}) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) set_mempolicy(0x0, &(0x7f0000001640)=0x6, 0x5) fallocate(r1, 0x0, 0x10000, 0x0) syz_mount_image$nfs(&(0x7f0000000280)='nfs\x00', 0x0, 0xe22, 0x1, &(0x7f0000000b80)=[{&(0x7f0000000a80), 0x0, 0x8}], 0x1000, 0x0) fchmod(r0, 0x0) readv(r0, &(0x7f00000013c0)=[{&(0x7f0000000080)=""/104, 0x68}, {&(0x7f0000000100)=""/145, 0x91}, {&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/167, 0xa7}, {&(0x7f0000001340)=""/19, 0x13}], 0x5) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_virtio(&(0x7f0000001380)='md5sumem0user\x00', &(0x7f0000001540)='./file0\x00', &(0x7f0000001580)='9p\x00', 0x1008000, &(0x7f00000015c0)={'trans=virtio,', {[{@noextend='noextend'}, {@cache_fscache='cache=fscache'}, {@uname={'uname', 0x3d, '/dev/vcs\x00'}}], [{@appraise_type='appraise_type=imasig'}, {@obj_type={'obj_type', 0x3d, '/dev/vcs\x00'}}]}}) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000001480)) sendmsg(0xffffffffffffffff, 0x0, 0x8010) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x400000000000) getegid() [ 191.925795][ T8871] FAULT_INJECTION: forcing a failure. [ 191.925795][ T8871] name failslab, interval 1, probability 0, space 0, times 1 [ 191.973210][ T8871] CPU: 1 PID: 8871 Comm: syz-executor.3 Not tainted 5.2.0-rc5+ #4 [ 191.981179][ T8871] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 191.991255][ T8871] Call Trace: [ 191.994558][ T8871] dump_stack+0x1d8/0x2f8 [ 191.998902][ T8871] should_fail+0x608/0x860 [ 192.003331][ T8871] ? setup_fault_attr+0x2b0/0x2b0 [ 192.008378][ T8871] __should_failslab+0x11a/0x160 [ 192.013337][ T8871] ? getname_flags+0xba/0x640 [ 192.018019][ T8871] should_failslab+0x9/0x20 [ 192.022530][ T8871] kmem_cache_alloc+0x56/0x2b0 [ 192.027298][ T8871] ? fpregs_assert_state_consistent+0xaa/0xe0 [ 192.033361][ T8871] getname_flags+0xba/0x640 [ 192.037857][ T8871] getname+0x19/0x20 [ 192.041739][ T8871] __x64_sys_execve+0x78/0xb0 [ 192.046508][ T8871] do_syscall_64+0xfe/0x140 [ 192.051006][ T8871] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 192.056890][ T8871] RIP: 0033:0x4592c9 [ 192.060774][ T8871] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 192.080380][ T8871] RSP: 002b:00007f26e9d09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 192.088791][ T8871] RAX: ffffffffffffffda RBX: 00007f26e9d09c90 RCX: 00000000004592c9 [ 192.096763][ T8871] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 192.104734][ T8871] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 192.112710][ T8871] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f26e9d0a6d4 21:40:15 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) 21:40:15 executing program 4: mknod(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r0 = open(&(0x7f0000001ac0)='./bus\x00', 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x4, @mcast1, 0x3}, 0x1c) pwritev(r0, 0x0, 0x0, 0x0) [ 192.120678][ T8871] R13: 00000000004bf96d R14: 00000000004d1250 R15: 0000000000000003 21:40:15 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f000037d000)=[{&(0x7f0000000000)="1f00000002031900000007000000068100ed853b09000100010100ff3ffe58", 0x1f}], 0x1) getpeername(r0, &(0x7f0000000100)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000080)=0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000180)=[@timestamp, @mss={0x2, 0x3}], 0x2) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x101}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000001c0)={'lo\x00\x05\xb1\x00\x00\x00\x00`\x00\xdd\x00\x00\x04\x00'}) 21:40:15 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) 21:40:15 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000008, 0x0) r1 = gettid() socketpair(0x17, 0x1, 0x401, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_dev$sndpcmp(&(0x7f0000001300)='/dev/snd/pcmC#D#p\x00', 0xffffffffffffffdb, 0x480000) ioctl$CAPI_GET_PROFILE(r3, 0xc0404309, &(0x7f0000001340)=0x8) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$DRM_IOCTL_MAP_BUFS(r4, 0xc0186419, &(0x7f00000012c0)={0x1, &(0x7f0000000180)=""/221, &(0x7f0000001280)=[{0x0, 0x1000, 0x4, &(0x7f0000000280)=""/4096}]}) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f00000000c0)={r5, 0x65, "e6ace160b4a750fd1333e0179244b311367a8140e924d31df84da518e798fe22fe9280ce5637b8f4d83d3ebec793021b569d883bee11643d307a8758b7ad61cb5c2ed16abca9c69dc4819d1de846907717e72491ac661dcd4193edc109ae958d07aae25314"}, 0x0) sync_file_range(r0, 0x4, 0x80000001, 0x1) tgkill(r1, r1, 0xe) getsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) 21:40:15 executing program 5: syz_emit_ethernet(0x66, &(0x7f0000000000)=ANY=[@ANYBLOB="ffffffffffff0180c200000086dd6076605100303afffe809c0000ff0000ff000000000000ffff020000000000000000000000000001870090780014000060c5961e0000001bff010000000000e41703000000000001ff020000000000000000000000000001"], 0x0) 21:40:15 executing program 3 (fault-call:3 fault-nth:1): mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 21:40:15 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) [ 192.406647][ T8894] device lo entered promiscuous mode 21:40:15 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0x2) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x48, &(0x7f0000000100)={&(0x7f0000000000)={0x2c, 0x36, 0x829, 0x0, 0x0, {0x2801, 0x1000000}, [@nested={0x18, 0x0, [@typed={0x14, 0x1, @ipv6=@loopback={0xffffffffffffffff}}]}]}, 0x2c}, 0x1, 0xffffff7f0e000000}, 0x0) setsockopt$netlink_NETLINK_RX_RING(r1, 0x10e, 0x6, &(0x7f0000000040)={0x4, 0x7fff, 0x1, 0xe0}, 0x10) sendto$rxrpc(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@in4={0x21, 0x0, 0x3, 0x10, {0x2, 0x0, @empty}}, 0x24) [ 192.467861][ T8894] device lo left promiscuous mode [ 192.554967][ T8904] FAULT_INJECTION: forcing a failure. [ 192.554967][ T8904] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 192.568214][ T8904] CPU: 0 PID: 8904 Comm: syz-executor.3 Not tainted 5.2.0-rc5+ #4 [ 192.576014][ T8904] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 192.586068][ T8904] Call Trace: [ 192.589370][ T8904] dump_stack+0x1d8/0x2f8 [ 192.593724][ T8904] should_fail+0x608/0x860 [ 192.598150][ T8904] ? setup_fault_attr+0x2b0/0x2b0 [ 192.603282][ T8904] ? proc_fail_nth_write+0x179/0x1f0 [ 192.608569][ T8904] should_fail_alloc_page+0x55/0x60 [ 192.608580][ T8904] prepare_alloc_pages+0x283/0x460 [ 192.608593][ T8904] __alloc_pages_nodemask+0x11c/0x790 [ 192.608617][ T8904] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 192.608635][ T8904] ? __f_unlock_pos+0x19/0x20 [ 192.608650][ T8904] kmem_getpages+0x46/0x480 [ 192.608664][ T8904] cache_grow_begin+0x7e/0x2c0 [ 192.608677][ T8904] cache_alloc_refill+0x311/0x3f0 [ 192.608687][ T8904] ? check_preemption_disabled+0xb7/0x280 [ 192.608699][ T8904] kmem_cache_alloc+0x288/0x2b0 [ 192.608705][ T8904] ? getname_flags+0xba/0x640 [ 192.608714][ T8904] getname_flags+0xba/0x640 [ 192.608726][ T8904] getname+0x19/0x20 [ 192.672590][ T8904] __x64_sys_execve+0x78/0xb0 [ 192.677289][ T8904] do_syscall_64+0xfe/0x140 [ 192.681799][ T8904] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 192.687690][ T8904] RIP: 0033:0x4592c9 21:40:16 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x100, 0x240000) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000080)={0x200, {{0x2, 0x4e21, @broadcast}}}, 0x88) ioctl(r1, 0xffffffff0000641f, 0x0) ioctl(r0, 0x2cb, &(0x7f0000000140)="9810ed4f9a33faa0bb116a81cd47cf2177f5949a1b93d92fa48e1ca0592036917d5efbc0a356a80b1432a875cee942e400") 21:40:16 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) [ 192.691674][ T8904] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 192.711281][ T8904] RSP: 002b:00007f26e9d09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 192.711292][ T8904] RAX: ffffffffffffffda RBX: 00007f26e9d09c90 RCX: 00000000004592c9 [ 192.711298][ T8904] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 192.711304][ T8904] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 192.711309][ T8904] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f26e9d0a6d4 [ 192.711315][ T8904] R13: 00000000004bf96d R14: 00000000004d1250 R15: 0000000000000003 [ 192.869552][ T8919] netlink: set zone limit has 4 unknown bytes [ 193.041181][ T8899] device lo entered promiscuous mode 21:40:16 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) r2 = dup2(r0, r1) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x1d, @multicast2, 0x4e24, 0x3, 'sed\x00', 0x4, 0x7, 0x6e}, {@local, 0x4e21, 0x3, 0xa6a, 0x3, 0x246d}}, 0x44) 21:40:16 executing program 3 (fault-call:3 fault-nth:2): mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 21:40:16 executing program 5: r0 = fsopen(&(0x7f0000000040)='tmpfs\x00\xdd\xc8\xec\b D\xa6\xa2\xb5\x9b\xbc\x8dp\xb5\x83\xf1\xfaG\xdai\xcelF4k\xf8)\xe4\xa7\x8b\xf7jXE \x96\\', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) ioctl$sock_inet_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000080)={'team_slave_0\x00', {0x2, 0x4e24, @empty}}) 21:40:16 executing program 4: mkdir(0x0, 0x0) syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x4, 0x84000) openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x400, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x111000, 0x0) ioctl$EVIOCGKEY(r0, 0x80404518, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', 0x0, &(0x7f00002e7fec)='\x02\x00\x00\x00 \x00\x00\x00\x00\xfe\xff\x00\x01\x00\x00\x80\x8c\x00\x00\x00', 0x14, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(&(0x7f00000000c0), 0x8c, 0x1, 0x0, &(0x7f0000000140), 0x0) sched_rr_get_interval(0x0, &(0x7f0000000000)) 21:40:16 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) [ 193.191521][ T8948] FAULT_INJECTION: forcing a failure. [ 193.191521][ T8948] name failslab, interval 1, probability 0, space 0, times 0 [ 193.207539][ T8948] CPU: 0 PID: 8948 Comm: syz-executor.3 Not tainted 5.2.0-rc5+ #4 [ 193.215381][ T8948] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 193.225441][ T8948] Call Trace: [ 193.228741][ T8948] dump_stack+0x1d8/0x2f8 [ 193.233074][ T8948] should_fail+0x608/0x860 [ 193.237494][ T8948] ? setup_fault_attr+0x2b0/0x2b0 [ 193.242645][ T8948] __should_failslab+0x11a/0x160 [ 193.249076][ T8948] ? dup_fd+0x71/0xc70 [ 193.253146][ T8948] should_failslab+0x9/0x20 [ 193.257639][ T8948] kmem_cache_alloc+0x56/0x2b0 [ 193.262482][ T8948] ? __kasan_kmalloc+0x178/0x1b0 [ 193.267415][ T8948] dup_fd+0x71/0xc70 [ 193.271308][ T8948] ? getname+0x19/0x20 [ 193.275376][ T8948] ? __x64_sys_execve+0x78/0xb0 [ 193.280222][ T8948] ? do_syscall_64+0xfe/0x140 [ 193.284893][ T8948] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 193.290961][ T8948] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 193.296511][ T8948] unshare_files+0x11b/0x2d0 [ 193.301107][ T8948] ? __ia32_sys_unshare+0x40/0x40 [ 193.306156][ T8948] __do_execve_file+0x224/0x1cd0 [ 193.311097][ T8948] ? __virt_addr_valid+0x159/0x1f0 [ 193.316203][ T8948] ? __phys_addr+0x8e/0x120 [ 193.320702][ T8948] ? __phys_addr_symbol+0x2f/0x70 [ 193.325723][ T8948] ? __check_object_size+0x314/0x400 [ 193.331036][ T8948] ? do_execve_file+0x40/0x40 [ 193.335706][ T8948] ? getname_flags+0x214/0x640 [ 193.340475][ T8948] __x64_sys_execve+0x94/0xb0 [ 193.345155][ T8948] do_syscall_64+0xfe/0x140 [ 193.349655][ T8948] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 193.355541][ T8948] RIP: 0033:0x4592c9 [ 193.359427][ T8948] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 193.379131][ T8948] RSP: 002b:00007f26e9d09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b 21:40:16 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) [ 193.387545][ T8948] RAX: ffffffffffffffda RBX: 00007f26e9d09c90 RCX: 00000000004592c9 [ 193.395526][ T8948] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 193.403498][ T8948] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 193.411468][ T8948] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f26e9d0a6d4 [ 193.419449][ T8948] R13: 00000000004bf96d R14: 00000000004d1250 R15: 0000000000000003 21:40:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$KVM_ASSIGN_PCI_DEVICE(r1, 0x8040ae69, &(0x7f0000000080)={0x0, 0x10000, 0x100000001, 0x0, 0x1b86}) socket$xdp(0x2c, 0x3, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) readv(r2, &(0x7f0000001400)=[{&(0x7f0000000100)=""/39, 0x27}, {&(0x7f0000000140)=""/13, 0xd}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000180)=""/111, 0x6f}, {&(0x7f00000002c0)=""/255, 0xff}, {&(0x7f0000000200)=""/120, 0x78}], 0x6) 21:40:17 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="03003d29f94c91"], 0x1, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[], 0x4}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:40:17 executing program 3 (fault-call:3 fault-nth:3): mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 21:40:17 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:17 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) [ 193.621315][ T8970] FAULT_INJECTION: forcing a failure. [ 193.621315][ T8970] name failslab, interval 1, probability 0, space 0, times 0 [ 193.667945][ T8970] CPU: 0 PID: 8970 Comm: syz-executor.3 Not tainted 5.2.0-rc5+ #4 [ 193.675799][ T8970] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 193.685850][ T8970] Call Trace: [ 193.685871][ T8970] dump_stack+0x1d8/0x2f8 [ 193.685886][ T8970] should_fail+0x608/0x860 [ 193.685899][ T8970] ? setup_fault_attr+0x2b0/0x2b0 [ 193.685917][ T8970] __should_failslab+0x11a/0x160 [ 193.685931][ T8970] should_failslab+0x9/0x20 [ 193.685940][ T8970] kmem_cache_alloc_trace+0x5d/0x2c0 [ 193.685950][ T8970] ? alloc_fdtable+0x98/0x290 [ 193.685965][ T8970] alloc_fdtable+0x98/0x290 [ 193.685980][ T8970] dup_fd+0x93b/0xc70 [ 193.685988][ T8970] ? getname+0x19/0x20 [ 193.686018][ T8970] unshare_files+0x11b/0x2d0 [ 193.703130][ T8970] ? __ia32_sys_unshare+0x40/0x40 [ 193.703153][ T8970] __do_execve_file+0x224/0x1cd0 [ 193.735189][ T8970] ? __virt_addr_valid+0x159/0x1f0 [ 193.735199][ T8970] ? __phys_addr+0x8e/0x120 [ 193.735207][ T8970] ? __phys_addr_symbol+0x2f/0x70 [ 193.735221][ T8970] ? __check_object_size+0x314/0x400 [ 193.769644][ T8970] ? do_execve_file+0x40/0x40 [ 193.774322][ T8970] ? getname_flags+0x214/0x640 [ 193.779089][ T8970] __x64_sys_execve+0x94/0xb0 [ 193.783766][ T8970] do_syscall_64+0xfe/0x140 [ 193.783783][ T8970] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 193.783793][ T8970] RIP: 0033:0x4592c9 [ 193.783808][ T8970] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 21:40:17 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) [ 193.817764][ T8970] RSP: 002b:00007f26e9d09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 193.826180][ T8970] RAX: ffffffffffffffda RBX: 00007f26e9d09c90 RCX: 00000000004592c9 [ 193.834150][ T8970] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 193.842118][ T8970] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 193.850095][ T8970] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f26e9d0a6d4 [ 193.858082][ T8970] R13: 00000000004bf96d R14: 00000000004d1250 R15: 0000000000000003 21:40:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$KVM_ASSIGN_PCI_DEVICE(r1, 0x8040ae69, &(0x7f0000000080)={0x0, 0x10000, 0x100000001, 0x0, 0x1b86}) socket$xdp(0x2c, 0x3, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) readv(r2, &(0x7f0000001400)=[{&(0x7f0000000100)=""/39, 0x27}, {&(0x7f0000000140)=""/13, 0xd}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000180)=""/111, 0x6f}, {&(0x7f00000002c0)=""/255, 0xff}, {&(0x7f0000000200)=""/120, 0x78}], 0x6) 21:40:17 executing program 1 (fault-call:0 fault-nth:0): bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:17 executing program 3 (fault-call:3 fault-nth:4): mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 21:40:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x5, &(0x7f0000000080)="11dca596fbae41ec7be070") seccomp(0x2, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000040)='.\x00', 0x1) 21:40:17 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:17 executing program 4: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x8e, 0x2000) r1 = socket$key(0xf, 0x3, 0x2) sendmmsg$sock(r0, &(0x7f0000003c40)=[{{&(0x7f0000000040)=@nfc={0x27, 0x0, 0x0, 0x5}, 0x80, &(0x7f0000001540)=[{&(0x7f00000000c0)="b632e316d607b7ca7e2ed0e9aa7ba45494270bd09547201bf8ce53b15ed42562167dc84684231bec", 0x28}, {&(0x7f0000000200)="ad1aa3262a820904d92923ada6bf841aa0a9371af50699bbdb50d352d1c1c0b3f1d8fe070a0703c489c98b9267cc024615fbf37b396170b63468e777e8011d06fe212bbe53941f8761d70a13e96350d3f7cc531cd3a513c0c2712cfad9b7de5f853fe19e9aff0fddd96ee70bed710cdcdd992038938a6a2627ed8d2b2d9c0b3d0ddb719fea22596e99c8046d4ed79a3eb66c6d05d4342cf18ac03904a075d7c2a70e97b636ec9960d5502e7887f1c3c25154046831cf4434b91cc59d5fac572ad4f44526aa0282b6cee24c352ed491", 0xcf}, {&(0x7f0000000300)="eae78218d85be4cf098a0d50246e39d32f6cd1ac9afed6a6287d4958901f062ce2273a2f4cf7aa36cae6cb8b30431cd48cc99f093b3944949c6d224ca8c7d7fe88377ab09132f0337d81310f0e2aff809fc8d65673e7a2ecb137f0cd0271c7f92b0a4e406c65e220cd91284ce2a85ef5d0751478ed22e89d41119ce783933ff2f73cfd9adedb4f310a75907d5791fa0b9543e84bfb5b", 0x96}, {&(0x7f0000000100)="fce6156f417a4f06bcdb701f351c0df6ab43afbc4d1863d8739ad1aed752021a9f70742c374e84e5da7b1e286785e6ad10801fc2901bb30ce3792687d1d2754cb5107abfee15b1040d820eb29f6fc7e039ed5dbf6fc0e403c0a6ab929844aa6ce50aa7302d25b55aa59ac0747f", 0x6d}, {&(0x7f00000003c0)="f7c5a58c83ae1013daebd08fc08f4f6cbc78ec3aa241f63333dd1f52e619c1b382cf11190526446ce39932d46cc23029b96af27d6f31ec7f75f2c817f9d9188827034ea017502474471f57a4c7271b41cfa3b038d54ed4b7c87e09398abea9a47cb61f9deb1c439e809e754b3cfa2a40e989f69f9407331b328c914133a60bb92e63deb631aee21822bf069eb80573dfb0351597f73b31268b4a8206d6", 0x9d}, {&(0x7f0000000480)="3fbea7c8601a785611c3df35a9fea8a05d7846f6d2480cde11d40b88e33f397902a08d7a2a597a43386f9ba68a3f8ffa9674d0f2b95d6ed0df888ce74a42fe6f266defda442df6509e0c92eb8c0e57d2cdaafa399d08e11c964b11d1ba85d1d69a8115e43e08975444c7f42f0e4729d0ecce60e342ef1c15e70f17c11980c9530c3250afe2b1d9ac6a207780283647393b7393d36a5a2bad9eb3de668d8988cd8966c11c526376122a78747fe5db254db7fb95", 0xb3}, {&(0x7f0000000540)="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", 0x1000}], 0x7, &(0x7f00000015c0)=[@mark={{0x14, 0x1, 0x24, 0x8c}}, @txtime={{0x18, 0x1, 0x3d, 0x9}}], 0x30}}, {{&(0x7f0000001600)=@pppol2tpv3in6={0x18, 0x1, {0x0, r1, 0x0, 0x3, 0x1, 0x0, {0xa, 0x4e21, 0x3ec, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x9}}}, 0x80, &(0x7f0000001900)=[{&(0x7f0000001680)="1a05e978d16497a74a83c6a4532301048ebae0e0550aecd800f07b15c1f1398ebdb35face24dbd6de703058eb4eadd9e25b7e17106c3f7c39fa07fc98bd1e0dc4f265955b54e8a086be395188ac61dc7a1c4848666424e0a85e260aac623bfa8905dc4df0dfcfef83860eb59a025d9b07f79af5c415b08035f29d273dbcaf9e72c4429433cd749de03528e616afb4142842b491ccb34abb82da46050bd7ebaadb65531", 0xa3}, {&(0x7f0000001740)="e39248f9345e21d2dcd0973a9d6afdc1c49f5689d69453c007f0633c3d670484d9e7d0d90e170c3cfe7f5493dd39072755d367a970bee84f30a1427ea4392cf0655e8bec8d034d2d89362434aed4b7bdb73aeaa2fd71ef021fcd155df6d2781338d66d7388d32e643698730222b1332517ca4e99cc06802c6b816ad111c8202bf409508841babb", 0x87}, {&(0x7f0000001800)="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", 0xfa}], 0x3, &(0x7f0000001940)=[@timestamping={{0x14, 0x1, 0x25, 0x1}}], 0x18}}, {{&(0x7f0000001980)=@generic={0x5, "03ba6ae1d55ff1017eacf3a0bb25ea7636768afbd26c7319bea3e362bde1311622ce8ff59d04256c2c177418c1ee0e92702b890e457582e4135ec9c6f853cd0a3520fe10db1717318d0b2005bd61abd51f48f134aa7bc1467e6bee2a62bd9b028db35b54ddd47c4978740d2dbbbda3bc4de67f26a5f644c8b3c8c6ba0418"}, 0x80, &(0x7f0000001c80)=[{&(0x7f0000001a00)="2574f03747cb99de4cc048e3fdd899bfe39407fd186888a0787fbc71e8daae14c5e3e20bf5096015edbde4e7042ac8770db86dc76b02bb806c97b0baedf563c9f2cd04241934d54137b2424ca133c6766b9ea1bc91f983006bd95f558ac9dbc5df0701de9c97b0b21266088e6e3287754a4d58182b1b77e180bb5699ef56a994d0", 0x81}, {&(0x7f0000001ac0)="e3375ddc6d84088551973ade", 0xc}, {&(0x7f0000001b00)="16aeb9b896959e2c14ed96038ce8f1a5e58652951156eb910f954dba4191184f374a84f6660ee5c86f3afdf2965b1f0e95add81daf5107b20e8f2330b4530fb20d809e1645a7dbf8829b3214b746da3d18125058b2f3d5b24fc6787c67e6a8e569ed730d7057e82a2bcab6a14a13527e1eca90894404c61d14c3fc0846ec5a58c0d580cd52b143ac8a8dca5563c99e168ea667f16b9488b16947f30832928cded178975486b906b315", 0xa9}, {&(0x7f0000001bc0)="e9e7ea3dd285acdb5fefd72f9cdbdebd13db1c18d1c5bf21aa317a8a4136e19cab21275b0141d347304901f63f1c724a9565ae25c15fae32df368e6ff1146113f5c64784af1a7fe2ae417c29914f03f3450a3fb6ac50dc76dac099535f7b2fc83c155d61defb599bbb609869eeff4f38cd26c20963ae698bec02d91cc516b6032a60a21b15dbc55b40fdbf85", 0x8c}], 0x4, &(0x7f0000001cc0)=[@mark={{0x14, 0x1, 0x24, 0x6}}, @txtime={{0x18, 0x1, 0x3d, 0x7}}], 0x30}}, {{&(0x7f0000001d00)=@nl=@proc={0x10, 0x0, 0x25dfdbfb, 0x40000}, 0x80, &(0x7f0000001d80), 0x0, &(0x7f0000001dc0)=[@mark={{0x14, 0x1, 0x24, 0x4}}, @timestamping={{0x14, 0x1, 0x25, 0x8}}], 0x30}}, {{&(0x7f0000001e00)=@caif=@util={0x25, "077205eace519504e8263245f7bc9cf6"}, 0x80, &(0x7f0000002040)=[{&(0x7f0000001e80)="6232295a503c58932849e4fa182203728a4de1a0d20f12ef81aad6bc8a0e455f5d0c11561bcd5223b4f6fa4f5d1066092849eda5814177a96f62ed61b28fdd2e06854d7396640709eb48a55fe388cc535f9c5e9e6e6b795e881ad0a1803f28257369ca74c0b00572de19ca860f7847ba1bcbc0c3209d1b76741cdcd820ad330eefb1d5ff4e45f2361687b3cde6120e64cfe0261ead8c02e6f59242a634dbb719f2d77e590794bfeef3b7db1518d428a0a6fa5e1c9d530a678af79d2c4e78b8bb463153a6dbfb53587544202020961248f618f1da", 0xd4}, {&(0x7f0000001f80)="0e7c574d272ba234c9af6d45c327552ce2b305bd9fa4012f99d4a96bc78ba602e39c152dd6998a552219d58b6bf60bfab431ba8e8c9bcf9e1e813b4fd9ab58ee67224b7a984d27d511f328642648ad08958bb3bf8d03654b5d71ad64c449f180a1ea2c73623606f5d0f69c575dfc6a6ba37426043875050efbf9960f92785d821bcde750ec4b3ee18c29df69b04fb11704ec526f336a1e56b6cbdb5a350849616ebad222fd199c571932b31f467d2650307d57a8c6bf0beb06949b8d", 0xbc}], 0x2, &(0x7f0000002080)=[@mark={{0x14, 0x1, 0x24, 0x40}}, @mark={{0x14, 0x1, 0x24, 0x9}}, @mark={{0x14, 0x1, 0x24, 0xfffffffffffffff8}}, @timestamping={{0x14, 0x1, 0x25, 0x7}}, @txtime={{0x18, 0x1, 0x3d, 0x68f}}, @mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0xfff}}, @mark={{0x14}}], 0xc0}}, {{&(0x7f0000002140)=@sco={0x1f, {0x9, 0x5, 0x2, 0x2, 0x3, 0x546}}, 0x80, &(0x7f0000003240)=[{&(0x7f00000021c0)="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", 0x1000}, {&(0x7f00000031c0)="387477a253e64a207346a7f49e05e6b2a588db0a7364d0475a3c6e2fceea9852458293814e57d2c69a39287d7096cac2fc164515a91599a81bf7311b26fb0a04fd7aeb00a0bf232cd552b4c7949c41b789d9da644731970f1b5d785cace0aa718acbd0fe", 0x64}], 0x2, &(0x7f0000003280)=[@txtime={{0x18, 0x1, 0x3d, 0x75}}, @timestamping={{0x14, 0x1, 0x25, 0x4}}], 0x30}}, {{0x0, 0x0, &(0x7f0000003440)=[{&(0x7f00000032c0)="a1f194", 0x3}, {&(0x7f0000003300)="823089704f49442d09e93dec5964fd846acabcf7d891f8fd417fa71fe3c40c69d7cbbf7800e0e9ef1ed07806352099f86475685fd3834b55677a5019540f1447f7adff0203cc6ab20457e19fec652b918366cc09df9a84c416d944d3b496d7dc5b032765133765451da3fc001c9c6384fa401d17d0deaeef5770c8604890a68b", 0x80}, {&(0x7f0000003380)}, {&(0x7f00000033c0)="a4f4b6c028faee08b71af680aa53607d4c74787edcc9004b98555adaeda7d3b009440e2512bb73a25f091252335705035ae8264baeefe055c3e87836157293b2814a7e8d", 0x44}], 0x4, &(0x7f0000003480)=[@txtime={{0x18, 0x1, 0x3d, 0x1}}], 0x18}}, {{&(0x7f00000034c0)=@can, 0x80, &(0x7f00000039c0)=[{&(0x7f0000003540)="bc81113c8f04cb4b1bb62f66364121a7293dd9cabe9830eeee86db2057c9e400cf96ced6cd5e130741475ef3f9b50387ac9aa07dafd4428b94b3c3e43b7aa5b5052c460c6c977e362498f510", 0x4c}, {&(0x7f00000035c0)="2d694903a40593861b59fb00fef922060d155ec0879d002a4864a05673f03c3be6d678907cf18098c892f4acbbeae2601b5b7bc5a5256fce47441520ab345290f94b4b09fa4534873c5f7bf328bb9c36a2b882aa16f25a8635133e453fa5581a0b734345a33aa2a4950d182a3df29ddf0bcd8398eb2891773ecfacef661ecc78e52bbbdd66f331b94b5f004d97d35554bedbb41d7a17a24daec1a5c870ed7f8d0a5568ec4022", 0xa6}, {&(0x7f0000003680)="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", 0xfc}, {&(0x7f0000003780)="1e8c70951fe0b6e0d59afbf3d20f596c38408a809a3a62f89db1635e6d455c4935f0a2e359db066f993e8317c29dcfbeb386c9c5959dd32e23f4d51de77e439931b6972f7eec6980d2b6354ed8c6e95738db33a15f932f9981a70d2026024b2a47da670936e1b7dbebef5addfd0261928d98aebd66464d770340b314b20e5fbe530a250802ed2c11218f7ec3ebe9655bc65ca372e4197919da6bbe38a8e6f005859bd5bb5d304adcd4e6c5656cc7ee188b3ece4c85c4d109db", 0xb9}, {&(0x7f0000003840)="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", 0xfc}, {&(0x7f0000003940)="c4fbb339d096e16fd478569fd4e325b0362a8ad9d06aef2f418f7386f8f2a6e80e2b6c94cce89ee572481617c6fa03e0bdb2f6aed1130fbec4d8dce0af6ff047660e1bf1c5161c7f5d2a80ca451a442c66c3e119", 0x54}], 0x6, &(0x7f0000003a40)=[@mark={{0x14, 0x1, 0x24, 0x100}}], 0x18}}, {{&(0x7f0000003a80)=@nfc_llcp={0x27, 0x0, 0x1, 0x7, 0x100000001, 0x1f, "9f7a9a14746d51e64966c680689eed5354258b249ee2fa3e9a684162ec49112a0b6943ea7dcb6d9de8d3df4f0ed02d7685ca6dd826c84559e73d55e089a824", 0x30}, 0x80, &(0x7f0000003b40)=[{&(0x7f0000003b00)="e849c519bc8fd396be1bd3b4c351081993c333", 0x13}], 0x1, &(0x7f0000003b80)=[@timestamping={{0x14, 0x1, 0x25, 0xf6}}, @mark={{0x14, 0x1, 0x24, 0xffffffffffffffff}}, @txtime={{0x18}}, @mark={{0x14, 0x1, 0x24, 0x8}}, @timestamping={{0x14, 0x1, 0x25, 0x8}}, @txtime={{0x18, 0x1, 0x3d, 0x4}}, @txtime={{0x18, 0x1, 0x3d, 0x40000}}], 0xa8}}], 0x9, 0x40040) [ 194.014479][ T8995] FAULT_INJECTION: forcing a failure. [ 194.014479][ T8995] name failslab, interval 1, probability 0, space 0, times 0 [ 194.018722][ T8990] FAULT_INJECTION: forcing a failure. [ 194.018722][ T8990] name failslab, interval 1, probability 0, space 0, times 0 [ 194.047301][ T8995] CPU: 1 PID: 8995 Comm: syz-executor.1 Not tainted 5.2.0-rc5+ #4 [ 194.055226][ T8995] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 194.065286][ T8995] Call Trace: [ 194.068588][ T8995] dump_stack+0x1d8/0x2f8 [ 194.072930][ T8995] should_fail+0x608/0x860 [ 194.077362][ T8995] ? setup_fault_attr+0x2b0/0x2b0 [ 194.082504][ T8995] __should_failslab+0x11a/0x160 [ 194.087453][ T8995] should_failslab+0x9/0x20 [ 194.091961][ T8995] kmem_cache_alloc_trace+0x5d/0x2c0 [ 194.091973][ T8995] ? btf_new_fd+0x176/0x37b0 [ 194.091982][ T8995] ? __lock_acquire+0xcf7/0x1a40 [ 194.091996][ T8995] btf_new_fd+0x176/0x37b0 [ 194.092023][ T8995] ? __might_fault+0xf9/0x160 [ 194.092034][ T8995] ? cap_capable+0x250/0x290 [ 194.092046][ T8995] ? btf_release+0xd0/0xd0 [ 194.111342][ T8995] ? security_capable+0xa2/0xd0 [ 194.111361][ T8995] __do_sys_bpf+0x1212/0xc5d0 [ 194.111371][ T8995] ? __might_fault+0xf9/0x160 [ 194.111389][ T8995] ? kstrtoull+0x3ba/0x4e0 [ 194.111407][ T8995] ? kasan_check_write+0x14/0x20 [ 194.148351][ T9000] FAT-fs (loop4): bogus number of reserved sectors [ 194.148764][ T8995] ? refcount_sub_and_test_checked+0x1c2/0x290 [ 194.148783][ T8995] ? __bpf_prog_put_rcu+0x320/0x320 [ 194.156460][ T9000] FAT-fs (loop4): Can't find a valid FAT filesystem [ 194.161534][ T8995] ? refcount_inc_checked+0x50/0x50 [ 194.161553][ T8995] ? refcount_dec_and_test_checked+0x1a/0x20 [ 194.161565][ T8995] ? proc_fail_nth_write+0x179/0x1f0 [ 194.161577][ T8995] ? proc_fail_nth_read+0x1a0/0x1a0 [ 194.161589][ T8995] ? trace_lock_acquire+0x190/0x190 [ 194.161600][ T8995] ? __mutex_lock_common+0x56b/0x2fc0 [ 194.161612][ T8995] ? memset+0x31/0x40 [ 194.161625][ T8995] ? fsnotify+0x14b9/0x1580 21:40:17 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 21:40:17 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_VERSION(r0, 0xc0106407, &(0x7f0000000040)={0x100000100000001, 0x5, 0x1, 0x6}) ioctl$SCSI_IOCTL_GET_IDLUN(r0, 0x5382, &(0x7f0000000140)) ioctl$VIDIOC_S_MODULATOR(r0, 0x40445637, &(0x7f0000000080)={0xff, "68cd912349730b91369f7607fc3c88849f0eb2f91ecc0bb56d099e92d3e7d105", 0x120, 0x6, 0xfffffffffffffffa, 0x11, 0x1b5b21fa293fb24b}) [ 194.161645][ T8995] ? __f_unlock_pos+0x19/0x20 [ 194.161658][ T8995] ? kasan_check_write+0x14/0x20 [ 194.161673][ T8995] ? __mutex_unlock_slowpath+0x18c/0x630 [ 194.229294][ T8995] ? mutex_unlock+0x10/0x10 [ 194.233818][ T8995] ? __sb_end_write+0xde/0x120 [ 194.238608][ T8995] ? kasan_check_write+0x14/0x20 [ 194.243553][ T8995] ? fput_many+0x47/0x1a0 [ 194.247935][ T8995] ? prepare_exit_to_usermode+0x1e1/0x4f0 [ 194.253659][ T8995] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 194.259302][ T8995] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 194.264777][ T8995] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 194.270503][ T8995] ? do_syscall_64+0x1d/0x140 [ 194.275192][ T8995] __x64_sys_bpf+0x7a/0x90 [ 194.279621][ T8995] do_syscall_64+0xfe/0x140 [ 194.284152][ T8995] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 194.290074][ T8995] RIP: 0033:0x4592c9 [ 194.293993][ T8995] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 194.313693][ T8995] RSP: 002b:00007f2fc00e7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 194.322130][ T8995] RAX: ffffffffffffffda RBX: 00007f2fc00e7c90 RCX: 00000000004592c9 [ 194.330116][ T8995] RDX: 0000000000000020 RSI: 00000000200006c0 RDI: 0000000000000012 [ 194.338798][ T8995] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 194.351552][ T8995] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2fc00e86d4 [ 194.362100][ T8995] R13: 00000000004bf4d3 R14: 00000000004d0aa0 R15: 0000000000000003 [ 194.370110][ T8990] CPU: 0 PID: 8990 Comm: syz-executor.3 Not tainted 5.2.0-rc5+ #4 [ 194.377930][ T8990] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 194.388015][ T8990] Call Trace: [ 194.391426][ T8990] dump_stack+0x1d8/0x2f8 [ 194.395742][ T8990] should_fail+0x608/0x860 [ 194.400170][ T8990] ? setup_fault_attr+0x2b0/0x2b0 [ 194.405181][ T8990] __should_failslab+0x11a/0x160 [ 194.410100][ T8990] should_failslab+0x9/0x20 [ 194.414794][ T8990] kmem_cache_alloc_node_trace+0x6e/0x280 [ 194.420508][ T8990] ? __kmalloc_node+0x3c/0x60 [ 194.425167][ T8990] __kmalloc_node+0x3c/0x60 [ 194.429650][ T8990] kvmalloc_node+0xcc/0x130 [ 194.434134][ T8990] alloc_fdtable+0xe3/0x290 [ 194.438623][ T8990] dup_fd+0x93b/0xc70 [ 194.442584][ T8990] ? getname+0x19/0x20 [ 194.446643][ T8990] unshare_files+0x11b/0x2d0 [ 194.451217][ T8990] ? __ia32_sys_unshare+0x40/0x40 [ 194.456247][ T8990] __do_execve_file+0x224/0x1cd0 [ 194.461201][ T8990] ? __virt_addr_valid+0x159/0x1f0 [ 194.466305][ T8990] ? __phys_addr+0x8e/0x120 [ 194.470784][ T8990] ? __phys_addr_symbol+0x2f/0x70 [ 194.475804][ T8990] ? __check_object_size+0x314/0x400 [ 194.481196][ T8990] ? do_execve_file+0x40/0x40 [ 194.485940][ T8990] ? getname_flags+0x214/0x640 [ 194.490697][ T8990] __x64_sys_execve+0x94/0xb0 [ 194.495373][ T8990] do_syscall_64+0xfe/0x140 [ 194.499861][ T8990] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 194.505855][ T8990] RIP: 0033:0x4592c9 [ 194.509728][ T8990] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 194.529422][ T8990] RSP: 002b:00007f26e9d09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 194.537900][ T8990] RAX: ffffffffffffffda RBX: 00007f26e9d09c90 RCX: 00000000004592c9 [ 194.545853][ T8990] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 194.553825][ T8990] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 21:40:18 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x10000, 0x9b) write$P9_RUNLINKAT(r0, &(0x7f00000000c0)={0x7, 0x4d, 0x1}, 0x7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="86408e1bcc07ca6716204ac075d9a4b94a6d5c9848ca6b3a3202e07310b5945b15672c27a823b3483fb468540f35158a5879"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x246) ioctl$KVM_SET_VAPIC_ADDR(r3, 0x4008ae93, &(0x7f0000000040)=0x1) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x2000000000000}, @IPVS_DEST_ATTR_L_THRESH={0x8}]}, @IPVS_CMD_ATTR_SERVICE={0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x27f72cd91c476712}, 0x24000000) ioctl$KVM_GET_VCPU_EVENTS(r3, 0x4400ae8f, &(0x7f0000000140)) ioctl$KVM_RUN(r3, 0xae80, 0x0) 21:40:18 executing program 1 (fault-call:0 fault-nth:1): bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:18 executing program 3 (fault-call:3 fault-nth:5): mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 194.561781][ T8990] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f26e9d0a6d4 [ 194.569752][ T8990] R13: 00000000004bf96d R14: 00000000004d1250 R15: 0000000000000003 [ 194.672485][ T9021] FAULT_INJECTION: forcing a failure. [ 194.672485][ T9021] name failslab, interval 1, probability 0, space 0, times 0 21:40:18 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 21:40:18 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000680)={0x0, @in={{0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, &(0x7f0000000740)=0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000780)={r2, 0x10000}, &(0x7f00000007c0)=0x8) read(r0, &(0x7f0000001240)=""/4096, 0xc9871b76) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000080)="d6e912a86a99539e0b30549d655e6222d45e99f3fed0c892667a19590f9f0d29486f68b27eb876b0ecc75f1f737bb9e2806c2e330a8d37f6ce852504174c7d7a1635362cb540c5eb0ef786412e92b0cf8d401590a22fe4c0359d5fd475aa4541b590b92bbdda37c3e13b939bc13fbaf0407ea9", &(0x7f0000000100)="fee0"}}, &(0x7f0000044000)) clock_getres(0x0, &(0x7f0000dd5ff0)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, r4}, {0x0, 0x9}}, 0x0) close(r0) timer_create(0x2, &(0x7f0000000140)={0x0, 0x4, 0x1, @tid=r3}, &(0x7f0000000180)) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) tkill(r3, 0x1000000000016) [ 194.747340][ T9026] FAULT_INJECTION: forcing a failure. [ 194.747340][ T9026] name failslab, interval 1, probability 0, space 0, times 0 [ 194.774458][ T9021] CPU: 1 PID: 9021 Comm: syz-executor.1 Not tainted 5.2.0-rc5+ #4 [ 194.782305][ T9021] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 194.792454][ T9021] Call Trace: [ 194.795753][ T9021] dump_stack+0x1d8/0x2f8 [ 194.800132][ T9021] should_fail+0x608/0x860 [ 194.804548][ T9021] ? setup_fault_attr+0x2b0/0x2b0 [ 194.809594][ T9021] __should_failslab+0x11a/0x160 [ 194.814538][ T9021] should_failslab+0x9/0x20 [ 194.819056][ T9021] kmem_cache_alloc_trace+0x5d/0x2c0 [ 194.824343][ T9021] ? btf_new_fd+0x326/0x37b0 [ 194.828936][ T9021] btf_new_fd+0x326/0x37b0 [ 194.833364][ T9021] ? __might_fault+0xf9/0x160 [ 194.838039][ T9021] ? cap_capable+0x250/0x290 [ 194.842632][ T9021] ? btf_release+0xd0/0xd0 [ 194.847052][ T9021] ? security_capable+0xa2/0xd0 [ 194.851914][ T9021] __do_sys_bpf+0x1212/0xc5d0 [ 194.856587][ T9021] ? __might_fault+0xf9/0x160 [ 194.861274][ T9021] ? kstrtoull+0x3ba/0x4e0 [ 194.865702][ T9021] ? kasan_check_write+0x14/0x20 [ 194.870647][ T9021] ? refcount_sub_and_test_checked+0x1c2/0x290 [ 194.876797][ T9021] ? __bpf_prog_put_rcu+0x320/0x320 [ 194.882003][ T9021] ? refcount_inc_checked+0x50/0x50 [ 194.887214][ T9021] ? refcount_dec_and_test_checked+0x1a/0x20 [ 194.893220][ T9021] ? proc_fail_nth_write+0x179/0x1f0 [ 194.898512][ T9021] ? proc_fail_nth_read+0x1a0/0x1a0 [ 194.903718][ T9021] ? trace_lock_acquire+0x190/0x190 [ 194.908914][ T9021] ? __mutex_lock_common+0x56b/0x2fc0 [ 194.914313][ T9021] ? memset+0x31/0x40 [ 194.918294][ T9021] ? fsnotify+0x14b9/0x1580 [ 194.922805][ T9021] ? __f_unlock_pos+0x19/0x20 [ 194.927481][ T9021] ? kasan_check_write+0x14/0x20 [ 194.932444][ T9021] ? __mutex_unlock_slowpath+0x18c/0x630 [ 194.938078][ T9021] ? mutex_unlock+0x10/0x10 [ 194.942588][ T9021] ? __sb_end_write+0xde/0x120 [ 194.947352][ T9021] ? kasan_check_write+0x14/0x20 [ 194.952282][ T9021] ? fput_many+0x47/0x1a0 [ 194.956614][ T9021] ? prepare_exit_to_usermode+0x1e1/0x4f0 [ 194.962329][ T9021] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 194.967967][ T9021] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 194.973431][ T9021] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 194.979145][ T9021] ? do_syscall_64+0x1d/0x140 [ 194.983829][ T9021] __x64_sys_bpf+0x7a/0x90 [ 194.988245][ T9021] do_syscall_64+0xfe/0x140 [ 194.992752][ T9021] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 194.998636][ T9021] RIP: 0033:0x4592c9 [ 195.002523][ T9021] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 195.022395][ T9021] RSP: 002b:00007f2fc00e7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 195.030814][ T9021] RAX: ffffffffffffffda RBX: 00007f2fc00e7c90 RCX: 00000000004592c9 [ 195.038779][ T9021] RDX: 0000000000000020 RSI: 00000000200006c0 RDI: 0000000000000012 [ 195.046743][ T9021] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 195.054714][ T9021] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2fc00e86d4 [ 195.062686][ T9021] R13: 00000000004bf4d3 R14: 00000000004d0aa0 R15: 0000000000000003 [ 195.070846][ T9026] CPU: 0 PID: 9026 Comm: syz-executor.3 Not tainted 5.2.0-rc5+ #4 [ 195.078693][ T9026] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 195.088755][ T9026] Call Trace: [ 195.092055][ T9026] dump_stack+0x1d8/0x2f8 [ 195.096394][ T9026] should_fail+0x608/0x860 [ 195.100824][ T9026] ? setup_fault_attr+0x2b0/0x2b0 [ 195.105861][ T9026] __should_failslab+0x11a/0x160 [ 195.110793][ T9026] should_failslab+0x9/0x20 [ 195.115280][ T9026] kmem_cache_alloc_node_trace+0x6e/0x280 [ 195.121000][ T9026] ? __kmalloc_node+0x3c/0x60 [ 195.125658][ T9026] __kmalloc_node+0x3c/0x60 [ 195.130162][ T9026] kvmalloc_node+0xcc/0x130 [ 195.134677][ T9026] alloc_fdtable+0xe3/0x290 [ 195.139196][ T9026] dup_fd+0x93b/0xc70 [ 195.143183][ T9026] ? getname+0x19/0x20 [ 195.147267][ T9026] unshare_files+0x11b/0x2d0 [ 195.151867][ T9026] ? __ia32_sys_unshare+0x40/0x40 [ 195.156879][ T9026] __do_execve_file+0x224/0x1cd0 [ 195.161815][ T9026] ? __virt_addr_valid+0x159/0x1f0 [ 195.166940][ T9026] ? __phys_addr+0x8e/0x120 [ 195.171425][ T9026] ? __phys_addr_symbol+0x2f/0x70 [ 195.176445][ T9026] ? __check_object_size+0x314/0x400 [ 195.181751][ T9026] ? do_execve_file+0x40/0x40 [ 195.186433][ T9026] ? getname_flags+0x214/0x640 [ 195.191195][ T9026] __x64_sys_execve+0x94/0xb0 [ 195.195874][ T9026] do_syscall_64+0xfe/0x140 [ 195.200366][ T9026] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 195.206243][ T9026] RIP: 0033:0x4592c9 [ 195.210125][ T9026] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 195.229742][ T9026] RSP: 002b:00007f26e9d09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 195.238158][ T9026] RAX: ffffffffffffffda RBX: 00007f26e9d09c90 RCX: 00000000004592c9 21:40:18 executing program 1 (fault-call:0 fault-nth:2): bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") socketpair(0x2c, 0x3, 0x0, &(0x7f00000000c0)) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vfio/vfio\x00', 0x18242, 0x0) ioctl$VT_RELDISP(r1, 0x5605) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x90040, 0x0) setsockopt$bt_BT_VOICE(r2, 0x112, 0xb, &(0x7f0000000180)=0x60, 0x2) futimesat(r2, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)={{0x0, 0x2710}, {0x0, 0x7530}}) 21:40:18 executing program 3 (fault-call:3 fault-nth:6): mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 195.246133][ T9026] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 195.254099][ T9026] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 195.262061][ T9026] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f26e9d0a6d4 [ 195.270028][ T9026] R13: 00000000004bf96d R14: 00000000004d1250 R15: 0000000000000003 [ 195.394337][ T9037] FAULT_INJECTION: forcing a failure. [ 195.394337][ T9037] name failslab, interval 1, probability 0, space 0, times 0 [ 195.416763][ T9042] FAULT_INJECTION: forcing a failure. [ 195.416763][ T9042] name failslab, interval 1, probability 0, space 0, times 0 [ 195.467983][ T9037] CPU: 0 PID: 9037 Comm: syz-executor.1 Not tainted 5.2.0-rc5+ #4 [ 195.475833][ T9037] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 195.475838][ T9037] Call Trace: [ 195.475858][ T9037] dump_stack+0x1d8/0x2f8 [ 195.475875][ T9037] should_fail+0x608/0x860 [ 195.475891][ T9037] ? setup_fault_attr+0x2b0/0x2b0 [ 195.503338][ T9037] __should_failslab+0x11a/0x160 [ 195.508292][ T9037] should_failslab+0x9/0x20 [ 195.512800][ T9037] kmem_cache_alloc_node_trace+0x6e/0x280 [ 195.518531][ T9037] ? __kmalloc_node+0x3c/0x60 [ 195.523226][ T9037] __kmalloc_node+0x3c/0x60 [ 195.527825][ T9037] kvmalloc_node+0xcc/0x130 [ 195.532366][ T9037] btf_new_fd+0x374/0x37b0 [ 195.536788][ T9037] ? __might_fault+0xf9/0x160 [ 195.541465][ T9037] ? cap_capable+0x250/0x290 [ 195.546060][ T9037] ? btf_release+0xd0/0xd0 [ 195.550475][ T9037] ? security_capable+0xa2/0xd0 [ 195.555324][ T9037] __do_sys_bpf+0x1212/0xc5d0 [ 195.559996][ T9037] ? __might_fault+0xf9/0x160 [ 195.564683][ T9037] ? kstrtoull+0x3ba/0x4e0 [ 195.569188][ T9037] ? kasan_check_write+0x14/0x20 [ 195.574119][ T9037] ? refcount_sub_and_test_checked+0x1c2/0x290 [ 195.580267][ T9037] ? __bpf_prog_put_rcu+0x320/0x320 [ 195.585459][ T9037] ? refcount_inc_checked+0x50/0x50 [ 195.590664][ T9037] ? refcount_dec_and_test_checked+0x1a/0x20 [ 195.596731][ T9037] ? proc_fail_nth_write+0x179/0x1f0 [ 195.602030][ T9037] ? proc_fail_nth_read+0x1a0/0x1a0 [ 195.607218][ T9037] ? trace_lock_acquire+0x190/0x190 [ 195.612412][ T9037] ? __mutex_lock_common+0x56b/0x2fc0 [ 195.617790][ T9037] ? memset+0x31/0x40 [ 195.621764][ T9037] ? fsnotify+0x14b9/0x1580 [ 195.626265][ T9037] ? __f_unlock_pos+0x19/0x20 [ 195.630936][ T9037] ? kasan_check_write+0x14/0x20 [ 195.635860][ T9037] ? __mutex_unlock_slowpath+0x18c/0x630 [ 195.641496][ T9037] ? mutex_unlock+0x10/0x10 [ 195.646007][ T9037] ? __sb_end_write+0xde/0x120 [ 195.650766][ T9037] ? kasan_check_write+0x14/0x20 [ 195.655693][ T9037] ? fput_many+0x47/0x1a0 [ 195.660025][ T9037] ? prepare_exit_to_usermode+0x1e1/0x4f0 [ 195.665780][ T9037] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 195.671414][ T9037] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 195.676971][ T9037] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 195.682703][ T9037] ? do_syscall_64+0x1d/0x140 [ 195.687381][ T9037] __x64_sys_bpf+0x7a/0x90 [ 195.691807][ T9037] do_syscall_64+0xfe/0x140 [ 195.696310][ T9037] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 195.702200][ T9037] RIP: 0033:0x4592c9 [ 195.706110][ T9037] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 195.725806][ T9037] RSP: 002b:00007f2fc00e7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 195.734305][ T9037] RAX: ffffffffffffffda RBX: 00007f2fc00e7c90 RCX: 00000000004592c9 [ 195.742359][ T9037] RDX: 0000000000000020 RSI: 00000000200006c0 RDI: 0000000000000012 [ 195.750323][ T9037] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 195.758281][ T9037] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2fc00e86d4 [ 195.766245][ T9037] R13: 00000000004bf4d3 R14: 00000000004d0aa0 R15: 0000000000000003 [ 195.776450][ T9042] CPU: 1 PID: 9042 Comm: syz-executor.3 Not tainted 5.2.0-rc5+ #4 [ 195.784280][ T9042] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 195.794420][ T9042] Call Trace: [ 195.797727][ T9042] dump_stack+0x1d8/0x2f8 [ 195.802152][ T9042] should_fail+0x608/0x860 [ 195.806562][ T9042] ? setup_fault_attr+0x2b0/0x2b0 [ 195.811588][ T9042] __should_failslab+0x11a/0x160 [ 195.816532][ T9042] should_failslab+0x9/0x20 [ 195.821029][ T9042] kmem_cache_alloc_trace+0x5d/0x2c0 [ 195.826308][ T9042] ? __do_execve_file+0x2ca/0x1cd0 [ 195.831428][ T9042] __do_execve_file+0x2ca/0x1cd0 [ 195.836367][ T9042] ? __virt_addr_valid+0x159/0x1f0 [ 195.841474][ T9042] ? __phys_addr+0x8e/0x120 [ 195.845974][ T9042] ? __phys_addr_symbol+0x2f/0x70 [ 195.850996][ T9042] ? __check_object_size+0x314/0x400 [ 195.856291][ T9042] ? do_execve_file+0x40/0x40 [ 195.860970][ T9042] ? getname_flags+0x214/0x640 [ 195.865745][ T9042] __x64_sys_execve+0x94/0xb0 [ 195.870431][ T9042] do_syscall_64+0xfe/0x140 [ 195.875297][ T9042] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 195.881188][ T9042] RIP: 0033:0x4592c9 [ 195.885091][ T9042] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 195.904711][ T9042] RSP: 002b:00007f26e9d09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b 21:40:19 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 21:40:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_percpu\x00', 0x0, 0x0) getsockopt$packet_int(r1, 0x107, 0x10, &(0x7f00000000c0), &(0x7f0000000100)=0x4) syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x4, 0x1000000807e) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000140)=""/8, &(0x7f0000000000)=0x8) [ 195.913129][ T9042] RAX: ffffffffffffffda RBX: 00007f26e9d09c90 RCX: 00000000004592c9 [ 195.921123][ T9042] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 195.929088][ T9042] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 195.937057][ T9042] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f26e9d0a6d4 [ 195.945025][ T9042] R13: 00000000004bf96d R14: 00000000004d1250 R15: 0000000000000003 21:40:19 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={0x0, 0x0}, 0x20) 21:40:19 executing program 2: prctl$PR_SET_PDEATHSIG(0x1, 0x28) msync(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1) r0 = socket$kcm(0x29, 0x2, 0x0) sendmmsg(r0, &(0x7f0000005040)=[{{&(0x7f00000024c0)=@hci, 0x7fffef80, &(0x7f0000002980), 0x0, &(0x7f0000002a00)}}, {{&(0x7f0000003400)=@hci, 0x80, &(0x7f0000004840), 0x1f3, &(0x7f00000048c0)}}], 0x2, 0x0) sendmsg$sock(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x40) 21:40:19 executing program 0: syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x400, 0x4180) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e00b4ec7be070") bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000063119b000000009924e55a90e1bd8700"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:40:19 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={0x0, 0x0}, 0x20) 21:40:19 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000000)={{{@in6=@mcast2, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@initdev}}, &(0x7f0000000100)=0xe8) connect(r0, &(0x7f0000000140)=@ll={0x11, 0x7, r1, 0x1, 0x7fffffff, 0x6, @remote}, 0x80) fcntl$getflags(r0, 0xb) 21:40:19 executing program 3 (fault-call:3 fault-nth:7): mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 21:40:19 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={0x0, 0x0}, 0x20) 21:40:19 executing program 1 (fault-call:0 fault-nth:3): bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008914, &(0x7f0000000040)="b3c09be6000000") r1 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x4400, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000080)=0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000140)={{{@in6=@mcast2, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f00000000c0)=0xe8) ioctl$DRM_IOCTL_GET_CLIENT(r2, 0xc0286405, &(0x7f0000000240)={0x8001, 0x7, r3, 0x0, r4, 0x0, 0x2101, 0xb9e}) setsockopt$inet6_group_source_req(r1, 0x29, 0x2c, &(0x7f0000000300)={0x0, {{0xa, 0x0, 0x0, @loopback}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) socket$inet6_tcp(0xa, 0x1, 0x0) [ 196.319912][ T9080] FAULT_INJECTION: forcing a failure. [ 196.319912][ T9080] name failslab, interval 1, probability 0, space 0, times 0 21:40:19 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) close(r0) socket$netlink(0x10, 0x3, 0x9) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") ftruncate(r1, 0x200004) sendfile(r0, r1, 0x0, 0x8000fffffffe) 21:40:19 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xe, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x169, 0x11, 0x74}]}, &(0x7f0000000040)='gPL\x00', 0x4, 0x1000, &(0x7f0000001200)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80, 0x0) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000140)={0x0, @multicast2}, &(0x7f0000000200)=0xc) sendmsg$FOU_CMD_GET(r0, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x84000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x64, r1, 0x800, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @mcast2}, @FOU_ATTR_TYPE={0x8, 0x4, 0x2}, @FOU_ATTR_PEER_V6={0x14, 0x9, @ipv4={[], [], @local}}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xff}, @FOU_ATTR_PEER_V4={0x8, 0x8, @multicast1}, @FOU_ATTR_IFINDEX={0x8, 0xb, r2}]}, 0x64}, 0x1, 0x0, 0x0, 0x24000004}, 0x8080) ioctl$SG_GET_REQUEST_TABLE(r0, 0x2286, &(0x7f0000000340)) 21:40:19 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) [ 196.473508][ T9080] CPU: 0 PID: 9080 Comm: syz-executor.3 Not tainted 5.2.0-rc5+ #4 [ 196.481383][ T9080] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 196.491447][ T9080] Call Trace: [ 196.494775][ T9080] dump_stack+0x1d8/0x2f8 [ 196.499132][ T9080] should_fail+0x608/0x860 [ 196.503653][ T9080] ? setup_fault_attr+0x2b0/0x2b0 [ 196.508797][ T9080] ? kzalloc+0x26/0x40 [ 196.512975][ T9080] __should_failslab+0x11a/0x160 [ 196.518011][ T9080] ? kzalloc+0x26/0x40 [ 196.522178][ T9080] should_failslab+0x9/0x20 [ 196.526772][ T9080] __kmalloc+0x7a/0x310 [ 196.530941][ T9080] kzalloc+0x26/0x40 [ 196.534838][ T9080] security_prepare_creds+0x40/0x260 [ 196.540135][ T9080] prepare_creds+0x29e/0x370 [ 196.544731][ T9080] prepare_exec_creds+0x17/0xc0 [ 196.549596][ T9080] __do_execve_file+0x35f/0x1cd0 [ 196.554587][ T9080] ? __phys_addr_symbol+0x2f/0x70 [ 196.559708][ T9080] ? __check_object_size+0x314/0x400 [ 196.565099][ T9080] ? do_execve_file+0x40/0x40 21:40:20 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) [ 196.569783][ T9080] ? getname_flags+0x214/0x640 [ 196.574557][ T9080] __x64_sys_execve+0x94/0xb0 [ 196.579248][ T9080] do_syscall_64+0xfe/0x140 [ 196.583768][ T9080] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 196.589667][ T9080] RIP: 0033:0x4592c9 [ 196.593565][ T9080] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 196.613174][ T9080] RSP: 002b:00007f26e9d09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b 21:40:20 executing program 4: unshare(0x2000400) r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x800000000001, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0x40405515, &(0x7f0000000200)={{0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', 0x0, 0x100}) [ 196.621595][ T9080] RAX: ffffffffffffffda RBX: 00007f26e9d09c90 RCX: 00000000004592c9 [ 196.629591][ T9080] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 196.637614][ T9080] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 196.645596][ T9080] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f26e9d0a6d4 [ 196.653579][ T9080] R13: 00000000004bf96d R14: 00000000004d1250 R15: 0000000000000003 21:40:20 executing program 2: socketpair(0x8, 0x80006, 0x40, &(0x7f00000001c0)={0xffffffffffffffff}) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, &(0x7f0000000200)=0x720, 0x4) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x3d, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x210000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x38, r2, 0x0, 0x70bd2c, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x33}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x50a5694ff8b9cd7b}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}]}, 0x38}, 0x1, 0x0, 0x0, 0x4008014}, 0x80) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x100, 0x0) ioctl$VIDIOC_S_HW_FREQ_SEEK(r3, 0x40305652, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x5, 0xba4, 0x401, 0x7, 0x9}) r4 = fcntl$dupfd(r1, 0x406, r1) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$KVM_CHECK_EXTENSION(r3, 0xae03, 0x9) 21:40:20 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:20 executing program 3 (fault-call:3 fault-nth:8): mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 21:40:20 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) 21:40:20 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x2, 0x2) 21:40:20 executing program 1: bpf$BPF_BTF_LOAD(0x2, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) [ 196.829302][ T26] audit: type=1800 audit(1561153220.287:32): pid=9098 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed comm="syz-executor.0" name="bus" dev="sda1" ino=16659 res=0 [ 196.853743][ T9126] FAULT_INJECTION: forcing a failure. [ 196.853743][ T9126] name failslab, interval 1, probability 0, space 0, times 0 [ 196.894518][ T9126] CPU: 1 PID: 9126 Comm: syz-executor.3 Not tainted 5.2.0-rc5+ #4 [ 196.902366][ T9126] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 196.912418][ T9126] Call Trace: [ 196.915710][ T9126] dump_stack+0x1d8/0x2f8 [ 196.920050][ T9126] should_fail+0x608/0x860 [ 196.924487][ T9126] ? setup_fault_attr+0x2b0/0x2b0 [ 196.929526][ T9126] ? kzalloc+0x26/0x40 [ 196.933616][ T9126] __should_failslab+0x11a/0x160 [ 196.938561][ T9126] ? kzalloc+0x26/0x40 [ 196.942634][ T9126] should_failslab+0x9/0x20 [ 196.947135][ T9126] __kmalloc+0x7a/0x310 [ 196.951412][ T9126] kzalloc+0x26/0x40 [ 196.955320][ T9126] security_prepare_creds+0x40/0x260 [ 196.960612][ T9126] prepare_creds+0x29e/0x370 [ 196.960626][ T9126] prepare_exec_creds+0x17/0xc0 [ 196.960640][ T9126] __do_execve_file+0x35f/0x1cd0 [ 196.960654][ T9126] ? __phys_addr_symbol+0x2f/0x70 [ 196.960669][ T9126] ? __check_object_size+0x314/0x400 [ 196.985409][ T9126] ? do_execve_file+0x40/0x40 [ 196.990086][ T9126] ? getname_flags+0x214/0x640 [ 196.994864][ T9126] __x64_sys_execve+0x94/0xb0 [ 196.999551][ T9126] do_syscall_64+0xfe/0x140 [ 197.004102][ T9126] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 197.010020][ T9126] RIP: 0033:0x4592c9 [ 197.013917][ T9126] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 197.033531][ T9126] RSP: 002b:00007f26e9d09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b 21:40:20 executing program 2: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000000)) ptrace(0x10, r0) r1 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x0, 0x24001) connect$nfc_llcp(r1, &(0x7f00000000c0)={0x27, 0x1, 0x0, 0x6, 0x237, 0xfffffffffffffffd, "99e10f44bb46f3e9236a7e276771ccd5df55cf9e727ba33d55cc01f4b24a7c9d06321bc3f585f11a6d1f1ad52696ae8c2aab2146685e320d810d3310e66214", 0x25}, 0x60) ptrace$getregset(0x4, r0, 0x400002, 0x0) 21:40:20 executing program 0: get_thread_area(&(0x7f0000000040)={0x200, 0x1000, 0x2400, 0x100000000, 0x2, 0x40, 0x9, 0x101, 0x8, 0x154}) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000200)=@updpolicy={0xb8, 0x13, 0x1, 0x0, 0x0, {{@in6=@mcast1={0xff, 0x201, [0x0, 0xf00]}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, &(0x7f00000000c0)={0x200, 0x6, 0x1}) 21:40:20 executing program 4: r0 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000740)='v', 0x1, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f00000006c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000700)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) r3 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x0, 0x400000) ioctl$ION_IOC_HEAP_QUERY(r3, 0xc0184908, &(0x7f0000000240)={0x34, 0x0, &(0x7f0000000180)}) 21:40:20 executing program 1: bpf$BPF_BTF_LOAD(0x3, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:20 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) [ 197.042039][ T9126] RAX: ffffffffffffffda RBX: 00007f26e9d09c90 RCX: 00000000004592c9 [ 197.050199][ T9126] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 197.058195][ T9126] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 197.066169][ T9126] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f26e9d0a6d4 [ 197.074205][ T9126] R13: 00000000004bf96d R14: 00000000004d1250 R15: 0000000000000003 21:40:20 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) 21:40:20 executing program 3 (fault-call:3 fault-nth:9): mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 21:40:20 executing program 1: bpf$BPF_BTF_LOAD(0x4, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:20 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$SG_SET_KEEP_ORPHAN(r0, 0x2287, &(0x7f0000000080)) ftruncate(r0, 0x3ff) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f0000000040)) socket$nl_netfilter(0x10, 0x3, 0xc) 21:40:20 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4}, 0x10}}, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1886, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000140)={0x0, 0x3, 0x2, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r2 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x1, 0x2) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000000c0)=0x969b, 0x4) [ 197.275865][ T9158] FAULT_INJECTION: forcing a failure. [ 197.275865][ T9158] name failslab, interval 1, probability 0, space 0, times 0 [ 197.296094][ T9158] CPU: 1 PID: 9158 Comm: syz-executor.3 Not tainted 5.2.0-rc5+ #4 [ 197.303944][ T9158] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 197.314049][ T9158] Call Trace: [ 197.317354][ T9158] dump_stack+0x1d8/0x2f8 [ 197.321708][ T9158] should_fail+0x608/0x860 [ 197.326147][ T9158] ? setup_fault_attr+0x2b0/0x2b0 [ 197.331186][ T9158] __should_failslab+0x11a/0x160 [ 197.336145][ T9158] ? __alloc_file+0x29/0x350 [ 197.340758][ T9158] should_failslab+0x9/0x20 [ 197.345265][ T9158] kmem_cache_alloc+0x56/0x2b0 [ 197.350035][ T9158] __alloc_file+0x29/0x350 [ 197.354982][ T9158] ? alloc_empty_file+0x4c/0x1b0 [ 197.359916][ T9158] alloc_empty_file+0xac/0x1b0 [ 197.359928][ T9158] path_openat+0x12b/0x4400 [ 197.359939][ T9158] ? stack_trace_save+0x1e0/0x1e0 [ 197.359951][ T9158] ? rcu_lock_release+0x26/0x30 [ 197.359959][ T9158] ? is_bpf_text_address+0x398/0x3b0 [ 197.359976][ T9158] ? unwind_get_return_address+0x4c/0x90 [ 197.359992][ T9158] ? arch_stack_walk+0x98/0xe0 [ 197.384389][ T9158] ? stack_trace_save+0x111/0x1e0 [ 197.384402][ T9158] ? do_filp_open+0x430/0x430 [ 197.384414][ T9158] ? stack_trace_snprint+0x150/0x150 [ 197.384426][ T9158] ? finish_lock_switch+0x31/0x40 [ 197.384438][ T9158] ? finish_task_switch+0x251/0x560 [ 197.384453][ T9158] ? __bfs+0x550/0x550 [ 197.404538][ T9158] ? __kasan_kmalloc+0x178/0x1b0 [ 197.404551][ T9158] ? __kasan_kmalloc+0x11c/0x1b0 [ 197.404560][ T9158] ? kasan_kmalloc+0x9/0x10 [ 197.404568][ T9158] ? __kmalloc+0x23c/0x310 [ 197.404578][ T9158] ? kzalloc+0x26/0x40 [ 197.404588][ T9158] ? security_prepare_creds+0x40/0x260 [ 197.404597][ T9158] ? prepare_creds+0x29e/0x370 [ 197.404618][ T9158] ? prepare_exec_creds+0x17/0xc0 [ 197.452443][ T9158] ? __do_execve_file+0x35f/0x1cd0 [ 197.452457][ T9158] ? do_syscall_64+0xfe/0x140 [ 197.452469][ T9158] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 197.452482][ T9158] do_filp_open+0x1f7/0x430 [ 197.452495][ T9158] ? vfs_tmpfile+0x230/0x230 [ 197.452507][ T9158] ? __lock_acquire+0xcf7/0x1a40 [ 197.452532][ T9158] ? debug_mutex_init+0x2d/0x60 [ 197.467411][ T9158] ? do_open_execat+0x9e/0x6c0 [ 197.467427][ T9158] do_open_execat+0x169/0x6c0 [ 197.467440][ T9158] ? do_raw_spin_lock+0x143/0x3a0 [ 197.467454][ T9158] ? open_exec+0x60/0x60 [ 197.467469][ T9158] ? kasan_check_read+0x11/0x20 [ 197.467479][ T9158] ? do_raw_spin_unlock+0x49/0x260 [ 197.467496][ T9158] __do_execve_file+0x7a8/0x1cd0 [ 197.521789][ T9158] ? __check_object_size+0x314/0x400 [ 197.531873][ T9158] ? do_execve_file+0x40/0x40 [ 197.531884][ T9158] ? getname_flags+0x214/0x640 [ 197.531898][ T9158] __x64_sys_execve+0x94/0xb0 [ 197.531913][ T9158] do_syscall_64+0xfe/0x140 [ 197.531931][ T9158] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 197.561681][ T9158] RIP: 0033:0x4592c9 21:40:21 executing program 4: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @local}, {0x0, @local}, 0x8, {0x2, 0x0, @initdev}, '\x8a\xb9\xa9\xc3\x00\x00\x00\x00r0\x00'}) ioctl$sock_inet_SIOCSARP(r0, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @remote}, 0x8, {0x2, 0x0, @loopback}}) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x1, 0x0) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x40000, 0x0) ioctl$NBD_SET_SIZE(r0, 0xab02, 0xd661) 21:40:21 executing program 1: bpf$BPF_BTF_LOAD(0x5, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) [ 197.565591][ T9158] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 197.585324][ T9158] RSP: 002b:00007f26e9d09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 197.593924][ T9158] RAX: ffffffffffffffda RBX: 00007f26e9d09c90 RCX: 00000000004592c9 [ 197.601913][ T9158] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 197.609892][ T9158] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 197.617871][ T9158] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f26e9d0a6d4 [ 197.625847][ T9158] R13: 00000000004bf96d R14: 00000000004d1250 R15: 0000000000000003 21:40:21 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) r1 = dup(r0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) r2 = syz_open_pts(r1, 0x1008000000000002) r3 = dup3(r2, r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f00000000c0)={0x0, 0xff}) write$UHID_INPUT(r3, &(0x7f0000000140)={0x8, "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", 0x1000}, 0x1006) 21:40:21 executing program 4: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x40442, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) write$UHID_INPUT(r0, &(0x7f00000014c0)={0x8, "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", 0x1000}, 0x1006) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x28000, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f00000010c0)=""/177, 0xb1}], 0x1, 0x0) ioctl$KVM_GET_MSRS(r1, 0xc008ae88, &(0x7f00000000c0)) 21:40:21 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) 21:40:21 executing program 1: bpf$BPF_BTF_LOAD(0x6, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:21 executing program 3 (fault-call:3 fault-nth:10): mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 21:40:21 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) listen(r0, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000040)=0x6, 0xc2) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x800) write$FUSE_NOTIFY_POLL(r1, &(0x7f00000000c0)={0x18, 0x1, 0x0, {0x2}}, 0x18) syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd60d8652b00140600fe8000000000000089000d00000000aafe8000080000000000000080be0f824f174c7620", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5010000090780000"], 0x0) 21:40:21 executing program 5 (fault-call:0 fault-nth:0): bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) [ 197.924719][ T9192] FAULT_INJECTION: forcing a failure. [ 197.924719][ T9192] name failslab, interval 1, probability 0, space 0, times 0 [ 197.947327][ T9192] CPU: 1 PID: 9192 Comm: syz-executor.3 Not tainted 5.2.0-rc5+ #4 [ 197.955157][ T9192] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 197.965215][ T9192] Call Trace: [ 197.968514][ T9192] dump_stack+0x1d8/0x2f8 [ 197.972882][ T9192] should_fail+0x608/0x860 [ 197.977300][ T9192] ? setup_fault_attr+0x2b0/0x2b0 [ 197.977321][ T9192] __should_failslab+0x11a/0x160 [ 197.977334][ T9192] ? security_file_alloc+0x36/0x200 [ 197.977345][ T9192] should_failslab+0x9/0x20 [ 197.977360][ T9192] kmem_cache_alloc+0x56/0x2b0 [ 198.001754][ T9192] security_file_alloc+0x36/0x200 [ 198.006794][ T9192] __alloc_file+0xb1/0x350 [ 198.011227][ T9192] alloc_empty_file+0xac/0x1b0 [ 198.016001][ T9192] path_openat+0x12b/0x4400 [ 198.020518][ T9192] ? stack_trace_save+0x1e0/0x1e0 [ 198.025547][ T9192] ? rcu_lock_release+0x26/0x30 [ 198.030397][ T9192] ? is_bpf_text_address+0x398/0x3b0 [ 198.035779][ T9192] ? unwind_get_return_address+0x4c/0x90 [ 198.041418][ T9192] ? arch_stack_walk+0x98/0xe0 [ 198.041440][ T9192] ? stack_trace_save+0x111/0x1e0 [ 198.041450][ T9192] ? do_filp_open+0x430/0x430 [ 198.041461][ T9192] ? stack_trace_snprint+0x150/0x150 [ 198.041477][ T9192] ? stack_trace_save+0x111/0x1e0 [ 198.061203][ T9192] ? __bfs+0x550/0x550 [ 198.061215][ T9192] ? __kasan_kmalloc+0x178/0x1b0 [ 198.061226][ T9192] ? __kasan_kmalloc+0x11c/0x1b0 [ 198.061240][ T9192] ? kasan_kmalloc+0x9/0x10 [ 198.079970][ T9199] FAULT_INJECTION: forcing a failure. [ 198.079970][ T9199] name failslab, interval 1, probability 0, space 0, times 0 [ 198.080193][ T9192] ? __kmalloc+0x23c/0x310 [ 198.097268][ T9192] ? kzalloc+0x26/0x40 [ 198.097279][ T9192] ? security_prepare_creds+0x40/0x260 [ 198.097287][ T9192] ? prepare_creds+0x29e/0x370 [ 198.097296][ T9192] ? prepare_exec_creds+0x17/0xc0 [ 198.097306][ T9192] ? __do_execve_file+0x35f/0x1cd0 [ 198.097318][ T9192] ? do_syscall_64+0xfe/0x140 [ 198.097328][ T9192] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 198.097341][ T9192] do_filp_open+0x1f7/0x430 [ 198.097356][ T9192] ? vfs_tmpfile+0x230/0x230 [ 198.130853][ T9192] ? __lock_acquire+0xcf7/0x1a40 [ 198.130881][ T9192] ? debug_mutex_init+0x2d/0x60 [ 198.130896][ T9192] ? do_open_execat+0x9e/0x6c0 [ 198.160588][ T9192] do_open_execat+0x169/0x6c0 [ 198.165281][ T9192] ? do_raw_spin_lock+0x143/0x3a0 [ 198.170310][ T9192] ? open_exec+0x60/0x60 [ 198.174574][ T9192] ? kasan_check_read+0x11/0x20 [ 198.179437][ T9192] ? do_raw_spin_unlock+0x49/0x260 [ 198.184568][ T9192] __do_execve_file+0x7a8/0x1cd0 [ 198.189543][ T9192] ? __check_object_size+0x314/0x400 [ 198.194836][ T9192] ? do_execve_file+0x40/0x40 [ 198.199530][ T9192] ? getname_flags+0x214/0x640 [ 198.204295][ T9192] __x64_sys_execve+0x94/0xb0 [ 198.208976][ T9192] do_syscall_64+0xfe/0x140 [ 198.213491][ T9192] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 198.219396][ T9192] RIP: 0033:0x4592c9 [ 198.223303][ T9192] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 198.242907][ T9192] RSP: 002b:00007f26e9d09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 198.251323][ T9192] RAX: ffffffffffffffda RBX: 00007f26e9d09c90 RCX: 00000000004592c9 21:40:21 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) inotify_init1(0x80800) r1 = dup(r0) add_key(&(0x7f0000000540)='logon\x00', 0x0, &(0x7f00000005c0)="76ae32d976f48987ef377e37598e733e4365c8c24f5343b776b903a40e3b462a11", 0x21, 0xfffffffffffffffb) keyctl$search(0xa, 0x0, 0x0, &(0x7f0000000500)={'syz'}, 0x0) sendmsg$sock(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000001c0)="db108f9b3cfd21e8399755b302ee09247babe4910513cd993f005e2c745971c790fdfdeba68a7d6eaa00a810b0469f9084b56cb604f6504e27df8f77d8678ffad21221da", 0x44}], 0x1, &(0x7f0000000240)=[@mark={{0x14, 0x1, 0x24, 0x6}}, @timestamping={{0x14, 0x1, 0x25, 0xffffffffffffffff}}, @mark={{0x14, 0x1, 0x24, 0x5}}], 0x48}, 0x80) lstat(&(0x7f0000000400)='./file0\x00', &(0x7f00000018c0)) syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x80, 0x1, &(0x7f0000001800)=[{&(0x7f0000001640)="daa0798e2f428a2384da39695c1840414be3afebffb9425d2b13407152df3d830edcb758fb811e868616cc99ce85766ff08edc664d7f5348cea36b1bab6a6c2a30cc94cc533734e202ec929ed9cfa1547ea450f81ee07b04dba76b649500232331f902ada532d07e71edc59d18e9b14e6f607093d66b324ea0f27ac4579ee4fea7ffee62ee36236b14bf7af48d34816415a4cea7492fc896", 0x98, 0x7}], 0x10021, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r1, 0x40045731, &(0x7f0000000000)=0x9) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) socket$pppoe(0x18, 0x1, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040)=0x7, 0x4) socket$pptp(0x18, 0x1, 0x2) 21:40:21 executing program 1: bpf$BPF_BTF_LOAD(0x7, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) [ 198.259325][ T9192] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 198.276779][ T9192] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 198.284767][ T9192] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f26e9d0a6d4 [ 198.292743][ T9192] R13: 00000000004bf96d R14: 00000000004d1250 R15: 0000000000000003 [ 198.300745][ T9199] CPU: 0 PID: 9199 Comm: syz-executor.5 Not tainted 5.2.0-rc5+ #4 [ 198.308562][ T9199] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 198.318705][ T9199] Call Trace: [ 198.322002][ T9199] dump_stack+0x1d8/0x2f8 21:40:21 executing program 3 (fault-call:3 fault-nth:11): mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 198.326344][ T9199] should_fail+0x608/0x860 [ 198.330762][ T9199] ? setup_fault_attr+0x2b0/0x2b0 [ 198.335798][ T9199] __should_failslab+0x11a/0x160 [ 198.340735][ T9199] should_failslab+0x9/0x20 [ 198.345236][ T9199] kmem_cache_alloc_trace+0x5d/0x2c0 [ 198.350522][ T9199] ? btf_new_fd+0x176/0x37b0 [ 198.356126][ T9199] ? __lock_acquire+0xcf7/0x1a40 [ 198.361075][ T9199] btf_new_fd+0x176/0x37b0 [ 198.365512][ T9199] ? __might_fault+0xf9/0x160 [ 198.370188][ T9199] ? cap_capable+0x250/0x290 [ 198.374783][ T9199] ? btf_release+0xd0/0xd0 [ 198.379204][ T9199] ? security_capable+0xa2/0xd0 [ 198.384060][ T9199] __do_sys_bpf+0x1212/0xc5d0 [ 198.388737][ T9199] ? __might_fault+0xf9/0x160 [ 198.393422][ T9199] ? kstrtoull+0x3ba/0x4e0 [ 198.397845][ T9199] ? kasan_check_write+0x14/0x20 [ 198.397856][ T9199] ? refcount_sub_and_test_checked+0x1c2/0x290 [ 198.397865][ T9199] ? __bpf_prog_put_rcu+0x320/0x320 [ 198.397874][ T9199] ? refcount_inc_checked+0x50/0x50 [ 198.397891][ T9199] ? refcount_dec_and_test_checked+0x1a/0x20 [ 198.397902][ T9199] ? proc_fail_nth_write+0x179/0x1f0 [ 198.397914][ T9199] ? proc_fail_nth_read+0x1a0/0x1a0 [ 198.397924][ T9199] ? trace_lock_acquire+0x190/0x190 [ 198.397936][ T9199] ? __mutex_lock_common+0x56b/0x2fc0 [ 198.397948][ T9199] ? memset+0x31/0x40 [ 198.397961][ T9199] ? fsnotify+0x14b9/0x1580 [ 198.397981][ T9199] ? __f_unlock_pos+0x19/0x20 [ 198.397994][ T9199] ? kasan_check_write+0x14/0x20 [ 198.398008][ T9199] ? __mutex_unlock_slowpath+0x18c/0x630 [ 198.470523][ T9199] ? mutex_unlock+0x10/0x10 [ 198.473706][ T9208] FAULT_INJECTION: forcing a failure. [ 198.473706][ T9208] name failslab, interval 1, probability 0, space 0, times 0 [ 198.475056][ T9199] ? __sb_end_write+0xde/0x120 [ 198.475072][ T9199] ? kasan_check_write+0x14/0x20 [ 198.475081][ T9199] ? fput_many+0x47/0x1a0 [ 198.475104][ T9199] ? prepare_exit_to_usermode+0x1e1/0x4f0 [ 198.475114][ T9199] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 198.475129][ T9199] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 198.518470][ T9199] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 198.524196][ T9199] ? do_syscall_64+0x1d/0x140 [ 198.528889][ T9199] __x64_sys_bpf+0x7a/0x90 [ 198.533316][ T9199] do_syscall_64+0xfe/0x140 [ 198.537827][ T9199] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 198.543743][ T9199] RIP: 0033:0x4592c9 [ 198.547641][ T9199] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 198.567248][ T9199] RSP: 002b:00007f6ea15e8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 21:40:22 executing program 1: bpf$BPF_BTF_LOAD(0x8, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) [ 198.575665][ T9199] RAX: ffffffffffffffda RBX: 00007f6ea15e8c90 RCX: 00000000004592c9 [ 198.583635][ T9199] RDX: 0000000000000020 RSI: 00000000200006c0 RDI: 0000000000000012 [ 198.591602][ T9199] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 198.591614][ T9199] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6ea15e96d4 [ 198.591620][ T9199] R13: 00000000004bf4d3 R14: 00000000004d0aa0 R15: 0000000000000003 [ 198.615860][ T9208] CPU: 0 PID: 9208 Comm: syz-executor.3 Not tainted 5.2.0-rc5+ #4 21:40:22 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x20001000008912, &(0x7f0000000080)="c0dc00025e0b01047be070") connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000003040)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) connect$l2tp(r1, &(0x7f0000000140)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) r2 = request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000bc0)={'syz', 0x3}, &(0x7f0000000c00)='\x00', 0xffffffffffffffff) keyctl$clear(0x7, r2) sendmmsg(r1, &(0x7f0000000b40)=[{{&(0x7f00000000c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, r0, 0x4, 0x4, 0x4, 0x0, {0xa, 0x4e20, 0x4, @mcast1, 0x4}}}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000180)="ebf7a9dd10e7da3291238d3f7bc75f3ad14c99b2305a11ee016e0e5b2c38a00f16aa5f559ca0928841a30cd3da56b5a1cc157894f66e9d4aaafa3eea67f3f8c93e27acc0290f54b3dd70293bf4746c4fe715a71c63329118cf327b8690e643c8137d1e6229a463fd2f689f8cad5d5144942d0c49997e9f91f8d82d284f85a7e828c53b5ebffd8dd0855b6dcfdd506f12f8b7c2c885b19c47b757b94fff7e00735e5678290ccb0bac8dc88da7a696385e23ca82acb9", 0xb5}, {&(0x7f0000000240)="c768fe2f956f638f9590447dc93a174bf1c84a79f4db143fe0cc3a0826c0798841294a575eaadd17599d86ce12408f7ac19cd4444b33005cccbd0fd67bd905e319df402df72808df7442fa78e8e1cb867d70f3b8af12032266a8396d3e54ff639e97eb5a76057083f17dd53c63fc", 0x6e}, {&(0x7f0000000040)="24505d9007036fc6e92cfb0984672dbad8cc1b4e05f46f0157411b", 0x1b}, {&(0x7f00000002c0)="2c5d480f46165fdd5702430091fb5138c3810eba578a41f61db49fa5461de7b232df5a3d3d300b62d3948feb19679545ade8ccb179e25369c267811866b53bb3cce7a05a2071af8b4543294622df65f37b4a46971eed89008d3faf5fe33b9317e745d48d958467cab5845bb62f58b8c84634c5361a6319b82d834501793f1c7a7b703d48eddc7d3780529fa0e741196da3dfbc16740b4e98c71de48bf250caca9e96875ea6973f6d47e454a03c09e3ea11b663f25c73da00ee78a2f0e24ad0c9053bec6b7319a6964da4eac248e36642", 0xd0}, {&(0x7f00000003c0)="96e62ef019b2c0bcbfbead378f714aaebe8a669fa8e08fb47a01645ef1953bfec270903e1c0586bf98f13ba90d794aac03a582a0265b508bf27110165c771be6bb02977314c94eac201178d583cae70e4d361fe97cc86a4e51d6a02ed5b3a1edb56a75d11a787ef4e588b9f91e8650f49f8bd097f536d7e0160fd552855ec7258ac2146a79c96cf0e96f313319d1ec74818b9359d8e8a3e6ccc316cdabe71ac05a1e7bc82fde33a2bddfd4bcb5f8ae", 0xaf}, {&(0x7f0000000480)="78b45e4d5a908f9bf8dfad73539d659772846560468dfd5fe4cfe9f3ff4c8bf4c57a61917ee0ad11a3ec1281f550d75e2498b3cb9d5d7eac08159078da440a99f2ac3924b9fa4fa95e993e906e391c00e37c362bdee8688c83fab133c31a288ac14230fa7efbc4e57e26c0d09b95061d3544b6017d15838c41f4d8b33110430da4909be8c2969614cb418c26598bdafbcd8a809a9e4b03db52db9ddae70e9f6a149b967b7287195f6678392262d369c43b8f6d6d453f8bb5d2f7b2f1d8f14b45717841e162aaefee0c2127d85f1d10ee91c407f78e19fb801ca57fe2a6d66ca021f1c1", 0xe3}, {&(0x7f0000000580)="82e4c16af79adfa7cc0bcd8a778d87492ce9aac9ff8b4158fd8b29de9bc46e1ebc247419699ec4604d3437e177c6ce72f744d7abab9513aebed747fdc9a9898cb0ddc5d84a3439966b797ec608a040dec3e9a4bbd4585583e55bc5ef4e3727538dd764d15bc53e105f6db3abd9", 0x6d}], 0x7, &(0x7f0000000680)=ANY=[@ANYBLOB="100100000000000084000000f71f000089ca7ecfa9a5f19e91f0d98f34d959094dde4407000048c45658f93b9e5ca28b9b561d528c6f2c058f16246cb7e8a47e138bb378e0e49446c813c4fef3a164d824846194e64194d66d897ef4ce5b2d4d57373246c697f5ea83d0215dcf63e36ffc22bf41ef13c48deeef9a62db848d827dddc4d884ad417ec7a1fb9c2b98199a718562c2938fb7205783808a0b97791d9ac961d8031435bb0f282d7efab94535dea92dddebf54a52e1dcd91fcd17807ca179f7c2735d445619b953a7751e92a0b99354ec1dcb2d184ea6e582cc975c0972ba9d70d241c0c6369a72fce111dfa937a8bb22fed356aeab860da1dab650a2ef19b0a16124f5ce81d9e43361931ac9"], 0x110}}, {{&(0x7f00000007c0)=@x25={0x9, @null=' \x00'}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="4c684b344e997de37a4317c8ddb4798fe49edd7ccd54af3aeb882d8c1b9101c3cabaa72f576036106e29f9d4ca5aa200a5dfd421bd5f6322c8370edb5dd77a2224b4012fc4e170d88fb60deded18e1f3c89987b208b6118c27cb52fc17c4ed57c68519d63e93131ae5ed12a54b83e4ec78befe32", 0x74}, {&(0x7f00000008c0)="1f76415e370f676c2540f4fd5f5d901e0f52bea2865cdce7345305a969ccec9faab12d97418de572f26797b112f2187a62b79721678ef2c5ca715492c43d33ec9e26b9c4a842b497466b00d6a3527de2d225a667a2659e72173fb048273e91c4033cd3a41c56bd4b087a88", 0x6b}], 0x0, &(0x7f0000000980)=[{0xc8, 0x10f, 0x4, "dbe447163bcb3fc0ba3ca09509a77bfcb88e6be6c42cb999d7c8a7443e2e1819095f16090b9596478d04cfc7a5a38cc4c31e3449f54b1ab7da2c66f175bf4dd61b1f3d8c8b1d4f8447957c86ab2e2bfdc5e3f0338f700b3dde32f2826a23b08ed0f26b282842fc6d625a35dc9693097f84b87216e6e1101bd906d54011c80db2ae1e7e55759b359fb63b0a6432bbafe97c8ee36ae990abea3302f4d718f3fbb2ed53b8fb53fff4f634d720376d9d71bda2dd839e3728"}, {0xf0, 0x111, 0x6, "5c7638b80fe256fcea5eda576257a2b752b860eff4a0c2c16a66c7b460d4dbcd31b8f1629937e1350229a827f1aefd188fb20911202a53c77f1365012317100380e723b6bb5fbc3ada2cc01014800dcb205754dc0a8a981096d97390470b283a1bb64cf257048f59d1e87ead2910d58a228cc4fd86dc4d565c7e2776cca8b78235fb6cd95747c9a2c963603907cb2c0ff0c534cfdfeeaf121e06217ab0e73f49f4085e73e40bb18204712c2c49efd998fdf71c26b9c1a62577b0792313911023ee1d6234406b961bfba30793f0d2138cd76c554ed6b5ababa4c8"}], 0x1b8}}], 0x2, 0x200) 21:40:22 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r0, 0x10d, 0xd3, &(0x7f0000000140), &(0x7f0000000000)=0x4) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$setperm(0x5, r1, 0x20) [ 198.623772][ T9208] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 198.633834][ T9208] Call Trace: [ 198.637140][ T9208] dump_stack+0x1d8/0x2f8 [ 198.641478][ T9208] should_fail+0x608/0x860 [ 198.645897][ T9208] ? setup_fault_attr+0x2b0/0x2b0 [ 198.650930][ T9208] __should_failslab+0x11a/0x160 [ 198.655878][ T9208] ? security_file_alloc+0x36/0x200 [ 198.661082][ T9208] should_failslab+0x9/0x20 [ 198.665592][ T9208] kmem_cache_alloc+0x56/0x2b0 [ 198.670367][ T9208] security_file_alloc+0x36/0x200 [ 198.675396][ T9208] __alloc_file+0xb1/0x350 [ 198.679821][ T9208] alloc_empty_file+0xac/0x1b0 [ 198.684597][ T9208] path_openat+0x12b/0x4400 [ 198.689112][ T9208] ? stack_trace_save+0x1e0/0x1e0 [ 198.694140][ T9208] ? rcu_lock_release+0x26/0x30 [ 198.698992][ T9208] ? is_bpf_text_address+0x398/0x3b0 [ 198.704285][ T9208] ? unwind_get_return_address+0x4c/0x90 [ 198.709926][ T9208] ? arch_stack_walk+0x98/0xe0 [ 198.714700][ T9208] ? stack_trace_save+0x111/0x1e0 [ 198.719738][ T9208] ? do_filp_open+0x430/0x430 [ 198.724421][ T9208] ? stack_trace_snprint+0x150/0x150 [ 198.729706][ T9208] ? stack_trace_save+0x111/0x1e0 [ 198.734743][ T9208] ? __bfs+0x550/0x550 [ 198.734754][ T9208] ? __kasan_kmalloc+0x178/0x1b0 [ 198.734766][ T9208] ? __kasan_kmalloc+0x11c/0x1b0 [ 198.734774][ T9208] ? kasan_kmalloc+0x9/0x10 [ 198.734782][ T9208] ? __kmalloc+0x23c/0x310 [ 198.734793][ T9208] ? kzalloc+0x26/0x40 [ 198.734803][ T9208] ? security_prepare_creds+0x40/0x260 [ 198.734812][ T9208] ? prepare_creds+0x29e/0x370 [ 198.734826][ T9208] ? prepare_exec_creds+0x17/0xc0 [ 198.757625][ T9208] ? __do_execve_file+0x35f/0x1cd0 [ 198.757639][ T9208] ? do_syscall_64+0xfe/0x140 [ 198.757652][ T9208] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 198.757666][ T9208] do_filp_open+0x1f7/0x430 [ 198.757679][ T9208] ? vfs_tmpfile+0x230/0x230 [ 198.757691][ T9208] ? __lock_acquire+0xcf7/0x1a40 [ 198.757702][ T9208] ? do_raw_spin_lock+0x143/0x3a0 [ 198.757724][ T9208] ? debug_mutex_init+0x2d/0x60 [ 198.757735][ T9208] ? do_open_execat+0x9e/0x6c0 [ 198.757750][ T9208] do_open_execat+0x169/0x6c0 [ 198.757761][ T9208] ? do_raw_spin_lock+0x143/0x3a0 [ 198.757774][ T9208] ? open_exec+0x60/0x60 [ 198.757791][ T9208] ? kasan_check_read+0x11/0x20 [ 198.782163][ T9208] ? do_raw_spin_unlock+0x49/0x260 [ 198.782182][ T9208] __do_execve_file+0x7a8/0x1cd0 [ 198.782199][ T9208] ? __check_object_size+0x314/0x400 [ 198.782221][ T9208] ? do_execve_file+0x40/0x40 [ 198.782232][ T9208] ? getname_flags+0x214/0x640 [ 198.782248][ T9208] __x64_sys_execve+0x94/0xb0 [ 198.782264][ T9208] do_syscall_64+0xfe/0x140 21:40:22 executing program 1: bpf$BPF_BTF_LOAD(0x9, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:22 executing program 3 (fault-call:3 fault-nth:12): mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 21:40:22 executing program 5 (fault-call:0 fault-nth:1): bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) [ 198.816846][ T9208] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 198.816857][ T9208] RIP: 0033:0x4592c9 [ 198.816869][ T9208] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 198.816875][ T9208] RSP: 002b:00007f26e9d09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 198.816886][ T9208] RAX: ffffffffffffffda RBX: 00007f26e9d09c90 RCX: 00000000004592c9 21:40:22 executing program 4: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x21, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb]}}}}}}}}, 0x0) r0 = socket$isdn_base(0x22, 0x3, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f0000000000)={'ip6tnl0\x00', {0x2, 0x4e24, @multicast2}}) syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x3, 0x101000) rmdir(&(0x7f0000000040)='./file0\x00') [ 198.816892][ T9208] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 198.816899][ T9208] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 198.816905][ T9208] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f26e9d0a6d4 [ 198.816912][ T9208] R13: 00000000004bf96d R14: 00000000004d1250 R15: 0000000000000003 21:40:22 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x2, 0x2) accept$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f00000001c0)={r3, 0x1, 0x2, @random="e6617e784f20"}, 0x10) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x100, 0x0) setsockopt$RDS_CONG_MONITOR(r4, 0x114, 0x6, &(0x7f0000000080), 0x4) r5 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r6, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") close(r1) creat(&(0x7f0000000180)='./file0\x00', 0x0) syz_kvm_setup_cpu$x86(r1, r5, &(0x7f000001e000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 199.016870][ T9231] FAULT_INJECTION: forcing a failure. [ 199.016870][ T9231] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 199.031725][ T9233] FAULT_INJECTION: forcing a failure. [ 199.031725][ T9233] name failslab, interval 1, probability 0, space 0, times 0 [ 199.062061][ T9236] dccp_invalid_packet: P.Data Offset(0) too small [ 199.070824][ T9231] CPU: 0 PID: 9231 Comm: syz-executor.3 Not tainted 5.2.0-rc5+ #4 [ 199.078645][ T9231] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 199.088700][ T9231] Call Trace: [ 199.088720][ T9231] dump_stack+0x1d8/0x2f8 [ 199.088737][ T9231] should_fail+0x608/0x860 [ 199.088753][ T9231] ? setup_fault_attr+0x2b0/0x2b0 [ 199.088774][ T9231] should_fail_alloc_page+0x55/0x60 [ 199.088784][ T9231] prepare_alloc_pages+0x283/0x460 21:40:22 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b7c51203001bfc4e2f00000000000000267b6dd918a1437ff15eab4e107c12bc", 0x20) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x8, 0x800) ioctl$UI_DEV_DESTROY(r1, 0x5502) [ 199.088800][ T9231] __alloc_pages_nodemask+0x11c/0x790 [ 199.088817][ T9231] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 199.088851][ T9231] alloc_pages_current+0x2fb/0x540 [ 199.088868][ T9231] __get_free_pages+0xc/0x30 [ 199.088880][ T9231] pgd_alloc+0x21/0x250 [ 199.093875][ T9236] dccp_invalid_packet: P.Data Offset(0) too small [ 199.096569][ T9231] mm_init+0x44f/0x6e0 [ 199.096584][ T9231] mm_alloc+0xae/0xd0 [ 199.096598][ T9231] __do_execve_file+0x920/0x1cd0 [ 199.096622][ T9231] ? __check_object_size+0x314/0x400 [ 199.096644][ T9231] ? do_execve_file+0x40/0x40 [ 199.111245][ T9231] ? getname_flags+0x214/0x640 [ 199.111264][ T9231] __x64_sys_execve+0x94/0xb0 [ 199.111280][ T9231] do_syscall_64+0xfe/0x140 [ 199.111302][ T9231] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 199.190314][ T9231] RIP: 0033:0x4592c9 [ 199.194210][ T9231] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 199.213913][ T9231] RSP: 002b:00007f26e9d09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 199.222416][ T9231] RAX: ffffffffffffffda RBX: 00007f26e9d09c90 RCX: 00000000004592c9 [ 199.230386][ T9231] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 199.238364][ T9231] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 199.247853][ T9231] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f26e9d0a6d4 [ 199.255822][ T9231] R13: 00000000004bf96d R14: 00000000004d1250 R15: 0000000000000003 [ 199.263813][ T9233] CPU: 1 PID: 9233 Comm: syz-executor.5 Not tainted 5.2.0-rc5+ #4 [ 199.271634][ T9233] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 199.281699][ T9233] Call Trace: [ 199.285003][ T9233] dump_stack+0x1d8/0x2f8 [ 199.289360][ T9233] should_fail+0x608/0x860 [ 199.293789][ T9233] ? setup_fault_attr+0x2b0/0x2b0 [ 199.298820][ T9233] __should_failslab+0x11a/0x160 [ 199.303752][ T9233] should_failslab+0x9/0x20 [ 199.308328][ T9233] kmem_cache_alloc_trace+0x5d/0x2c0 [ 199.313607][ T9233] ? btf_new_fd+0x326/0x37b0 [ 199.318195][ T9233] btf_new_fd+0x326/0x37b0 [ 199.322709][ T9233] ? __might_fault+0xf9/0x160 [ 199.327375][ T9233] ? cap_capable+0x250/0x290 [ 199.331955][ T9233] ? btf_release+0xd0/0xd0 [ 199.336454][ T9233] ? security_capable+0xa2/0xd0 [ 199.341330][ T9233] __do_sys_bpf+0x1212/0xc5d0 [ 199.346002][ T9233] ? __might_fault+0xf9/0x160 [ 199.350681][ T9233] ? kstrtoull+0x3ba/0x4e0 [ 199.355646][ T9233] ? kasan_check_write+0x14/0x20 [ 199.360580][ T9233] ? refcount_sub_and_test_checked+0x1c2/0x290 [ 199.366726][ T9233] ? __bpf_prog_put_rcu+0x320/0x320 [ 199.371921][ T9233] ? refcount_inc_checked+0x50/0x50 [ 199.377138][ T9233] ? refcount_dec_and_test_checked+0x1a/0x20 [ 199.383127][ T9233] ? proc_fail_nth_write+0x179/0x1f0 [ 199.388494][ T9233] ? proc_fail_nth_read+0x1a0/0x1a0 [ 199.393689][ T9233] ? trace_lock_acquire+0x190/0x190 [ 199.398972][ T9233] ? __mutex_lock_common+0x56b/0x2fc0 [ 199.404351][ T9233] ? memset+0x31/0x40 [ 199.408336][ T9233] ? fsnotify+0x14b9/0x1580 [ 199.412849][ T9233] ? __f_unlock_pos+0x19/0x20 [ 199.417529][ T9233] ? kasan_check_write+0x14/0x20 [ 199.422748][ T9233] ? __mutex_unlock_slowpath+0x18c/0x630 [ 199.428375][ T9233] ? mutex_unlock+0x10/0x10 [ 199.432870][ T9233] ? __sb_end_write+0xde/0x120 [ 199.437629][ T9233] ? kasan_check_write+0x14/0x20 [ 199.442559][ T9233] ? fput_many+0x47/0x1a0 [ 199.446893][ T9233] ? prepare_exit_to_usermode+0x1e1/0x4f0 [ 199.452612][ T9233] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 199.458256][ T9233] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 199.463715][ T9233] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 199.469785][ T9233] ? do_syscall_64+0x1d/0x140 [ 199.474462][ T9233] __x64_sys_bpf+0x7a/0x90 [ 199.478879][ T9233] do_syscall_64+0xfe/0x140 [ 199.483398][ T9233] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 199.489290][ T9233] RIP: 0033:0x4592c9 [ 199.493191][ T9233] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 199.512884][ T9233] RSP: 002b:00007f6ea15e8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 199.521556][ T9233] RAX: ffffffffffffffda RBX: 00007f6ea15e8c90 RCX: 00000000004592c9 [ 199.529613][ T9233] RDX: 0000000000000020 RSI: 00000000200006c0 RDI: 0000000000000012 [ 199.537592][ T9233] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 199.545563][ T9233] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6ea15e96d4 [ 199.553535][ T9233] R13: 00000000004bf4d3 R14: 00000000004d0aa0 R15: 0000000000000003 21:40:23 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/if_inet6\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") preadv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/69, 0x45}, {&(0x7f0000000200)=""/223, 0xdf}], 0x2, 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/dlm-control\x00', 0x400000000004000, 0x0) r2 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000080)='trusted\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='user)trusted@vboxnet1}\x00', r2) 21:40:23 executing program 1: bpf$BPF_BTF_LOAD(0xa, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:23 executing program 3 (fault-call:3 fault-nth:13): mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 21:40:23 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000000)) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000180)={0x0, @in6={{0xa, 0x4e22, 0x1, @local}}, 0x86}, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x4cdb, 0x2) syz_open_dev$amidi(0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r2, 0x0) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$NBD_SET_BLKSIZE(0xffffffffffffffff, 0xab01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffd6b, 0x0, 0x0, 0x362) 21:40:23 executing program 5 (fault-call:0 fault-nth:2): bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:23 executing program 0: r0 = dup(0xffffffffffffff9c) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x20600) ioctl$UDMABUF_CREATE(r0, 0x40187542, &(0x7f00000003c0)={r0, 0x0, 0x8000, 0x101000000}) prctl$PR_GET_TIMERSLACK(0x1e) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) connect$bt_sco(r0, &(0x7f0000000000)={0x1f, {0x5, 0x310, 0x6, 0x0, 0x7, 0xffff}}, 0x8) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$SIOCGETLINKNAME(r0, 0x89e0, &(0x7f00000001c0)={0x3}) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) r2 = request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000140)={r2, 0x5}, 0x0, &(0x7f0000000180)="c3a5f0a3ae", 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r0, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000004}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)={0x88, r3, 0x4, 0x0, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0x70, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x800}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_NODE={0x4}]}, 0x88}}, 0x20040000) [ 199.781201][ T9261] FAULT_INJECTION: forcing a failure. [ 199.781201][ T9261] name failslab, interval 1, probability 0, space 0, times 0 21:40:23 executing program 1: bpf$BPF_BTF_LOAD(0xb, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) [ 199.824073][ T9262] FAULT_INJECTION: forcing a failure. [ 199.824073][ T9262] name failslab, interval 1, probability 0, space 0, times 0 21:40:23 executing program 2: r0 = gettid() ptrace$pokeuser(0x6, r0, 0x1000, 0x1) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000180)='threaded\x00', 0x3d3427e) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='dax\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getpeername(r1, &(0x7f00000000c0)=@un=@abs, &(0x7f0000000040)=0x80) tkill(r2, 0x11) [ 199.918078][ T9262] CPU: 0 PID: 9262 Comm: syz-executor.3 Not tainted 5.2.0-rc5+ #4 [ 199.925924][ T9262] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 199.935978][ T9262] Call Trace: [ 199.939278][ T9262] dump_stack+0x1d8/0x2f8 [ 199.943616][ T9262] should_fail+0x608/0x860 [ 199.948037][ T9262] ? setup_fault_attr+0x2b0/0x2b0 [ 199.953079][ T9262] __should_failslab+0x11a/0x160 [ 199.958111][ T9262] ? vm_area_alloc+0x24/0xf0 [ 199.962734][ T9262] should_failslab+0x9/0x20 21:40:23 executing program 1: bpf$BPF_BTF_LOAD(0xc, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) [ 199.967241][ T9262] kmem_cache_alloc+0x56/0x2b0 [ 199.972019][ T9262] vm_area_alloc+0x24/0xf0 [ 199.976442][ T9262] __do_execve_file+0xa12/0x1cd0 [ 199.981382][ T9262] ? __check_object_size+0x314/0x400 [ 199.986682][ T9262] ? do_execve_file+0x40/0x40 [ 199.991465][ T9262] ? getname_flags+0x214/0x640 [ 199.996342][ T9262] __x64_sys_execve+0x94/0xb0 [ 200.001025][ T9262] do_syscall_64+0xfe/0x140 [ 200.005626][ T9262] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 200.011516][ T9262] RIP: 0033:0x4592c9 [ 200.015411][ T9262] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 200.035067][ T9262] RSP: 002b:00007f26e9d09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 200.043484][ T9262] RAX: ffffffffffffffda RBX: 00007f26e9d09c90 RCX: 00000000004592c9 [ 200.051459][ T9262] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 200.059431][ T9262] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 200.067397][ T9262] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f26e9d0a6d4 [ 200.075370][ T9262] R13: 00000000004bf96d R14: 00000000004d1250 R15: 0000000000000003 [ 200.083367][ T9261] CPU: 1 PID: 9261 Comm: syz-executor.5 Not tainted 5.2.0-rc5+ #4 [ 200.091190][ T9261] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 200.101271][ T9261] Call Trace: [ 200.104562][ T9261] dump_stack+0x1d8/0x2f8 [ 200.108895][ T9261] should_fail+0x608/0x860 [ 200.113322][ T9261] ? setup_fault_attr+0x2b0/0x2b0 [ 200.118353][ T9261] __should_failslab+0x11a/0x160 [ 200.123295][ T9261] should_failslab+0x9/0x20 [ 200.127800][ T9261] kmem_cache_alloc_node_trace+0x6e/0x280 [ 200.133517][ T9261] ? __kmalloc_node+0x3c/0x60 [ 200.138206][ T9261] __kmalloc_node+0x3c/0x60 [ 200.142710][ T9261] kvmalloc_node+0xcc/0x130 [ 200.147215][ T9261] btf_new_fd+0x374/0x37b0 [ 200.151645][ T9261] ? __might_fault+0xf9/0x160 [ 200.156320][ T9261] ? cap_capable+0x250/0x290 [ 200.160908][ T9261] ? btf_release+0xd0/0xd0 [ 200.165325][ T9261] ? security_capable+0xa2/0xd0 [ 200.170177][ T9261] __do_sys_bpf+0x1212/0xc5d0 [ 200.174849][ T9261] ? __might_fault+0xf9/0x160 [ 200.179533][ T9261] ? kstrtoull+0x3ba/0x4e0 [ 200.183957][ T9261] ? kasan_check_write+0x14/0x20 [ 200.188893][ T9261] ? refcount_sub_and_test_checked+0x1c2/0x290 [ 200.195041][ T9261] ? __bpf_prog_put_rcu+0x320/0x320 [ 200.200235][ T9261] ? refcount_inc_checked+0x50/0x50 [ 200.205447][ T9261] ? refcount_dec_and_test_checked+0x1a/0x20 [ 200.211441][ T9261] ? proc_fail_nth_write+0x179/0x1f0 [ 200.216732][ T9261] ? proc_fail_nth_read+0x1a0/0x1a0 [ 200.221932][ T9261] ? trace_lock_acquire+0x190/0x190 [ 200.227133][ T9261] ? __mutex_lock_common+0x56b/0x2fc0 [ 200.232516][ T9261] ? memset+0x31/0x40 [ 200.236506][ T9261] ? fsnotify+0x14b9/0x1580 [ 200.241024][ T9261] ? __f_unlock_pos+0x19/0x20 [ 200.245706][ T9261] ? kasan_check_write+0x14/0x20 [ 200.250725][ T9261] ? __mutex_unlock_slowpath+0x18c/0x630 [ 200.256362][ T9261] ? mutex_unlock+0x10/0x10 [ 200.260881][ T9261] ? __sb_end_write+0xde/0x120 [ 200.276692][ T9261] ? kasan_check_write+0x14/0x20 [ 200.281718][ T9261] ? fput_many+0x47/0x1a0 [ 200.286060][ T9261] ? prepare_exit_to_usermode+0x1e1/0x4f0 [ 200.291813][ T9261] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 200.297448][ T9261] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 200.302912][ T9261] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 200.308660][ T9261] ? do_syscall_64+0x1d/0x140 [ 200.313339][ T9261] __x64_sys_bpf+0x7a/0x90 [ 200.317766][ T9261] do_syscall_64+0xfe/0x140 [ 200.322271][ T9261] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 200.328170][ T9261] RIP: 0033:0x4592c9 [ 200.332074][ T9261] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 200.353723][ T9261] RSP: 002b:00007f6ea15e8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 200.362142][ T9261] RAX: ffffffffffffffda RBX: 00007f6ea15e8c90 RCX: 00000000004592c9 21:40:23 executing program 3 (fault-call:3 fault-nth:14): mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 200.370212][ T9261] RDX: 0000000000000020 RSI: 00000000200006c0 RDI: 0000000000000012 [ 200.378220][ T9261] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 200.386203][ T9261] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6ea15e96d4 [ 200.394185][ T9261] R13: 00000000004bf4d3 R14: 00000000004d0aa0 R15: 0000000000000003 21:40:23 executing program 5 (fault-call:0 fault-nth:3): bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:24 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) [ 200.583893][ T9277] FAULT_INJECTION: forcing a failure. [ 200.583893][ T9277] name failslab, interval 1, probability 0, space 0, times 0 21:40:24 executing program 1: bpf$BPF_BTF_LOAD(0xd, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:24 executing program 4: prctl$PR_GET_TSC(0x19, &(0x7f0000000040)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.stat\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0x2, 0x7fff, 0x3f, 0x0, r0, 0x4, [], 0x0, 0xffffffffffffffff, 0x5}, 0xffffffffffffff2c) lseek(r1, 0x2a, 0x1) [ 200.685744][ T9277] CPU: 1 PID: 9277 Comm: syz-executor.3 Not tainted 5.2.0-rc5+ #4 [ 200.693594][ T9277] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 200.703747][ T9277] Call Trace: [ 200.707222][ T9277] dump_stack+0x1d8/0x2f8 [ 200.711575][ T9277] should_fail+0x608/0x860 [ 200.716016][ T9277] ? setup_fault_attr+0x2b0/0x2b0 [ 200.721080][ T9277] __should_failslab+0x11a/0x160 [ 200.726038][ T9277] ? vm_area_alloc+0x24/0xf0 [ 200.730631][ T9277] should_failslab+0x9/0x20 [ 200.735151][ T9277] kmem_cache_alloc+0x56/0x2b0 [ 200.739930][ T9277] vm_area_alloc+0x24/0xf0 [ 200.744355][ T9277] __do_execve_file+0xa12/0x1cd0 [ 200.749306][ T9277] ? __check_object_size+0x314/0x400 [ 200.754604][ T9277] ? do_execve_file+0x40/0x40 [ 200.759282][ T9277] ? getname_flags+0x214/0x640 [ 200.759300][ T9277] __x64_sys_execve+0x94/0xb0 [ 200.759315][ T9277] do_syscall_64+0xfe/0x140 [ 200.759330][ T9277] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 200.759340][ T9277] RIP: 0033:0x4592c9 [ 200.759354][ T9277] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 200.773274][ T9277] RSP: 002b:00007f26e9d09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 200.811043][ T9277] RAX: ffffffffffffffda RBX: 00007f26e9d09c90 RCX: 00000000004592c9 [ 200.819020][ T9277] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 200.826990][ T9277] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 21:40:24 executing program 5: bpf$BPF_BTF_LOAD(0x2, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:24 executing program 0: r0 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x3, 0x2) sendmsg$nl_xfrm(r0, 0x0, 0x5) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) readv(r1, &(0x7f0000000800)=[{&(0x7f0000000140)=""/88, 0xffffffffffffff50}], 0x10000000000000b7) socket$inet_udplite(0x2, 0x2, 0x88) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) bind$rds(r2, 0x0, 0x0) perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="070000e8ff00"/24], 0x18}, 0x0) r3 = open(&(0x7f00009e1000)='./file1\x00', 0x0, 0x0) r4 = openat$vnet(0xffffffffffffff9c, &(0x7f0000001740)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r4, 0x40000000af01, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x80, 0x0) ioctl$KVM_HYPERV_EVENTFD(r0, 0x4018aebd, &(0x7f00000000c0)={0x4, r3}) ioctl$VIDIOC_STREAMON(r0, 0x40045612, &(0x7f0000000100)=0x7) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000640)='cgroup.type\x00', 0x2, 0x0) 21:40:24 executing program 1: bpf$BPF_BTF_LOAD(0xe, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:24 executing program 5: bpf$BPF_BTF_LOAD(0x3, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) [ 200.834965][ T9277] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f26e9d0a6d4 [ 200.842941][ T9277] R13: 00000000004bf96d R14: 00000000004d1250 R15: 0000000000000003 21:40:24 executing program 4: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x40001000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") getsockopt$nfc_llcp(r0, 0x118, 0x2, &(0x7f0000000100)=""/149, 0x95) 21:40:27 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x4600, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', r1, &(0x7f0000000080)='./file0\x00') sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:40:27 executing program 3 (fault-call:3 fault-nth:15): mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 21:40:27 executing program 1: bpf$BPF_BTF_LOAD(0xf, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:27 executing program 0: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x3e, &(0x7f0000000000)=0x9, 0x4) r1 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x3, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f00000000c0)={0x0, 0xfe}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000140)={r2, @in6={{0xa, 0x4e21, 0x7, @local, 0x4}}, 0x5, 0x0, 0x100000000, 0x100, 0x2}, &(0x7f0000000280)=0x98) bind$llc(r0, &(0x7f0000000040), 0x10) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f00000002c0)) sendmmsg(r0, &(0x7f00000001c0), 0x40000000000021a, 0x0) 21:40:27 executing program 4: r0 = syz_open_dev$media(&(0x7f0000000280)='/dev/media#\x00', 0x4, 0x0) r1 = openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000100)={{{@in6=@remote, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) ioctl$HCIINQUIRY(r1, 0x800448f0, &(0x7f0000000200)={r2, 0x7ff, 0x3, 0x401, 0x5, 0x8, 0x8001}) mknod$loop(&(0x7f00000002c0)='./file0\x00', 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='cpuset\x00', 0x0, 0x0) 21:40:27 executing program 5: bpf$BPF_BTF_LOAD(0x4, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) [ 203.569028][ T9329] FAULT_INJECTION: forcing a failure. [ 203.569028][ T9329] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 203.590911][ T9329] CPU: 0 PID: 9329 Comm: syz-executor.3 Not tainted 5.2.0-rc5+ #4 [ 203.598752][ T9329] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 203.608816][ T9329] Call Trace: [ 203.608837][ T9329] dump_stack+0x1d8/0x2f8 [ 203.608853][ T9329] should_fail+0x608/0x860 [ 203.608868][ T9329] ? setup_fault_attr+0x2b0/0x2b0 [ 203.608888][ T9329] should_fail_alloc_page+0x55/0x60 [ 203.608899][ T9329] prepare_alloc_pages+0x283/0x460 [ 203.608915][ T9329] __alloc_pages_nodemask+0x11c/0x790 [ 203.608938][ T9329] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 203.616581][ T9329] ? rcu_lock_release+0xd/0x30 [ 203.616619][ T9329] alloc_pages_current+0x2fb/0x540 [ 203.657101][ T9329] get_zeroed_page+0x17/0x40 [ 203.661694][ T9329] __pud_alloc+0x37/0x210 21:40:27 executing program 5: bpf$BPF_BTF_LOAD(0x5, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:27 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x400000, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0xffffffffffffffff, 0x0) ioctl$KVM_GET_IRQCHIP(r1, 0xc208ae62, &(0x7f0000000140)) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x403, 0xc040) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f00000000c0)={0x7d, 0x2, [0x40000102], [0xc1]}) [ 203.666031][ T9329] handle_mm_fault+0x2aa0/0x6130 [ 203.670989][ T9329] ? finish_fault+0x220/0x220 [ 203.675678][ T9329] ? ext4_readpage+0x136/0x170 [ 203.680463][ T9329] __get_user_pages+0x1096/0x1710 [ 203.685512][ T9329] ? populate_vma_page_range+0x250/0x250 [ 203.691162][ T9329] get_user_pages_remote+0xdb/0x4b0 [ 203.696370][ T9329] ? vfs_read+0x2aa/0x3c0 [ 203.700710][ T9329] ? strnlen_user+0x1e0/0x260 [ 203.705390][ T9329] copy_strings+0x447/0x7e0 [ 203.709893][ T9329] ? kernel_read+0x96/0xd0 [ 203.709915][ T9329] ? copy_strings_kernel+0xd0/0xd0 [ 203.709927][ T9329] ? kasan_check_write+0x14/0x20 [ 203.709936][ T9329] ? count+0x1fb/0x260 [ 203.709945][ T9329] ? up_write+0xb0/0x1b0 [ 203.709958][ T9329] __do_execve_file+0x1173/0x1cd0 [ 203.709982][ T9329] ? do_execve_file+0x40/0x40 [ 203.709997][ T9329] ? getname_flags+0x214/0x640 [ 203.742439][ T9329] __x64_sys_execve+0x94/0xb0 [ 203.742457][ T9329] do_syscall_64+0xfe/0x140 [ 203.742479][ T9329] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 203.762534][ T9329] RIP: 0033:0x4592c9 [ 203.766430][ T9329] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 203.786132][ T9329] RSP: 002b:00007f26e9d09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 203.786144][ T9329] RAX: ffffffffffffffda RBX: 00007f26e9d09c90 RCX: 00000000004592c9 [ 203.786150][ T9329] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 203.786157][ T9329] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 21:40:27 executing program 1: bpf$BPF_BTF_LOAD(0x10, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:27 executing program 1: bpf$BPF_BTF_LOAD(0x11, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) [ 203.786163][ T9329] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f26e9d0a6d4 [ 203.786169][ T9329] R13: 00000000004bf96d R14: 00000000004d1250 R15: 0000000000000003 [ 203.840910][ T9339] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.2'. 21:40:27 executing program 5: bpf$BPF_BTF_LOAD(0x6, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_buf(r0, 0x0, 0x2f, 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x10000) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000000140)={0x0, 0x9c2, &(0x7f0000000040)="5040416a96b9473f888c134b717e2e219832c60c1313475e33cd89e0eed8864e4dfbf20e9f0245fe8cf32ac8b4dc8e2abb542dfa0cec19a81d2ca4dbb65db6c608ee65655c35726984ab6f535de29a01f578ee47eb24fa55f81c609d8ad27df098f352d7c5543d2d5d1f2e56bdf22091c260ab1040f2d61dedbd25d4ac7b3f43411839ea5d82a728cea9cace7c6810325ff8da4f", &(0x7f0000000100)="cc679cf266e52060db1cce586a1eb03b86", 0x94, 0x11}) 21:40:27 executing program 2: r0 = memfd_create(&(0x7f0000000100)='-vmnet0\',^]$\x00', 0x0) dup2(0xffffffffffffffff, r0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0xc0505350, &(0x7f0000000340)={0x23e}) [ 203.892542][ T9339] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:40:27 executing program 3 (fault-call:3 fault-nth:16): mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 21:40:27 executing program 1: bpf$BPF_BTF_LOAD(0x13, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) [ 204.095036][ T9363] FAULT_INJECTION: forcing a failure. [ 204.095036][ T9363] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 204.178232][ T9363] CPU: 0 PID: 9363 Comm: syz-executor.3 Not tainted 5.2.0-rc5+ #4 [ 204.186083][ T9363] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 204.196143][ T9363] Call Trace: [ 204.199456][ T9363] dump_stack+0x1d8/0x2f8 [ 204.203797][ T9363] should_fail+0x608/0x860 [ 204.208223][ T9363] ? setup_fault_attr+0x2b0/0x2b0 [ 204.213263][ T9363] should_fail_alloc_page+0x55/0x60 [ 204.218471][ T9363] prepare_alloc_pages+0x283/0x460 [ 204.223595][ T9363] __alloc_pages_nodemask+0x11c/0x790 [ 204.228981][ T9363] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 204.234546][ T9363] alloc_pages_current+0x2fb/0x540 [ 204.239667][ T9363] __pmd_alloc+0x39/0x3d0 [ 204.244014][ T9363] handle_mm_fault+0x3115/0x6130 [ 204.248972][ T9363] ? finish_fault+0x220/0x220 [ 204.253655][ T9363] ? ext4_readpage+0x136/0x170 [ 204.258441][ T9363] __get_user_pages+0x1096/0x1710 [ 204.263486][ T9363] ? populate_vma_page_range+0x250/0x250 [ 204.269143][ T9363] get_user_pages_remote+0xdb/0x4b0 [ 204.274353][ T9363] ? vfs_read+0x2aa/0x3c0 21:40:27 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) write$cgroup_type(r0, &(0x7f0000000040)='threaded\x00', 0xfffffd55) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)=ANY=[@ANYBLOB="0007000000a9bb0000010000000000000000"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc020660b, 0x1ffffffd) recvmsg(0xffffffffffffffff, 0x0, 0x0) 21:40:27 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) connect$can_bcm(r0, &(0x7f00000000c0)={0x1d, r1}, 0x10) sendmsg$can_bcm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x5, 0x0, 0x0, {}, {}, {0x0, 0x0, 0x0, 0x1}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "9446e55a5555262c"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="0600001100"/16, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYBLOB="00000080010000000000000000000000b1fb1d2cecd099cf"], 0x48}}, 0x0) 21:40:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(0xffffffffffffffff, 0xc0045520, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x10000, 0x400) ioctl$KDGKBLED(r0, 0x4b64, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x8, 0x0) recvmsg(r1, 0x0, 0x40) getsockname$packet(0xffffffffffffffff, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f0000000180)='./file0\x00', 0xfffffffffffffffa, 0x67, 0x0, 0x0, 0x0) 21:40:27 executing program 1: bpf$BPF_BTF_LOAD(0x14, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:27 executing program 5: bpf$BPF_BTF_LOAD(0x7, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) [ 204.278687][ T9363] ? strnlen_user+0x1e0/0x260 [ 204.283373][ T9363] copy_strings+0x447/0x7e0 [ 204.287883][ T9363] ? kernel_read+0x96/0xd0 [ 204.292330][ T9363] ? copy_strings_kernel+0xd0/0xd0 [ 204.297451][ T9363] ? kasan_check_write+0x14/0x20 [ 204.302396][ T9363] ? count+0x1fb/0x260 [ 204.306464][ T9363] ? up_write+0xb0/0x1b0 [ 204.310711][ T9363] __do_execve_file+0x1173/0x1cd0 [ 204.310743][ T9363] ? do_execve_file+0x40/0x40 [ 204.320518][ T9363] ? getname_flags+0x214/0x640 [ 204.320533][ T9363] __x64_sys_execve+0x94/0xb0 [ 204.320548][ T9363] do_syscall_64+0xfe/0x140 [ 204.320562][ T9363] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 204.320571][ T9363] RIP: 0033:0x4592c9 [ 204.320581][ T9363] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 21:40:27 executing program 1: bpf$BPF_BTF_LOAD(0x15, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:27 executing program 5: bpf$BPF_BTF_LOAD(0x8, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) [ 204.320587][ T9363] RSP: 002b:00007f26e9d09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 204.320597][ T9363] RAX: ffffffffffffffda RBX: 00007f26e9d09c90 RCX: 00000000004592c9 [ 204.320603][ T9363] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 204.320619][ T9363] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 204.405594][ T9363] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f26e9d0a6d4 [ 204.413572][ T9363] R13: 00000000004bf96d R14: 00000000004d1250 R15: 0000000000000003 21:40:27 executing program 2: r0 = add_key$user(&(0x7f0000001200)='user\x00', &(0x7f0000002400)={'syz', 0x3}, &(0x7f0000002440)="e4", 0x1, 0xfffffffffffffffc) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f0000002540)='\x00', 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 21:40:27 executing program 3 (fault-call:3 fault-nth:17): mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 21:40:28 executing program 5: bpf$BPF_BTF_LOAD(0x9, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:28 executing program 1: bpf$BPF_BTF_LOAD(0x16, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) [ 204.638106][ T9396] FAULT_INJECTION: forcing a failure. [ 204.638106][ T9396] name failslab, interval 1, probability 0, space 0, times 0 [ 204.708243][ T9396] CPU: 0 PID: 9396 Comm: syz-executor.3 Not tainted 5.2.0-rc5+ #4 [ 204.716108][ T9396] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 204.726190][ T9396] Call Trace: [ 204.726214][ T9396] dump_stack+0x1d8/0x2f8 [ 204.726228][ T9396] should_fail+0x608/0x860 [ 204.726241][ T9396] ? setup_fault_attr+0x2b0/0x2b0 [ 204.726263][ T9396] __should_failslab+0x11a/0x160 [ 204.726277][ T9396] ? __pmd_alloc+0xbc/0x3d0 [ 204.726288][ T9396] should_failslab+0x9/0x20 [ 204.726298][ T9396] kmem_cache_alloc+0x56/0x2b0 [ 204.726314][ T9396] __pmd_alloc+0xbc/0x3d0 [ 204.726328][ T9396] handle_mm_fault+0x3115/0x6130 [ 204.726356][ T9396] ? finish_fault+0x220/0x220 [ 204.726369][ T9396] ? ext4_readpage+0x136/0x170 [ 204.726400][ T9396] __get_user_pages+0x1096/0x1710 [ 204.726428][ T9396] ? populate_vma_page_range+0x250/0x250 [ 204.726452][ T9396] get_user_pages_remote+0xdb/0x4b0 [ 204.726467][ T9396] ? vfs_read+0x2aa/0x3c0 [ 204.726476][ T9396] ? strnlen_user+0x1e0/0x260 [ 204.726491][ T9396] copy_strings+0x447/0x7e0 [ 204.726509][ T9396] ? kernel_read+0x96/0xd0 [ 204.743556][ T9396] ? copy_strings_kernel+0xd0/0xd0 [ 204.743572][ T9396] ? kasan_check_write+0x14/0x20 [ 204.786000][ T9396] ? count+0x1fb/0x260 [ 204.801135][ T9396] ? up_write+0xb0/0x1b0 [ 204.801155][ T9396] __do_execve_file+0x1173/0x1cd0 [ 204.801181][ T9396] ? do_execve_file+0x40/0x40 [ 204.842774][ T9396] ? getname_flags+0x214/0x640 [ 204.847547][ T9396] __x64_sys_execve+0x94/0xb0 [ 204.852228][ T9396] do_syscall_64+0xfe/0x140 [ 204.856736][ T9396] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 204.856747][ T9396] RIP: 0033:0x4592c9 [ 204.856764][ T9396] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 204.886142][ T9396] RSP: 002b:00007f26e9d09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 204.886153][ T9396] RAX: ffffffffffffffda RBX: 00007f26e9d09c90 RCX: 00000000004592c9 21:40:28 executing program 5: bpf$BPF_BTF_LOAD(0xa, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) [ 204.886159][ T9396] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 204.886165][ T9396] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 204.886170][ T9396] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f26e9d0a6d4 [ 204.886176][ T9396] R13: 00000000004bf96d R14: 00000000004d1250 R15: 0000000000000003 21:40:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) fsetxattr$trusted_overlay_opaque(r1, &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f0000000140)='y\x00', 0x2, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) dup2(r1, r0) 21:40:28 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_smc(0x2b, 0x1, 0x0) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) sendmmsg(r0, &(0x7f0000000200), 0x40002e7, 0x0) 21:40:28 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f00000001c0)=@framed={{0xffffffb4, 0x4000, 0x7000000, 0x200000000000000, 0x0, 0x7e, 0x0, 0x20001}}, &(0x7f0000000000)='\x00\x00\x00j\xff\xff\x9b\xff\xff\xf1s\x94\x9f\xaa!\xccQ\xd7\xa9\xcc\r1\xc2\a\x8f\xf8Ov\xbd\xd2\xef\xb2\xad\x1bd/\x10\xfebn\xdc#\xee\xfcl3w\x9d\xc3\xc7\f:\x98R\x9b?\xcfDl\x93Krp\xa1Z\x11H_\x89C\xa3#N\x9dHM\x17\xa6^\x80\xed\xd2\x02=U`rw\xcbtTEP\xbd\xb4\xaf\x93\x97\xea@\xb1\xa4\xe4\xe7Y\xa1\xcf,', 0x7, 0xc3, &(0x7f00000000c0)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0xa}, 0x8, 0x10, &(0x7f0000000000)={0x0, 0x5, 0x9}, 0x10}, 0x70) r0 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x2, 0x2) write$smack_current(r0, &(0x7f0000000200)='Ntrustedtrustedcpuset\x00', 0x16) 21:40:28 executing program 3 (fault-call:3 fault-nth:18): mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 21:40:28 executing program 5: bpf$BPF_BTF_LOAD(0xb, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:28 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0xffffff1f, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:28 executing program 2: r0 = socket(0x2, 0x3, 0x100000001) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @empty}, 0x10) sendto(r0, &(0x7f0000000600)="0400", 0x2, 0x8002, 0x0, 0x0) recvfrom$packet(r0, &(0x7f0000000080)=""/34, 0x22, 0x0, 0x0, 0x0) listen(r0, 0x2) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRES64], 0x8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x82, 0x0) write$P9_RRENAMEAT(r1, &(0x7f0000000040)={0x7, 0x4b, 0x2}, 0x7) 21:40:28 executing program 5: bpf$BPF_BTF_LOAD(0xc, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) [ 205.230889][ T9419] FAULT_INJECTION: forcing a failure. [ 205.230889][ T9419] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 205.309086][ T9419] CPU: 0 PID: 9419 Comm: syz-executor.3 Not tainted 5.2.0-rc5+ #4 [ 205.316946][ T9419] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 205.327014][ T9419] Call Trace: [ 205.330358][ T9419] dump_stack+0x1d8/0x2f8 [ 205.334704][ T9419] should_fail+0x608/0x860 [ 205.339139][ T9419] ? setup_fault_attr+0x2b0/0x2b0 [ 205.344187][ T9419] should_fail_alloc_page+0x55/0x60 [ 205.349395][ T9419] prepare_alloc_pages+0x283/0x460 21:40:28 executing program 5: bpf$BPF_BTF_LOAD(0xd, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:28 executing program 5: bpf$BPF_BTF_LOAD(0xe, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) [ 205.354510][ T9419] __alloc_pages_nodemask+0x11c/0x790 [ 205.359891][ T9419] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 205.365448][ T9419] ? kasan_check_write+0x14/0x20 [ 205.370388][ T9419] ? do_raw_spin_lock+0x143/0x3a0 [ 205.375462][ T9419] alloc_pages_current+0x2fb/0x540 [ 205.380588][ T9419] pte_alloc_one+0x1f/0x180 [ 205.385176][ T9419] __pte_alloc+0x20/0x2f0 [ 205.389507][ T9419] handle_mm_fault+0x5529/0x6130 [ 205.394460][ T9419] ? finish_fault+0x220/0x220 [ 205.399144][ T9419] ? ext4_readpage+0x136/0x170 [ 205.403935][ T9419] __get_user_pages+0x1096/0x1710 21:40:28 executing program 5: bpf$BPF_BTF_LOAD(0xf, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) [ 205.408993][ T9419] ? populate_vma_page_range+0x250/0x250 [ 205.414670][ T9419] get_user_pages_remote+0xdb/0x4b0 [ 205.419887][ T9419] ? vfs_read+0x2aa/0x3c0 [ 205.424229][ T9419] ? strnlen_user+0x1e0/0x260 [ 205.428912][ T9419] copy_strings+0x447/0x7e0 [ 205.433419][ T9419] ? kernel_read+0x96/0xd0 [ 205.437853][ T9419] ? copy_strings_kernel+0xd0/0xd0 [ 205.442974][ T9419] ? kasan_check_write+0x14/0x20 [ 205.447918][ T9419] ? count+0x1fb/0x260 [ 205.451995][ T9419] ? up_write+0xb0/0x1b0 [ 205.456258][ T9419] __do_execve_file+0x1173/0x1cd0 [ 205.460259][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 205.461311][ T9419] ? do_execve_file+0x40/0x40 [ 205.477069][ T9419] ? getname_flags+0x214/0x640 [ 205.481843][ T9419] __x64_sys_execve+0x94/0xb0 [ 205.486517][ T9419] do_syscall_64+0xfe/0x140 [ 205.491012][ T9419] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 205.496899][ T9419] RIP: 0033:0x4592c9 [ 205.500785][ T9419] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 205.520866][ T9419] RSP: 002b:00007f26e9d09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 205.529281][ T9419] RAX: ffffffffffffffda RBX: 00007f26e9d09c90 RCX: 00000000004592c9 [ 205.537253][ T9419] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 205.545244][ T9419] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 205.553219][ T9419] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f26e9d0a6d4 [ 205.561288][ T9419] R13: 00000000004bf96d R14: 00000000004d1250 R15: 0000000000000003 21:40:29 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:29 executing program 2: ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000140)={0xf000000, 0x1, 0x0, [0x500], &(0x7f0000000000)={0xf0f002, 0x0, [], @value64}}) 21:40:29 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) fstatfs(r1, &(0x7f0000000040)=""/48) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="39000000130007606900000000000000ab0080482600000046000107000000141900010010000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) 21:40:29 executing program 5: bpf$BPF_BTF_LOAD(0x10, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:29 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x200000, 0x0) getsockname(r0, &(0x7f0000000040)=@alg, &(0x7f00000000c0)=0x80) clock_nanosleep(0x0, 0x0, 0x0, 0x0) 21:40:29 executing program 3 (fault-call:3 fault-nth:19): mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 21:40:29 executing program 5: bpf$BPF_BTF_LOAD(0x11, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) [ 205.782868][ T9459] FAULT_INJECTION: forcing a failure. [ 205.782868][ T9459] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 205.826364][ T9459] CPU: 1 PID: 9459 Comm: syz-executor.3 Not tainted 5.2.0-rc5+ #4 [ 205.834303][ T9459] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 205.844365][ T9459] Call Trace: [ 205.844387][ T9459] dump_stack+0x1d8/0x2f8 [ 205.844403][ T9459] should_fail+0x608/0x860 [ 205.844415][ T9459] ? setup_fault_attr+0x2b0/0x2b0 [ 205.844435][ T9459] should_fail_alloc_page+0x55/0x60 [ 205.844452][ T9459] prepare_alloc_pages+0x283/0x460 [ 205.871772][ T9459] __alloc_pages_nodemask+0x11c/0x790 [ 205.877157][ T9459] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 205.882708][ T9459] ? kasan_check_write+0x14/0x20 [ 205.882720][ T9459] ? do_raw_spin_lock+0x143/0x3a0 [ 205.882739][ T9459] alloc_pages_current+0x2fb/0x540 [ 205.892690][ T9459] pte_alloc_one+0x1f/0x180 [ 205.902287][ T9459] __pte_alloc+0x20/0x2f0 [ 205.906628][ T9459] handle_mm_fault+0x5529/0x6130 [ 205.906653][ T9459] ? finish_fault+0x220/0x220 [ 205.916250][ T9459] ? ext4_readpage+0x136/0x170 [ 205.921034][ T9459] __get_user_pages+0x1096/0x1710 [ 205.921067][ T9459] ? populate_vma_page_range+0x250/0x250 [ 205.921091][ T9459] get_user_pages_remote+0xdb/0x4b0 [ 205.921107][ T9459] ? vfs_read+0x2aa/0x3c0 [ 205.941259][ T9459] ? strnlen_user+0x1e0/0x260 [ 205.945933][ T9459] copy_strings+0x447/0x7e0 [ 205.950442][ T9459] ? kernel_read+0x96/0xd0 [ 205.954878][ T9459] ? copy_strings_kernel+0xd0/0xd0 [ 205.959998][ T9459] ? kasan_check_write+0x14/0x20 [ 205.964947][ T9459] ? count+0x1fb/0x260 [ 205.969136][ T9459] ? up_write+0xb0/0x1b0 [ 205.973389][ T9459] __do_execve_file+0x1173/0x1cd0 [ 205.978439][ T9459] ? do_execve_file+0x40/0x40 [ 205.983149][ T9459] ? getname_flags+0x214/0x640 [ 205.987935][ T9459] __x64_sys_execve+0x94/0xb0 [ 205.992629][ T9459] do_syscall_64+0xfe/0x140 [ 205.997148][ T9459] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 206.003041][ T9459] RIP: 0033:0x4592c9 [ 206.006936][ T9459] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 21:40:29 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x8, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:29 executing program 2: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x1, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000300)={{{@in=@dev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@dev}}, &(0x7f0000000400)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000440)={{{@in=@loopback, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@initdev}}, &(0x7f0000000540)=0xe8) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_unix(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x40400, &(0x7f0000000640)={'trans=unix,', {[{@fscache='fscache'}, {@debug={'debug', 0x3d, 0x9}}, {@cachetag={'cachetag', 0x3d, 'cbc-twofish-3way\x00'}}, {@afid={'afid', 0x3d, 0x720}}], [{@dont_appraise='dont_appraise'}, {@uid_eq={'uid', 0x3d, r2}}, {@smackfsdef={'smackfsdef', 0x3d, 'nodevcpuset'}}, {@euid_lt={'euid<', r3}}, {@fowner_eq={'fowner', 0x3d, r4}}]}}) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000140)="9cabced9e5faaa751249f0b8a18e1646", 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1f, &(0x7f0000000740)={@mcast1, r1}, 0x14) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r6 = accept$alg(r5, 0x0, 0x0) sendmsg$alg(r6, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) ioctl$UFFDIO_WAKE(r0, 0x8010aa02, &(0x7f0000000780)={&(0x7f0000ff9000/0x5000)=nil, 0x5000}) write$binfmt_script(r6, &(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRESHEX=r5, @ANYRESOCT=0x0], 0x31) syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0xfffffffffffff590, 0x0) recvmmsg(r6, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0xa7}], 0x3a0}}], 0x1, 0x0, 0x0) 21:40:29 executing program 2: r0 = socket$packet(0x11, 0x40000003, 0x300) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x7, 0x248000) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f0000000100)) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x5, &(0x7f0000000080)=[{0xffffffffffffffe0, 0x87e, 0x2, 0x7}, {0x7, 0x8, 0x54a, 0xa65}, {0x7, 0x3, 0xffffffffffffffe6, 0xfffffffb}, {0x8, 0x9, 0x3f, 0x3e85}, {0x9, 0x81, 0x4f93c10e, 0x2}]}, 0xfffffd93) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) 21:40:29 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x1a, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:29 executing program 0: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x101100, 0x0) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000100), 0x4) syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1db2, 0x0, 0x0, 0x0, 0x677, 0xfffffffffdfffffd, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0x8}, 0x0, 0xffffffffffffffff, r0, 0x0) mknod(&(0x7f0000000180)='./file0/file2\x00', 0x100, 0x5) 21:40:29 executing program 5: bpf$BPF_BTF_LOAD(0x13, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) [ 206.026543][ T9459] RSP: 002b:00007f26e9d09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 206.034979][ T9459] RAX: ffffffffffffffda RBX: 00007f26e9d09c90 RCX: 00000000004592c9 [ 206.042971][ T9459] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 206.050963][ T9459] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 206.050970][ T9459] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f26e9d0a6d4 [ 206.050976][ T9459] R13: 00000000004bf96d R14: 00000000004d1250 R15: 0000000000000003 21:40:29 executing program 3 (fault-call:3 fault-nth:20): mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 21:40:29 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) fstatfs(r1, &(0x7f0000000040)=""/48) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="39000000130007606900000000000000ab0080482600000046000107000000141900010010000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) 21:40:29 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x1a00, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:29 executing program 0: r0 = socket(0x400000000010, 0x800000000002, 0x0) recvmsg(r0, &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002700)=""/146, 0x92}, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000080)={0x0, 0x3ff}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000100)={r1, 0x81, 0x10}, &(0x7f0000000140)=0xc) setsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000040)=0x522, 0x4) write(r0, &(0x7f0000000000)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000b0000000000", 0x24) 21:40:29 executing program 2: rt_sigprocmask(0x0, &(0x7f0000000140)={0xfffffffffffffffa}, 0x0, 0x8) r0 = gettid() timer_create(0x8, &(0x7f00000000c0)={0x0, 0x32, 0x4, @tid=r0}, &(0x7f00000002c0)) timer_settime(0x0, 0x0, &(0x7f0000000300)={{0x0, 0x1}, {0x0, 0xe4c}}, 0x0) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000000000)={0xfffffffffffffdb0}, 0x8, 0x0) r2 = dup3(r1, r1, 0x80000) fchmod(r2, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r2, 0x28, 0x1, &(0x7f0000000040)=0x7, 0x8) getsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000080)={0x0, 0x95}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000200)={r3, 0x2, 0x6}, &(0x7f0000000240)=0x8) read(r1, &(0x7f0000000180)=""/128, 0x189) 21:40:29 executing program 5: bpf$BPF_BTF_LOAD(0x14, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:29 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x4000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:29 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) fstatfs(r1, &(0x7f0000000040)=""/48) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="39000000130007606900000000000000ab0080482600000046000107000000141900010010000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) 21:40:29 executing program 5: bpf$BPF_BTF_LOAD(0x15, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:29 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @rand_addr, 0x800000000000}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) r2 = dup2(r0, r1) setsockopt$IP_VS_SO_SET_FLUSH(r2, 0x0, 0x485, 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000180)={&(0x7f0000000380)={0x264, r3, 0x406, 0x70bd2d, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0x48, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fff}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_BEARER={0x154, 0x1, [@TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000000}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'rose0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}}, {0x14, 0x2, @in={0x2, 0x4e21, @multicast2}}}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffffffff8000}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x40, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xdec}}, {0x14, 0x2, @in={0x2, 0x4e23, @multicast2}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x100000000, @mcast1, 0x3}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0xfffffffffffffffa, @empty, 0x4}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x889, @rand_addr="41efef3073a7f8680412a5552f79f019", 0x9a3}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x5204, @dev={0xfe, 0x80, [], 0x19}, 0x5}}}}]}, @TIPC_NLA_NET={0x48, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x1}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x701}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x5e}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7f}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xdd6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}]}, @TIPC_NLA_BEARER={0x50, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @local}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x40, @ipv4={[], [], @rand_addr=0x2}, 0x7}}}}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffff}]}]}]}, 0x264}, 0x1, 0x0, 0x0, 0x4000044}, 0x4800) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_256={{0x304}, "502b9fdf57dcfe21", "4efcf0cd78ac0fd9d43071201668cd682130965022e378a8a5a7f1e9e3f733bb", "cb5d5d48", "03c24f2867ca3439"}, 0x38) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffff5d, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r4 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x100, 0x80) r5 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x11, r4, 0x8000000) ioctl$LOOP_SET_BLOCK_SIZE(r4, 0x4c09, 0x0) getpeername$packet(r4, &(0x7f0000000300)={0x11, 0x0, 0x0}, &(0x7f0000000340)=0x5fbe50871e38c109) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10041}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x60, r5, 0xb16, 0x70bd2c, 0xa229, {}, [@FOU_ATTR_AF={0x8, 0x2, 0x2}, @FOU_ATTR_PEER_PORT={0x8}, @FOU_ATTR_IFINDEX={0x8, 0xb, r6}, @FOU_ATTR_PEER_V4={0x8, 0x8, @remote}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @ipv4={[], [], @loopback}}, @FOU_ATTR_AF={0x8, 0x2, 0x2}, @FOU_ATTR_PEER_V4={0x8, 0x8, @rand_addr=0x8}]}, 0x60}}, 0x40000) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e21, @empty}], 0x10) 21:40:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca505021daf87391d5e0bcfec7b3e3d") r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140), 0x4) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x121000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x1f, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0xfff}, @alu={0x0, 0x5, 0x2, 0x7, 0x7, 0xfffffffffffffffe, 0x4}, @alu={0x7, 0x5, 0xf, 0xa, 0x4, 0xfffffffffffffffe}, @call={0x85, 0x0, 0x0, 0x63}]}, &(0x7f0000000040)='GPL\x00', 0x7f, 0xfc, &(0x7f0000000180)=""/252, 0x40f00, 0x0, [], 0x0, 0x2, r2, 0x8, &(0x7f0000000100)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x1, 0xa, 0x9, 0xf4f}, 0x10}, 0x70) syz_emit_ethernet(0x32, &(0x7f0000017f07)=ANY=[@ANYBLOB="ffffffffffff0180a000000008004500002400000000002f9078ac14ffaa7f000001b481880b0000000000000800000086dd080088be00000000100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0) 21:40:29 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x1000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) [ 206.607975][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 206.680539][ T9526] FAULT_INJECTION: forcing a failure. [ 206.680539][ T9526] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 206.703574][ T9526] CPU: 0 PID: 9526 Comm: syz-executor.3 Not tainted 5.2.0-rc5+ #4 [ 206.711511][ T9526] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 206.721573][ T9526] Call Trace: [ 206.724885][ T9526] dump_stack+0x1d8/0x2f8 [ 206.729223][ T9526] should_fail+0x608/0x860 [ 206.733641][ T9526] ? setup_fault_attr+0x2b0/0x2b0 [ 206.738698][ T9526] should_fail_alloc_page+0x55/0x60 [ 206.743887][ T9526] prepare_alloc_pages+0x283/0x460 [ 206.748995][ T9526] __alloc_pages_nodemask+0x11c/0x790 [ 206.754364][ T9526] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 206.759905][ T9526] ? kasan_check_write+0x14/0x20 [ 206.764853][ T9526] ? do_raw_spin_lock+0x143/0x3a0 [ 206.769885][ T9526] alloc_pages_current+0x2fb/0x540 [ 206.774991][ T9526] pte_alloc_one+0x1f/0x180 [ 206.779491][ T9526] __pte_alloc+0x20/0x2f0 [ 206.783821][ T9526] handle_mm_fault+0x5529/0x6130 [ 206.788790][ T9526] ? finish_fault+0x220/0x220 [ 206.793470][ T9526] ? ext4_readpage+0x136/0x170 [ 206.798240][ T9526] __get_user_pages+0x1096/0x1710 [ 206.803272][ T9526] ? populate_vma_page_range+0x250/0x250 [ 206.808918][ T9526] get_user_pages_remote+0xdb/0x4b0 [ 206.814218][ T9526] ? vfs_read+0x2aa/0x3c0 [ 206.818559][ T9526] ? strnlen_user+0x1e0/0x260 [ 206.823238][ T9526] copy_strings+0x447/0x7e0 [ 206.827739][ T9526] ? kernel_read+0x96/0xd0 [ 206.832171][ T9526] ? copy_strings_kernel+0xd0/0xd0 [ 206.837276][ T9526] ? kasan_check_write+0x14/0x20 [ 206.842207][ T9526] ? count+0x1fb/0x260 [ 206.846265][ T9526] ? up_write+0xb0/0x1b0 [ 206.850632][ T9526] __do_execve_file+0x1173/0x1cd0 [ 206.855662][ T9526] ? do_execve_file+0x40/0x40 [ 206.860335][ T9526] ? getname_flags+0x214/0x640 [ 206.865092][ T9526] __x64_sys_execve+0x94/0xb0 [ 206.869769][ T9526] do_syscall_64+0xfe/0x140 [ 206.874275][ T9526] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 206.880191][ T9526] RIP: 0033:0x4592c9 [ 206.884104][ T9526] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 206.903709][ T9526] RSP: 002b:00007f26e9d09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 206.912117][ T9526] RAX: ffffffffffffffda RBX: 00007f26e9d09c90 RCX: 00000000004592c9 [ 206.920092][ T9526] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 21:40:30 executing program 3 (fault-call:3 fault-nth:21): mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 21:40:30 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) fstatfs(r1, &(0x7f0000000040)=""/48) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="39000000130007606900000000000000ab0080482600000046000107000000141900010010000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) 21:40:30 executing program 5: bpf$BPF_BTF_LOAD(0x16, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:30 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x2000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca505021daf87391d5e0bcfec7b3e3d") r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140), 0x4) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x121000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x1f, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0xfff}, @alu={0x0, 0x5, 0x2, 0x7, 0x7, 0xfffffffffffffffe, 0x4}, @alu={0x7, 0x5, 0xf, 0xa, 0x4, 0xfffffffffffffffe}, @call={0x85, 0x0, 0x0, 0x63}]}, &(0x7f0000000040)='GPL\x00', 0x7f, 0xfc, &(0x7f0000000180)=""/252, 0x40f00, 0x0, [], 0x0, 0x2, r2, 0x8, &(0x7f0000000100)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x1, 0xa, 0x9, 0xf4f}, 0x10}, 0x70) syz_emit_ethernet(0x32, &(0x7f0000017f07)=ANY=[@ANYBLOB="ffffffffffff0180a000000008004500002400000000002f9078ac14ffaa7f000001b481880b0000000000000800000086dd080088be00000000100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0) [ 206.928055][ T9526] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 206.936014][ T9526] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f26e9d0a6d4 [ 206.943983][ T9526] R13: 00000000004bf96d R14: 00000000004d1250 R15: 0000000000000003 21:40:30 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:30 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x8000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca505021daf87391d5e0bcfec7b3e3d") r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140), 0x4) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x121000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x1f, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0xfff}, @alu={0x0, 0x5, 0x2, 0x7, 0x7, 0xfffffffffffffffe, 0x4}, @alu={0x7, 0x5, 0xf, 0xa, 0x4, 0xfffffffffffffffe}, @call={0x85, 0x0, 0x0, 0x63}]}, &(0x7f0000000040)='GPL\x00', 0x7f, 0xfc, &(0x7f0000000180)=""/252, 0x40f00, 0x0, [], 0x0, 0x2, r2, 0x8, &(0x7f0000000100)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x1, 0xa, 0x9, 0xf4f}, 0x10}, 0x70) syz_emit_ethernet(0x32, &(0x7f0000017f07)=ANY=[@ANYBLOB="ffffffffffff0180a000000008004500002400000000002f9078ac14ffaa7f000001b481880b0000000000000800000086dd080088be00000000100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0) 21:40:30 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0xffffff1f, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) [ 207.245448][ T9549] FAULT_INJECTION: forcing a failure. [ 207.245448][ T9549] name failslab, interval 1, probability 0, space 0, times 0 [ 207.264013][ T9549] CPU: 1 PID: 9549 Comm: syz-executor.3 Not tainted 5.2.0-rc5+ #4 [ 207.271863][ T9549] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 207.281957][ T9549] Call Trace: [ 207.285466][ T9549] dump_stack+0x1d8/0x2f8 [ 207.289908][ T9549] should_fail+0x608/0x860 [ 207.294382][ T9549] ? setup_fault_attr+0x2b0/0x2b0 [ 207.299429][ T9549] __should_failslab+0x11a/0x160 [ 207.299443][ T9549] ? __anon_vma_prepare+0xbd/0x4c0 [ 207.299452][ T9549] should_failslab+0x9/0x20 [ 207.299462][ T9549] kmem_cache_alloc+0x56/0x2b0 [ 207.299471][ T9549] ? __anon_vma_prepare+0x68/0x4c0 [ 207.299479][ T9549] ? find_mergeable_anon_vma+0x46c/0x710 [ 207.299492][ T9549] __anon_vma_prepare+0xbd/0x4c0 [ 207.299508][ T9549] ? _raw_spin_unlock+0x2c/0x50 [ 207.334427][ T9549] handle_mm_fault+0x58d2/0x6130 [ 207.334454][ T9549] ? finish_fault+0x220/0x220 [ 207.344231][ T9549] ? ext4_readpage+0x136/0x170 [ 207.344261][ T9549] __get_user_pages+0x1096/0x1710 [ 207.344290][ T9549] ? populate_vma_page_range+0x250/0x250 [ 207.353752][ T9549] get_user_pages_remote+0xdb/0x4b0 [ 207.353769][ T9549] ? vfs_read+0x2aa/0x3c0 [ 207.353784][ T9549] ? strnlen_user+0x1e0/0x260 [ 207.364437][ T9549] copy_strings+0x447/0x7e0 [ 207.364451][ T9549] ? kernel_read+0x96/0xd0 [ 207.364472][ T9549] ? copy_strings_kernel+0xd0/0xd0 [ 207.364487][ T9549] ? kasan_check_write+0x14/0x20 [ 207.373990][ T9549] ? count+0x1fb/0x260 [ 207.374002][ T9549] ? up_write+0xb0/0x1b0 [ 207.374017][ T9549] __do_execve_file+0x1173/0x1cd0 [ 207.374044][ T9549] ? do_execve_file+0x40/0x40 [ 207.383247][ T9549] ? getname_flags+0x214/0x640 [ 207.383265][ T9549] __x64_sys_execve+0x94/0xb0 [ 207.383281][ T9549] do_syscall_64+0xfe/0x140 [ 207.383297][ T9549] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 207.435516][ T9549] RIP: 0033:0x4592c9 21:40:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x4, 0x70, 0x0, 0xfffffffffffffffc, 0x3, 0x0, 0x0, 0x7f, 0x800000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x987c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x8960, 0x200000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f0000000440), 0x20, 0x0, 0x0) seccomp(0x1, 0x2, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sysfs$3(0x3) 21:40:30 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x1a000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:30 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) fstatfs(r1, &(0x7f0000000040)=""/48) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="39000000130007606900000000000000ab0080482600000046000107000000141900010010000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) [ 207.439426][ T9549] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 207.459051][ T9549] RSP: 002b:00007f26e9d09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 207.459063][ T9549] RAX: ffffffffffffffda RBX: 00007f26e9d09c90 RCX: 00000000004592c9 [ 207.459068][ T9549] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 207.459074][ T9549] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 207.459079][ T9549] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f26e9d0a6d4 [ 207.459084][ T9549] R13: 00000000004bf96d R14: 00000000004d1250 R15: 0000000000000003 [ 207.585562][ T26] audit: type=1326 audit(1561153231.037:33): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=9558 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45c10a code=0x50000 [ 207.625226][ T26] audit: type=1326 audit(1561153231.067:34): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=9558 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4592c9 code=0x50000 21:40:31 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca505021daf87391d5e0bcfec7b3e3d") r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140), 0x4) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x121000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x1f, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0xfff}, @alu={0x0, 0x5, 0x2, 0x7, 0x7, 0xfffffffffffffffe, 0x4}, @alu={0x7, 0x5, 0xf, 0xa, 0x4, 0xfffffffffffffffe}, @call={0x85, 0x0, 0x0, 0x63}]}, &(0x7f0000000040)='GPL\x00', 0x7f, 0xfc, &(0x7f0000000180)=""/252, 0x40f00, 0x0, [], 0x0, 0x2, r2, 0x8, &(0x7f0000000100)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x1, 0xa, 0x9, 0xf4f}, 0x10}, 0x70) syz_emit_ethernet(0x32, &(0x7f0000017f07)=ANY=[@ANYBLOB="ffffffffffff0180a000000008004500002400000000002f9078ac14ffaa7f000001b481880b0000000000000800000086dd080088be00000000100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0) 21:40:31 executing program 3 (fault-call:3 fault-nth:22): mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 21:40:31 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) fstatfs(r1, &(0x7f0000000040)=""/48) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="39000000130007606900000000000000ab0080482600000046000107000000141900010010000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) 21:40:31 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x40000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) [ 207.673231][ T26] audit: type=1326 audit(1561153231.067:35): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=9558 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4592c9 code=0x50000 [ 207.740375][ T26] audit: type=1326 audit(1561153231.067:36): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=9558 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4592c9 code=0x50000 [ 207.765370][ T26] audit: type=1326 audit(1561153231.067:37): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=9558 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4592c9 code=0x50000 21:40:31 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x10000000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:31 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x8, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) [ 207.792504][ T9581] FAULT_INJECTION: forcing a failure. [ 207.792504][ T9581] name failslab, interval 1, probability 0, space 0, times 0 21:40:31 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) fstatfs(r1, &(0x7f0000000040)=""/48) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="39000000130007606900000000000000ab0080482600000046000107000000141900010010000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) [ 207.866408][ T9581] CPU: 1 PID: 9581 Comm: syz-executor.3 Not tainted 5.2.0-rc5+ #4 [ 207.874284][ T9581] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 207.884341][ T9581] Call Trace: [ 207.884363][ T9581] dump_stack+0x1d8/0x2f8 [ 207.884379][ T9581] should_fail+0x608/0x860 [ 207.884398][ T9581] ? setup_fault_attr+0x2b0/0x2b0 [ 207.901424][ T9581] __should_failslab+0x11a/0x160 [ 207.906372][ T9581] ? __anon_vma_prepare+0xbd/0x4c0 [ 207.911524][ T9581] should_failslab+0x9/0x20 [ 207.916032][ T9581] kmem_cache_alloc+0x56/0x2b0 [ 207.920792][ T9581] ? __anon_vma_prepare+0x68/0x4c0 [ 207.920803][ T9581] ? find_mergeable_anon_vma+0x46c/0x710 [ 207.920815][ T9581] __anon_vma_prepare+0xbd/0x4c0 [ 207.920831][ T9581] ? _raw_spin_unlock+0x2c/0x50 [ 207.941341][ T9581] handle_mm_fault+0x58d2/0x6130 [ 207.946306][ T9581] ? finish_fault+0x220/0x220 [ 207.950999][ T9581] ? ext4_readpage+0x136/0x170 [ 207.955788][ T9581] __get_user_pages+0x1096/0x1710 21:40:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca505021daf87391d5e0bcfec7b3e3d") r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140), 0x4) openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x121000, 0x0) syz_emit_ethernet(0x32, &(0x7f0000017f07)=ANY=[@ANYBLOB="ffffffffffff0180a000000008004500002400000000002f9078ac14ffaa7f000001b481880b0000000000000800000086dd080088be00000000100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0) [ 207.956376][ T26] audit: type=1326 audit(1561153231.067:38): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=9558 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4592c9 code=0x50000 [ 207.960838][ T9581] ? populate_vma_page_range+0x250/0x250 [ 207.960862][ T9581] get_user_pages_remote+0xdb/0x4b0 [ 207.960878][ T9581] ? vfs_read+0x2aa/0x3c0 [ 207.960888][ T9581] ? strnlen_user+0x1e0/0x260 [ 207.960901][ T9581] copy_strings+0x447/0x7e0 [ 207.960912][ T9581] ? kernel_read+0x96/0xd0 [ 207.960937][ T9581] ? copy_strings_kernel+0xd0/0xd0 [ 207.989975][ T26] audit: type=1326 audit(1561153231.067:39): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=9558 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4592c9 code=0x50000 [ 207.992978][ T9581] ? kasan_check_write+0x14/0x20 [ 207.992990][ T9581] ? count+0x1fb/0x260 [ 207.993001][ T9581] ? up_write+0xb0/0x1b0 [ 207.993014][ T9581] __do_execve_file+0x1173/0x1cd0 [ 207.993040][ T9581] ? do_execve_file+0x40/0x40 [ 207.997929][ T26] audit: type=1326 audit(1561153231.067:40): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=9558 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4592c9 code=0x50000 [ 208.002082][ T9581] ? getname_flags+0x214/0x640 [ 208.002100][ T9581] __x64_sys_execve+0x94/0xb0 [ 208.002124][ T9581] do_syscall_64+0xfe/0x140 [ 208.002145][ T9581] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 208.006780][ T26] audit: type=1326 audit(1561153231.067:41): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=9558 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4592c9 code=0x50000 [ 208.011041][ T9581] RIP: 0033:0x4592c9 [ 208.011052][ T9581] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 208.011058][ T9581] RSP: 002b:00007f26e9d09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 208.011067][ T9581] RAX: ffffffffffffffda RBX: 00007f26e9d09c90 RCX: 00000000004592c9 21:40:31 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x3, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/keycreate\x02', 0x2, 0x0) 21:40:31 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x100000000000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:31 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x1a, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:31 executing program 3 (fault-call:3 fault-nth:23): mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 21:40:31 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x200000000000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) [ 208.011073][ T9581] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 208.011079][ T9581] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 208.011085][ T9581] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f26e9d0a6d4 [ 208.011092][ T9581] R13: 00000000004bf96d R14: 00000000004d1250 R15: 0000000000000003 [ 208.124870][ T26] audit: type=1326 audit(1561153231.067:42): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=9558 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4592c9 code=0x50000 21:40:31 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="39000000130007606900000000000000ab0080482600000046000107000000141900010010000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) 21:40:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca505021daf87391d5e0bcfec7b3e3d") r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140), 0x4) syz_emit_ethernet(0x32, &(0x7f0000017f07)=ANY=[@ANYBLOB="ffffffffffff0180a000000008004500002400000000002f9078ac14ffaa7f000001b481880b0000000000000800000086dd080088be00000000100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0) 21:40:31 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x1a00, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:31 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x800000000000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) [ 208.289825][ T9604] FAULT_INJECTION: forcing a failure. [ 208.289825][ T9604] name failslab, interval 1, probability 0, space 0, times 0 21:40:31 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x4000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) [ 208.349517][ T9604] CPU: 1 PID: 9604 Comm: syz-executor.3 Not tainted 5.2.0-rc5+ #4 [ 208.358930][ T9604] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 208.369579][ T9604] Call Trace: [ 208.372883][ T9604] dump_stack+0x1d8/0x2f8 [ 208.377230][ T9604] should_fail+0x608/0x860 [ 208.381669][ T9604] ? setup_fault_attr+0x2b0/0x2b0 [ 208.386709][ T9604] __should_failslab+0x11a/0x160 [ 208.391654][ T9604] should_failslab+0x9/0x20 [ 208.396159][ T9604] kmem_cache_alloc_trace+0x5d/0x2c0 [ 208.401455][ T9604] ? tomoyo_find_next_domain+0x141/0x1dc0 [ 208.407183][ T9604] tomoyo_find_next_domain+0x141/0x1dc0 [ 208.412758][ T9604] ? trace_lock_acquire+0x190/0x190 [ 208.417957][ T9604] ? trace_lock_acquire+0x11c/0x190 [ 208.423311][ T9604] ? tomoyo_assign_domain+0x7c0/0x7c0 [ 208.428705][ T9604] ? lock_acquire+0x158/0x250 [ 208.433392][ T9604] ? rcu_lock_acquire+0x9/0x40 [ 208.438170][ T9604] tomoyo_bprm_check_security+0xe3/0x130 [ 208.443815][ T9604] security_bprm_check+0x55/0xb0 21:40:31 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x1000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) [ 208.448768][ T9604] search_binary_handler+0x6a/0x660 [ 208.453966][ T9604] ? rcu_lock_release+0x9/0x30 [ 208.458749][ T9604] __do_execve_file+0x1601/0x1cd0 [ 208.463799][ T9604] ? do_execve_file+0x40/0x40 [ 208.468480][ T9604] ? getname_flags+0x214/0x640 [ 208.473262][ T9604] __x64_sys_execve+0x94/0xb0 [ 208.477942][ T9604] do_syscall_64+0xfe/0x140 [ 208.477958][ T9604] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 208.477967][ T9604] RIP: 0033:0x4592c9 21:40:31 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x2000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) [ 208.477978][ T9604] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 208.477984][ T9604] RSP: 002b:00007f26e9d09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 208.478000][ T9604] RAX: ffffffffffffffda RBX: 00007f26e9d09c90 RCX: 00000000004592c9 [ 208.520253][ T9604] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 208.536225][ T9604] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 208.544202][ T9604] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f26e9d0a6d4 [ 208.544209][ T9604] R13: 00000000004bf96d R14: 00000000004d1250 R15: 0000000000000003 21:40:32 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000c80)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) close(0xffffffffffffffff) r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0xbdc, 0x1) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x6) 21:40:32 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x1a00000000000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca505021daf87391d5e0bcfec7b3e3d") socket$packet(0x11, 0x2, 0x300) syz_emit_ethernet(0x32, &(0x7f0000017f07)=ANY=[@ANYBLOB="ffffffffffff0180a000000008004500002400000000002f9078ac14ffaa7f000001b481880b0000000000000800000086dd080088be00000000100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0) 21:40:32 executing program 3 (fault-call:3 fault-nth:24): mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 21:40:32 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="39000000130007606900000000000000ab0080482600000046000107000000141900010010000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) 21:40:32 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x8000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:32 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x4000000000000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:32 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="39000000130007606900000000000000ab0080482600000046000107000000141900010010000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) 21:40:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca505021daf87391d5e0bcfec7b3e3d") socket$packet(0x11, 0x2, 0x300) syz_emit_ethernet(0x32, &(0x7f0000017f07)=ANY=[@ANYBLOB="ffffffffffff0180a000000008004500002400000000002f9078ac14ffaa7f000001b481880b0000000000000800000086dd080088be00000000100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0) 21:40:32 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x1a000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:32 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0xffffffff00000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:32 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="39000000130007606900000000000000ab0080482600000046000107000000141900010010000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) 21:40:32 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x40000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:32 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0xc, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:32 executing program 0: ioctl$UI_GET_VERSION(0xffffffffffffffff, 0x400c55cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x200, 0x0) getsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r4 = accept4(r0, 0x0, 0x0, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r3, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r5, 0x0, 0x70bd2b, 0x25dfdbfe, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x801) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) close(r4) [ 209.169227][ T9670] FAULT_INJECTION: forcing a failure. [ 209.169227][ T9670] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 209.182471][ T9670] CPU: 1 PID: 9670 Comm: syz-executor.3 Not tainted 5.2.0-rc5+ #4 [ 209.190257][ T9670] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 209.200311][ T9670] Call Trace: [ 209.203598][ T9670] dump_stack+0x1d8/0x2f8 [ 209.207927][ T9670] should_fail+0x608/0x860 [ 209.212326][ T9670] ? setup_fault_attr+0x2b0/0x2b0 [ 209.217351][ T9670] ? kasan_check_read+0x11/0x20 [ 209.222206][ T9670] should_fail_alloc_page+0x55/0x60 [ 209.227472][ T9670] prepare_alloc_pages+0x283/0x460 [ 209.232627][ T9670] __alloc_pages_nodemask+0x11c/0x790 [ 209.238004][ T9670] ? search_binary_handler+0x6a/0x660 [ 209.243375][ T9670] ? __do_execve_file+0x1601/0x1cd0 [ 209.249719][ T9670] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 209.255784][ T9670] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 209.261323][ T9670] ? __bfs+0x550/0x550 [ 209.265411][ T9670] kmem_getpages+0x46/0x480 [ 209.269908][ T9670] cache_grow_begin+0x7e/0x2c0 [ 209.274693][ T9670] cache_alloc_refill+0x311/0x3f0 [ 209.279710][ T9670] ? check_preemption_disabled+0xb7/0x280 [ 209.285423][ T9670] kmem_cache_alloc_trace+0x29f/0x2c0 [ 209.290779][ T9670] ? tomoyo_find_next_domain+0x141/0x1dc0 [ 209.296477][ T9670] tomoyo_find_next_domain+0x141/0x1dc0 [ 209.302009][ T9670] ? trace_lock_acquire+0x190/0x190 [ 209.307201][ T9670] ? trace_lock_acquire+0x11c/0x190 [ 209.312382][ T9670] ? tomoyo_assign_domain+0x7c0/0x7c0 [ 209.317735][ T9670] ? lock_acquire+0x158/0x250 [ 209.322392][ T9670] ? rcu_lock_acquire+0x9/0x40 [ 209.327155][ T9670] tomoyo_bprm_check_security+0xe3/0x130 [ 209.332863][ T9670] security_bprm_check+0x55/0xb0 [ 209.337787][ T9670] search_binary_handler+0x6a/0x660 [ 209.342987][ T9670] ? rcu_lock_release+0x9/0x30 [ 209.347738][ T9670] __do_execve_file+0x1601/0x1cd0 [ 209.352770][ T9670] ? do_execve_file+0x40/0x40 [ 209.357427][ T9670] ? getname_flags+0x214/0x640 [ 209.362178][ T9670] __x64_sys_execve+0x94/0xb0 [ 209.366866][ T9670] do_syscall_64+0xfe/0x140 [ 209.371356][ T9670] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 209.377314][ T9670] RIP: 0033:0x4592c9 [ 209.381213][ T9670] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 209.400828][ T9670] RSP: 002b:00007f26e9d09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 209.409432][ T9670] RAX: ffffffffffffffda RBX: 00007f26e9d09c90 RCX: 00000000004592c9 [ 209.417393][ T9670] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 209.425355][ T9670] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 209.433310][ T9670] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f26e9d0a6d4 [ 209.441265][ T9670] R13: 00000000004bf96d R14: 00000000004d1250 R15: 0000000000000003 21:40:32 executing program 3 (fault-call:3 fault-nth:25): mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 21:40:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca505021daf87391d5e0bcfec7b3e3d") socket$packet(0x11, 0x2, 0x300) syz_emit_ethernet(0x32, &(0x7f0000017f07)=ANY=[@ANYBLOB="ffffffffffff0180a000000008004500002400000000002f9078ac14ffaa7f000001b481880b0000000000000800000086dd080088be00000000100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0) 21:40:32 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x10000000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:32 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x1a, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:32 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000040)=""/48) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="39000000130007606900000000000000ab0080482600000046000107000000141900010010000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) 21:40:33 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x100000000000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:33 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x32, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca505021daf87391d5e0bcfec7b3e3d") setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000140), 0x4) syz_emit_ethernet(0x32, &(0x7f0000017f07)=ANY=[@ANYBLOB="ffffffffffff0180a000000008004500002400000000002f9078ac14ffaa7f000001b481880b0000000000000800000086dd080088be00000000100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0) [ 209.635030][ T9685] FAULT_INJECTION: forcing a failure. [ 209.635030][ T9685] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 209.648286][ T9685] CPU: 1 PID: 9685 Comm: syz-executor.3 Not tainted 5.2.0-rc5+ #4 [ 209.648294][ T9685] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 209.648298][ T9685] Call Trace: [ 209.648318][ T9685] dump_stack+0x1d8/0x2f8 [ 209.648335][ T9685] should_fail+0x608/0x860 [ 209.648349][ T9685] ? setup_fault_attr+0x2b0/0x2b0 [ 209.648364][ T9685] ? kasan_check_read+0x11/0x20 [ 209.648381][ T9685] should_fail_alloc_page+0x55/0x60 [ 209.648392][ T9685] prepare_alloc_pages+0x283/0x460 [ 209.648407][ T9685] __alloc_pages_nodemask+0x11c/0x790 [ 209.648419][ T9685] ? search_binary_handler+0x6a/0x660 [ 209.648430][ T9685] ? __do_execve_file+0x1601/0x1cd0 [ 209.648444][ T9685] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 209.648457][ T9685] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 209.648479][ T9685] ? __bfs+0x550/0x550 [ 209.648493][ T9685] kmem_getpages+0x46/0x480 [ 209.648505][ T9685] cache_grow_begin+0x7e/0x2c0 [ 209.648521][ T9685] cache_alloc_refill+0x311/0x3f0 [ 209.648532][ T9685] ? check_preemption_disabled+0xb7/0x280 [ 209.648547][ T9685] kmem_cache_alloc_trace+0x29f/0x2c0 [ 209.648558][ T9685] ? tomoyo_find_next_domain+0x141/0x1dc0 [ 209.648580][ T9685] tomoyo_find_next_domain+0x141/0x1dc0 [ 209.674092][ T9685] ? trace_lock_acquire+0x190/0x190 [ 209.674106][ T9685] ? trace_lock_acquire+0x11c/0x190 [ 209.674127][ T9685] ? tomoyo_assign_domain+0x7c0/0x7c0 21:40:33 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x200000000000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) [ 209.674136][ T9685] ? lock_acquire+0x158/0x250 [ 209.674146][ T9685] ? rcu_lock_acquire+0x9/0x40 [ 209.674165][ T9685] tomoyo_bprm_check_security+0xe3/0x130 [ 209.683613][ T9685] security_bprm_check+0x55/0xb0 [ 209.683629][ T9685] search_binary_handler+0x6a/0x660 [ 209.683641][ T9685] ? rcu_lock_release+0x9/0x30 [ 209.683660][ T9685] __do_execve_file+0x1601/0x1cd0 [ 209.683693][ T9685] ? do_execve_file+0x40/0x40 [ 209.693730][ T9685] ? getname_flags+0x214/0x640 [ 209.693748][ T9685] __x64_sys_execve+0x94/0xb0 [ 209.693764][ T9685] do_syscall_64+0xfe/0x140 [ 209.693780][ T9685] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 209.693790][ T9685] RIP: 0033:0x4592c9 [ 209.693809][ T9685] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 209.803208][ T9685] RSP: 002b:00007f26e9d09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 209.803220][ T9685] RAX: ffffffffffffffda RBX: 00007f26e9d09c90 RCX: 00000000004592c9 21:40:33 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:33 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x800000000000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) [ 209.803227][ T9685] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 209.803234][ T9685] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 209.803241][ T9685] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f26e9d0a6d4 [ 209.803247][ T9685] R13: 00000000004bf96d R14: 00000000004d1250 R15: 0000000000000003 21:40:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca505021daf87391d5e0bcfec7b3e3d") setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000140), 0x4) syz_emit_ethernet(0x32, &(0x7f0000017f07)=ANY=[@ANYBLOB="ffffffffffff0180a000000008004500002400000000002f9078ac14ffaa7f000001b481880b0000000000000800000086dd080088be00000000100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0) 21:40:33 executing program 3 (fault-call:3 fault-nth:26): mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 21:40:33 executing program 4: fstatfs(0xffffffffffffffff, &(0x7f0000000040)=""/48) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000240)="39000000130007606900000000000000ab0080482600000046000107000000141900010010000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) 21:40:33 executing program 0: r0 = add_key$keyring(&(0x7f0000000bc0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000240)='cifs.idmap\x00', 0x0) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) r2 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x8, 0x101000) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000040)={0x401}) stat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getegid() write$FUSE_ENTRY(r2, &(0x7f0000000b00)={0x90, 0x0, 0x1, {0x3, 0x1, 0x7ff, 0x9, 0x3, 0x4, {0x1, 0x81, 0x9910000, 0x4, 0x7fff, 0x8, 0x100000001, 0xfffffffffffffff9, 0x3, 0x4, 0x100, r3, r4, 0xfffffffffffffffe, 0x2}}}, 0x90) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000280)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e00000004000000c80400009002000090020000200100002001000020010000f8030000f8030000f8030000f8030000f803000004000000", @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="0000000000000000000006000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000077ad0297e8ff4a12ed5afb8f2ca889e4a607a399bcce2356243a85299a14059c99d62f91e0f7c6b00ad6eb1765aaeff88a5aad7e95eed0704f8aa31e0d794ff5bfdb3ccdd8ce47dbed7650de95b1872d4d2a246f390b70e64e9dcc76e787fb05aa576fca82d6f9a364894d40186e451930067f8712f93a6b71c3d4d4948323a03b7366d60ba59b6aa24fd9aabfdb6172b70a195e470000"], @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0002001000000000000000000000000000000000000000000000000280069707636686561646572000000000000000000000000000000000000000080080000000000003000434f4e4e4d41524b00000000000000000000000000000000000000000001030000000200000000000100010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000048017001000000000000000000000000000000000000000000000000480068626800000000000000000000000000000000000000000000000000000003000000040106000600e374040003000008ff010010010000800300030001000300030001000300380074696d65000000000000000000000000000000000000000000000000000000000000ef8d0000241b0100fc40010005000000ff0100002800434c415353494659000000000000000000000000000000000000000000000100000000000000fe8000000000000000000000000000bbfe8000000000000000000000000000aaff000000ff000000000000ffffffffff00000000ffffff00ffffff00ffffffff76657468305f746f5f7465616d0000006e72300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005e0004020100000000000000000000000000000038016801000000000000000000000000000000000000000000000000280069636d7036000000000000000000000000000000000000000000000000000300ff00000000004800647374000000000000000000000000000000000000000000000000000000070000000201ff7f08003f0003000001070000000800ccca050009000300030003000900d00d0700300053455400000000000000000000000000000000000000000000000000000200000215030003ff1b0a0000310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x528) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000100)={r5, @in6={{0xa, 0x4e21, 0x0, @loopback}}, 0x0, 0x0, 0x0, 0x0, 0xa}, 0x98) 21:40:33 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x8, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:33 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x1a00000000000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca505021daf87391d5e0bcfec7b3e3d") setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000140), 0x4) syz_emit_ethernet(0x32, &(0x7f0000017f07)=ANY=[@ANYBLOB="ffffffffffff0180a000000008004500002400000000002f9078ac14ffaa7f000001b481880b0000000000000800000086dd080088be00000000100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0) 21:40:33 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x1a, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:33 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x4000000000000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:33 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x0, 0x4, 0x0, 0xb0, 0xffffffffffffff9c, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}, 0x3c) 21:40:33 executing program 4: fstatfs(0xffffffffffffffff, &(0x7f0000000040)=""/48) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000240)="39000000130007606900000000000000ab0080482600000046000107000000141900010010000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) [ 210.211324][ T9728] FAULT_INJECTION: forcing a failure. [ 210.211324][ T9728] name failslab, interval 1, probability 0, space 0, times 0 [ 210.315934][ T9728] CPU: 1 PID: 9728 Comm: syz-executor.3 Not tainted 5.2.0-rc5+ #4 [ 210.323800][ T9728] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 210.333862][ T9728] Call Trace: [ 210.337170][ T9728] dump_stack+0x1d8/0x2f8 [ 210.341515][ T9728] should_fail+0x608/0x860 [ 210.345950][ T9728] ? setup_fault_attr+0x2b0/0x2b0 [ 210.350993][ T9728] ? tomoyo_encode2+0x273/0x5a0 [ 210.357393][ T9728] __should_failslab+0x11a/0x160 [ 210.362341][ T9728] ? tomoyo_encode2+0x273/0x5a0 [ 210.367204][ T9728] should_failslab+0x9/0x20 [ 210.371723][ T9728] __kmalloc+0x7a/0x310 [ 210.375891][ T9728] tomoyo_encode2+0x273/0x5a0 [ 210.380671][ T9728] tomoyo_realpath_from_path+0x769/0x7c0 [ 210.386324][ T9728] tomoyo_realpath_nofollow+0xa7/0xf0 [ 210.391723][ T9728] ? tomoyo_get_local_path+0x7b0/0x7b0 [ 210.397184][ T9728] ? tomoyo_domain+0xfe/0x160 [ 210.397197][ T9728] ? tomoyo_profile+0x11/0x50 [ 210.397208][ T9728] ? memcpy+0x49/0x60 [ 210.397217][ T9728] tomoyo_find_next_domain+0x27c/0x1dc0 21:40:33 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0xffffffff00000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:33 executing program 4: fstatfs(0xffffffffffffffff, &(0x7f0000000040)=""/48) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000240)="39000000130007606900000000000000ab0080482600000046000107000000141900010010000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) [ 210.397233][ T9728] ? trace_lock_acquire+0x190/0x190 [ 210.397246][ T9728] ? tomoyo_assign_domain+0x7c0/0x7c0 [ 210.397261][ T9728] ? lock_acquire+0x158/0x250 [ 210.431363][ T9728] ? rcu_lock_acquire+0x9/0x40 [ 210.436182][ T9728] tomoyo_bprm_check_security+0xe3/0x130 [ 210.441829][ T9728] security_bprm_check+0x55/0xb0 [ 210.446819][ T9728] search_binary_handler+0x6a/0x660 [ 210.452032][ T9728] ? rcu_lock_release+0x9/0x30 [ 210.456811][ T9728] __do_execve_file+0x1601/0x1cd0 [ 210.461870][ T9728] ? do_execve_file+0x40/0x40 [ 210.466648][ T9728] ? getname_flags+0x214/0x640 [ 210.471429][ T9728] __x64_sys_execve+0x94/0xb0 [ 210.476128][ T9728] do_syscall_64+0xfe/0x140 [ 210.480636][ T9728] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 210.486516][ T9728] RIP: 0033:0x4592c9 [ 210.490395][ T9728] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 210.510010][ T9728] RSP: 002b:00007f26e9d09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 210.518524][ T9728] RAX: ffffffffffffffda RBX: 00007f26e9d09c90 RCX: 00000000004592c9 [ 210.526492][ T9728] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 210.534461][ T9728] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 210.542417][ T9728] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f26e9d0a6d4 [ 210.550395][ T9728] R13: 00000000004bf96d R14: 00000000004d1250 R15: 0000000000000003 21:40:34 executing program 3 (fault-call:3 fault-nth:27): mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 21:40:34 executing program 0: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000040), &(0x7f00000000c0)=0x4) capset(&(0x7f0000000080)={0x19980330}, &(0x7f0000000140)) r1 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd000000100001000c0c0900fcff0000040e05a5", 0x58}], 0x1) 21:40:34 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) fstatfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="39000000130007606900000000000000ab0080482600000046000107000000141900010010000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) 21:40:34 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x1a00, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:34 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140), 0x4) syz_emit_ethernet(0x32, &(0x7f0000017f07)=ANY=[@ANYBLOB="ffffffffffff0180a000000008004500002400000000002f9078ac14ffaa7f000001b481880b0000000000000800000086dd080088be00000000100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0) [ 210.579022][ T9728] ERROR: Out of memory at tomoyo_realpath_from_path. 21:40:34 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0xc, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:34 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x4000, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) [ 210.672805][ T9754] capability: warning: `syz-executor.0' uses 32-bit capabilities (legacy support in use) 21:40:34 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x1a, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) [ 210.741161][ T9761] FAULT_INJECTION: forcing a failure. [ 210.741161][ T9761] name failslab, interval 1, probability 0, space 0, times 0 21:40:34 executing program 0: syz_emit_ethernet(0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000800450000280000000000899078ac14ffaae0000001000000005e0143eee2b08cd9b74a4dba2b90b63e5d1a3299456930525cb209fefdad10bce63a78426e8f6b66930c23c9618844958e0bc0bd09be794fa1b7407bf5d4cd82f8a3dc9a435c2b0154cc13162aeadd5b2505a3b58ddea44111bfd447ba1f80223b67130c6885ba816f343ccb3f368994bc63f5066b21f3541de288c1d847395c456ad67710cc7406c18e67e1f8cabe6d50d559d2d4508395c1c099335db857dd4bd9a00156201f443b97be015bbefd71aa43d92d9c5a27a7a8f057b99520ed6400182bb7d67eb9f2", @ANYRES32=0x42424242, @ANYRES32=0x42424242, @ANYBLOB="5000000090780000"], 0x0) 21:40:34 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140), 0x4) syz_emit_ethernet(0x32, &(0x7f0000017f07)=ANY=[@ANYBLOB="ffffffffffff0180a000000008004500002400000000002f9078ac14ffaa7f000001b481880b0000000000000800000086dd080088be00000000100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0) [ 210.835292][ T9761] CPU: 0 PID: 9761 Comm: syz-executor.3 Not tainted 5.2.0-rc5+ #4 [ 210.843151][ T9761] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 210.853310][ T9761] Call Trace: [ 210.856633][ T9761] dump_stack+0x1d8/0x2f8 [ 210.861164][ T9761] should_fail+0x608/0x860 [ 210.865593][ T9761] ? setup_fault_attr+0x2b0/0x2b0 [ 210.870640][ T9761] ? tomoyo_encode2+0x273/0x5a0 [ 210.875503][ T9761] __should_failslab+0x11a/0x160 [ 210.880446][ T9761] ? tomoyo_encode2+0x273/0x5a0 [ 210.880457][ T9761] should_failslab+0x9/0x20 [ 210.880466][ T9761] __kmalloc+0x7a/0x310 [ 210.880478][ T9761] tomoyo_encode2+0x273/0x5a0 [ 210.880492][ T9761] tomoyo_realpath_from_path+0x769/0x7c0 [ 210.880510][ T9761] tomoyo_realpath_nofollow+0xa7/0xf0 [ 210.880519][ T9761] ? tomoyo_get_local_path+0x7b0/0x7b0 [ 210.880527][ T9761] ? tomoyo_domain+0xfe/0x160 [ 210.880539][ T9761] ? tomoyo_profile+0x11/0x50 [ 210.880551][ T9761] ? memcpy+0x49/0x60 [ 210.880562][ T9761] tomoyo_find_next_domain+0x27c/0x1dc0 [ 210.880577][ T9761] ? trace_lock_acquire+0x190/0x190 [ 210.880596][ T9761] ? tomoyo_assign_domain+0x7c0/0x7c0 [ 210.894092][ T9761] ? lock_acquire+0x158/0x250 [ 210.894104][ T9761] ? rcu_lock_acquire+0x9/0x40 [ 210.894130][ T9761] tomoyo_bprm_check_security+0xe3/0x130 [ 210.959773][ T9761] security_bprm_check+0x55/0xb0 [ 210.964822][ T9761] search_binary_handler+0x6a/0x660 [ 210.970039][ T9761] ? rcu_lock_release+0x9/0x30 [ 210.974821][ T9761] __do_execve_file+0x1601/0x1cd0 [ 210.979872][ T9761] ? do_execve_file+0x40/0x40 21:40:34 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) fstatfs(0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="39000000130007606900000000000000ab0080482600000046000107000000141900010010000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) 21:40:34 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000000)={0x1f, {0xffffffffffffffff, 0x1ff, 0x3}}, 0xa) write$UHID_CREATE(r1, &(0x7f0000000140)={0x0, 'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000040)=""/67, 0x43, 0x3ff, 0xffffffff, 0x3, 0x1, 0xfff}, 0x120) write$P9_RLERRORu(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="0d00000007d900000043fc6bc359bed7fdd8f89b43e2dd286cb76ebdb003000000000000000b0ed608440a7bc0ec27d2814a96074f263017974684c1e5446076409afb2316a9f3956429d59eaad0424e670a33e91bb4430e32f782f8019637d7e8cc445b539ef334ac8e23afe43b4fdac79264b207e12c9b59713c8bf1a809afe68469c31c710f1b4ea409274773ee3245c5f8141f62dbfdeafbba038b0ee0556e0080000000000000ab4ad70763490a26c89a82eb80f4aa62463a"], 0xd) select(0x40, &(0x7f00000000c0)={0x3, 0x7c8, 0x7fffffff, 0x1000, 0xfff, 0x7, 0x45, 0xfffffffffffffff7}, &(0x7f0000000280)={0x3, 0x5, 0x1, 0x8, 0x7, 0x101, 0x7, 0xfffffffffffffffa}, &(0x7f00000002c0)={0x1, 0x3, 0x800, 0x2, 0x8, 0x9, 0x0, 0x3}, &(0x7f0000000300)) ioctl$BINDER_THREAD_EXIT(r1, 0x40046208, 0x0) bind$bt_rfcomm(r1, &(0x7f0000000100)={0x1f, {0x10000, 0xfffffffffffffffc, 0x5, 0x6, 0x8, 0x28000000000}, 0x2}, 0xa) write$P9_RXATTRCREATE(r1, &(0x7f0000000340)={0x7, 0x21, 0x1}, 0x7) [ 210.984560][ T9761] ? getname_flags+0x214/0x640 [ 210.989426][ T9761] __x64_sys_execve+0x94/0xb0 [ 210.994124][ T9761] do_syscall_64+0xfe/0x140 [ 210.998763][ T9761] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 211.004666][ T9761] RIP: 0033:0x4592c9 [ 211.008565][ T9761] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 211.028172][ T9761] RSP: 002b:00007f26e9d09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 211.036591][ T9761] RAX: ffffffffffffffda RBX: 00007f26e9d09c90 RCX: 00000000004592c9 [ 211.044581][ T9761] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 211.052570][ T9761] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 211.060549][ T9761] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f26e9d0a6d4 [ 211.068531][ T9761] R13: 00000000004bf96d R14: 00000000004d1250 R15: 0000000000000003 [ 211.116093][ T9761] ERROR: Out of memory at tomoyo_realpath_from_path. 21:40:34 executing program 3 (fault-call:3 fault-nth:28): mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 21:40:34 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x32, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:34 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x1000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x10, &(0x7f0000000000)=[@in={0x2, 0x4e20, @local}]}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f00000001c0)={r3, 0x800}, 0x8) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x800, 0x0) fallocate(r2, 0x0, 0x40000, 0xfff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, r4, 0x0, 0xa, &(0x7f0000000240)='/dev/full\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6}}, &(0x7f00000003c0)=0xe8) ioctl$SG_GET_REQUEST_TABLE(r2, 0x2286, &(0x7f0000000500)) lstat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000004c0)={r5, r6, r7}, 0xc) fallocate(r1, 0x0, 0x0, 0x5) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0x7, r2}) 21:40:34 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) fstatfs(0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="39000000130007606900000000000000ab0080482600000046000107000000141900010010000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) 21:40:34 executing program 2: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140), 0x4) syz_emit_ethernet(0x32, &(0x7f0000017f07)=ANY=[@ANYBLOB="ffffffffffff0180a000000008004500002400000000002f9078ac14ffaa7f000001b481880b0000000000000800000086dd080088be00000000100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0) 21:40:34 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x2000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:34 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) [ 211.276509][ T9796] FAULT_INJECTION: forcing a failure. [ 211.276509][ T9796] name failslab, interval 1, probability 0, space 0, times 0 21:40:34 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) fstatfs(0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="39000000130007606900000000000000ab0080482600000046000107000000141900010010000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) 21:40:34 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x8000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:34 executing program 2: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140), 0x4) syz_emit_ethernet(0x32, &(0x7f0000017f07)=ANY=[@ANYBLOB="ffffffffffff0180a000000008004500002400000000002f9078ac14ffaa7f000001b481880b0000000000000800000086dd080088be00000000100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0) 21:40:34 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x8, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) [ 211.382221][ T9796] CPU: 1 PID: 9796 Comm: syz-executor.3 Not tainted 5.2.0-rc5+ #4 [ 211.390597][ T9796] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 211.405549][ T9796] Call Trace: [ 211.405575][ T9796] dump_stack+0x1d8/0x2f8 [ 211.405590][ T9796] should_fail+0x608/0x860 [ 211.405604][ T9796] ? setup_fault_attr+0x2b0/0x2b0 [ 211.405617][ T9796] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 211.405636][ T9796] __should_failslab+0x11a/0x160 [ 211.405654][ T9796] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 211.443171][ T9796] should_failslab+0x9/0x20 [ 211.447703][ T9796] __kmalloc+0x7a/0x310 [ 211.451873][ T9796] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 211.457615][ T9796] tomoyo_realpath_from_path+0xdc/0x7c0 [ 211.463210][ T9796] tomoyo_realpath_nofollow+0xa7/0xf0 [ 211.468695][ T9796] ? tomoyo_get_local_path+0x7b0/0x7b0 [ 211.474165][ T9796] ? tomoyo_domain+0xfe/0x160 [ 211.478855][ T9796] ? tomoyo_profile+0x11/0x50 [ 211.483536][ T9796] ? memcpy+0x49/0x60 [ 211.487520][ T9796] tomoyo_find_next_domain+0x27c/0x1dc0 [ 211.493075][ T9796] ? trace_lock_acquire+0x190/0x190 [ 211.498288][ T9796] ? tomoyo_assign_domain+0x7c0/0x7c0 [ 211.498298][ T9796] ? lock_acquire+0x158/0x250 [ 211.498308][ T9796] ? rcu_lock_acquire+0x9/0x40 [ 211.498326][ T9796] tomoyo_bprm_check_security+0xe3/0x130 [ 211.508390][ T9796] security_bprm_check+0x55/0xb0 [ 211.523749][ T9796] search_binary_handler+0x6a/0x660 [ 211.528953][ T9796] ? rcu_lock_release+0x9/0x30 [ 211.533737][ T9796] __do_execve_file+0x1601/0x1cd0 [ 211.538790][ T9796] ? do_execve_file+0x40/0x40 [ 211.543473][ T9796] ? getname_flags+0x214/0x640 [ 211.548257][ T9796] __x64_sys_execve+0x94/0xb0 [ 211.552951][ T9796] do_syscall_64+0xfe/0x140 [ 211.557561][ T9796] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 211.563472][ T9796] RIP: 0033:0x4592c9 [ 211.567387][ T9796] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 211.587006][ T9796] RSP: 002b:00007f26e9d09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 211.595515][ T9796] RAX: ffffffffffffffda RBX: 00007f26e9d09c90 RCX: 00000000004592c9 [ 211.603500][ T9796] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 211.611655][ T9796] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 211.619729][ T9796] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f26e9d0a6d4 [ 211.627709][ T9796] R13: 00000000004bf96d R14: 00000000004d1250 R15: 0000000000000003 21:40:35 executing program 3 (fault-call:3 fault-nth:29): mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 21:40:35 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x1a000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:35 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x1a, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:35 executing program 2: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140), 0x4) syz_emit_ethernet(0x32, &(0x7f0000017f07)=ANY=[@ANYBLOB="ffffffffffff0180a000000008004500002400000000002f9078ac14ffaa7f000001b481880b0000000000000800000086dd080088be00000000100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0) 21:40:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000080)='.\x00', 0xfe) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x5) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000100), 0x4, {0xa, 0x4e23, 0x22fa, @ipv4={[], [], @multicast1}, 0x80000000}, r2}}, 0x38) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x4000082) write$nbd(r3, &(0x7f0000000240)={0x67446698, 0x0, 0x0, 0x0, 0x2, "6517a42ac4cb7a63d1a97a7e5a31524e892eac4023b714a3202f99f16d060a35efd21affe238385d4de98c35d691bbbf35c5601687a77cfa847ae2650ba9a951858f89ecba5a489a85"}, 0x59) sendfile(r3, r3, &(0x7f0000000200), 0xa198) 21:40:35 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) fstatfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="39000000130007606900000000000000ab0080482600000046000107000000141900010010000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) [ 211.656836][ T9796] ERROR: Out of memory at tomoyo_realpath_from_path. 21:40:35 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x1a00, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:35 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x40000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:35 executing program 2: socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000140), 0x4) syz_emit_ethernet(0x32, &(0x7f0000017f07)=ANY=[@ANYBLOB="ffffffffffff0180a000000008004500002400000000002f9078ac14ffaa7f000001b481880b0000000000000800000086dd080088be00000000100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0) [ 211.811078][ T9829] FAULT_INJECTION: forcing a failure. [ 211.811078][ T9829] name failslab, interval 1, probability 0, space 0, times 0 21:40:35 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f0000000080)={0x80, 0xffffffffffff7fff, 0x9, 0x299, 0x3, 0x4}) 21:40:35 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x10000000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) [ 211.866363][ T9829] CPU: 1 PID: 9829 Comm: syz-executor.3 Not tainted 5.2.0-rc5+ #4 [ 211.874229][ T9829] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 211.884285][ T9829] Call Trace: [ 211.887586][ T9829] dump_stack+0x1d8/0x2f8 [ 211.891922][ T9829] should_fail+0x608/0x860 [ 211.896343][ T9829] ? setup_fault_attr+0x2b0/0x2b0 [ 211.901374][ T9829] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 211.907106][ T9829] __should_failslab+0x11a/0x160 [ 211.912073][ T9829] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 211.917821][ T9829] should_failslab+0x9/0x20 [ 211.922329][ T9829] __kmalloc+0x7a/0x310 [ 211.922341][ T9829] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 211.922355][ T9829] tomoyo_realpath_from_path+0xdc/0x7c0 [ 211.922378][ T9829] tomoyo_realpath_nofollow+0xa7/0xf0 [ 211.932332][ T9829] ? tomoyo_get_local_path+0x7b0/0x7b0 [ 211.932342][ T9829] ? tomoyo_domain+0xfe/0x160 [ 211.932352][ T9829] ? tomoyo_profile+0x11/0x50 [ 211.932363][ T9829] ? memcpy+0x49/0x60 21:40:35 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x100000000000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) [ 211.932374][ T9829] tomoyo_find_next_domain+0x27c/0x1dc0 [ 211.932389][ T9829] ? trace_lock_acquire+0x190/0x190 [ 211.932404][ T9829] ? tomoyo_assign_domain+0x7c0/0x7c0 [ 211.932412][ T9829] ? lock_acquire+0x158/0x250 [ 211.932421][ T9829] ? rcu_lock_acquire+0x9/0x40 [ 211.932440][ T9829] tomoyo_bprm_check_security+0xe3/0x130 [ 211.993397][ T9829] security_bprm_check+0x55/0xb0 [ 211.998352][ T9829] search_binary_handler+0x6a/0x660 [ 212.003558][ T9829] ? rcu_lock_release+0x9/0x30 [ 212.008335][ T9829] __do_execve_file+0x1601/0x1cd0 [ 212.013382][ T9829] ? do_execve_file+0x40/0x40 [ 212.018066][ T9829] ? getname_flags+0x214/0x640 [ 212.022838][ T9829] __x64_sys_execve+0x94/0xb0 [ 212.027527][ T9829] do_syscall_64+0xfe/0x140 [ 212.032044][ T9829] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 212.037927][ T9829] RIP: 0033:0x4592c9 [ 212.041824][ T9829] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 212.061417][ T9829] RSP: 002b:00007f26e9d09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 212.069811][ T9829] RAX: ffffffffffffffda RBX: 00007f26e9d09c90 RCX: 00000000004592c9 [ 212.077763][ T9829] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 212.085805][ T9829] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 212.093781][ T9829] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f26e9d0a6d4 [ 212.101750][ T9829] R13: 00000000004bf96d R14: 00000000004d1250 R15: 0000000000000003 [ 212.131814][ T9829] ERROR: Out of memory at tomoyo_realpath_from_path. 21:40:35 executing program 3 (fault-call:3 fault-nth:30): mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 21:40:35 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x200000000000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:35 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) fstatfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="39000000130007606900000000000000ab0080482600000046000107000000141900010010000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) 21:40:35 executing program 2: socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000140), 0x4) syz_emit_ethernet(0x32, &(0x7f0000017f07)=ANY=[@ANYBLOB="ffffffffffff0180a000000008004500002400000000002f9078ac14ffaa7f000001b481880b0000000000000800000086dd080088be00000000100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0) 21:40:35 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x4000, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) statx(r1, &(0x7f0000000080)='./file0\x00', 0xdbe1311462562ddd, 0x60, &(0x7f0000000180)) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x1}], 0x10bb, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f00000000c0)={0x0, 0x833, 0x20}, &(0x7f0000000100)=0xc) setsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000280)={r3}, 0x8) r4 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs_stats_percpu\x00') preadv(r4, &(0x7f0000000480), 0x1000000000000237, 0x0) 21:40:35 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x1000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:35 executing program 2: socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000140), 0x4) syz_emit_ethernet(0x32, &(0x7f0000017f07)=ANY=[@ANYBLOB="ffffffffffff0180a000000008004500002400000000002f9078ac14ffaa7f000001b481880b0000000000000800000086dd080088be00000000100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0) [ 212.299354][ T9864] FAULT_INJECTION: forcing a failure. [ 212.299354][ T9864] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 212.312599][ T9864] CPU: 1 PID: 9864 Comm: syz-executor.3 Not tainted 5.2.0-rc5+ #4 [ 212.320408][ T9864] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 212.330468][ T9864] Call Trace: [ 212.333775][ T9864] dump_stack+0x1d8/0x2f8 21:40:35 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x800000000000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) [ 212.347757][ T9864] should_fail+0x608/0x860 [ 212.354657][ T9864] ? setup_fault_attr+0x2b0/0x2b0 [ 212.359693][ T9864] ? arch_stack_walk+0x98/0xe0 [ 212.364556][ T9864] should_fail_alloc_page+0x55/0x60 [ 212.369751][ T9864] prepare_alloc_pages+0x283/0x460 [ 212.369766][ T9864] __alloc_pages_nodemask+0x11c/0x790 [ 212.369781][ T9864] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 212.369796][ T9864] ? __kasan_kmalloc+0x178/0x1b0 [ 212.369806][ T9864] ? trace_lock_acquire+0x190/0x190 21:40:35 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x1a00000000000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) [ 212.369815][ T9864] ? __kasan_kmalloc+0x11c/0x1b0 [ 212.369822][ T9864] ? kasan_kmalloc+0x9/0x10 [ 212.369832][ T9864] ? tomoyo_find_next_domain+0x141/0x1dc0 [ 212.369842][ T9864] ? tomoyo_bprm_check_security+0xe3/0x130 [ 212.369856][ T9864] ? security_bprm_check+0x55/0xb0 [ 212.400999][ T9864] kmem_getpages+0x46/0x480 [ 212.401014][ T9864] cache_grow_begin+0x7e/0x2c0 [ 212.401028][ T9864] cache_alloc_refill+0x311/0x3f0 [ 212.401045][ T9864] ? check_preemption_disabled+0xb7/0x280 [ 212.411470][ T9864] kmem_cache_alloc+0x288/0x2b0 21:40:35 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x4000000000000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) [ 212.447301][ T9864] ? getname_kernel+0x59/0x2f0 [ 212.452189][ T9864] getname_kernel+0x59/0x2f0 [ 212.456787][ T9864] kern_path+0x1f/0x40 [ 212.460871][ T9864] tomoyo_realpath_nofollow+0x79/0xf0 [ 212.466254][ T9864] ? tomoyo_get_local_path+0x7b0/0x7b0 [ 212.471817][ T9864] ? tomoyo_domain+0xfe/0x160 [ 212.476502][ T9864] ? tomoyo_init_request_info+0x3c/0x2c0 [ 212.482156][ T9864] ? tomoyo_profile+0x11/0x50 [ 212.486934][ T9864] ? memcpy+0x49/0x60 [ 212.490930][ T9864] tomoyo_find_next_domain+0x27c/0x1dc0 21:40:35 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0xffffffff00000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:36 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x2000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) [ 212.496488][ T9864] ? trace_lock_acquire+0x190/0x190 [ 212.501707][ T9864] ? tomoyo_assign_domain+0x7c0/0x7c0 [ 212.507121][ T9864] ? lock_acquire+0x158/0x250 [ 212.511806][ T9864] ? rcu_lock_acquire+0x9/0x40 [ 212.516589][ T9864] tomoyo_bprm_check_security+0xe3/0x130 [ 212.522231][ T9864] security_bprm_check+0x55/0xb0 [ 212.527184][ T9864] search_binary_handler+0x6a/0x660 [ 212.532406][ T9864] ? rcu_lock_release+0x9/0x30 [ 212.537277][ T9864] __do_execve_file+0x1601/0x1cd0 [ 212.542339][ T9864] ? do_execve_file+0x40/0x40 [ 212.547018][ T9864] ? getname_flags+0x214/0x640 [ 212.551793][ T9864] __x64_sys_execve+0x94/0xb0 [ 212.551809][ T9864] do_syscall_64+0xfe/0x140 [ 212.551824][ T9864] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 212.551834][ T9864] RIP: 0033:0x4592c9 [ 212.551850][ T9864] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 212.590492][ T9864] RSP: 002b:00007f26e9d09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 212.599019][ T9864] RAX: ffffffffffffffda RBX: 00007f26e9d09c90 RCX: 00000000004592c9 [ 212.607092][ T9864] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 212.615074][ T9864] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 212.615081][ T9864] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f26e9d0a6d4 [ 212.615087][ T9864] R13: 00000000004bf96d R14: 00000000004d1250 R15: 0000000000000003 21:40:36 executing program 3 (fault-call:3 fault-nth:31): mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 21:40:36 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:36 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x8000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:36 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) fstatfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="39000000130007606900000000000000ab0080482600000046000107000000141900010010000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) 21:40:36 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() r1 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x0, 0x80000) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x7) r2 = getpgid(r0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x1, 0x0) ioctl$KVM_CHECK_EXTENSION(r3, 0xae03, 0x6) r4 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r1, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x60, r5, 0x0, 0x70bd2b, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1c}, @IPVS_CMD_ATTR_DAEMON={0x44, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0xb}}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vlan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x100000}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x20000000}, 0x4801) ioctl$TIOCSCTTY(r4, 0x540e, 0x8) kcmp(r0, r2, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) 21:40:36 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) syz_emit_ethernet(0x32, &(0x7f0000017f07)=ANY=[@ANYBLOB="ffffffffffff0180a000000008004500002400000000002f9078ac14ffaa7f000001b481880b0000000000000800000086dd080088be00000000100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0) 21:40:36 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x1a000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:36 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) syz_emit_ethernet(0x32, &(0x7f0000017f07)=ANY=[@ANYBLOB="ffffffffffff0180a000000008004500002400000000002f9078ac14ffaa7f000001b481880b0000000000000800000086dd080088be00000000100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0) [ 212.807292][ C1] protocol 88fb is buggy, dev hsr_slave_0 21:40:36 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1a, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:36 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) fstatfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="39000000130007606900000000000000ab0080482600000046000107000000141900010010000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) [ 212.863814][ T9902] FAULT_INJECTION: forcing a failure. [ 212.863814][ T9902] name failslab, interval 1, probability 0, space 0, times 0 [ 212.912142][ T9902] CPU: 1 PID: 9902 Comm: syz-executor.3 Not tainted 5.2.0-rc5+ #4 [ 212.920019][ T9902] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 212.930077][ T9902] Call Trace: [ 212.933384][ T9902] dump_stack+0x1d8/0x2f8 [ 212.937733][ T9902] should_fail+0x608/0x860 [ 212.942159][ T9902] ? setup_fault_attr+0x2b0/0x2b0 [ 212.947188][ T9902] ? arch_stack_walk+0x98/0xe0 [ 212.951970][ T9902] __should_failslab+0x11a/0x160 [ 212.956928][ T9902] should_failslab+0x9/0x20 21:40:36 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x32, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) [ 212.961436][ T9902] kmem_cache_alloc_trace+0x5d/0x2c0 [ 212.966758][ T9902] ? tomoyo_init_log+0x176/0x1f20 [ 212.971789][ T9902] tomoyo_init_log+0x176/0x1f20 [ 212.976649][ T9902] ? vsnprintf+0x1ba2/0x1c50 [ 212.981251][ T9902] ? common_lsm_audit+0x17b0/0x17b0 [ 212.986452][ T9902] ? tomoyo_profile+0x11/0x50 [ 212.991156][ T9902] ? tomoyo_domain_quota_is_ok+0x446/0x580 [ 212.996971][ T9902] tomoyo_supervisor+0x39c/0x13f0 [ 213.002006][ T9902] ? tomoyo_execute_permission+0x23e/0x3f0 21:40:36 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x40000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) [ 213.007818][ T9902] ? tomoyo_fill_path_info+0x9c/0x3a0 [ 213.013193][ T9902] ? tomoyo_profile+0x50/0x50 [ 213.017871][ T9902] ? rcu_lock_release+0x9/0x30 [ 213.022643][ T9902] ? rcu_lock_release+0x26/0x30 [ 213.027498][ T9902] ? mntput_no_expire+0x158/0xdd0 [ 213.032543][ T9902] ? tomoyo_check_path_acl+0xc9/0x180 [ 213.037922][ T9902] ? tomoyo_check_acl+0x342/0x3c0 [ 213.042962][ T9902] tomoyo_execute_permission+0x2d9/0x3f0 [ 213.048614][ T9902] tomoyo_find_next_domain+0x42a/0x1dc0 [ 213.054168][ T9902] ? trace_lock_acquire+0x190/0x190 [ 213.059382][ T9902] ? tomoyo_assign_domain+0x7c0/0x7c0 [ 213.064767][ T9902] ? lock_acquire+0x158/0x250 [ 213.069454][ T9902] ? rcu_lock_acquire+0x9/0x40 [ 213.074410][ T9902] tomoyo_bprm_check_security+0xe3/0x130 [ 213.080051][ T9902] security_bprm_check+0x55/0xb0 [ 213.085002][ T9902] search_binary_handler+0x6a/0x660 [ 213.090395][ T9902] ? rcu_lock_release+0x9/0x30 [ 213.095187][ T9902] __do_execve_file+0x1601/0x1cd0 [ 213.100243][ T9902] ? do_execve_file+0x40/0x40 [ 213.100254][ T9902] ? getname_flags+0x214/0x640 [ 213.100269][ T9902] __x64_sys_execve+0x94/0xb0 [ 213.100284][ T9902] do_syscall_64+0xfe/0x140 [ 213.100299][ T9902] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 213.100313][ T9902] RIP: 0033:0x4592c9 [ 213.109761][ T9902] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 213.109768][ T9902] RSP: 002b:00007f26e9d09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b 21:40:36 executing program 3 (fault-call:3 fault-nth:32): mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 21:40:36 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0xc, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:36 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x10000000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:36 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) syz_emit_ethernet(0x32, &(0x7f0000017f07)=ANY=[@ANYBLOB="ffffffffffff0180a000000008004500002400000000002f9078ac14ffaa7f000001b481880b0000000000000800000086dd080088be00000000100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0) [ 213.109778][ T9902] RAX: ffffffffffffffda RBX: 00007f26e9d09c90 RCX: 00000000004592c9 [ 213.109784][ T9902] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 213.109791][ T9902] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 213.109797][ T9902] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f26e9d0a6d4 [ 213.109803][ T9902] R13: 00000000004bf96d R14: 00000000004d1250 R15: 0000000000000003 21:40:36 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x1a, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:36 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x100000000000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:36 executing program 0: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x40, 0x0) ioctl$PIO_SCRNMAP(r0, 0x4b41, &(0x7f00000004c0)="532a4ad356405afe215151c5aebd68ae5f32f5d2dcf21a2db5425ed49667875050496300e4665aba306bceee07c10000b420e03b6a85d77ed40dcc13de0e8fa0bd9b1560424aeadc1fee7b346a755e6abdd1825cc50637583f41c66de8f076228668e89674044eb9f0eae9c13af2f2bc56d634af90484d299c0a79b263d3a124ec46235273619b7f345766682de3d259cc1c51c469b1f6584c6cb2a53efce25dc77d780530ea43b85beddb428ea4b02ec14b580206f0a6f5f1") r1 = socket$inet6(0xa, 0x2, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x1e}}, &(0x7f0000000080)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\x13\x17]\xdb\x1b/F <*\x05\xb7\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1\x96lI\x9c\xb6\xbf4\xc2\x98\x86f\x97\x00'/248}, 0x48) ioctl$DRM_IOCTL_CONTROL(r0, 0x40086414, &(0x7f0000000200)={0x3}) 21:40:36 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) fstatfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="39000000130007606900000000000000ab0080482600000046000107000000141900010010000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) [ 213.282526][ T9927] FAULT_INJECTION: forcing a failure. [ 213.282526][ T9927] name failslab, interval 1, probability 0, space 0, times 0 [ 213.366246][ T9927] CPU: 1 PID: 9927 Comm: syz-executor.3 Not tainted 5.2.0-rc5+ #4 [ 213.374100][ T9927] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 213.384165][ T9927] Call Trace: [ 213.387464][ T9927] dump_stack+0x1d8/0x2f8 [ 213.391820][ T9927] should_fail+0x608/0x860 [ 213.396252][ T9927] ? setup_fault_attr+0x2b0/0x2b0 [ 213.401285][ T9927] ? kzalloc+0x1f/0x40 [ 213.405364][ T9927] __should_failslab+0x11a/0x160 [ 213.410306][ T9927] ? kzalloc+0x1f/0x40 21:40:36 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x32, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:36 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x2, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) [ 213.414384][ T9927] should_failslab+0x9/0x20 [ 213.418893][ T9927] __kmalloc+0x7a/0x310 [ 213.418927][ T9927] kzalloc+0x1f/0x40 [ 213.418937][ T9927] tomoyo_commit_ok+0x23/0x1d0 [ 213.418951][ T9927] tomoyo_assign_domain+0x46d/0x7c0 [ 213.437133][ T9927] ? put_dec+0xe0/0xe0 [ 213.441219][ T9927] ? kzalloc+0x40/0x40 [ 213.445329][ T9927] ? snprintf+0xc9/0x120 [ 213.449576][ T9927] ? tomoyo_find_next_domain+0xb23/0x1dc0 [ 213.455305][ T9927] ? vscnprintf+0x80/0x80 [ 213.459727][ T9927] ? tomoyo_execute_permission+0x2d9/0x3f0 21:40:36 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x8, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) [ 213.465532][ T9927] tomoyo_find_next_domain+0xd95/0x1dc0 [ 213.465555][ T9927] ? tomoyo_assign_domain+0x7c0/0x7c0 [ 213.465569][ T9927] ? lock_acquire+0x158/0x250 [ 213.481236][ T9927] ? rcu_lock_acquire+0x9/0x40 [ 213.486109][ T9927] tomoyo_bprm_check_security+0xe3/0x130 [ 213.491754][ T9927] security_bprm_check+0x55/0xb0 [ 213.496705][ T9927] search_binary_handler+0x6a/0x660 [ 213.501909][ T9927] ? rcu_lock_release+0x9/0x30 [ 213.501928][ T9927] __do_execve_file+0x1601/0x1cd0 [ 213.501953][ T9927] ? do_execve_file+0x40/0x40 [ 213.511709][ T9927] ? getname_flags+0x214/0x640 [ 213.511725][ T9927] __x64_sys_execve+0x94/0xb0 [ 213.511740][ T9927] do_syscall_64+0xfe/0x140 [ 213.511757][ T9927] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 213.536210][ T9927] RIP: 0033:0x4592c9 [ 213.540110][ T9927] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 21:40:37 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x1a, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) [ 213.559776][ T9927] RSP: 002b:00007f26e9d09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 213.568357][ T9927] RAX: ffffffffffffffda RBX: 00007f26e9d09c90 RCX: 00000000004592c9 [ 213.576321][ T9927] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 213.584283][ T9927] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 213.592339][ T9927] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f26e9d0a6d4 [ 213.600309][ T9927] R13: 00000000004bf96d R14: 00000000004d1250 R15: 0000000000000003 [ 213.738700][ T9927] ERROR: Out of memory at tomoyo_memory_ok. [ 213.759005][ T9927] ERROR: Domain ' /sbin/init /etc/init.d/rc /sbin/startpar /etc/init.d/ssh /sbin/start-stop-daemon /usr/sbin/sshd /usr/sbin/sshd /bin/bash /root/syz-fuzzer /root/syz-executor.3 /root/syzkaller-testdir895971654/syzkaller.L31VQJ/62/file0' not defined. 21:40:37 executing program 3 (fault-call:3 fault-nth:33): mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 21:40:37 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x1a00, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, @perf_config_ext}, 0x0, 0x3, 0xffffffffffffffff, 0x0) close(r1) 21:40:37 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) fstatfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="39000000130007606900000000000000ab0080482600000046000107000000141900010010000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) 21:40:37 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140), 0x4) syz_emit_ethernet(0x0, 0x0, 0x0) 21:40:37 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x200000000000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:37 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x4000, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:37 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x800000000000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:37 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140), 0x4) syz_emit_ethernet(0x0, 0x0, 0x0) [ 213.919322][ T9977] FAULT_INJECTION: forcing a failure. [ 213.919322][ T9977] name failslab, interval 1, probability 0, space 0, times 0 [ 213.950218][ T9977] CPU: 1 PID: 9977 Comm: syz-executor.3 Not tainted 5.2.0-rc5+ #4 [ 213.958069][ T9977] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 213.968133][ T9977] Call Trace: [ 213.971431][ T9977] dump_stack+0x1d8/0x2f8 [ 213.975774][ T9977] should_fail+0x608/0x860 [ 213.980208][ T9977] ? setup_fault_attr+0x2b0/0x2b0 [ 213.985243][ T9977] ? kzalloc+0x1f/0x40 [ 213.989314][ T9977] ? tomoyo_domain_quota_is_ok+0x47f/0x580 [ 213.995136][ T9977] __should_failslab+0x11a/0x160 [ 214.000077][ T9977] ? kzalloc+0x1f/0x40 [ 214.004146][ T9977] should_failslab+0x9/0x20 [ 214.008640][ T9977] __kmalloc+0x7a/0x310 [ 214.008650][ T9977] ? string+0x2d7/0x2f0 [ 214.008663][ T9977] kzalloc+0x1f/0x40 [ 214.008672][ T9977] tomoyo_get_name+0x226/0x540 [ 214.008686][ T9977] tomoyo_assign_domain+0x357/0x7c0 [ 214.008695][ T9977] ? put_dec+0xe0/0xe0 [ 214.008710][ T9977] ? kzalloc+0x40/0x40 [ 214.020888][ T9977] ? snprintf+0xc9/0x120 [ 214.020903][ T9977] ? tomoyo_find_next_domain+0xb23/0x1dc0 [ 214.020913][ T9977] ? vscnprintf+0x80/0x80 [ 214.020927][ T9977] ? tomoyo_execute_permission+0x2d9/0x3f0 [ 214.020942][ T9977] tomoyo_find_next_domain+0xd95/0x1dc0 [ 214.034966][ T9977] ? tomoyo_assign_domain+0x7c0/0x7c0 [ 214.034977][ T9977] ? lock_acquire+0x158/0x250 [ 214.034988][ T9977] ? rcu_lock_acquire+0x9/0x40 [ 214.035007][ T9977] tomoyo_bprm_check_security+0xe3/0x130 [ 214.049007][ T9977] security_bprm_check+0x55/0xb0 [ 214.049023][ T9977] search_binary_handler+0x6a/0x660 [ 214.049035][ T9977] ? rcu_lock_release+0x9/0x30 [ 214.049053][ T9977] __do_execve_file+0x1601/0x1cd0 [ 214.049080][ T9977] ? do_execve_file+0x40/0x40 [ 214.109690][ T9977] ? getname_flags+0x214/0x640 [ 214.114470][ T9977] __x64_sys_execve+0x94/0xb0 [ 214.119191][ T9977] do_syscall_64+0xfe/0x140 [ 214.123708][ T9977] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 214.129597][ T9977] RIP: 0033:0x4592c9 [ 214.133494][ T9977] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 214.153094][ T9977] RSP: 002b:00007f26e9d09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 214.161502][ T9977] RAX: ffffffffffffffda RBX: 00007f26e9d09c90 RCX: 00000000004592c9 21:40:37 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) fstatfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="39000000130007606900000000000000ab0080482600000046000107000000141900010010000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) 21:40:37 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x1a00000000000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:37 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) rseq(&(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x4, 0x800, 0xad2}, 0x7}, 0x20, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1, 0xc, 0x200, 0x0, 0x0, r0, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r1, &(0x7f0000000000), 0x0}, 0x18) r2 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.stat\x00', 0x0, 0x0) bind$vsock_dgram(r2, &(0x7f00000000c0)={0x28, 0x0, 0xffffffff}, 0x10) socket$nl_xfrm(0x10, 0x3, 0x6) [ 214.161509][ T9977] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 214.161515][ T9977] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 214.161521][ T9977] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f26e9d0a6d4 [ 214.161527][ T9977] R13: 00000000004bf96d R14: 00000000004d1250 R15: 0000000000000003 [ 214.201792][ T9977] ERROR: Out of memory at tomoyo_memory_ok. 21:40:37 executing program 3 (fault-call:3 fault-nth:34): mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 21:40:37 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x1000000, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:37 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x4800) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000300)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f00000001c0)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x0, 0xb, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3948e533}, [@jmp={0x5, 0x4, 0x0, 0x1, 0xf, 0x6, 0xffffffffffffffff}, @generic={0x40, 0xd25, 0x2, 0x7, 0x8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x7fffffff}, @map={0x18, 0x4, 0x1, 0x0, r1}, @alu={0x0, 0xfff, 0xd, 0x3, 0x4, 0x80, 0xfffffffffffffff8}, @exit]}, &(0x7f0000000180)='syzkaller\x00', 0x8, 0x0, 0x0, 0x41f00, 0x1, [], r2, 0xc, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000240)={0x5, 0xc, 0x4, 0x51f}, 0x10}, 0x70) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000040), 0x4) write$binfmt_elf64(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="7f454c4600706a5ce1a2ee467d3bca22f507643a066504a088cc7b01000000000000020000000000004000000000000100f9f0e352c1000000000000000fa6227c0003003899c442264c4f2480554a000200ffffffff468051e574640300000003000000cc1a3b1e02b799d800"], 0x6d) write$binfmt_elf64(r0, &(0x7f0000001200)=ANY=[@ANYPTR], 0xf75) 21:40:37 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140), 0x4) syz_emit_ethernet(0x0, 0x0, 0x0) 21:40:37 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x4000000000000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:37 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) fstatfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="39000000130007606900000000000000ab0080482600000046000107000000141900010010000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) 21:40:37 executing program 0: r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x0, 0x6011, r0, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x0, 0x40) setsockopt$RXRPC_SECURITY_KEYRING(r1, 0x110, 0x2, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x15) r2 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x800005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x40003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000300)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$vbi(&(0x7f0000000440)='/dev/vbi#\x00', 0x1, 0x2) ioctl$RTC_WIE_ON(r4, 0x700f) mmap(&(0x7f00001be000/0x2000)=nil, 0x2000, 0x0, 0x20010, r2, 0x0) fdatasync(r2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x201, 0x0) ioctl$TIOCLINUX4(r5, 0x541c, &(0x7f0000000400)) truncate(&(0x7f0000000080)='./file0\x00', 0xff) write(r6, &(0x7f00000001c0), 0x10000026f) read(r5, &(0x7f0000000200)=""/250, 0x50c7e3e3) 21:40:37 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x2000000, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:37 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0xffffffff00000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:37 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) fstatfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="39000000130007606900000000000000ab0080482600000046000107000000141900010010000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) [ 214.415052][T10014] FAULT_INJECTION: forcing a failure. [ 214.415052][T10014] name failslab, interval 1, probability 0, space 0, times 0 [ 214.442439][T10014] CPU: 0 PID: 10014 Comm: syz-executor.3 Not tainted 5.2.0-rc5+ #4 [ 214.450383][T10014] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 214.460451][T10014] Call Trace: [ 214.463748][T10014] dump_stack+0x1d8/0x2f8 [ 214.468179][T10014] should_fail+0x608/0x860 [ 214.472609][T10014] ? setup_fault_attr+0x2b0/0x2b0 [ 214.477663][T10014] ? ima_collect_measurement+0x306/0x4f0 [ 214.483400][T10014] __should_failslab+0x11a/0x160 [ 214.488347][T10014] ? ima_collect_measurement+0x306/0x4f0 [ 214.493993][T10014] should_failslab+0x9/0x20 [ 214.498515][T10014] __kmalloc_track_caller+0x79/0x310 [ 214.503812][T10014] ? __up_read+0xc5/0x1e0 [ 214.508326][T10014] krealloc+0x41/0xc0 21:40:37 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) [ 214.512312][T10014] ima_collect_measurement+0x306/0x4f0 [ 214.517791][T10014] ? ima_get_action+0xa0/0xa0 [ 214.517811][T10014] ? ext4_initxattrs+0x110/0x110 [ 214.517825][T10014] ? ima_get_cache_status+0x1c0/0x1c0 [ 214.517842][T10014] process_measurement+0xb88/0x1390 [ 214.517862][T10014] ? ima_file_mmap+0x150/0x150 [ 214.517875][T10014] ? _raw_spin_unlock_irqrestore+0xbc/0xe0 [ 214.517892][T10014] ? debug_check_no_obj_freed+0x69d/0x740 [ 214.538068][T10014] ? lockdep_hardirqs_on+0x3c5/0x7d0 [ 214.538078][T10014] ? kfree+0xe6/0x120 [ 214.538101][T10014] ? rcu_lock_release+0x9/0x30 [ 214.538117][T10014] ? rcu_lock_release+0x26/0x30 [ 214.538126][T10014] ? smack_task_getsecid+0x1ca/0x230 [ 214.538143][T10014] ima_bprm_check+0x115/0x280 [ 214.538153][T10014] ? rcu_lock_release+0x9/0x30 [ 214.538165][T10014] ? process_measurement+0x1390/0x1390 [ 214.538179][T10014] ? tomoyo_bprm_check_security+0x118/0x130 [ 214.538190][T10014] security_bprm_check+0x98/0xb0 [ 214.538209][T10014] search_binary_handler+0x6a/0x660 [ 214.559750][T10014] ? rcu_lock_release+0x9/0x30 [ 214.559769][T10014] __do_execve_file+0x1601/0x1cd0 [ 214.559797][T10014] ? do_execve_file+0x40/0x40 [ 214.559808][T10014] ? getname_flags+0x214/0x640 [ 214.559824][T10014] __x64_sys_execve+0x94/0xb0 [ 214.559840][T10014] do_syscall_64+0xfe/0x140 [ 214.559854][T10014] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 214.559864][T10014] RIP: 0033:0x4592c9 21:40:38 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140), 0x4) syz_emit_ethernet(0x0, &(0x7f0000017f07)=ANY=[], 0x0) [ 214.559875][T10014] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 214.559881][T10014] RSP: 002b:00007f26e9d09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 214.559890][T10014] RAX: ffffffffffffffda RBX: 00007f26e9d09c90 RCX: 00000000004592c9 [ 214.559896][T10014] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 214.559901][T10014] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 214.559907][T10014] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f26e9d0a6d4 21:40:38 executing program 3 (fault-call:3 fault-nth:35): mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 21:40:38 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x8000000, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:38 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1a, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:38 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140), 0x4) syz_emit_ethernet(0x0, &(0x7f0000017f07)=ANY=[], 0x0) [ 214.559912][T10014] R13: 00000000004bf96d R14: 00000000004d1250 R15: 0000000000000003 [ 214.694741][ T26] kauditd_printk_skb: 59 callbacks suppressed [ 214.694750][ T26] audit: type=1800 audit(1561153238.147:102): pid=10014 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed comm="syz-executor.3" name="file0" dev="sda1" ino=16626 res=0 21:40:38 executing program 4: socket$netlink(0x10, 0x3, 0x0) fstatfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000240)="39000000130007606900000000000000ab0080482600000046000107000000141900010010000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) 21:40:38 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x1a000000, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) [ 214.897588][T10045] FAULT_INJECTION: forcing a failure. [ 214.897588][T10045] name failslab, interval 1, probability 0, space 0, times 0 [ 215.001593][T10045] CPU: 1 PID: 10045 Comm: syz-executor.3 Not tainted 5.2.0-rc5+ #4 [ 215.009537][T10045] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 215.019598][T10045] Call Trace: [ 215.022902][T10045] dump_stack+0x1d8/0x2f8 [ 215.027244][T10045] should_fail+0x608/0x860 [ 215.031674][T10045] ? setup_fault_attr+0x2b0/0x2b0 [ 215.037646][T10045] __should_failslab+0x11a/0x160 [ 215.042597][T10045] ? ima_d_path+0x56/0x170 [ 215.047019][T10045] should_failslab+0x9/0x20 [ 215.051524][T10045] kmem_cache_alloc+0x56/0x2b0 [ 215.056302][T10045] ima_d_path+0x56/0x170 [ 215.060551][T10045] process_measurement+0xc38/0x1390 [ 215.065761][T10045] ? ima_file_mmap+0x150/0x150 [ 215.070507][T10045] ? _raw_spin_unlock_irqrestore+0xbc/0xe0 [ 215.076302][T10045] ? debug_check_no_obj_freed+0x69d/0x740 [ 215.082014][T10045] ? lockdep_hardirqs_on+0x3c5/0x7d0 [ 215.087315][T10045] ? kfree+0xe6/0x120 [ 215.091384][T10045] ? rcu_lock_release+0x9/0x30 [ 215.096131][T10045] ? rcu_lock_release+0x26/0x30 [ 215.100967][T10045] ? smack_task_getsecid+0x1ca/0x230 [ 215.106240][T10045] ima_bprm_check+0x115/0x280 [ 215.110918][T10045] ? rcu_lock_release+0x9/0x30 [ 215.115766][T10045] ? process_measurement+0x1390/0x1390 [ 215.121626][T10045] ? tomoyo_bprm_check_security+0x118/0x130 [ 215.127500][T10045] security_bprm_check+0x98/0xb0 [ 215.132529][T10045] search_binary_handler+0x6a/0x660 [ 215.137729][T10045] ? rcu_lock_release+0x9/0x30 [ 215.142502][T10045] __do_execve_file+0x1601/0x1cd0 [ 215.147522][T10045] ? do_execve_file+0x40/0x40 [ 215.152204][T10045] ? getname_flags+0x214/0x640 [ 215.156951][T10045] __x64_sys_execve+0x94/0xb0 [ 215.161751][T10045] do_syscall_64+0xfe/0x140 [ 215.166268][T10045] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 215.172140][T10045] RIP: 0033:0x4592c9 [ 215.176024][T10045] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 215.195712][T10045] RSP: 002b:00007f26e9d09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 215.204104][T10045] RAX: ffffffffffffffda RBX: 00007f26e9d09c90 RCX: 00000000004592c9 [ 215.212092][T10045] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 215.220071][T10045] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 215.228039][T10045] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f26e9d0a6d4 [ 215.236140][T10045] R13: 00000000004bf96d R14: 00000000004d1250 R15: 0000000000000003 21:40:38 executing program 0: r0 = socket(0x10, 0x3, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000440)="2400000016005f0200f20400000000000a0200010100000000c2ff000f00000000000000", 0x24) getgroups(0x0, &(0x7f0000000040)) 21:40:38 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x32, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:38 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140), 0x4) syz_emit_ethernet(0x0, &(0x7f0000017f07)=ANY=[], 0x0) 21:40:38 executing program 4: socket$netlink(0x10, 0x3, 0x0) fstatfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000240)="39000000130007606900000000000000ab0080482600000046000107000000141900010010000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) 21:40:38 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x40000000, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:38 executing program 3 (fault-call:3 fault-nth:36): mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 215.419667][T10063] FAULT_INJECTION: forcing a failure. [ 215.419667][T10063] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 215.432920][T10063] CPU: 1 PID: 10063 Comm: syz-executor.3 Not tainted 5.2.0-rc5+ #4 [ 215.440813][T10063] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 215.440825][T10063] Call Trace: [ 215.454173][T10063] dump_stack+0x1d8/0x2f8 [ 215.458519][T10063] should_fail+0x608/0x860 [ 215.462937][T10063] ? setup_fault_attr+0x2b0/0x2b0 [ 215.462949][T10063] ? __bfs+0x550/0x550 [ 215.462968][T10063] should_fail_alloc_page+0x55/0x60 [ 215.462978][T10063] prepare_alloc_pages+0x283/0x460 [ 215.462992][T10063] __alloc_pages_nodemask+0x11c/0x790 [ 215.463007][T10063] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 215.493260][T10063] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 215.498993][T10063] ? trace_kfree+0xb2/0x110 [ 215.503509][T10063] ? krealloc+0x8e/0xc0 [ 215.507661][T10063] ? kfree+0x1d/0x120 [ 215.507677][T10063] kmem_getpages+0x46/0x480 [ 215.507689][T10063] cache_grow_begin+0x7e/0x2c0 [ 215.507702][T10063] cache_alloc_refill+0x311/0x3f0 [ 215.507718][T10063] ? check_preemption_disabled+0xb7/0x280 [ 215.516191][T10063] kmem_cache_alloc+0x288/0x2b0 [ 215.536488][T10063] ? ima_d_path+0x56/0x170 [ 215.540914][T10063] ima_d_path+0x56/0x170 [ 215.545167][T10063] process_measurement+0xc38/0x1390 [ 215.550381][T10063] ? ima_file_mmap+0x150/0x150 [ 215.555154][T10063] ? _raw_spin_unlock_irqrestore+0xbc/0xe0 [ 215.560957][T10063] ? debug_check_no_obj_freed+0x69d/0x740 [ 215.560971][T10063] ? lockdep_hardirqs_on+0x3c5/0x7d0 [ 215.560980][T10063] ? kfree+0xe6/0x120 [ 215.561000][T10063] ? rcu_lock_release+0x9/0x30 [ 215.561015][T10063] ? rcu_lock_release+0x26/0x30 [ 215.585561][T10063] ? smack_task_getsecid+0x1ca/0x230 [ 215.590865][T10063] ima_bprm_check+0x115/0x280 [ 215.595549][T10063] ? rcu_lock_release+0x9/0x30 [ 215.600320][T10063] ? process_measurement+0x1390/0x1390 [ 215.605788][T10063] ? tomoyo_bprm_check_security+0x118/0x130 [ 215.611693][T10063] security_bprm_check+0x98/0xb0 [ 215.616642][T10063] search_binary_handler+0x6a/0x660 [ 215.621851][T10063] ? rcu_lock_release+0x9/0x30 [ 215.626631][T10063] __do_execve_file+0x1601/0x1cd0 [ 215.631679][T10063] ? do_execve_file+0x40/0x40 [ 215.636368][T10063] ? getname_flags+0x214/0x640 [ 215.641148][T10063] __x64_sys_execve+0x94/0xb0 [ 215.645845][T10063] do_syscall_64+0xfe/0x140 [ 215.650365][T10063] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 215.656274][T10063] RIP: 0033:0x4592c9 [ 215.660175][T10063] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 215.660181][T10063] RSP: 002b:00007f26e9d09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 215.660191][T10063] RAX: ffffffffffffffda RBX: 00007f26e9d09c90 RCX: 00000000004592c9 [ 215.660197][T10063] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 215.660203][T10063] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 215.660216][T10063] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f26e9d0a6d4 21:40:39 executing program 0: poll(&(0x7f0000000040), 0x2000000000000032, 0x4e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x10101, 0x0, 0x0, 0x800e00791) readv(r0, &(0x7f00000015c0)=[{&(0x7f0000000000)=""/142, 0x8e}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6) shutdown(r0, 0x0) 21:40:39 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x10000000000, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:39 executing program 4: socket$netlink(0x10, 0x3, 0x0) fstatfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000240)="39000000130007606900000000000000ab0080482600000046000107000000141900010010000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) 21:40:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0xc, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:39 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) fstatfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, 0x0, 0x0) 21:40:39 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140), 0x4) syz_emit_ethernet(0x1, &(0x7f0000017f07)=ANY=[@ANYBLOB], 0x0) [ 215.720137][T10063] R13: 00000000004bf96d R14: 00000000004d1250 R15: 0000000000000003 21:40:39 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) fstatfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, 0x0, 0x0) 21:40:39 executing program 3 (fault-call:3 fault-nth:37): mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 21:40:39 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140), 0x4) syz_emit_ethernet(0x1, &(0x7f0000017f07)=ANY=[@ANYBLOB], 0x0) 21:40:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x1a, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:39 executing program 0: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) poll(&(0x7f0000000040), 0x2000000000000014, 0x4e) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x6c9, 0x0, 0x0, 0x800e00465) poll(&(0x7f0000000000)=[{r1, 0x2}], 0x1, 0x0) ppoll(&(0x7f0000000080), 0x1, 0x0, 0x0, 0x20) shutdown(r1, 0x0) unlinkat(r0, 0x0, 0x0) 21:40:39 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x100000000000000, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x32, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:39 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x200000000000000, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) [ 215.939232][T10101] FAULT_INJECTION: forcing a failure. [ 215.939232][T10101] name failslab, interval 1, probability 0, space 0, times 0 [ 215.994639][T10101] CPU: 1 PID: 10101 Comm: syz-executor.3 Not tainted 5.2.0-rc5+ #4 [ 216.002565][T10101] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 216.012644][T10101] Call Trace: [ 216.015950][T10101] dump_stack+0x1d8/0x2f8 [ 216.020289][T10101] should_fail+0x608/0x860 [ 216.024710][T10101] ? setup_fault_attr+0x2b0/0x2b0 [ 216.029782][T10101] __should_failslab+0x11a/0x160 [ 216.034730][T10101] should_failslab+0x9/0x20 [ 216.039242][T10101] kmem_cache_alloc_trace+0x5d/0x2c0 [ 216.044549][T10101] ? ima_add_digest_entry+0x5a/0x2d0 [ 216.049845][T10101] ima_add_digest_entry+0x5a/0x2d0 [ 216.054973][T10101] ima_add_template_entry+0xce/0x680 [ 216.060274][T10101] ? ima_get_binary_runtime_size+0x20/0x20 [ 216.066098][T10101] ? ima_eventname_ng_init+0xc4/0xe0 [ 216.066109][T10101] ? ima_eventname_init+0x140/0x140 [ 216.066128][T10101] ? ima_alloc_init_template+0x3c7/0x470 [ 216.066146][T10101] ? ima_store_measurement+0x3c6/0x730 [ 216.087728][T10101] ima_store_measurement+0x3ff/0x730 [ 216.093031][T10101] ? ima_collect_measurement+0x4f0/0x4f0 [ 216.098683][T10101] ? kmem_cache_alloc+0x20b/0x2b0 [ 216.103717][T10101] ? ima_d_path+0x56/0x170 [ 216.108153][T10101] ? ima_d_path+0x10b/0x170 [ 216.112655][T10101] process_measurement+0xcb3/0x1390 [ 216.117865][T10101] ? ima_file_mmap+0x150/0x150 [ 216.117880][T10101] ? _raw_spin_unlock_irqrestore+0xbc/0xe0 [ 216.117894][T10101] ? debug_check_no_obj_freed+0x69d/0x740 [ 216.117907][T10101] ? lockdep_hardirqs_on+0x3c5/0x7d0 [ 216.117915][T10101] ? kfree+0xe6/0x120 [ 216.117936][T10101] ? rcu_lock_release+0x9/0x30 [ 216.143533][T10101] ? rcu_lock_release+0x26/0x30 [ 216.143544][T10101] ? smack_task_getsecid+0x1ca/0x230 [ 216.143560][T10101] ima_bprm_check+0x115/0x280 [ 216.143577][T10101] ? rcu_lock_release+0x9/0x30 [ 216.167919][T10101] ? process_measurement+0x1390/0x1390 [ 216.173389][T10101] ? tomoyo_bprm_check_security+0x118/0x130 [ 216.179280][T10101] security_bprm_check+0x98/0xb0 [ 216.179295][T10101] search_binary_handler+0x6a/0x660 [ 216.179307][T10101] ? rcu_lock_release+0x9/0x30 [ 216.179326][T10101] __do_execve_file+0x1601/0x1cd0 [ 216.179353][T10101] ? do_execve_file+0x40/0x40 [ 216.179364][T10101] ? getname_flags+0x214/0x640 [ 216.179379][T10101] __x64_sys_execve+0x94/0xb0 [ 216.179395][T10101] do_syscall_64+0xfe/0x140 [ 216.213446][T10101] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 216.213458][T10101] RIP: 0033:0x4592c9 21:40:39 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140), 0x4) syz_emit_ethernet(0x1, &(0x7f0000017f07)=ANY=[@ANYBLOB], 0x0) 21:40:39 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) fstatfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, 0x0, 0x0) 21:40:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x2, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) [ 216.213468][T10101] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 216.213474][T10101] RSP: 002b:00007f26e9d09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 216.213491][T10101] RAX: ffffffffffffffda RBX: 00007f26e9d09c90 RCX: 00000000004592c9 [ 216.247361][T10101] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 216.247368][T10101] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 216.247373][T10101] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f26e9d0a6d4 [ 216.247378][T10101] R13: 00000000004bf96d R14: 00000000004d1250 R15: 0000000000000003 21:40:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x8, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:39 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) fstatfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000000), 0x0) [ 216.288465][T10101] ima: OUT OF MEMORY ERROR creating queue entry [ 216.312475][ T26] audit: type=1804 audit(1561153239.767:103): pid=10101 uid=0 auid=4294967295 ses=4294967295 subj=_ op=add_template_measure cause=ENOMEM comm="syz-executor.3" name="/root/syzkaller-testdir895971654/syzkaller.L31VQJ/67/file0" dev="sda1" ino=16707 res=0 21:40:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x1a, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:39 executing program 3 (fault-call:3 fault-nth:38): mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 21:40:39 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140), 0x4) syz_emit_ethernet(0x1, &(0x7f0000017f07)=ANY=[@ANYBLOB="ffffffffffff0180a000000008004500002400000000002f9078ac14ffaa7f000001b481880b0000000000000800000086dd08"], 0x0) 21:40:39 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x800000000000000, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) [ 216.522070][T10145] FAULT_INJECTION: forcing a failure. [ 216.522070][T10145] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 216.535578][T10145] CPU: 0 PID: 10145 Comm: syz-executor.3 Not tainted 5.2.0-rc5+ #4 [ 216.543476][T10145] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 216.553532][T10145] Call Trace: [ 216.553551][T10145] dump_stack+0x1d8/0x2f8 [ 216.553568][T10145] should_fail+0x608/0x860 [ 216.553580][T10145] ? setup_fault_attr+0x2b0/0x2b0 [ 216.553591][T10145] ? __bfs+0x550/0x550 [ 216.553611][T10145] should_fail_alloc_page+0x55/0x60 [ 216.553630][T10145] prepare_alloc_pages+0x283/0x460 [ 216.553646][T10145] __alloc_pages_nodemask+0x11c/0x790 [ 216.553663][T10145] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 216.565869][T10145] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 216.565882][T10145] ? trace_kfree+0xb2/0x110 [ 216.565892][T10145] ? krealloc+0x8e/0xc0 [ 216.565901][T10145] ? kfree+0x1d/0x120 [ 216.565917][T10145] kmem_getpages+0x46/0x480 [ 216.574994][T10145] cache_grow_begin+0x7e/0x2c0 [ 216.575009][T10145] cache_alloc_refill+0x311/0x3f0 [ 216.575021][T10145] ? check_preemption_disabled+0xb7/0x280 [ 216.575036][T10145] kmem_cache_alloc+0x288/0x2b0 [ 216.575046][T10145] ? ima_d_path+0x56/0x170 [ 216.575059][T10145] ima_d_path+0x56/0x170 [ 216.601967][T10145] process_measurement+0xc38/0x1390 [ 216.610644][T10145] ? ima_file_mmap+0x150/0x150 [ 216.610658][T10145] ? _raw_spin_unlock_irqrestore+0xbc/0xe0 [ 216.610671][T10145] ? debug_check_no_obj_freed+0x69d/0x740 [ 216.610684][T10145] ? lockdep_hardirqs_on+0x3c5/0x7d0 [ 216.610697][T10145] ? kfree+0xe6/0x120 [ 216.679546][T10145] ? rcu_lock_release+0x9/0x30 [ 216.684345][T10145] ? rcu_lock_release+0x26/0x30 [ 216.689203][T10145] ? smack_task_getsecid+0x1ca/0x230 [ 216.694497][T10145] ima_bprm_check+0x115/0x280 [ 216.699176][T10145] ? rcu_lock_release+0x9/0x30 [ 216.703972][T10145] ? process_measurement+0x1390/0x1390 [ 216.709523][T10145] ? tomoyo_bprm_check_security+0x118/0x130 [ 216.715428][T10145] security_bprm_check+0x98/0xb0 21:40:40 executing program 0: poll(&(0x7f0000000040), 0x2354, 0x4e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x10101, 0x0, 0x0, 0x800e00791) readv(r0, &(0x7f00000015c0)=[{&(0x7f0000000000)=""/142, 0x8e}, {0x0}, {0x0}, {0x0}], 0x4) shutdown(r0, 0x0) 21:40:40 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) fstatfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000000), 0x0) 21:40:40 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x1a00000000000000, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:40 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140), 0x4) syz_emit_ethernet(0x1, &(0x7f0000017f07)=ANY=[@ANYBLOB="ffffffffffff0180a000000008004500002400000000002f9078ac14ffaa7f000001b481880b0000000000000800000086dd08"], 0x0) 21:40:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x1a00, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) [ 216.720464][T10145] search_binary_handler+0x6a/0x660 [ 216.725670][T10145] ? rcu_lock_release+0x9/0x30 [ 216.730468][T10145] __do_execve_file+0x1601/0x1cd0 [ 216.735517][T10145] ? do_execve_file+0x40/0x40 [ 216.740205][T10145] ? getname_flags+0x214/0x640 [ 216.744979][T10145] __x64_sys_execve+0x94/0xb0 [ 216.749665][T10145] do_syscall_64+0xfe/0x140 [ 216.754180][T10145] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 216.760071][T10145] RIP: 0033:0x4592c9 21:40:40 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) fstatfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000000), 0x0) [ 216.763970][T10145] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 216.783581][T10145] RSP: 002b:00007f26e9d09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 216.792180][T10145] RAX: ffffffffffffffda RBX: 00007f26e9d09c90 RCX: 00000000004592c9 [ 216.800161][T10145] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 216.808143][T10145] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 216.816118][T10145] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f26e9d0a6d4 [ 216.824092][T10145] R13: 00000000004bf96d R14: 00000000004d1250 R15: 0000000000000003 21:40:40 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140), 0x4) syz_emit_ethernet(0x1, &(0x7f0000017f07)=ANY=[@ANYBLOB="ffffffffffff0180a000000008004500002400000000002f9078ac14ffaa7f000001b481880b0000000000000800000086dd08"], 0x0) 21:40:40 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x4000000000000000, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x4000, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:40 executing program 3 (fault-call:3 fault-nth:39): mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 21:40:40 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) fstatfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000000)=[{0x0}], 0x1) 21:40:40 executing program 0: socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) poll(&(0x7f0000000040), 0x2000000000000014, 0x4e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x6c9, 0x0, 0x0, 0x800e00465) poll(&(0x7f0000000040)=[{}], 0x1, 0x8001) shutdown(r0, 0x0) 21:40:40 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0xffffffff00000000, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) [ 217.056228][T10185] FAULT_INJECTION: forcing a failure. [ 217.056228][T10185] name failslab, interval 1, probability 0, space 0, times 0 [ 217.093642][T10185] CPU: 1 PID: 10185 Comm: syz-executor.3 Not tainted 5.2.0-rc5+ #4 [ 217.101606][T10185] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 217.111665][T10185] Call Trace: [ 217.114970][T10185] dump_stack+0x1d8/0x2f8 [ 217.119336][T10185] should_fail+0x608/0x860 [ 217.123769][T10185] ? setup_fault_attr+0x2b0/0x2b0 [ 217.128819][T10185] ? ima_write_template_field_data+0x4e/0x1e0 [ 217.135176][T10185] __should_failslab+0x11a/0x160 [ 217.140218][T10185] ? ima_write_template_field_data+0x4e/0x1e0 [ 217.146857][T10185] should_failslab+0x9/0x20 [ 217.151368][T10185] __kmalloc+0x7a/0x310 [ 217.155545][T10185] ima_write_template_field_data+0x4e/0x1e0 [ 217.161451][T10185] ima_eventdigest_ng_init+0x238/0x2f0 [ 217.166914][T10185] ? ima_eventdigest_init+0x400/0x400 [ 217.172509][T10185] ? trace_kmalloc+0xcd/0x130 [ 217.177199][T10185] ? kzalloc+0x26/0x40 [ 217.177208][T10185] ? __kmalloc+0x254/0x310 [ 217.177216][T10185] ? kzalloc+0x26/0x40 [ 217.177227][T10185] ? ima_eventdigest_init+0x400/0x400 [ 217.177239][T10185] ima_alloc_init_template+0x193/0x470 [ 217.177256][T10185] ima_store_measurement+0x27b/0x730 [ 217.177276][T10185] ? ima_collect_measurement+0x4f0/0x4f0 [ 217.195210][T10185] ? prepend_path+0xa30/0xa30 [ 217.195231][T10185] ? kmem_cache_alloc+0x20b/0x2b0 [ 217.195242][T10185] ? ima_d_path+0x56/0x170 [ 217.195254][T10185] ? ima_d_path+0x10b/0x170 [ 217.195269][T10185] process_measurement+0xcb3/0x1390 [ 217.211642][T10185] ? ima_file_mmap+0x150/0x150 [ 217.211657][T10185] ? _raw_spin_unlock_irqrestore+0xbc/0xe0 [ 217.211671][T10185] ? debug_check_no_obj_freed+0x69d/0x740 [ 217.211686][T10185] ? lockdep_hardirqs_on+0x3c5/0x7d0 [ 217.211694][T10185] ? kfree+0xe6/0x120 [ 217.211721][T10185] ? rcu_lock_release+0x9/0x30 [ 217.225825][T10185] ? rcu_lock_release+0x26/0x30 [ 217.225836][T10185] ? smack_task_getsecid+0x1ca/0x230 [ 217.225853][T10185] ima_bprm_check+0x115/0x280 [ 217.225868][T10185] ? rcu_lock_release+0x9/0x30 [ 217.240522][T10185] ? process_measurement+0x1390/0x1390 [ 217.240537][T10185] ? tomoyo_bprm_check_security+0x118/0x130 [ 217.240549][T10185] security_bprm_check+0x98/0xb0 [ 217.240564][T10185] search_binary_handler+0x6a/0x660 [ 217.240575][T10185] ? rcu_lock_release+0x9/0x30 [ 217.240594][T10185] __do_execve_file+0x1601/0x1cd0 [ 217.240620][T10185] ? do_execve_file+0x40/0x40 [ 217.240638][T10185] ? getname_flags+0x214/0x640 [ 217.327994][T10185] __x64_sys_execve+0x94/0xb0 [ 217.332684][T10185] do_syscall_64+0xfe/0x140 [ 217.337214][T10185] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 217.343298][T10185] RIP: 0033:0x4592c9 21:40:40 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140), 0x4) syz_emit_ethernet(0x1, &(0x7f0000017f07)=ANY=[@ANYBLOB="ffffffffffff0180a000000008004500002400000000002f9078ac14ffaa7f000001b481880b0000000000000800000086dd080088be00000000100000000100000000000000080022eb000000"], 0x0) 21:40:40 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) fstatfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000000)=[{0x0}], 0x1) 21:40:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x1000000, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x2000000, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x8000000, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x1a000000, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) [ 217.347245][T10185] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 217.367406][T10185] RSP: 002b:00007f26e9d09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 217.367417][T10185] RAX: ffffffffffffffda RBX: 00007f26e9d09c90 RCX: 00000000004592c9 [ 217.367423][T10185] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 217.367428][T10185] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 21:40:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x40000000, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:40 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) [ 217.367433][T10185] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f26e9d0a6d4 [ 217.367438][T10185] R13: 00000000004bf96d R14: 00000000004d1250 R15: 0000000000000003 [ 217.418542][ T26] audit: type=1804 audit(1561153240.847:104): pid=10185 uid=0 auid=4294967295 ses=4294967295 subj=_ op=add_template_measure cause=ENOMEM comm="syz-executor.3" name="/root/syzkaller-testdir895971654/syzkaller.L31VQJ/69/file0" dev="sda1" ino=16785 res=0 21:40:41 executing program 3 (fault-call:3 fault-nth:40): mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 21:40:41 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140), 0x4) syz_emit_ethernet(0x1, &(0x7f0000017f07)=ANY=[@ANYBLOB="ffffffffffff0180a000000008004500002400000000002f9078ac14ffaa7f000001b481880b0000000000000800000086dd080088be00000000100000000100000000000000080022eb000000"], 0x0) [ 217.610364][T10222] FAULT_INJECTION: forcing a failure. [ 217.610364][T10222] name failslab, interval 1, probability 0, space 0, times 0 [ 217.640623][T10222] CPU: 1 PID: 10222 Comm: syz-executor.3 Not tainted 5.2.0-rc5+ #4 [ 217.648559][T10222] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 217.658622][T10222] Call Trace: [ 217.662005][T10222] dump_stack+0x1d8/0x2f8 [ 217.666541][T10222] should_fail+0x608/0x860 [ 217.670946][T10222] ? setup_fault_attr+0x2b0/0x2b0 [ 217.675995][T10222] __should_failslab+0x11a/0x160 [ 217.680922][T10222] ? kzalloc+0x1f/0x40 [ 217.685063][T10222] should_failslab+0x9/0x20 [ 217.689547][T10222] __kmalloc+0x7a/0x310 [ 217.693691][T10222] kzalloc+0x1f/0x40 [ 217.697572][T10222] crypto_create_tfm+0x73/0x310 [ 217.702520][T10222] ? crypto_alg_mod_lookup+0x4e9/0x820 [ 217.707980][T10222] crypto_alloc_tfm+0x15c/0x2e0 [ 217.712852][T10222] crypto_alloc_shash+0x2c/0x40 [ 217.717693][T10222] ima_calc_field_array_hash+0x175/0x700 [ 217.723314][T10222] ? __kasan_kmalloc+0x11c/0x1b0 [ 217.728466][T10222] ? kasan_kmalloc+0x9/0x10 [ 217.733069][T10222] ? ima_calc_file_hash+0x1a20/0x1a20 [ 217.738425][T10222] ? ima_alloc_init_template+0x193/0x470 [ 217.744161][T10222] ? ima_store_measurement+0x27b/0x730 [ 217.749618][T10222] ? process_measurement+0xcb3/0x1390 [ 217.754987][T10222] ? ima_bprm_check+0x115/0x280 [ 217.759819][T10222] ? security_bprm_check+0x98/0xb0 [ 217.764933][T10222] ? search_binary_handler+0x6a/0x660 [ 217.770312][T10222] ? __do_execve_file+0x1601/0x1cd0 [ 217.775489][T10222] ? __x64_sys_execve+0x94/0xb0 [ 217.780319][T10222] ? do_syscall_64+0xfe/0x140 [ 217.785062][T10222] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 217.791142][T10222] ? __bfs+0x550/0x550 [ 217.795199][T10222] ? ima_write_template_field_data+0x86/0x1e0 [ 217.801260][T10222] ? memcpy+0x49/0x60 [ 217.805226][T10222] ? ima_write_template_field_data+0x15e/0x1e0 [ 217.811369][T10222] ? ima_write_template_field_data+0x4e/0x1e0 [ 217.817447][T10222] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 217.823162][T10222] ? trace_kmalloc+0xcd/0x130 [ 217.827822][T10222] ? ima_write_template_field_data+0x4e/0x1e0 [ 217.833877][T10222] ? ima_write_template_field_data+0x86/0x1e0 [ 217.839960][T10222] ? memcpy+0x49/0x60 [ 217.843935][T10222] ? ima_write_template_field_data+0x165/0x1e0 [ 217.850096][T10222] ? ima_eventname_ng_init+0xc4/0xe0 [ 217.855576][T10222] ? ima_eventname_init+0x140/0x140 [ 217.860808][T10222] ? ima_alloc_init_template+0x3c7/0x470 [ 217.866430][T10222] ima_store_measurement+0x36e/0x730 [ 217.871702][T10222] ? ima_collect_measurement+0x4f0/0x4f0 [ 217.877330][T10222] ? prepend_path+0xa30/0xa30 [ 217.882014][T10222] ? kmem_cache_alloc+0x20b/0x2b0 [ 217.887036][T10222] ? ima_d_path+0x56/0x170 [ 217.891435][T10222] ? ima_d_path+0x10b/0x170 [ 217.895922][T10222] process_measurement+0xcb3/0x1390 [ 217.901146][T10222] ? ima_file_mmap+0x150/0x150 [ 217.905914][T10222] ? _raw_spin_unlock_irqrestore+0xbc/0xe0 [ 217.911725][T10222] ? debug_check_no_obj_freed+0x69d/0x740 [ 217.917452][T10222] ? lockdep_hardirqs_on+0x3c5/0x7d0 [ 217.923052][T10222] ? kfree+0xe6/0x120 [ 217.927033][T10222] ? rcu_lock_release+0x9/0x30 [ 217.931787][T10222] ? rcu_lock_release+0x26/0x30 [ 217.936620][T10222] ? smack_task_getsecid+0x1ca/0x230 [ 217.941890][T10222] ima_bprm_check+0x115/0x280 [ 217.946551][T10222] ? rcu_lock_release+0x9/0x30 [ 217.951421][T10222] ? process_measurement+0x1390/0x1390 [ 217.956875][T10222] ? tomoyo_bprm_check_security+0x118/0x130 [ 217.962776][T10222] security_bprm_check+0x98/0xb0 [ 217.967704][T10222] search_binary_handler+0x6a/0x660 [ 217.972898][T10222] ? rcu_lock_release+0x9/0x30 [ 217.977652][T10222] __do_execve_file+0x1601/0x1cd0 [ 217.982677][T10222] ? do_execve_file+0x40/0x40 [ 217.987336][T10222] ? getname_flags+0x214/0x640 [ 217.992083][T10222] __x64_sys_execve+0x94/0xb0 [ 217.996742][T10222] do_syscall_64+0xfe/0x140 [ 218.001253][T10222] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 218.007167][T10222] RIP: 0033:0x4592c9 [ 218.011053][T10222] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 218.030816][T10222] RSP: 002b:00007f26e9d09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 218.039208][T10222] RAX: ffffffffffffffda RBX: 00007f26e9d09c90 RCX: 00000000004592c9 [ 218.047168][T10222] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 21:40:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) socketpair(0x0, 0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x713a0520, 0x0, 0x0, 0x800e007f8) shutdown(r0, 0x0) 21:40:41 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0xffffff1f, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:41 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) fstatfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000000)=[{0x0}], 0x1) 21:40:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x10000000000, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:41 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140), 0x4) syz_emit_ethernet(0x1, &(0x7f0000017f07)=ANY=[@ANYBLOB="ffffffffffff0180a000000008004500002400000000002f9078ac14ffaa7f000001b481880b0000000000000800000086dd080088be00000000100000000100000000000000080022eb000000"], 0x0) [ 218.055145][T10222] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 218.063097][T10222] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f26e9d0a6d4 [ 218.071052][T10222] R13: 00000000004bf96d R14: 00000000004d1250 R15: 0000000000000003 21:40:41 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x2, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x100000000000000, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) [ 218.107639][T10222] ima: Can not allocate sha1 (reason: -12) [ 218.117924][ T26] audit: type=1804 audit(1561153241.577:105): pid=10222 uid=0 auid=4294967295 ses=4294967295 subj=_ op=add_template_measure cause=hashing_error comm="syz-executor.3" name="ima-ng" dev="sda1" ino=16787 res=0 21:40:41 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) fstatfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)}], 0x1) 21:40:41 executing program 3 (fault-call:3 fault-nth:41): mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 21:40:41 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140), 0x4) syz_emit_ethernet(0x1, &(0x7f0000017f07)=ANY=[@ANYBLOB="ffffffffffff0180a000000008004500002400000000002f9078ac14ffaa7f000001b481880b0000000000000800000086dd080088be00000000100000000100000000000000080022eb00000000200000000200000000000000"], 0x0) 21:40:41 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x8, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:41 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockname(r0, 0x0, 0x0) 21:40:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x200000000000000, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:41 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) fstatfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)}], 0x1) 21:40:41 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140), 0x4) syz_emit_ethernet(0x1, &(0x7f0000017f07)=ANY=[@ANYBLOB="ffffffffffff0180a000000008004500002400000000002f9078ac14ffaa7f000001b481880b0000000000000800000086dd080088be00000000100000000100000000000000080022eb00000000200000000200000000000000"], 0x0) [ 218.396313][T10261] FAULT_INJECTION: forcing a failure. [ 218.396313][T10261] name failslab, interval 1, probability 0, space 0, times 0 21:40:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x800000000000000, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:41 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x1a, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:41 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) fstatfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)}], 0x1) [ 218.515192][T10261] CPU: 1 PID: 10261 Comm: syz-executor.3 Not tainted 5.2.0-rc5+ #4 [ 218.523132][T10261] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 218.533195][T10261] Call Trace: [ 218.533217][T10261] dump_stack+0x1d8/0x2f8 [ 218.540819][T10261] should_fail+0x608/0x860 [ 218.540832][T10261] ? setup_fault_attr+0x2b0/0x2b0 [ 218.540850][T10261] __should_failslab+0x11a/0x160 [ 218.540863][T10261] ? kzalloc+0x1f/0x40 [ 218.540872][T10261] should_failslab+0x9/0x20 [ 218.540886][T10261] __kmalloc+0x7a/0x310 [ 218.567956][T10261] kzalloc+0x1f/0x40 [ 218.571858][T10261] crypto_create_tfm+0x73/0x310 [ 218.576716][T10261] ? crypto_alg_mod_lookup+0x4e9/0x820 [ 218.582218][T10261] crypto_alloc_tfm+0x15c/0x2e0 [ 218.587082][T10261] crypto_alloc_shash+0x2c/0x40 [ 218.591952][T10261] ima_calc_field_array_hash+0x175/0x700 [ 218.597595][T10261] ? __kasan_kmalloc+0x11c/0x1b0 [ 218.602525][T10261] ? kasan_kmalloc+0x9/0x10 [ 218.607018][T10261] ? ima_calc_file_hash+0x1a20/0x1a20 [ 218.612395][T10261] ? ima_alloc_init_template+0x193/0x470 [ 218.618014][T10261] ? ima_store_measurement+0x27b/0x730 [ 218.623461][T10261] ? process_measurement+0xcb3/0x1390 [ 218.628821][T10261] ? ima_bprm_check+0x115/0x280 [ 218.633661][T10261] ? security_bprm_check+0x98/0xb0 [ 218.638852][T10261] ? search_binary_handler+0x6a/0x660 [ 218.644215][T10261] ? __do_execve_file+0x1601/0x1cd0 [ 218.649419][T10261] ? __x64_sys_execve+0x94/0xb0 [ 218.654272][T10261] ? do_syscall_64+0xfe/0x140 [ 218.658941][T10261] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 218.665050][T10261] ? __bfs+0x550/0x550 [ 218.669385][T10261] ? ima_write_template_field_data+0x86/0x1e0 [ 218.675560][T10261] ? memcpy+0x49/0x60 [ 218.679533][T10261] ? ima_write_template_field_data+0x15e/0x1e0 [ 218.685704][T10261] ? ima_write_template_field_data+0x4e/0x1e0 [ 218.691765][T10261] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 218.697523][T10261] ? trace_kmalloc+0xcd/0x130 [ 218.702193][T10261] ? ima_write_template_field_data+0x4e/0x1e0 [ 218.708262][T10261] ? ima_write_template_field_data+0x86/0x1e0 [ 218.714319][T10261] ? memcpy+0x49/0x60 [ 218.718294][T10261] ? ima_write_template_field_data+0x165/0x1e0 [ 218.724456][T10261] ? ima_eventname_ng_init+0xc4/0xe0 [ 218.729733][T10261] ? ima_eventname_init+0x140/0x140 [ 218.734923][T10261] ? ima_alloc_init_template+0x3c7/0x470 [ 218.740554][T10261] ima_store_measurement+0x36e/0x730 [ 218.745839][T10261] ? ima_collect_measurement+0x4f0/0x4f0 [ 218.751472][T10261] ? prepend_path+0xa30/0xa30 [ 218.756155][T10261] ? kmem_cache_alloc+0x20b/0x2b0 [ 218.761174][T10261] ? ima_d_path+0x56/0x170 [ 218.765595][T10261] ? ima_d_path+0x10b/0x170 [ 218.770095][T10261] process_measurement+0xcb3/0x1390 [ 218.775301][T10261] ? ima_file_mmap+0x150/0x150 [ 218.780072][T10261] ? _raw_spin_unlock_irqrestore+0xbc/0xe0 [ 218.785872][T10261] ? debug_check_no_obj_freed+0x69d/0x740 [ 218.791588][T10261] ? lockdep_hardirqs_on+0x3c5/0x7d0 [ 218.796865][T10261] ? kfree+0xe6/0x120 [ 218.800850][T10261] ? rcu_lock_release+0x9/0x30 [ 218.805612][T10261] ? rcu_lock_release+0x26/0x30 [ 218.810483][T10261] ? smack_task_getsecid+0x1ca/0x230 [ 218.815767][T10261] ima_bprm_check+0x115/0x280 [ 218.820452][T10261] ? rcu_lock_release+0x9/0x30 [ 218.825294][T10261] ? process_measurement+0x1390/0x1390 [ 218.830748][T10261] ? tomoyo_bprm_check_security+0x118/0x130 [ 218.836630][T10261] security_bprm_check+0x98/0xb0 [ 218.841567][T10261] search_binary_handler+0x6a/0x660 [ 218.846847][T10261] ? rcu_lock_release+0x9/0x30 [ 218.851611][T10261] __do_execve_file+0x1601/0x1cd0 [ 218.856645][T10261] ? do_execve_file+0x40/0x40 [ 218.861319][T10261] ? getname_flags+0x214/0x640 [ 218.866087][T10261] __x64_sys_execve+0x94/0xb0 [ 218.870761][T10261] do_syscall_64+0xfe/0x140 [ 218.875278][T10261] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 218.881166][T10261] RIP: 0033:0x4592c9 [ 218.885051][T10261] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 218.904667][T10261] RSP: 002b:00007f26e9d09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b 21:40:41 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = socket$unix(0x1, 0x0, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 218.913076][T10261] RAX: ffffffffffffffda RBX: 00007f26e9d09c90 RCX: 00000000004592c9 [ 218.921060][T10261] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 218.929027][T10261] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 218.937006][T10261] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f26e9d0a6d4 [ 218.944976][T10261] R13: 00000000004bf96d R14: 00000000004d1250 R15: 0000000000000003 21:40:42 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x1a00, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) [ 219.048673][T10261] ima: Can not allocate sha1 (reason: -12) [ 219.062642][ T26] audit: type=1804 audit(1561153242.517:106): pid=10261 uid=0 auid=4294967295 ses=4294967295 subj=_ op=add_template_measure cause=hashing_error comm="syz-executor.3" name="ima-ng" dev="sda1" ino=16518 res=0 21:40:42 executing program 3: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 21:40:42 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x1a00000000000000, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:42 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) fstatfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="39000000130007606900000000000000ab008048260000004600010700", 0x1d}], 0x1) 21:40:42 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140), 0x4) syz_emit_ethernet(0x1, &(0x7f0000017f07)=ANY=[@ANYBLOB="ffffffffffff0180a000000008004500002400000000002f9078ac14ffaa7f000001b481880b0000000000000800000086dd080088be00000000100000000100000000000000080022eb00000000200000000200000000000000"], 0x0) 21:40:42 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x4000, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:42 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) fsetxattr$system_posix_acl(0xffffffffffffff9c, 0x0, 0x0, 0xffffffd8, 0x3) 21:40:42 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) fstatfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="39000000130007606900000000000000ab008048260000004600010700", 0x1d}], 0x1) 21:40:42 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x4000000000000000, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:42 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140), 0x4) syz_emit_ethernet(0x1, &(0x7f0000017f07)=ANY=[@ANYBLOB="ffffffffffff0180a000000008004500002400000000002f9078ac14ffaa7f000001b481880b0000000000000800000086dd080088be00000000100000000100000000000000080022eb00000000200000000200000000000000000000000800"], 0x0) 21:40:42 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x1000000, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:42 executing program 0: keyctl$negate(0xd, 0x0, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 21:40:42 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x2000000, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:42 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0xffffffff00000000, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:42 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140), 0x4) syz_emit_ethernet(0x1, &(0x7f0000017f07)=ANY=[@ANYBLOB="ffffffffffff0180a000000008004500002400000000002f9078ac14ffaa7f000001b481880b0000000000000800000086dd080088be00000000100000000100000000000000080022eb00000000200000000200000000000000000000000800"], 0x0) 21:40:43 executing program 3: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) setxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f00000000c0)='./file0/file0\x00', 0xe, 0x1) r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) ioctl$SCSI_IOCTL_DOORLOCK(r0, 0x5380) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) 21:40:43 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) fstatfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="39000000130007606900000000000000ab008048260000004600010700", 0x1d}], 0x1) 21:40:43 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x8000000, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:43 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) fstatfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="39000000130007606900000000000000ab0080482600000046000107000000141900010010000000000003", 0x2b}], 0x1) 21:40:43 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:43 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140), 0x4) syz_emit_ethernet(0x1, &(0x7f0000017f07)=ANY=[@ANYBLOB="ffffffffffff0180a000000008004500002400000000002f9078ac14ffaa7f000001b481880b0000000000000800000086dd080088be00000000100000000100000000000000080022eb00000000200000000200000000000000000000000800"], 0x0) 21:40:43 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) fstatfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="39000000130007606900000000000000ab0080482600000046000107000000141900010010000000000003", 0x2b}], 0x1) 21:40:43 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x1a000000, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:43 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000100), 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r0, r1, 0x0, 0x10000) 21:40:43 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0xffffff1f, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:43 executing program 3: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='loginuid\x00') setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000080)=0x3, 0x4) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 21:40:43 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140), 0x4) syz_emit_ethernet(0x1, &(0x7f0000017f07)=ANY=[@ANYBLOB="ffffffffffff0180a000000008004500002400000000002f9078ac14ffaa7f000001b481880b0000000000000800000086dd080088be00000000100000000100000000000000080022eb00000000200000000200000000000000000000000800655800"], 0x0) 21:40:43 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x40000000, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:43 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) fstatfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="39000000130007606900000000000000ab0080482600000046000107000000141900010010000000000003", 0x2b}], 0x1) 21:40:43 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x2, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:43 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x10000000000, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:43 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140), 0x4) syz_emit_ethernet(0x1, &(0x7f0000017f07)=ANY=[@ANYBLOB="ffffffffffff0180a000000008004500002400000000002f9078ac14ffaa7f000001b481880b0000000000000800000086dd080088be00000000100000000100000000000000080022eb00000000200000000200000000000000000000000800655800"], 0x0) 21:40:43 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) fstatfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="39000000130007606900000000000000ab0080482600000046000107000000141900010010000000000003f5000000000000", 0x32}], 0x1) 21:40:43 executing program 3: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2008}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r1, 0x4, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x40) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000240)={0x800100e, 0xeace, 0x2}) 21:40:43 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x100000000000000, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:44 executing program 0: poll(&(0x7f0000000100)=[{}], 0x22ba, 0x800000000004a) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0xfffffeb1, 0x0, 0x0, 0x800e00711) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ppoll(&(0x7f0000000080)=[{r1, 0x112}], 0x1, &(0x7f00000000c0)={0xffff}, 0x0, 0x0) shutdown(r0, 0x0) 21:40:44 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) fstatfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="39000000130007606900000000000000ab0080482600000046000107000000141900010010000000000003f5000000000000", 0x32}], 0x1) 21:40:44 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x8, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:44 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140), 0x4) syz_emit_ethernet(0x1, &(0x7f0000017f07)=ANY=[@ANYBLOB="ffffffffffff0180a000000008004500002400000000002f9078ac14ffaa7f000001b481880b0000000000000800000086dd080088be00000000100000000100000000000000080022eb00000000200000000200000000000000000000000800655800"], 0x0) 21:40:44 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x200000000000000, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:44 executing program 3: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) ioctl$VIDIOC_S_PARM(r0, 0xc0cc5616, &(0x7f0000000180)={0xa, @output={0x0, 0x1, {0x20000000200, 0x6c1d4352}, 0x1, 0xf8f5}}) 21:40:44 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x1a, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:44 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) fstatfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="39000000130007606900000000000000ab0080482600000046000107000000141900010010000000000003f5000000000000", 0x32}], 0x1) 21:40:44 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x800000000000000, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:44 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140), 0x4) syz_emit_ethernet(0x1, &(0x7f0000017f07)=ANY=[@ANYBLOB="ffffffffffff0180a000000008004500002400000000002f9078ac14ffaa7f000001b481880b0000000000000800000086dd080088be00000000100000000100000000000000080022eb000000002000000002000000000000000000000008006558000000"], 0x0) 21:40:44 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x1a00, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:44 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000000)) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[], 0xfffffe04) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x802, 0x0) 21:40:44 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) fstatfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="39000000130007606900000000000000ab0080482600000046000107000000141900010010000000000003f5000000000000ef38bf46", 0x36}], 0x1) 21:40:44 executing program 3: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) uselib(&(0x7f0000000040)='./file0\x00') 21:40:44 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x4000, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:44 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x1a00000000000000, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:44 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) fstatfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="39000000130007606900000000000000ab0080482600000046000107000000141900010010000000000003f5000000000000ef38bf46", 0x36}], 0x1) 21:40:44 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140), 0x4) syz_emit_ethernet(0x1, &(0x7f0000017f07)=ANY=[@ANYBLOB="ffffffffffff0180a000000008004500002400000000002f9078ac14ffaa7f000001b481880b0000000000000800000086dd080088be00000000100000000100000000000000080022eb000000002000000002000000000000000000000008006558000000"], 0x0) 21:40:44 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x4000000000000000, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:44 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) fstatfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="39000000130007606900000000000000ab0080482600000046000107000000141900010010000000000003f5000000000000ef38bf46", 0x36}], 0x1) 21:40:44 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x1000000, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:45 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140), 0x4) syz_emit_ethernet(0x1, &(0x7f0000017f07)=ANY=[@ANYBLOB="ffffffffffff0180a000000008004500002400000000002f9078ac14ffaa7f000001b481880b0000000000000800000086dd080088be00000000100000000100000000000000080022eb000000002000000002000000000000000000000008006558000000"], 0x0) 21:40:45 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x4000, 0x0) connect$netrom(r0, &(0x7f0000000080)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0x4}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @null, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x20) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000180)={0x0, 0x6, 0x4}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000200)={r1, 0xffffffff7fffffff, 0x5, [0x80, 0x8001, 0x3, 0x1, 0x401]}, 0x12) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 21:40:45 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0xffffffff00000000, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:45 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x2000000, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) socketpair(0x0, 0x0, 0x0, 0x0) setsockopt$inet_int(r0, 0x0, 0x44, &(0x7f0000000000), 0x4) recvfrom$inet(r0, 0x0, 0x713a0520, 0x0, 0x0, 0x800e007f8) shutdown(r0, 0x0) 21:40:45 executing program 2: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) poll(&(0x7f0000000040), 0x2000000000000014, 0x4e) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x6c9, 0x0, 0x0, 0x800e00465) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x8001) shutdown(r1, 0x0) 21:40:45 executing program 3: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0x8, "71cecbcd50410cde"}, 0xa, 0x1) 21:40:45 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) fstatfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="39000000130007606900000000000000ab0080482600000046000107000000141900010010000000000003f5000000000000ef38bf461e59", 0x38}], 0x1) 21:40:45 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:45 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x8000000, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:45 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) fstatfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="39000000130007606900000000000000ab0080482600000046000107000000141900010010000000000003f5000000000000ef38bf461e59", 0x38}], 0x1) 21:40:45 executing program 3: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) rt_sigaction(0x26, &(0x7f0000000180)={&(0x7f0000000040)="470f0fceaa263e420fc7720ac4214816e2c482f13b6165440fe17d32c4e345383d0c00000002450f459f62e6a6763667410f380bb50010ef000fdfb56ec1ffff660f3835b260e6cf1a", {0x2}, 0x8000000, &(0x7f00000000c0)="66470f3a08e50746d03c422e2e66410f3a20b9000001000bc4a1f9e1f7660feae96fc40100166f72450f14adb0b846bef0280ec421a973f8f3"}, 0x0, 0x8, &(0x7f00000001c0)) syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x10001, 0x4, &(0x7f0000000540)=[{&(0x7f0000000280)="22de541d066db081f3a4c9cecbbe1c2313d7c2bc498384584804d3e7a60d490882a0d7816570cefe71c337f825975446f190608dbf754367", 0x38, 0x80000001}, {&(0x7f0000000380)="4deb0ac8a92ae60eb4dfddce52aaa805e9eca130f3369767011764600a7c8e6222cf1f9eb8aed12c897168f010cb0587112a1a8839bdc709f8fbaa789eae344ee837c6350edda53f89f225eef6bbae4f0bdc5afc02d164c33ec1a8a47dde09b3320a3dc1ece6203bbb16458e51729da60e37f9deadf771a61abdafab506767e0c9d467c81f06e9bbfaa5c37606ba9adfde88533db72d9ef76251fe753d1aa7241aa2a688d7f0ca761d8d173b3eb703ef666ee1a38f75a56151a51a1009cd7a2ff54a2051c79f09847493b70e3491977f1dcda472a5942dc45ab13e8ed0b1f4188de9c6ce64262bcd45f58da7678894", 0xef, 0x47a}, {&(0x7f00000002c0)="2c8223c852960e8e88e36a19688ce692c2a0c9ba98dfe677e543cd0a471c8ecdce8920dbac90eadacc18e716042439f4b8ce0dad3552c95e8f5fe647f6bc759d94b4fa9514f658c703b67b5fef41e9", 0x4f, 0x3}, {&(0x7f0000000480)="8db438026f1df62296bba20a0fdce97af39479fc5bc96135db39710be1c8c2fdc6f21f751eb8bbb482e7335b23a37e59d40cc5caf165b9b7d8e410500bb834b6ce0d343d26a0d0f12e85948ce64b3b0cc10b37bc075ff63e3b80ea649b003efa881741b4d86fe068e4e3b8c01c87dfedd50ec5d598895465c0488073bca2a5e394f959333c87434cbbf99093", 0x8c, 0x8}], 0x4400, &(0x7f00000005c0)={[{@max_inline={'max_inline', 0x3d, [0x0, 0x6b, 0x2d, 0x6d, 0x3d, 0x37]}}], [{@pcr={'pcr', 0x3d, 0x7}}]}) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 21:40:45 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x2, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:45 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000240)={0x79}) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x10000, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', r2}, 0x10) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdb3) ioctl$KVM_SET_VAPIC_ADDR(r3, 0x4008ae93, &(0x7f00000000c0)=0x6002) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000100)="460f300f07c483614804ee08440f20c03506000000440f22c0c402f93473230f09f20f013cb9b805000000b9c00000000f01d90fc728c4c1f9e79f2e000000", 0x3f}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f00000002c0)={"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"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(r2, 0x5, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$DRM_IOCTL_INFO_BUFS(r2, 0xc0106418, &(0x7f00000001c0)={0x800000000, 0x6, 0x9, 0x5, 0xa, 0x4}) ioctl$SIOCX25SDTEFACILITIES(r2, 0x89eb, &(0x7f0000000180)={0x3fff8000, 0x80000001, 0x1, 0x3ff, 0x1cf2, 0x18, 0x1b, "b49a02ee42ff80634a31abe5303b79f5a1a10bb7", "10e56939d92940cfdd25537639cef617cbf35017"}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) 21:40:45 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x1a000000, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:45 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) fstatfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="39000000130007606900000000000000ab0080482600000046000107000000141900010010000000000003f5000000000000ef38bf461e59", 0x38}], 0x1) 21:40:45 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x8, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:46 executing program 2: poll(&(0x7f0000000100)=[{}], 0x22ba, 0x800000000004a) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0xfffffeb1, 0x0, 0x0, 0x800e00711) ppoll(&(0x7f0000000080)=[{}, {0xffffffffffffffff, 0x112}, {}, {}], 0x4, 0x0, &(0x7f0000000140)={0x5}, 0x8) shutdown(r0, 0x0) 21:40:46 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x40000000, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:46 executing program 4: perf_event_open(&(0x7f0000000100)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x14104a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x2) sendfile(r1, r0, &(0x7f0000000000), 0x0) 21:40:46 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1a, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:46 executing program 3: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x4400, 0x0) getsockopt$TIPC_IMPORTANCE(r0, 0x10f, 0x7f, &(0x7f0000000080), &(0x7f00000000c0)=0x4) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 21:40:46 executing program 0: mlock(&(0x7f0000000000/0x4000)=nil, 0x4000) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 21:40:46 executing program 0: 21:40:46 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x10000000000, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:46 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1a00, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:46 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x100000000000000, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:46 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x4000, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:46 executing program 3: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) r0 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x2, 0x100) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000180)={0x56c0, 0x4, 0x4, 0x120000, {0x0, 0x2710}, {0x4, 0xa, 0x0, 0x87, 0xc9, 0x8, "990304d6"}, 0x10001, 0x4, @planes=&(0x7f0000000080)={0x3, 0x6, @userptr=0x3, 0x9}, 0x4}) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f00000000c0)=0x7f) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 21:40:47 executing program 2: 21:40:47 executing program 4: 21:40:47 executing program 0: 21:40:47 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x200000000000000, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:47 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1000000, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:47 executing program 3: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x600080, 0x0) ioctl$SIOCGETLINKNAME(r0, 0x89e0, &(0x7f0000000240)={0x3, 0x2}) execve(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) rt_sigpending(&(0x7f0000000040), 0x8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_SUBDEV_G_CROP(r1, 0xc038563b, &(0x7f00000001c0)={0x1, 0x0, {0x5, 0x0, 0x2, 0x8}}) r2 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x7fffffff, 0x80) setsockopt$TIPC_IMPORTANCE(r2, 0x10f, 0x7f, &(0x7f00000000c0)=0x3, 0x4) r3 = socket$nl_crypto(0x10, 0x3, 0x15) getsockname(r3, &(0x7f00000003c0)=@ax25={{0x3, @netrom}, [@remote, @bcast, @null, @remote, @netrom, @null, @remote, @bcast]}, &(0x7f0000000440)=0x80) 21:40:47 executing program 4: 21:40:47 executing program 0: 21:40:47 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x800000000000000, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:47 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x2000000, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:47 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x200000000a, 0xffffffffffffffff) fcntl$dupfd(r1, 0xa, 0xffffffffffffffff) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r3, 0x0) connect$unix(r2, &(0x7f0000000440)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r4 = accept$inet(r3, 0x0, 0x0) sendto(r4, &(0x7f0000000040), 0xfe81, 0x0, 0x0, 0x100000118) shmget$private(0x0, 0x12000, 0x0, &(0x7f0000fed000/0x12000)=nil) shmctl$IPC_RMID(0x0, 0x0) geteuid() 21:40:47 executing program 3: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x101002, 0x0) sendto$isdn(r0, &(0x7f0000000080)={0x9, 0xfaa, "b02183aff5f8052489fe85d1a749b97fe602ce6eb6a2adf3f017c7d5612be850467a37d70742874226dccb1d2bba5f6d1cee1f919ac1fd210fa0f3ed080a57a577cfe44c0973bb5c741103"}, 0x53, 0x800, &(0x7f0000000180)={0x22, 0x8001, 0xfffffffffffeffff, 0x9, 0x54}, 0x6) 21:40:47 executing program 2: memfd_create(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000000), 0x4) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x28, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}, [@typed={0x14, 0xc, @ipv6=@ipv4={[], [], @empty}}]}, 0x28}}, 0x0) 21:40:47 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) poll(&(0x7f0000000040), 0x2000000000000014, 0x4e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0xcfb3abb5, 0x0, 0x0, 0x800e00815) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, &(0x7f0000000080), 0x8) shutdown(r0, 0x0) 21:40:47 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x8000000, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:47 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x1a00000000000000, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:47 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x4000000000000000, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:47 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1a000000, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) [ 223.935655][T10672] netlink: 'syz-executor.2': attribute type 12 has an invalid length. 21:40:47 executing program 0: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) close(r0) close(r1) socketpair$unix(0x1, 0x20000000005, 0x0, &(0x7f0000000140)) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x27d, 0x0, 0x0, 0x800e00f80) 21:40:47 executing program 3: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x80000, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000080)) accept4$bt_l2cap(r0, 0x0, &(0x7f00000000c0), 0x80000000800) prctl$PR_SET_SECUREBITS(0x1c, 0x23) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/current\x00', 0x2, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 21:40:47 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0xffffffff00000000, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:47 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x40000000, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r1, 0x5501, 0x0) write$uinput_user_dev(r1, &(0x7f0000000880)={'syz1\x00'}, 0x45c) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000100)={'syzkaller0\x00', {0x2, 0x0, @local}}) 21:40:47 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) [ 224.347578][T10707] netlink: 'syz-executor.2': attribute type 12 has an invalid length. [ 224.358255][T10708] input: syz1 as /devices/virtual/input/input5 21:40:47 executing program 2: memfd_create(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000000), 0x4) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x28, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}, [@typed={0x14, 0xc, @ipv6=@ipv4={[], [], @empty}}]}, 0x28}}, 0x0) [ 224.467971][T10672] syz-executor.2 (10672) used greatest stack depth: 18624 bytes left [ 224.537566][T10720] input: syz1 as /devices/virtual/input/input6 [ 224.545522][T10718] netlink: 'syz-executor.2': attribute type 12 has an invalid length. 21:40:48 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, 0x0, &(0x7f00000004c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000100)={'TPROXY\x00\x00\x00\xf8\xff\xff\xff\xff\xff\xff\xff\x00'}, &(0x7f0000000080)=0x30d) ioctl(r1, 0xffffffffffffffb7, &(0x7f0000000080)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x9, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x5, 0x800}}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x5, 0x7}}]}, {0x0, [0x30, 0x7f, 0x7f, 0x61, 0x6f, 0x5f, 0x61]}}, &(0x7f00000002c0)=""/77, 0x51, 0x4d, 0x1}, 0x20) recvmsg(0xffffffffffffffff, 0x0, 0x2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x4000000000007) r2 = socket$rxrpc(0x21, 0x2, 0x200000000007) io_setup(0x5, &(0x7f00000001c0)=0x0) connect$rxrpc(r2, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @initdev}}, 0x24) io_submit(r3, 0x1, &(0x7f0000000600)=[&(0x7f0000000200)={0xfffffffffffffdef, 0x0, 0x0, 0x8, 0x0, r0, 0x0}]) 21:40:48 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x10000000000, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:48 executing program 3: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x1, 0x0) ioctl$KVM_SIGNAL_MSI(r0, 0x4020aea5, &(0x7f0000000080)={0x4, 0xf000, 0x6, 0x7, 0x8}) 21:40:48 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x2, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:48 executing program 0 (fault-call:3 fault-nth:0): r0 = socket$netlink(0x10, 0x3, 0x0) fstatfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="39000000130007606900000000000000ab0080482600000046000107000000141900010010000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) 21:40:48 executing program 2 (fault-call:2 fault-nth:0): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140), 0x4) syz_emit_ethernet(0x1, &(0x7f0000017f07)=ANY=[@ANYBLOB="ffffffffffff0180a000000008004500002400000000002f9078ac14ffaa7f000001b481880b0000000000000800000086dd080088be00000000100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0) 21:40:48 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x8, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) [ 224.891673][T10732] FAULT_INJECTION: forcing a failure. [ 224.891673][T10732] name failslab, interval 1, probability 0, space 0, times 0 [ 224.921123][T10732] CPU: 0 PID: 10732 Comm: syz-executor.0 Not tainted 5.2.0-rc5+ #4 [ 224.929321][T10732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 224.939381][T10732] Call Trace: [ 224.939408][T10732] dump_stack+0x1d8/0x2f8 [ 224.947100][T10732] should_fail+0x608/0x860 [ 224.947115][T10732] ? setup_fault_attr+0x2b0/0x2b0 [ 224.947133][T10732] __should_failslab+0x11a/0x160 [ 224.947145][T10732] should_failslab+0x9/0x20 [ 224.947155][T10732] kmem_cache_alloc_node+0x65/0x270 [ 224.947164][T10732] ? __alloc_skb+0x9f/0x500 [ 224.947180][T10732] __alloc_skb+0x9f/0x500 [ 224.956635][T10732] netlink_sendmsg+0x78d/0xd40 [ 224.956660][T10732] ? netlink_getsockopt+0x9f0/0x9f0 21:40:48 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1a, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:48 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x100000000000000, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:48 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140), 0x4) syz_emit_ethernet(0x1, &(0x7f0000017f07)=ANY=[@ANYBLOB="ffffffffffff0180a000000008004500002400000000002f9078ac14ffaa7f000001b481880b0000000000000800000086dd080088be00000000100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0) [ 224.956676][T10732] ? tomoyo_socket_sendmsg+0x25/0x30 [ 224.971406][T10732] ? security_socket_sendmsg+0xa0/0xd0 [ 224.971419][T10732] ? netlink_getsockopt+0x9f0/0x9f0 [ 224.971433][T10732] sock_write_iter+0x30c/0x430 [ 224.971450][T10732] ? sock_read_iter+0x410/0x410 [ 225.015826][T10732] do_iter_readv_writev+0x6f5/0x9c0 [ 225.021033][T10732] ? vfs_dedupe_file_range+0x9c0/0x9c0 [ 225.026503][T10732] ? security_file_permission+0x148/0x350 [ 225.032227][T10732] ? rw_verify_area+0x1c2/0x360 [ 225.037086][T10732] do_iter_write+0x180/0x590 21:40:48 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1a00, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) [ 225.041688][T10732] ? do_writev+0x9e/0x560 [ 225.046011][T10732] do_writev+0x2ce/0x560 [ 225.050344][T10732] ? do_readv+0x410/0x410 [ 225.050356][T10732] ? finish_task_switch+0x251/0x560 [ 225.050374][T10732] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 225.050388][T10732] ? trace_hardirqs_on_caller+0x74/0x80 [ 225.050402][T10732] ? rcu_irq_exit+0x118/0x2b0 [ 225.050419][T10732] ? retint_kernel+0x2b/0x2b [ 225.070920][T10732] __x64_sys_writev+0x7d/0x90 [ 225.070936][T10732] do_syscall_64+0xfe/0x140 [ 225.070952][T10732] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 225.070962][T10732] RIP: 0033:0x4592c9 [ 225.070973][T10732] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 225.070978][T10732] RSP: 002b:00007fcfea069c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 225.070989][T10732] RAX: ffffffffffffffda RBX: 00007fcfea069c90 RCX: 00000000004592c9 21:40:48 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x200000000000000, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) [ 225.070994][T10732] RDX: 0000000000000001 RSI: 0000000020000000 RDI: 0000000000000003 [ 225.071000][T10732] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 225.071006][T10732] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcfea06a6d4 [ 225.071018][T10732] R13: 00000000004c640b R14: 00000000004e0418 R15: 0000000000000005 21:40:48 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) unshare(0x140000) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, 0x0) 21:40:48 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x800000000000000, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:48 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x4000, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:48 executing program 3: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) r0 = syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x6, 0x4000) ioctl$IOC_PR_RELEASE(r0, 0x401070ca, &(0x7f0000000080)={0x10000, 0x200}) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) r1 = getpgrp(0xffffffffffffffff) ptrace$poke(0x5, r1, &(0x7f00000000c0), 0x3) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 21:40:48 executing program 0 (fault-call:3 fault-nth:1): r0 = socket$netlink(0x10, 0x3, 0x0) fstatfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="39000000130007606900000000000000ab0080482600000046000107000000141900010010000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) 21:40:48 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140), 0x4) syz_emit_ethernet(0x2, &(0x7f0000017f07)=ANY=[@ANYBLOB="ffffffffffff0180a000000008004500002400000000002f9078ac14ffaa7f000001b481880b0000000000000800000086dd080088be00000000100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0) 21:40:48 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1a00000000000000, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:48 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x254, 0x800) getsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, &(0x7f00000001c0), &(0x7f0000000200)=0x4) r1 = socket$inet6(0xa, 0x8000a, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000000)=0xd767, 0x4) shutdown(r1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r1, 0x2334) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000300)={0x0, 0x10, &(0x7f0000000140)=[@in={0x2, 0x4e23, @loopback=0xac1414e0}]}, &(0x7f0000000080)=0x10) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000100)=0x0) fcntl$setown(r1, 0x8, r3) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x7c, &(0x7f00000000c0)={r2}, 0x8) [ 225.429439][T10781] FAULT_INJECTION: forcing a failure. [ 225.429439][T10781] name failslab, interval 1, probability 0, space 0, times 0 [ 225.459730][T10781] CPU: 0 PID: 10781 Comm: syz-executor.0 Not tainted 5.2.0-rc5+ #4 [ 225.467667][T10781] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 225.477720][T10781] Call Trace: [ 225.481024][T10781] dump_stack+0x1d8/0x2f8 [ 225.485452][T10781] should_fail+0x608/0x860 [ 225.489877][T10781] ? setup_fault_attr+0x2b0/0x2b0 [ 225.494951][T10781] __should_failslab+0x11a/0x160 [ 225.499901][T10781] should_failslab+0x9/0x20 [ 225.504412][T10781] kmem_cache_alloc_node_trace+0x6e/0x280 [ 225.510147][T10781] ? __kmalloc_node_track_caller+0x3c/0x60 [ 225.515964][T10781] __kmalloc_node_track_caller+0x3c/0x60 [ 225.521598][T10781] ? netlink_sendmsg+0x78d/0xd40 [ 225.521611][T10781] __alloc_skb+0xe8/0x500 [ 225.521636][T10781] netlink_sendmsg+0x78d/0xd40 [ 225.521660][T10781] ? netlink_getsockopt+0x9f0/0x9f0 [ 225.521674][T10781] ? tomoyo_socket_sendmsg+0x25/0x30 [ 225.521686][T10781] ? security_socket_sendmsg+0xa0/0xd0 [ 225.521696][T10781] ? netlink_getsockopt+0x9f0/0x9f0 [ 225.521711][T10781] sock_write_iter+0x30c/0x430 [ 225.530977][T10781] ? sock_read_iter+0x410/0x410 [ 225.531003][T10781] do_iter_readv_writev+0x6f5/0x9c0 [ 225.531018][T10781] ? vfs_dedupe_file_range+0x9c0/0x9c0 [ 225.531032][T10781] ? security_file_permission+0x148/0x350 [ 225.531047][T10781] ? rw_verify_area+0x1c2/0x360 [ 225.531061][T10781] do_iter_write+0x180/0x590 [ 225.531085][T10781] do_writev+0x2ce/0x560 [ 225.587931][T10781] ? do_readv+0x410/0x410 [ 225.587947][T10781] ? trace_x86_fpu_regs_activated+0x213/0x250 [ 225.587963][T10781] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 225.596781][T10781] ? retint_kernel+0x2b/0x2b [ 225.617483][T10781] ? trace_hardirqs_on_caller+0x74/0x80 [ 225.623131][T10781] ? rcu_irq_exit+0x118/0x2b0 [ 225.627821][T10781] ? retint_kernel+0x2b/0x2b [ 225.632428][T10781] ? do_syscall_64+0xc0/0x140 [ 225.637121][T10781] __x64_sys_writev+0x7d/0x90 [ 225.641808][T10781] do_syscall_64+0xfe/0x140 [ 225.646348][T10781] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 225.652254][T10781] RIP: 0033:0x4592c9 [ 225.656151][T10781] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 21:40:49 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x4000000000000000, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:49 executing program 3: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 21:40:49 executing program 3: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) chmod(&(0x7f00000000c0)='./file0\x00', 0x85) r0 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x200, 0x80000) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r0, 0xc034564b, &(0x7f0000000080)={0x8001, 0x777b5f7b, 0xf11, 0x200, 0x1, @discrete={0x2, 0xfffffffffffffff8}}) 21:40:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1000000, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:49 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140), 0x4) syz_emit_ethernet(0x8, &(0x7f0000017f07)=ANY=[@ANYBLOB="ffffffffffff0180a000000008004500002400000000002f9078ac14ffaa7f000001b481880b0000000000000800000086dd080088be00000000100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0) [ 225.675768][T10781] RSP: 002b:00007fcfea069c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 225.684190][T10781] RAX: ffffffffffffffda RBX: 00007fcfea069c90 RCX: 00000000004592c9 [ 225.692168][T10781] RDX: 0000000000000001 RSI: 0000000020000000 RDI: 0000000000000003 [ 225.700141][T10781] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 225.708143][T10781] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcfea06a6d4 [ 225.716205][T10781] R13: 00000000004c640b R14: 00000000004e0418 R15: 0000000000000005 21:40:49 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0xffffffff00000000, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:49 executing program 4: r0 = perf_event_open$cgroup(&(0x7f0000000080)={0x3, 0x70, 0x3, 0x7fff, 0x2, 0x43d, 0x0, 0x52e1, 0x41033, 0xd, 0x4, 0x9e94, 0x0, 0x97e8, 0x400000000000, 0x400, 0x9, 0x3, 0xff, 0x7ff, 0x2, 0x2, 0x40, 0x8, 0x1, 0x2, 0x5, 0x1, 0xb0, 0x100000001, 0x4, 0x1ff, 0x8000, 0x8, 0x4, 0x0, 0x7, 0x7, 0x0, 0x800, 0x1, @perf_config_ext={0x4, 0x4560}, 0x440, 0x7, 0x1, 0x4, 0x4c15, 0x4, 0x2}, 0xffffffffffffff9c, 0x5, 0xffffffffffffff9c, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000100)='trusted.overlay.opaque\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x3) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$addseals(r1, 0x409, 0x0) 21:40:49 executing program 0 (fault-call:3 fault-nth:2): r0 = socket$netlink(0x10, 0x3, 0x0) fstatfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="39000000130007606900000000000000ab0080482600000046000107000000141900010010000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) 21:40:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x2000000, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:49 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140), 0x4) syz_emit_ethernet(0xe, &(0x7f0000017f07)=ANY=[@ANYBLOB="ffffffffffff0180a000000008004500002400000000002f9078ac14ffaa7f000001b481880b0000000000000800000086dd080088be00000000100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0) 21:40:49 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x2, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) [ 225.958316][T10828] FAULT_INJECTION: forcing a failure. [ 225.958316][T10828] name failslab, interval 1, probability 0, space 0, times 0 21:40:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x8000000, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) [ 226.023688][T10828] CPU: 1 PID: 10828 Comm: syz-executor.0 Not tainted 5.2.0-rc5+ #4 [ 226.031628][T10828] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 226.041712][T10828] Call Trace: [ 226.045003][T10828] dump_stack+0x1d8/0x2f8 [ 226.049343][T10828] should_fail+0x608/0x860 [ 226.053770][T10828] ? setup_fault_attr+0x2b0/0x2b0 [ 226.058802][T10828] ? _raw_spin_unlock_irqrestore+0xad/0xe0 [ 226.064629][T10828] ? rcu_preempt_deferred_qs_irqrestore+0x810/0xd40 [ 226.071225][T10828] __should_failslab+0x11a/0x160 [ 226.076171][T10828] ? skb_clone+0x1cc/0x380 [ 226.080593][T10828] should_failslab+0x9/0x20 [ 226.085102][T10828] kmem_cache_alloc+0x56/0x2b0 [ 226.089880][T10828] ? check_preemption_disabled+0x47/0x280 [ 226.095608][T10828] skb_clone+0x1cc/0x380 [ 226.099857][T10828] netlink_deliver_tap+0x63a/0xa00 [ 226.105168][T10828] netlink_unicast+0x938/0xaf0 [ 226.109941][T10828] ? netlink_detachskb+0x50/0x50 [ 226.109957][T10828] ? __phys_addr_symbol+0x2f/0x70 21:40:49 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x8, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1a000000, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) [ 226.109967][T10828] ? __check_object_size+0x314/0x400 [ 226.109981][T10828] ? security_netlink_send+0x94/0xb0 [ 226.109994][T10828] netlink_sendmsg+0xa7a/0xd40 [ 226.110013][T10828] ? retint_kernel+0x2b/0x2b [ 226.120047][T10828] ? netlink_getsockopt+0x9f0/0x9f0 [ 226.120062][T10828] ? tomoyo_socket_sendmsg+0x25/0x30 [ 226.120075][T10828] ? security_socket_sendmsg+0xa0/0xd0 [ 226.120085][T10828] ? netlink_getsockopt+0x9f0/0x9f0 [ 226.120097][T10828] sock_write_iter+0x30c/0x430 [ 226.120110][T10828] ? sock_read_iter+0x410/0x410 [ 226.120118][T10828] ? rcu_irq_exit+0x118/0x2b0 [ 226.120144][T10828] ? do_iter_readv_writev+0x138/0x9c0 [ 226.120152][T10828] ? do_iter_readv_writev+0x142/0x9c0 [ 226.120167][T10828] do_iter_readv_writev+0x6f5/0x9c0 [ 226.120180][T10828] ? vfs_dedupe_file_range+0x9c0/0x9c0 [ 226.120191][T10828] ? security_file_permission+0x148/0x350 [ 226.120204][T10828] ? rw_verify_area+0x1c2/0x360 [ 226.120217][T10828] do_iter_write+0x180/0x590 [ 226.120232][T10828] ? do_writev+0x9e/0x560 [ 226.120245][T10828] do_writev+0x2ce/0x560 [ 226.220583][T10828] ? do_readv+0x410/0x410 [ 226.224928][T10828] ? __mutex_unlock_slowpath+0x18c/0x630 [ 226.230572][T10828] ? mutex_unlock+0x10/0x10 [ 226.235082][T10828] ? __sb_end_write+0xde/0x120 [ 226.239851][T10828] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 226.245601][T10828] ? trace_hardirqs_on_caller+0x74/0x80 [ 226.251164][T10828] ? rcu_irq_exit+0x118/0x2b0 [ 226.255845][T10828] ? retint_kernel+0x2b/0x2b [ 226.260445][T10828] __x64_sys_writev+0x7d/0x90 [ 226.265149][T10828] do_syscall_64+0xfe/0x140 [ 226.269668][T10828] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 226.269678][T10828] RIP: 0033:0x4592c9 [ 226.269689][T10828] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 226.269694][T10828] RSP: 002b:00007fcfea069c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 226.269704][T10828] RAX: ffffffffffffffda RBX: 00007fcfea069c90 RCX: 00000000004592c9 [ 226.269709][T10828] RDX: 0000000000000001 RSI: 0000000020000000 RDI: 0000000000000003 21:40:49 executing program 3: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x103081, 0x5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@empty, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000380)={{{@in=@loopback, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000300)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000480)={{{@in6=@dev={0xfe, 0x80, [], 0x27}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e23, 0x7fff, 0x4e20, 0xc8b7, 0x2, 0xa0, 0x0, 0x84, r1, r2}, {0x0, 0x401, 0x23feb1c1, 0x2, 0x401, 0x6, 0x5, 0x1}, {0x400, 0xfffffffffffffff8, 0x3, 0x5}, 0x3, 0x6e6bb7, 0x0, 0x1, 0x2, 0x2}, {{@in=@multicast1, 0x4d6, 0x33}, 0xa, @in6=@ipv4={[], [], @remote}, 0x3500, 0x1, 0x3, 0x20a, 0x20, 0x6, 0x7e}}, 0xe8) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 21:40:49 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x1a, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x40000000, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:49 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 226.269715][T10828] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 226.269721][T10828] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcfea06a6d4 [ 226.269727][T10828] R13: 00000000004c640b R14: 00000000004e0418 R15: 0000000000000005 21:40:49 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x1a00, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:49 executing program 0 (fault-call:3 fault-nth:3): r0 = socket$netlink(0x10, 0x3, 0x0) fstatfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="39000000130007606900000000000000ab0080482600000046000107000000141900010010000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) 21:40:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x10000000000, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:49 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140), 0x4) syz_emit_ethernet(0xf000, &(0x7f0000017f07)=ANY=[@ANYBLOB="ffffffffffff0180a000000008004500002400000000002f9078ac14ffaa7f000001b481880b0000000000000800000086dd080088be00000000100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0) 21:40:49 executing program 3: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) r0 = fsmount(0xffffffffffffff9c, 0x1, 0x80) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000040)={r1, 0x0, 0x5, 0x1ff, 0x7}) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 21:40:49 executing program 4: syz_open_dev$loop(0x0, 0x0, 0x6) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x7, r0, 0x0) msync(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x40) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) mkdirat$cgroup(r1, 0x0, 0x1ff) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x6800, 0x100, &(0x7f0000000540)) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000380)=ANY=[], 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) pipe2$9p(0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@remote, 0x0, 0x1, 0xff, 0x2, 0x40, 0x3b63}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="73797a30d97fdf575f9efd3c6c2a80273b0c90d400b5304a23d6f15ca00213413feaab5dd862cef81a57d8886e0c8f14eb9619f9b118c3ab733923a24ea952bcb8a1a162406a034279b24b3fc8ea191e5fff3a3244c6927cc4360f22856c7fddb8c1699ccff373f99aa54d814c58f9e9b08a8c50ba5338a2b8f9265b10e20bb2741de392a44ba5ee23b6bcbd56c8a6c895d460ed434d6043b81df0e5237d04f5bda834a8bacc0fa80bd65b6d30c1988519ff71f2f92eaaa03d6d3c0c270de0a06034cbda16dd44cb5d"], 0xc9) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045532, &(0x7f0000000140)=0x4) socket$nl_netfilter(0x10, 0x3, 0xc) pipe2(0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8940, 0x0) 21:40:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x4000, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) [ 226.589843][T10866] FAULT_INJECTION: forcing a failure. [ 226.589843][T10866] name failslab, interval 1, probability 0, space 0, times 0 21:40:50 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140), 0x4) syz_emit_ethernet(0x20017f08, &(0x7f0000017f07)=ANY=[@ANYBLOB="ffffffffffff0180a000000008004500002400000000002f9078ac14ffaa7f000001b481880b0000000000000800000086dd080088be00000000100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0) [ 226.688263][T10866] CPU: 1 PID: 10866 Comm: syz-executor.0 Not tainted 5.2.0-rc5+ #4 [ 226.696204][T10866] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 226.706266][T10866] Call Trace: [ 226.709564][T10866] dump_stack+0x1d8/0x2f8 [ 226.713906][T10866] should_fail+0x608/0x860 [ 226.718335][T10866] ? setup_fault_attr+0x2b0/0x2b0 [ 226.723383][T10866] __should_failslab+0x11a/0x160 [ 226.728334][T10866] ? do_setlink+0x688/0x3b60 [ 226.732926][T10866] should_failslab+0x9/0x20 [ 226.737434][T10866] __kmalloc+0x7a/0x310 [ 226.741606][T10866] do_setlink+0x688/0x3b60 [ 226.746045][T10866] ? lockdep_hardirqs_on+0x3c5/0x7d0 [ 226.751437][T10866] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 226.756914][T10866] ? retint_kernel+0x2b/0x2b [ 226.761521][T10866] ? rtnetlink_event+0x1b0/0x1b0 [ 226.766477][T10866] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 226.771939][T10866] ? __bfs+0x550/0x550 [ 226.776010][T10866] ? rcu_irq_exit+0x118/0x2b0 [ 226.780705][T10866] ? retint_kernel+0x2b/0x2b [ 226.785315][T10866] ? __nla_validate_parse+0xce5/0x2010 [ 226.790780][T10866] ? __nla_validate_parse+0x18dd/0x2010 [ 226.796330][T10866] ? __nla_validate_parse+0x18f0/0x2010 [ 226.801884][T10866] ? __nla_validate_parse+0x18f5/0x2010 [ 226.807434][T10866] ? lockdep_hardirqs_on+0x3c5/0x7d0 [ 226.812822][T10866] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 226.818288][T10866] ? retint_kernel+0x2b/0x2b [ 226.822884][T10866] ? trace_hardirqs_on_caller+0x74/0x80 [ 226.828520][T10866] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 226.833982][T10866] ? rcu_irq_exit+0x118/0x2b0 21:40:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x1000000, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:50 executing program 3: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x1e) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 226.838669][T10866] ? retint_kernel+0x2b/0x2b [ 226.843283][T10866] ? __nla_validate_parse+0xce5/0x2010 [ 226.848748][T10866] ? rtnl_setlink+0x44a/0x560 [ 226.853427][T10866] ? __dev_get_by_index+0x98/0x120 [ 226.858544][T10866] rtnl_setlink+0x497/0x560 [ 226.863074][T10866] ? rtnl_dump_ifinfo+0x12f0/0x12f0 [ 226.868319][T10866] ? rtnl_dump_ifinfo+0x12f0/0x12f0 [ 226.873653][T10866] rtnetlink_rcv_msg+0xb19/0xe50 [ 226.878602][T10866] ? rtnetlink_bind+0x80/0x80 [ 226.883289][T10866] ? trace_lock_acquire+0x190/0x190 [ 226.888493][T10866] ? __local_bh_enable_ip+0x13a/0x240 [ 226.893907][T10866] ? local_bh_enable+0x9/0x30 [ 226.898604][T10866] ? trace_hardirqs_on+0x74/0x80 [ 226.903549][T10866] ? __local_bh_enable_ip+0x13a/0x240 [ 226.908923][T10866] ? kasan_check_write+0x14/0x20 [ 226.913864][T10866] ? do_raw_spin_lock+0x143/0x3a0 [ 226.918902][T10866] ? _raw_spin_unlock_irqrestore+0x77/0xe0 [ 226.924843][T10866] ? _raw_spin_unlock_irqrestore+0xbc/0xe0 [ 226.930658][T10866] ? rcu_preempt_deferred_qs_irqrestore+0x810/0xd40 [ 226.937436][T10866] netlink_rcv_skb+0x1f0/0x460 [ 226.942217][T10866] ? rtnetlink_bind+0x80/0x80 [ 226.946907][T10866] ? netlink_ack+0xa80/0xa80 [ 226.946932][T10866] rtnetlink_rcv+0x1c/0x20 [ 226.946943][T10866] netlink_unicast+0x962/0xaf0 [ 226.946962][T10866] ? netlink_detachskb+0x50/0x50 [ 226.946978][T10866] ? __check_object_size+0x2fc/0x400 [ 226.960737][T10866] ? __check_object_size+0x314/0x400 [ 226.960752][T10866] ? security_netlink_send+0x94/0xb0 [ 226.960765][T10866] netlink_sendmsg+0xa7a/0xd40 21:40:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x100000000000000, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:50 executing program 0 (fault-call:3 fault-nth:4): r0 = socket$netlink(0x10, 0x3, 0x0) fstatfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="39000000130007606900000000000000ab0080482600000046000107000000141900010010000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) [ 226.960785][T10866] ? retint_kernel+0x2b/0x2b [ 226.960799][T10866] ? netlink_getsockopt+0x9f0/0x9f0 [ 226.960814][T10866] ? tomoyo_socket_sendmsg+0x25/0x30 [ 226.960826][T10866] ? security_socket_sendmsg+0xa0/0xd0 [ 226.960836][T10866] ? netlink_getsockopt+0x9f0/0x9f0 [ 226.960849][T10866] sock_write_iter+0x30c/0x430 [ 226.960862][T10866] ? sock_read_iter+0x410/0x410 [ 226.960881][T10866] ? __might_fault+0xf9/0x160 [ 226.960898][T10866] do_iter_readv_writev+0x6f5/0x9c0 [ 226.960913][T10866] ? vfs_dedupe_file_range+0x9c0/0x9c0 [ 226.960927][T10866] ? security_file_permission+0x148/0x350 [ 226.960940][T10866] ? rw_verify_area+0x1c2/0x360 [ 226.960955][T10866] do_iter_write+0x180/0x590 [ 226.960969][T10866] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 226.960982][T10866] ? do_writev+0x9e/0x560 [ 226.960994][T10866] do_writev+0x2ce/0x560 [ 226.961008][T10866] ? do_readv+0x410/0x410 [ 226.961022][T10866] ? fput_many+0x28/0x1a0 [ 226.961033][T10866] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 226.961046][T10866] ? retint_kernel+0x2b/0x2b [ 226.961057][T10866] ? trace_hardirqs_on_caller+0x74/0x80 [ 226.961072][T10866] ? rcu_irq_exit+0x118/0x2b0 [ 226.961084][T10866] ? retint_kernel+0x2b/0x2b [ 226.961099][T10866] ? do_syscall_64+0xc0/0x140 [ 226.961112][T10866] __x64_sys_writev+0x7d/0x90 [ 226.961132][T10866] do_syscall_64+0xfe/0x140 [ 226.961147][T10866] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 226.961156][T10866] RIP: 0033:0x4592c9 [ 226.961168][T10866] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 226.961173][T10866] RSP: 002b:00007fcfea069c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 226.961184][T10866] RAX: ffffffffffffffda RBX: 00007fcfea069c90 RCX: 00000000004592c9 [ 226.961190][T10866] RDX: 0000000000000001 RSI: 0000000020000000 RDI: 0000000000000003 [ 226.961196][T10866] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 226.961203][T10866] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcfea06a6d4 [ 226.961210][T10866] R13: 00000000004c640b R14: 00000000004e0418 R15: 0000000000000005 [ 227.052861][T10899] FAULT_INJECTION: forcing a failure. [ 227.052861][T10899] name failslab, interval 1, probability 0, space 0, times 0 [ 227.095291][T10899] CPU: 1 PID: 10899 Comm: syz-executor.0 Not tainted 5.2.0-rc5+ #4 [ 227.146360][T10899] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 227.146366][T10899] Call Trace: [ 227.146386][T10899] dump_stack+0x1d8/0x2f8 [ 227.146401][T10899] should_fail+0x608/0x860 [ 227.146413][T10899] ? setup_fault_attr+0x2b0/0x2b0 [ 227.146433][T10899] __should_failslab+0x11a/0x160 [ 227.146445][T10899] should_failslab+0x9/0x20 [ 227.146454][T10899] kmem_cache_alloc_node+0x65/0x270 [ 227.146463][T10899] ? __alloc_skb+0x9f/0x500 [ 227.146475][T10899] __alloc_skb+0x9f/0x500 [ 227.146491][T10899] rtmsg_ifinfo_build_skb+0x7f/0x180 [ 227.146507][T10899] rtnetlink_event+0xf2/0x1b0 [ 227.276552][T10899] raw_notifier_call_chain+0xec/0x190 [ 227.281945][T10899] dev_set_mac_address+0x3a6/0x510 21:40:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x2000000, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x200000000000000, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:50 executing program 3: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) r0 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x941) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000080), &(0x7f00000000c0)=0x8) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 227.287077][T10899] ? dev_pre_changeaddr_notify+0x1c0/0x1c0 [ 227.293166][T10899] ? do_setlink+0x688/0x3b60 [ 227.297765][T10899] ? trace_kmalloc+0xcd/0x130 [ 227.302455][T10899] ? do_setlink+0x688/0x3b60 [ 227.307079][T10899] ? do_setlink+0x72f/0x3b60 [ 227.311666][T10899] do_setlink+0x73f/0x3b60 [ 227.316111][T10899] ? lockdep_hardirqs_on+0x3c5/0x7d0 [ 227.321392][T10899] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 227.326867][T10899] ? retint_kernel+0x2b/0x2b [ 227.331569][T10899] ? trace_hardirqs_on_caller+0x74/0x80 [ 227.337195][T10899] ? rtnetlink_event+0x1b0/0x1b0 [ 227.342145][T10899] ? rcu_irq_exit+0x118/0x2b0 [ 227.346815][T10899] ? __bfs+0x550/0x550 [ 227.350870][T10899] ? retint_kernel+0x2b/0x2b [ 227.355646][T10899] ? __nla_validate_parse+0x36f/0x2010 [ 227.361134][T10899] ? __nla_validate_parse+0x3c9/0x2010 [ 227.366588][T10899] ? __sanitizer_cov_trace_pc+0x14/0x50 [ 227.372136][T10899] ? __nla_validate_parse+0x18f5/0x2010 [ 227.377670][T10899] ? lockdep_hardirqs_on+0x3c5/0x7d0 [ 227.383056][T10899] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 227.388501][T10899] ? retint_kernel+0x2b/0x2b [ 227.393070][T10899] ? trace_hardirqs_on_caller+0x74/0x80 [ 227.398599][T10899] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 227.404067][T10899] ? rcu_irq_exit+0x118/0x2b0 [ 227.408767][T10899] ? retint_kernel+0x2b/0x2b [ 227.413346][T10899] ? __nla_validate_parse+0xce5/0x2010 [ 227.418784][T10899] ? rtnl_setlink+0x163/0x560 [ 227.423442][T10899] rtnl_setlink+0x497/0x560 [ 227.427953][T10899] ? __bfs+0x550/0x550 [ 227.432012][T10899] ? rtnl_dump_ifinfo+0x12f0/0x12f0 [ 227.437228][T10899] ? retint_kernel+0x2b/0x2b [ 227.441813][T10899] ? rtnl_dump_ifinfo+0x12f0/0x12f0 [ 227.446994][T10899] ? rtnl_get_link+0xf4/0x1d0 [ 227.451653][T10899] ? rtnetlink_rcv_msg+0xb0a/0xe50 [ 227.456853][T10899] ? rtnl_dump_ifinfo+0x12f0/0x12f0 [ 227.462029][T10899] rtnetlink_rcv_msg+0xb19/0xe50 [ 227.466948][T10899] ? rtnetlink_bind+0x80/0x80 [ 227.471609][T10899] ? __local_bh_enable_ip+0x13a/0x240 [ 227.476961][T10899] ? local_bh_enable+0x9/0x30 [ 227.481639][T10899] ? trace_hardirqs_on+0x74/0x80 [ 227.486569][T10899] ? __local_bh_enable_ip+0x13a/0x240 [ 227.491925][T10899] ? local_bh_enable+0x1f/0x30 [ 227.496698][T10899] ? __dev_queue_xmit+0x2107/0x3090 [ 227.501912][T10899] ? dev_queue_xmit+0x20/0x20 [ 227.506599][T10899] netlink_rcv_skb+0x1f0/0x460 [ 227.511346][T10899] ? rtnetlink_bind+0x80/0x80 [ 227.516010][T10899] ? netlink_ack+0xa80/0xa80 [ 227.520584][T10899] rtnetlink_rcv+0x1c/0x20 [ 227.524980][T10899] netlink_unicast+0x962/0xaf0 [ 227.529728][T10899] ? netlink_detachskb+0x50/0x50 [ 227.534662][T10899] ? iov_iter_advance+0x1e6/0xf90 [ 227.540451][T10899] ? security_netlink_send+0x94/0xb0 [ 227.546870][T10899] netlink_sendmsg+0xa7a/0xd40 [ 227.551655][T10899] ? retint_kernel+0x2b/0x2b [ 227.556250][T10899] ? netlink_getsockopt+0x9f0/0x9f0 [ 227.561437][T10899] ? tomoyo_socket_sendmsg+0x25/0x30 [ 227.566730][T10899] ? security_socket_sendmsg+0xa0/0xd0 [ 227.572192][T10899] ? netlink_getsockopt+0x9f0/0x9f0 [ 227.577398][T10899] sock_write_iter+0x30c/0x430 [ 227.582173][T10899] ? sock_read_iter+0x410/0x410 [ 227.587269][T10899] ? rcu_irq_exit+0x118/0x2b0 [ 227.591933][T10899] ? do_iter_readv_writev+0x538/0x9c0 [ 227.597294][T10899] ? do_iter_readv_writev+0x541/0x9c0 [ 227.602832][T10899] do_iter_readv_writev+0x6f5/0x9c0 [ 227.608014][T10899] ? vfs_dedupe_file_range+0x9c0/0x9c0 [ 227.613662][T10899] ? security_file_permission+0x148/0x350 [ 227.619369][T10899] ? rw_verify_area+0x1c2/0x360 [ 227.624225][T10899] do_iter_write+0x180/0x590 [ 227.628801][T10899] ? do_writev+0x9e/0x560 [ 227.633281][T10899] do_writev+0x2ce/0x560 [ 227.637509][T10899] ? do_readv+0x410/0x410 [ 227.641915][T10899] ? mutex_unlock+0x10/0x10 [ 227.646405][T10899] ? __sb_end_write+0xde/0x120 [ 227.651161][T10899] ? kasan_check_write+0x14/0x20 [ 227.656077][T10899] ? fput_many+0x47/0x1a0 [ 227.660411][T10899] ? debug_smp_processor_id+0x1c/0x20 [ 227.665783][T10899] ? fpregs_assert_state_consistent+0xaa/0xe0 [ 227.671831][T10899] ? check_preemption_disabled+0xb7/0x280 [ 227.677547][T10899] ? prepare_exit_to_usermode+0x1e1/0x4f0 [ 227.683247][T10899] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 227.688710][T10899] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 227.694494][T10899] ? do_syscall_64+0x1d/0x140 [ 227.699153][T10899] __x64_sys_writev+0x7d/0x90 [ 227.703828][T10899] do_syscall_64+0xfe/0x140 [ 227.708315][T10899] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 227.714185][T10899] RIP: 0033:0x4592c9 [ 227.718063][T10899] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 21:40:51 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140), 0x4) syz_emit_ethernet(0x7ffff000, &(0x7f0000017f07)=ANY=[@ANYBLOB="ffffffffffff0180a000000008004500002400000000002f9078ac14ffaa7f000001b481880b0000000000000800000086dd080088be00000000100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0) [ 227.737674][T10899] RSP: 002b:00007fcfea069c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 227.746175][T10899] RAX: ffffffffffffffda RBX: 00007fcfea069c90 RCX: 00000000004592c9 [ 227.754162][T10899] RDX: 0000000000000001 RSI: 0000000020000000 RDI: 0000000000000003 [ 227.762532][T10899] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 227.770486][T10899] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcfea06a6d4 [ 227.778438][T10899] R13: 00000000004c640b R14: 00000000004e0418 R15: 0000000000000005 21:40:51 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140), 0x4) syz_emit_ethernet(0xf000, &(0x7f0000017f07)=ANY=[@ANYBLOB="ffffffffffff0180a000000008004500002400000000002f9078ac14ffaa7f000001b481880b0000000000000800000086dd080088be00000000100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0) 21:40:51 executing program 0 (fault-call:3 fault-nth:5): r0 = socket$netlink(0x10, 0x3, 0x0) fstatfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="39000000130007606900000000000000ab0080482600000046000107000000141900010010000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) 21:40:51 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x800000000000000, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:51 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x8000000, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:51 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140), 0x4) syz_emit_ethernet(0x1, &(0x7f0000017f07)=ANY=[@ANYBLOB="ffffffffffff0280a000000008004500002400000000002f9078ac14ffaa7f000001b481880b0000000000000800000086dd080088be00000000100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0) 21:40:51 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140), 0x4) syz_emit_ethernet(0xf000, &(0x7f0000017f07)=ANY=[@ANYBLOB="ffffffffffff0180a000000008004500002400000000002f9078ac14ffaa7f000001b481880b0000000000000800000086dd080088be00000000100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0) [ 228.015136][T10932] FAULT_INJECTION: forcing a failure. [ 228.015136][T10932] name failslab, interval 1, probability 0, space 0, times 0 21:40:51 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1a00000000000000, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) [ 228.117608][T10932] CPU: 1 PID: 10932 Comm: syz-executor.0 Not tainted 5.2.0-rc5+ #4 [ 228.125632][T10932] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 228.135686][T10932] Call Trace: [ 228.138980][T10932] dump_stack+0x1d8/0x2f8 [ 228.138997][T10932] should_fail+0x608/0x860 [ 228.139010][T10932] ? setup_fault_attr+0x2b0/0x2b0 [ 228.139020][T10932] ? lock_release+0x489/0x790 [ 228.139040][T10932] __should_failslab+0x11a/0x160 [ 228.139055][T10932] should_failslab+0x9/0x20 [ 228.139066][T10932] kmem_cache_alloc_node_trace+0x6e/0x280 [ 228.139076][T10932] ? __kmalloc_node_track_caller+0x3c/0x60 [ 228.139092][T10932] __kmalloc_node_track_caller+0x3c/0x60 [ 228.139103][T10932] ? rtmsg_ifinfo_build_skb+0x7f/0x180 [ 228.139117][T10932] __alloc_skb+0xe8/0x500 [ 228.139141][T10932] rtmsg_ifinfo_build_skb+0x7f/0x180 [ 228.199351][T10932] rtnetlink_event+0xf2/0x1b0 [ 228.199368][T10932] raw_notifier_call_chain+0xec/0x190 [ 228.199382][T10932] dev_set_mac_address+0x3a6/0x510 21:40:51 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x1a000000, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) [ 228.199394][T10932] ? dev_pre_changeaddr_notify+0x1c0/0x1c0 [ 228.199403][T10932] ? do_setlink+0x688/0x3b60 [ 228.199415][T10932] ? trace_kmalloc+0xcd/0x130 [ 228.199428][T10932] ? do_setlink+0x688/0x3b60 [ 228.214568][T10932] ? do_setlink+0x72f/0x3b60 [ 228.214584][T10932] do_setlink+0x73f/0x3b60 [ 228.214607][T10932] ? lockdep_hardirqs_on+0x3c5/0x7d0 [ 228.214623][T10932] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 228.253957][T10932] ? retint_kernel+0x2b/0x2b [ 228.258594][T10932] ? rtnetlink_event+0x1b0/0x1b0 [ 228.268315][T10932] ? __bfs+0x550/0x550 [ 228.268325][T10932] ? __bfs+0x550/0x550 [ 228.268338][T10932] ? retint_kernel+0x2b/0x2b [ 228.268352][T10932] ? __nla_validate_parse+0x489/0x2010 [ 228.268360][T10932] ? __nla_validate_parse+0x683/0x2010 [ 228.268369][T10932] ? __nla_validate_parse+0x695/0x2010 [ 228.268382][T10932] ? __nla_validate_parse+0x18f5/0x2010 [ 228.268393][T10932] ? lockdep_hardirqs_on+0x3c5/0x7d0 [ 228.268405][T10932] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 228.268417][T10932] ? retint_kernel+0x2b/0x2b 21:40:51 executing program 3: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0xfffffffffffffcff, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x1f) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 21:40:51 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x4000000000000000, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:51 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x40000000, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) [ 228.268432][T10932] ? trace_hardirqs_on_caller+0x74/0x80 [ 228.323885][T10932] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 228.323900][T10932] ? rcu_irq_exit+0x118/0x2b0 [ 228.323912][T10932] ? retint_kernel+0x2b/0x2b [ 228.323928][T10932] ? __nla_validate_parse+0xce5/0x2010 [ 228.344245][T10932] ? rtnl_setlink+0x44a/0x560 [ 228.349044][T10932] ? __dev_get_by_index+0x61/0x120 [ 228.355119][T10932] rtnl_setlink+0x497/0x560 [ 228.359735][T10932] ? rtnl_dump_ifinfo+0x12f0/0x12f0 [ 228.364980][T10932] ? rtnl_dump_ifinfo+0x12f0/0x12f0 [ 228.370547][T10932] rtnetlink_rcv_msg+0xb19/0xe50 [ 228.375589][T10932] ? rtnetlink_bind+0x80/0x80 [ 228.380451][T10932] ? __local_bh_enable_ip+0x13a/0x240 [ 228.385839][T10932] ? local_bh_enable+0x9/0x30 [ 228.390529][T10932] ? trace_hardirqs_on+0x74/0x80 [ 228.395477][T10932] ? __local_bh_enable_ip+0x13a/0x240 [ 228.400961][T10932] ? local_bh_enable+0x1f/0x30 [ 228.405729][T10932] ? __dev_queue_xmit+0x2107/0x3090 [ 228.410950][T10932] ? dev_queue_xmit+0x20/0x20 [ 228.415633][T10932] ? retint_kernel+0x2b/0x2b [ 228.420233][T10932] ? trace_hardirqs_on_caller+0x74/0x80 [ 228.425834][T10932] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 228.431314][T10932] netlink_rcv_skb+0x1f0/0x460 [ 228.436085][T10932] ? rtnetlink_bind+0x80/0x80 [ 228.440782][T10932] ? netlink_ack+0xa80/0xa80 [ 228.445390][T10932] rtnetlink_rcv+0x1c/0x20 [ 228.449815][T10932] netlink_unicast+0x962/0xaf0 [ 228.454692][T10932] ? netlink_detachskb+0x50/0x50 [ 228.459666][T10932] ? __phys_addr_symbol+0x2f/0x70 21:40:51 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x10000000000, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) [ 228.465693][T10932] ? __check_object_size+0x314/0x400 [ 228.471102][T10932] ? security_netlink_send+0x94/0xb0 [ 228.477210][T10932] netlink_sendmsg+0xa7a/0xd40 [ 228.481995][T10932] ? netlink_getsockopt+0x9f0/0x9f0 [ 228.487209][T10932] ? tomoyo_socket_sendmsg+0x25/0x30 [ 228.492512][T10932] ? security_socket_sendmsg+0xa0/0xd0 [ 228.497977][T10932] ? netlink_getsockopt+0x9f0/0x9f0 [ 228.503319][T10932] sock_write_iter+0x30c/0x430 [ 228.508086][T10932] ? sock_read_iter+0x410/0x410 [ 228.512985][T10932] ? __might_fault+0xf9/0x160 21:40:51 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0xffffffff00000000, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) [ 228.517675][T10932] do_iter_readv_writev+0x6f5/0x9c0 [ 228.522885][T10932] ? vfs_dedupe_file_range+0x9c0/0x9c0 [ 228.528349][T10932] ? security_file_permission+0x148/0x350 [ 228.534168][T10932] ? rw_verify_area+0x1c2/0x360 [ 228.539027][T10932] do_iter_write+0x180/0x590 [ 228.539043][T10932] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 228.539056][T10932] ? do_writev+0x9e/0x560 [ 228.539067][T10932] do_writev+0x2ce/0x560 [ 228.539081][T10932] ? do_readv+0x410/0x410 [ 228.539093][T10932] ? fput_many+0x3e/0x1a0 [ 228.539104][T10932] ? fput_many+0x42/0x1a0 [ 228.539114][T10932] ? fput_many+0x47/0x1a0 [ 228.539139][T10932] ? debug_smp_processor_id+0x1c/0x20 [ 228.550076][T10932] ? fpregs_assert_state_consistent+0xaa/0xe0 [ 228.550089][T10932] ? check_preemption_disabled+0xb7/0x280 [ 228.550101][T10932] ? prepare_exit_to_usermode+0x1e1/0x4f0 [ 228.550112][T10932] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 228.550164][T10932] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 228.550176][T10932] ? do_syscall_64+0x1d/0x140 [ 228.550190][T10932] __x64_sys_writev+0x7d/0x90 [ 228.550203][T10932] do_syscall_64+0xfe/0x140 [ 228.550220][T10932] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 228.629870][T10932] RIP: 0033:0x4592c9 [ 228.633769][T10932] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 228.653408][T10932] RSP: 002b:00007fcfea069c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 228.661822][T10932] RAX: ffffffffffffffda RBX: 00007fcfea069c90 RCX: 00000000004592c9 [ 228.669789][T10932] RDX: 0000000000000001 RSI: 0000000020000000 RDI: 0000000000000003 [ 228.669796][T10932] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 228.669802][T10932] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcfea06a6d4 [ 228.669808][T10932] R13: 00000000004c640b R14: 00000000004e0418 R15: 0000000000000005 21:40:52 executing program 0 (fault-call:3 fault-nth:6): r0 = socket$netlink(0x10, 0x3, 0x0) fstatfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="39000000130007606900000000000000ab0080482600000046000107000000141900010010000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) 21:40:52 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x100000000000000, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:52 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x2, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:52 executing program 4: r0 = socket(0x40000000015, 0x5, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f0000000040)={'filter\x00', 0xc9, "366cd0fbd103d1d46d4f4ec021c39dae27f2a34999fc2114159dd780740f32c972e50db09fa992fe74c2f29d8886e3a7970bd4f79c933b203c1ec611d8f4b29cd344ad637f915d13ff37c234c270197c34c09b4d77cb25f37af5f91888b041f81c8c95e89039bfdc3138b11a0ca875377fbca3f9f9d85d61e23b425ae4d10a6e9dbe350dae467525f0e08bb379e9972c20a02f791109d6056d1970be9ed448071c7c9ec89ecf3d5bc43395146d81f68179e289fadc3fb628cac50a8958f7d109df62caaa972caf5228"}, &(0x7f0000000140)=0xed) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @empty={[0xe0ffffff]}}, 0x1c) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x6, 0x80) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000180)=ANY=[@ANYRES32=0x0, @ANYBLOB="b2a00700090001000000a600090006000700"], &(0x7f0000000200)=0x16) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f00000002c0)=0x7ff, 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000240)={r2, 0x6, 0x9, 0x5}, &(0x7f0000000280)=0x10) 21:40:52 executing program 3: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x3) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 21:40:52 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140), 0x4) syz_emit_ethernet(0x1, &(0x7f0000017f07)=ANY=[@ANYBLOB="ffffffffffff0880a000000008004500002400000000002f9078ac14ffaa7f000001b481880b0000000000000800000086dd080088be00000000100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0) 21:40:52 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x8, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:52 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x200000000000000, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:52 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x2040, 0x0) ioctl$SIOCGETLINKNAME(r1, 0x89e0, &(0x7f0000000140)={0x4}) bind$bt_sco(r0, &(0x7f0000000040), 0x3) close(r0) r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x48c0) getsockopt$bt_sco_SCO_CONNINFO(r2, 0x11, 0x2, &(0x7f0000000080)=""/60, &(0x7f00000000c0)=0x3c) 21:40:52 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140), 0x4) syz_emit_ethernet(0x1, &(0x7f0000017f07)=ANY=[@ANYBLOB="ffffffffffff0e80a000000008004500002400000000002f9078ac14ffaa7f000001b481880b0000000000000800000086dd080088be00000000100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0) [ 228.958352][T10992] FAULT_INJECTION: forcing a failure. [ 228.958352][T10992] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 228.971600][T10992] CPU: 0 PID: 10992 Comm: syz-executor.0 Not tainted 5.2.0-rc5+ #4 [ 228.971609][T10992] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 228.971613][T10992] Call Trace: [ 228.971641][T10992] dump_stack+0x1d8/0x2f8 [ 228.971657][T10992] should_fail+0x608/0x860 [ 228.971670][T10992] ? setup_fault_attr+0x2b0/0x2b0 21:40:52 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x1a, [{}]}]}}, 0x0, 0x32}, 0x20) [ 228.971682][T10992] ? __bfs+0x550/0x550 [ 228.971700][T10992] should_fail_alloc_page+0x55/0x60 [ 228.971710][T10992] prepare_alloc_pages+0x283/0x460 [ 228.971723][T10992] __alloc_pages_nodemask+0x11c/0x790 [ 228.971740][T10992] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 228.971751][T10992] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 228.971767][T10992] ? trace_hardirqs_on_caller+0x74/0x80 [ 228.971779][T10992] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 228.971796][T10992] kmem_getpages+0x46/0x480 [ 228.971808][T10992] cache_grow_begin+0x7e/0x2c0 21:40:52 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x1a00, [{}]}]}}, 0x0, 0x32}, 0x20) [ 228.971822][T10992] cache_alloc_refill+0x311/0x3f0 [ 228.971834][T10992] ? check_preemption_disabled+0xb7/0x280 [ 228.971855][T10992] kmem_cache_alloc_node_trace+0x25f/0x280 [ 229.021438][T10992] ? __kmalloc_node_track_caller+0x3c/0x60 [ 229.021454][T10992] __kmalloc_node_track_caller+0x3c/0x60 [ 229.021465][T10992] ? rtmsg_ifinfo_build_skb+0x7f/0x180 [ 229.021477][T10992] __alloc_skb+0xe8/0x500 [ 229.021494][T10992] rtmsg_ifinfo_build_skb+0x7f/0x180 [ 229.021509][T10992] rtnetlink_event+0xf2/0x1b0 [ 229.021525][T10992] raw_notifier_call_chain+0xec/0x190 [ 229.037889][T10992] dev_set_mac_address+0x3a6/0x510 [ 229.037904][T10992] ? dev_pre_changeaddr_notify+0x1c0/0x1c0 [ 229.037914][T10992] ? do_setlink+0x688/0x3b60 [ 229.037927][T10992] ? trace_kmalloc+0xcd/0x130 [ 229.037939][T10992] ? do_setlink+0x688/0x3b60 [ 229.037949][T10992] ? do_setlink+0x72f/0x3b60 [ 229.037961][T10992] do_setlink+0x73f/0x3b60 [ 229.037982][T10992] ? lockdep_hardirqs_on+0x3c5/0x7d0 [ 229.037995][T10992] ? __bfs+0x550/0x550 [ 229.049083][T10992] ? retint_kernel+0x2b/0x2b [ 229.049096][T10992] ? trace_hardirqs_on_caller+0x74/0x80 [ 229.049108][T10992] ? rtnetlink_event+0x1b0/0x1b0 [ 229.049122][T10992] ? __bfs+0x550/0x550 [ 229.049131][T10992] ? retint_kernel+0x2b/0x2b [ 229.049147][T10992] ? __nla_validate_parse+0xce5/0x2010 [ 229.049161][T10992] ? lockdep_hardirqs_on+0x3c5/0x7d0 [ 229.106657][T10992] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 229.123194][T10992] ? lockdep_hardirqs_on+0x3c5/0x7d0 [ 229.123208][T10992] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 229.123223][T10992] ? retint_kernel+0x2b/0x2b [ 229.123235][T10992] ? trace_hardirqs_on_caller+0x74/0x80 [ 229.123246][T10992] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 229.123258][T10992] ? rcu_irq_exit+0x118/0x2b0 [ 229.123271][T10992] ? retint_kernel+0x2b/0x2b [ 229.179112][T10992] ? __nla_validate_parse+0xce5/0x2010 [ 229.179124][T10992] ? __dev_get_by_index+0xaa/0x120 [ 229.179133][T10992] ? rtnl_setlink+0x475/0x560 [ 229.179146][T10992] rtnl_setlink+0x497/0x560 [ 229.179161][T10992] ? rtnl_dump_ifinfo+0x12f0/0x12f0 [ 229.189940][T10992] ? rtnl_dump_ifinfo+0x12f0/0x12f0 [ 229.189954][T10992] rtnetlink_rcv_msg+0xb19/0xe50 [ 229.189971][T10992] ? rtnetlink_bind+0x80/0x80 [ 229.189987][T10992] ? __local_bh_enable_ip+0x13a/0x240 [ 229.190001][T10992] ? local_bh_enable+0x9/0x30 [ 229.190016][T10992] ? trace_hardirqs_on+0x74/0x80 [ 229.210773][T10992] ? __local_bh_enable_ip+0x13a/0x240 [ 229.210790][T10992] ? local_bh_enable+0x1f/0x30 [ 229.210800][T10992] ? __dev_queue_xmit+0x2107/0x3090 [ 229.210826][T10992] ? dev_queue_xmit+0x20/0x20 [ 229.210854][T10992] netlink_rcv_skb+0x1f0/0x460 [ 229.221862][T10992] ? rtnetlink_bind+0x80/0x80 [ 229.221876][T10992] ? netlink_ack+0xa80/0xa80 [ 229.221900][T10992] rtnetlink_rcv+0x1c/0x20 [ 229.221912][T10992] netlink_unicast+0x962/0xaf0 [ 229.221930][T10992] ? netlink_detachskb+0x50/0x50 [ 229.221946][T10992] ? __phys_addr_symbol+0x2f/0x70 [ 229.298803][T10992] ? __check_object_size+0x314/0x400 [ 229.298818][T10992] ? security_netlink_send+0x94/0xb0 [ 229.298837][T10992] netlink_sendmsg+0xa7a/0xd40 [ 229.313470][T10992] ? netlink_getsockopt+0x9f0/0x9f0 [ 229.313488][T10992] ? tomoyo_socket_sendmsg+0x25/0x30 [ 229.313502][T10992] ? security_socket_sendmsg+0xa0/0xd0 [ 229.313512][T10992] ? netlink_getsockopt+0x9f0/0x9f0 [ 229.313528][T10992] sock_write_iter+0x30c/0x430 [ 229.336964][T10992] ? sock_read_iter+0x410/0x410 [ 229.352646][T10992] ? rcu_irq_exit+0x118/0x2b0 [ 229.352667][T10992] ? do_iter_readv_writev+0x667/0x9c0 [ 229.352684][T10992] do_iter_readv_writev+0x6f5/0x9c0 [ 229.352700][T10992] ? vfs_dedupe_file_range+0x9c0/0x9c0 [ 229.352714][T10992] ? security_file_permission+0x148/0x350 [ 229.352729][T10992] ? rw_verify_area+0x1c2/0x360 [ 229.420154][T10992] do_iter_write+0x180/0x590 [ 229.424754][T10992] ? do_writev+0x24f/0x560 [ 229.429180][T10992] do_writev+0x2ce/0x560 [ 229.433434][T10992] ? do_readv+0x410/0x410 [ 229.437765][T10992] ? __mutex_unlock_slowpath+0x18c/0x630 [ 229.437778][T10992] ? mutex_unlock+0x10/0x10 [ 229.437793][T10992] ? kasan_check_write+0x14/0x20 [ 229.437806][T10992] ? fput_many+0x47/0x1a0 [ 229.448227][T10992] ? debug_smp_processor_id+0x1c/0x20 [ 229.448237][T10992] ? fpregs_assert_state_consistent+0xaa/0xe0 [ 229.448247][T10992] ? check_preemption_disabled+0xb7/0x280 [ 229.448258][T10992] ? prepare_exit_to_usermode+0x1e1/0x4f0 [ 229.448268][T10992] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 229.448278][T10992] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 229.448292][T10992] ? do_syscall_64+0x1d/0x140 [ 229.496283][T10992] __x64_sys_writev+0x7d/0x90 [ 229.500970][T10992] do_syscall_64+0xfe/0x140 [ 229.505483][T10992] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 229.511375][T10992] RIP: 0033:0x4592c9 [ 229.515273][T10992] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 229.534924][T10992] RSP: 002b:00007fcfea069c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 229.543517][T10992] RAX: ffffffffffffffda RBX: 00007fcfea069c90 RCX: 00000000004592c9 [ 229.551479][T10992] RDX: 0000000000000001 RSI: 0000000020000000 RDI: 0000000000000003 [ 229.559628][T10992] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 229.567602][T10992] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcfea06a6d4 [ 229.575619][T10992] R13: 00000000004c640b R14: 00000000004e0418 R15: 0000000000000005 21:40:53 executing program 0 (fault-call:3 fault-nth:7): r0 = socket$netlink(0x10, 0x3, 0x0) fstatfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="39000000130007606900000000000000ab0080482600000046000107000000141900010010000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) 21:40:53 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x4000, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:53 executing program 3: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mixer\x00', 0x4280, 0x0) ioctl$KVM_KVMCLOCK_CTRL(r0, 0xaead) prctl$PR_SET_SECUREBITS(0x1c, 0x23) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xb, 0x10, "ada77d5d972049c8b775f9715b7ca08eb7dd615ab23568c8583ea2960934dbbb3884e4b4af0d05be57e7d27ae3f3e8aa12a041b346bc435cf872ae5f7d68a4b3", "029933fb85c9bbfc440f9de0e62af4c3e02dc148baefeccb6f42fbfbf3c2a063", [0x401, 0x696]}) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 21:40:53 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000009040)=[{{0x0, 0x0, &(0x7f0000004580)=[{&(0x7f0000004480)=""/245, 0xf5}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x5, 0xa0000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x2) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in=@dev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f0000000080)=0xe8) connect$packet(r2, &(0x7f0000000100)={0x11, 0x10, r3, 0x1, 0x0, 0x6, @local}, 0x14) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f00000023c0), 0x1000000000000252) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x2) 21:40:53 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140), 0x4) syz_emit_ethernet(0x1, &(0x7f0000017f07)=ANY=[@ANYBLOB="ffffffffffff0180a000000001004500002400000000002f9078ac14ffaa7f000001b481880b0000000000000800000086dd080088be00000000100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0) 21:40:53 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x800000000000000, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:53 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x1a00000000000000, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:53 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x1000000, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:53 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140), 0x4) syz_emit_ethernet(0x1, &(0x7f0000017f07)=ANY=[@ANYBLOB="ffffffffffff0180a0001f0008004500002400000000002f9078ac14ffaa7f000001b481880b0000000000000800000086dd080088be00000000100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0) [ 229.737105][T11037] FAULT_INJECTION: forcing a failure. [ 229.737105][T11037] name failslab, interval 1, probability 0, space 0, times 0 [ 229.846249][T11037] CPU: 0 PID: 11037 Comm: syz-executor.0 Not tainted 5.2.0-rc5+ #4 [ 229.854191][T11037] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 229.864249][T11037] Call Trace: [ 229.867576][T11037] dump_stack+0x1d8/0x2f8 [ 229.871939][T11037] should_fail+0x608/0x860 [ 229.876362][T11037] ? setup_fault_attr+0x2b0/0x2b0 [ 229.881432][T11037] __should_failslab+0x11a/0x160 [ 229.886381][T11037] should_failslab+0x9/0x20 [ 229.890896][T11037] kmem_cache_alloc_trace+0x5d/0x2c0 [ 229.896183][T11037] ? netdevice_event+0x382/0xb10 [ 229.901215][T11037] netdevice_event+0x382/0xb10 [ 229.906084][T11037] ? inet6addr_event+0x150/0x150 [ 229.911048][T11037] ? netdevice_event+0xb10/0xb10 [ 229.916075][T11037] ? add_default_gids+0xe0/0xe0 [ 229.920961][T11037] ? is_ndev_for_default_gid_filter+0x1e0/0x1e0 [ 229.927211][T11037] ? enum_all_gids_of_dev_cb+0x5e0/0x5e0 [ 229.933026][T11037] ? __up_read+0xc5/0x1e0 [ 229.937368][T11037] ? netdev_upper_walk+0x1a0/0x1a0 [ 229.942572][T11037] ? add_default_gids+0xe0/0xe0 [ 229.947428][T11037] ? cfg802154_netdev_notifier_call+0xd8/0x660 [ 229.953671][T11037] ? up_read+0x22/0x30 [ 229.957747][T11037] ? netlbl_unlhsh_netdev_handler+0x188/0x260 [ 229.963827][T11037] raw_notifier_call_chain+0xec/0x190 [ 229.969215][T11037] dev_set_mac_address+0x3a6/0x510 [ 229.974333][T11037] ? dev_pre_changeaddr_notify+0x1c0/0x1c0 [ 229.980440][T11037] ? do_setlink+0x688/0x3b60 [ 229.980454][T11037] ? trace_kmalloc+0xcd/0x130 [ 229.980466][T11037] ? do_setlink+0x688/0x3b60 [ 229.980475][T11037] ? do_setlink+0x72f/0x3b60 [ 229.980489][T11037] do_setlink+0x73f/0x3b60 [ 229.980512][T11037] ? lockdep_hardirqs_on+0x3c5/0x7d0 [ 229.980523][T11037] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 229.980537][T11037] ? retint_kernel+0x2b/0x2b [ 229.980549][T11037] ? trace_hardirqs_on_caller+0x74/0x80 [ 229.980559][T11037] ? rtnetlink_event+0x1b0/0x1b0 [ 229.980569][T11037] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 229.980581][T11037] ? rcu_irq_exit+0x118/0x2b0 [ 229.980592][T11037] ? retint_kernel+0x2b/0x2b 21:40:53 executing program 4: mount(0x0, 0x0, &(0x7f0000000100)='configfs\x00', 0x0, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000100)=0x40) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) ftruncate(r1, 0x208200) r2 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002012, r2, 0x0) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) 21:40:53 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x4000000000000000, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:53 executing program 3: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x03\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x202000) statx(r0, &(0x7f0000000080)='./file0\x00', 0x4000, 0x200, &(0x7f0000000180)) [ 229.980608][T11037] ? __nla_validate_parse+0x489/0x2010 [ 229.980635][T11037] ? __nla_validate_parse+0x18f5/0x2010 [ 229.980658][T11037] ? __nla_validate+0x50/0x50 [ 229.980669][T11037] ? trace_lock_acquire+0x190/0x190 [ 229.980679][T11037] ? __bfs+0x550/0x550 [ 229.980688][T11037] ? arch_stack_walk+0x98/0xe0 [ 229.980701][T11037] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 229.980717][T11037] ? __nla_parse+0x41/0x50 [ 229.980731][T11037] rtnl_setlink+0x497/0x560 [ 229.980747][T11037] ? rtnl_dump_ifinfo+0x12f0/0x12f0 [ 229.980797][T11037] ? rtnl_dump_ifinfo+0x12f0/0x12f0 [ 229.980809][T11037] rtnetlink_rcv_msg+0xb19/0xe50 [ 229.980827][T11037] ? rtnetlink_bind+0x80/0x80 [ 229.980844][T11037] ? __local_bh_enable_ip+0x13a/0x240 [ 229.980859][T11037] ? local_bh_enable+0x9/0x30 [ 229.980870][T11037] ? trace_hardirqs_on+0x74/0x80 [ 229.980880][T11037] ? __local_bh_enable_ip+0x13a/0x240 [ 229.980892][T11037] ? local_bh_enable+0x1f/0x30 [ 229.980902][T11037] ? __dev_queue_xmit+0x2107/0x3090 [ 229.980927][T11037] ? dev_queue_xmit+0x20/0x20 [ 229.980936][T11037] ? retint_kernel+0x2b/0x2b [ 229.980947][T11037] ? trace_hardirqs_on_caller+0x74/0x80 [ 229.980959][T11037] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 229.980978][T11037] netlink_rcv_skb+0x1f0/0x460 [ 229.980990][T11037] ? rtnetlink_bind+0x80/0x80 [ 229.981002][T11037] ? netlink_ack+0xa80/0xa80 [ 229.981026][T11037] rtnetlink_rcv+0x1c/0x20 [ 229.981037][T11037] netlink_unicast+0x962/0xaf0 [ 229.981055][T11037] ? netlink_detachskb+0x50/0x50 [ 229.981068][T11037] ? __check_object_size+0x2fc/0x400 [ 229.981076][T11037] ? __check_object_size+0x314/0x400 [ 229.981090][T11037] ? security_netlink_send+0x94/0xb0 [ 229.981104][T11037] netlink_sendmsg+0xa7a/0xd40 [ 229.981127][T11037] ? netlink_getsockopt+0x9f0/0x9f0 [ 229.981143][T11037] ? tomoyo_socket_sendmsg+0x25/0x30 [ 229.981155][T11037] ? security_socket_sendmsg+0xa0/0xd0 [ 229.981165][T11037] ? netlink_getsockopt+0x9f0/0x9f0 [ 229.981177][T11037] sock_write_iter+0x30c/0x430 [ 229.981190][T11037] ? sock_read_iter+0x410/0x410 [ 229.981208][T11037] ? __might_fault+0xf9/0x160 [ 229.981224][T11037] do_iter_readv_writev+0x6f5/0x9c0 [ 229.981239][T11037] ? vfs_dedupe_file_range+0x9c0/0x9c0 [ 229.981252][T11037] ? security_file_permission+0x148/0x350 [ 229.981265][T11037] ? rw_verify_area+0x1c2/0x360 [ 229.981280][T11037] do_iter_write+0x180/0x590 [ 229.981299][T11037] do_writev+0x2ce/0x560 [ 229.981315][T11037] ? do_readv+0x410/0x410 [ 229.981324][T11037] ? __mutex_unlock_slowpath+0x18c/0x630 [ 229.981337][T11037] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 229.981349][T11037] ? retint_kernel+0x2b/0x2b [ 229.981364][T11037] ? trace_hardirqs_on_caller+0x74/0x80 [ 230.025388][T11037] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 230.035772][T11037] ? retint_kernel+0x2b/0x2b [ 230.035797][T11037] __x64_sys_writev+0x7d/0x90 [ 230.035811][T11037] do_syscall_64+0xfe/0x140 [ 230.035828][T11037] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 230.045076][T11037] RIP: 0033:0x4592c9 [ 230.045087][T11037] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 230.045094][T11037] RSP: 002b:00007fcfea069c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 230.045105][T11037] RAX: ffffffffffffffda RBX: 00007fcfea069c90 RCX: 00000000004592c9 [ 230.045111][T11037] RDX: 0000000000000001 RSI: 0000000020000000 RDI: 0000000000000003 [ 230.045117][T11037] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 230.045123][T11037] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcfea06a6d4 [ 230.045129][T11037] R13: 00000000004c640b R14: 00000000004e0418 R15: 0000000000000005 [ 230.407203][ T26] audit: type=1804 audit(1561153253.577:107): pid=11056 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir868575399/syzkaller.askQha/124/bus" dev="sda1" ino=16908 res=1 [ 230.472959][ T26] audit: type=1804 audit(1561153253.727:108): pid=11056 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir868575399/syzkaller.askQha/124/bus" dev="sda1" ino=16908 res=1 21:40:54 executing program 0 (fault-call:3 fault-nth:8): r0 = socket$netlink(0x10, 0x3, 0x0) fstatfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="39000000130007606900000000000000ab0080482600000046000107000000141900010010000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) 21:40:54 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x2000000, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:54 executing program 3: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x20) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x7fff, &(0x7f0000000040)='./file0\x00', r0, &(0x7f00000000c0)="ad2ae63562090aca9b1c5328835f7eed79c1b2f7624ec926a664ec903119541d50af2c7c5256efa348e2d5bcb77fb5563c19") execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 21:40:54 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140), 0x4) syz_emit_ethernet(0x1, &(0x7f0000017f07)=ANY=[@ANYBLOB="ffffffffffff0180a000001f08004500002400000000002f9078ac14ffaa7f000001b481880b0000000000000800000086dd080088be00000000100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0) 21:40:54 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x1c, 0x80001) connect(r0, &(0x7f0000000180)=@ax25={{0x3, @bcast, 0x1}, [@bcast, @bcast, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}]}, 0x80) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140), 0x4) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000240), &(0x7f0000000280)=0x4) syz_open_dev$radio(&(0x7f0000000200)='/dev/radio#\x00', 0x0, 0x2) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[@ANYBLOB="ffe0ffffffffffffffffffff89064500fec300b20c9e71764078ac14ffbbe000000100000000b0904fd63dbe98a01f6a8e26ab2a6f2f00089078"], 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x8, 0x80400) ioctl$VIDIOC_QUERYCTRL(r2, 0xc0445624, &(0x7f0000000040)={0x1, 0x8, "20d36ea1ea0b87a455275682c473ada94d166bd11d864d1564cecb5c36cf159f", 0x1, 0x6, 0x0, 0x4, 0x102}) [ 230.516749][ T26] audit: type=1804 audit(1561153253.827:109): pid=11056 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir868575399/syzkaller.askQha/124/bus" dev="sda1" ino=16908 res=1 21:40:54 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0xffffffff00000000, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:54 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x8000000, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:54 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000002}]}]}}, 0x0, 0x32}, 0x20) 21:40:54 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140), 0x4) syz_emit_ethernet(0x1, &(0x7f0000017f07)=ANY=[@ANYBLOB="ffffffffffff0180a0000000080045001f2400000000002f9078ac14ffaa7f000001b481880b0000000000000800000086dd080088be00000000100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0) [ 230.725166][T11084] FAULT_INJECTION: forcing a failure. [ 230.725166][T11084] name failslab, interval 1, probability 0, space 0, times 0 21:40:54 executing program 4: unshare(0x4020400) r0 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x0, 0x87d) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000040)={0x1ff, 0x0, 0x1}) ioctl$PIO_CMAP(r0, 0x4b71, &(0x7f0000000180)={0xffffffff, 0x2, 0x4, 0x0, 0x1000, 0x10000}) ioctl$DRM_IOCTL_AGP_UNBIND(r0, 0x40106437, &(0x7f0000000080)={r1, 0x10001}) pread64(r0, 0x0, 0x0, 0x0) ppoll(&(0x7f00000000c0)=[{r0, 0x100}, {r0, 0x8000}, {r0, 0x204}, {r0, 0xa000}, {r0, 0x1}, {r0, 0x200}], 0x6, &(0x7f0000000100)={0x77359400}, &(0x7f0000000140)={0x8}, 0x8) 21:40:54 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x1a000000, [{}]}]}}, 0x0, 0x32}, 0x20) [ 230.791294][T11084] CPU: 1 PID: 11084 Comm: syz-executor.0 Not tainted 5.2.0-rc5+ #4 [ 230.799324][T11084] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 230.809391][T11084] Call Trace: [ 230.812696][T11084] dump_stack+0x1d8/0x2f8 [ 230.817053][T11084] should_fail+0x608/0x860 [ 230.821496][T11084] ? setup_fault_attr+0x2b0/0x2b0 [ 230.826550][T11084] __should_failslab+0x11a/0x160 [ 230.831503][T11084] should_failslab+0x9/0x20 [ 230.836023][T11084] kmem_cache_alloc_trace+0x5d/0x2c0 21:40:54 executing program 3: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x21) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x18}, 0x10) [ 230.841315][T11084] ? netdevice_event+0x382/0xb10 [ 230.841331][T11084] netdevice_event+0x382/0xb10 [ 230.841350][T11084] ? retint_kernel+0x2b/0x2b [ 230.851053][T11084] ? trace_hardirqs_on_caller+0x74/0x80 [ 230.851066][T11084] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 230.851082][T11084] ? inet6addr_event+0x150/0x150 [ 230.851090][T11084] ? netdevice_event+0xb10/0xb10 [ 230.851098][T11084] ? add_default_gids+0xe0/0xe0 [ 230.851108][T11084] ? is_ndev_for_default_gid_filter+0x1e0/0x1e0 [ 230.851116][T11084] ? enum_all_gids_of_dev_cb+0x5e0/0x5e0 [ 230.851133][T11084] ? __up_read+0xc5/0x1e0 [ 230.851147][T11084] ? netdev_upper_walk+0x1a0/0x1a0 [ 230.897712][T11084] ? add_default_gids+0xe0/0xe0 [ 230.897728][T11084] ? cfg802154_netdev_notifier_call+0xd8/0x660 [ 230.897739][T11084] ? up_read+0x22/0x30 [ 230.897750][T11084] ? netlbl_unlhsh_netdev_handler+0x188/0x260 [ 230.897763][T11084] raw_notifier_call_chain+0xec/0x190 [ 230.897777][T11084] dev_set_mac_address+0x3a6/0x510 [ 230.897789][T11084] ? dev_pre_changeaddr_notify+0x1c0/0x1c0 [ 230.897798][T11084] ? do_setlink+0x688/0x3b60 [ 230.897809][T11084] ? trace_kmalloc+0xcd/0x130 [ 230.897823][T11084] ? do_setlink+0x688/0x3b60 [ 230.913928][T11084] ? do_setlink+0x72f/0x3b60 [ 230.913944][T11084] do_setlink+0x73f/0x3b60 [ 230.913956][T11084] ? trace_lock_acquire+0x190/0x190 [ 230.913974][T11084] ? lockdep_hardirqs_on+0x3c5/0x7d0 [ 230.940349][T11084] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 230.940366][T11084] ? retint_kernel+0x2b/0x2b [ 230.940379][T11084] ? rtnetlink_event+0x1b0/0x1b0 [ 230.940390][T11084] ? __bfs+0x550/0x550 [ 230.940400][T11084] ? __bfs+0x550/0x550 [ 230.940410][T11084] ? retint_kernel+0x2b/0x2b [ 230.940438][T11084] ? __nla_validate_parse+0xce5/0x2010 [ 230.940451][T11084] ? __nla_validate_parse+0x19c1/0x2010 [ 230.940461][T11084] ? __nla_validate_parse+0x18f5/0x2010 [ 230.940475][T11084] ? lockdep_hardirqs_on+0x3c5/0x7d0 [ 230.958912][T11084] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 230.958930][T11084] ? retint_kernel+0x2b/0x2b [ 230.958942][T11084] ? trace_hardirqs_on_caller+0x74/0x80 [ 230.958953][T11084] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 230.958968][T11084] ? rcu_irq_exit+0x118/0x2b0 [ 230.979319][T11084] ? retint_kernel+0x2b/0x2b [ 230.979336][T11084] ? __nla_validate_parse+0xce5/0x2010 [ 230.979346][T11084] ? rtnl_setlink+0x44a/0x560 [ 230.979360][T11084] ? __dev_get_by_index+0x98/0x120 [ 230.979372][T11084] rtnl_setlink+0x497/0x560 [ 230.979387][T11084] ? rtnl_dump_ifinfo+0x12f0/0x12f0 [ 230.979427][T11084] ? rtnl_get_link+0xf4/0x1d0 [ 230.997108][T11084] ? rtnl_get_link+0xfe/0x1d0 [ 230.997130][T11084] ? __sanitizer_cov_trace_pc+0x45/0x50 [ 230.997144][T11084] ? rtnl_dump_ifinfo+0x12f0/0x12f0 [ 230.997155][T11084] rtnetlink_rcv_msg+0xb19/0xe50 [ 230.997165][T11084] ? finish_lock_switch+0x31/0x40 [ 230.997181][T11084] ? rtnetlink_bind+0x80/0x80 [ 230.997191][T11084] ? __schedule+0x660/0x9e0 [ 230.997213][T11084] ? is_mmconf_reserved+0x410/0x410 [ 231.012816][T11084] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 231.012830][T11084] ? rcu_irq_exit+0x118/0x2b0 [ 231.012845][T11084] ? ___preempt_schedule+0x16/0x18 [ 231.012855][T11084] ? preempt_schedule+0xdb/0x120 [ 231.012867][T11084] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 231.012886][T11084] ? retint_kernel+0x2b/0x2b [ 231.039277][T11084] ? trace_hardirqs_on_caller+0x74/0x80 [ 231.039290][T11084] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 231.039303][T11084] ? rcu_irq_exit+0x118/0x2b0 [ 231.039316][T11084] ? retint_kernel+0x2b/0x2b [ 231.039340][T11084] netlink_rcv_skb+0x1f0/0x460 [ 231.039353][T11084] ? rtnetlink_bind+0x80/0x80 [ 231.039364][T11084] ? netlink_ack+0xa80/0xa80 [ 231.039386][T11084] rtnetlink_rcv+0x1c/0x20 [ 231.187951][T11084] netlink_unicast+0x962/0xaf0 [ 231.187971][T11084] ? netlink_detachskb+0x50/0x50 [ 231.187982][T11084] ? __phys_addr_symbol+0x2f/0x70 [ 231.187993][T11084] ? __check_object_size+0x314/0x400 [ 231.188007][T11084] ? security_netlink_send+0x94/0xb0 [ 231.188020][T11084] netlink_sendmsg+0xa7a/0xd40 [ 231.188042][T11084] ? netlink_getsockopt+0x9f0/0x9f0 [ 231.197213][T11084] ? tomoyo_socket_sendmsg+0x25/0x30 [ 231.197227][T11084] ? security_socket_sendmsg+0xa0/0xd0 [ 231.197238][T11084] ? netlink_getsockopt+0x9f0/0x9f0 [ 231.197252][T11084] sock_write_iter+0x30c/0x430 [ 231.197265][T11084] ? sock_read_iter+0x410/0x410 [ 231.197286][T11084] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 231.197308][T11084] do_iter_readv_writev+0x6f5/0x9c0 [ 231.264209][T11084] ? vfs_dedupe_file_range+0x9c0/0x9c0 [ 231.272345][T11084] ? security_file_permission+0x148/0x350 [ 231.278209][T11084] ? rw_verify_area+0x1c2/0x360 [ 231.283064][T11084] do_iter_write+0x180/0x590 [ 231.287684][T11084] ? do_writev+0x9e/0x560 [ 231.292010][T11084] do_writev+0x2ce/0x560 [ 231.296248][T11084] ? do_readv+0x410/0x410 [ 231.300559][T11084] ? __mutex_unlock_slowpath+0x18c/0x630 [ 231.306178][T11084] ? mutex_unlock+0x10/0x10 [ 231.310687][T11084] ? __sb_end_write+0xde/0x120 [ 231.315440][T11084] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 231.320977][T11084] ? trace_hardirqs_on_caller+0x74/0x80 [ 231.326605][T11084] ? rcu_irq_exit+0x118/0x2b0 [ 231.331298][T11084] ? retint_kernel+0x2b/0x2b [ 231.335877][T11084] __x64_sys_writev+0x7d/0x90 [ 231.340722][T11084] do_syscall_64+0xfe/0x140 [ 231.345243][T11084] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 231.351137][T11084] RIP: 0033:0x4592c9 [ 231.355021][T11084] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 231.374714][T11084] RSP: 002b:00007fcfea069c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 231.383152][T11084] RAX: ffffffffffffffda RBX: 00007fcfea069c90 RCX: 00000000004592c9 [ 231.391149][T11084] RDX: 0000000000000001 RSI: 0000000020000000 RDI: 0000000000000003 [ 231.399116][T11084] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 231.407097][T11084] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcfea06a6d4 [ 231.415078][T11084] R13: 00000000004c640b R14: 00000000004e0418 R15: 0000000000000005 21:40:54 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) fstatfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="39000000130007606900000000000000ab0080482600000046000107000000141900010010000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) 21:40:54 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x40000000, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:54 executing program 3: r0 = add_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000180)="910d5322b0038dba6caedecb1b2b161ce6a4dfb0699e70155a5f5a3ffe898bb0a5c624c65133b3bb5f0f791e626b642c02e253e0a39375719752008291dbc061a34050a0363278a2f6a9a11a75c9c0f95b451d94d856b8d78aa1a3d89025eecac5d38943ebd02cf0976a6ed6ad25eb3bf7c990bb19aa5ecf8d30ceb056bacaabcdd3b454b118f63f9604e52095eb3ac35a108c41f2ad81f350878bfea5736ffd7c96e02206920a895c8a7d8de4ed8be7d47ef01d9af3ea83be54faf6af19cfb2e59f8297449f", 0xc6, 0xffffffffffffffff) add_key(&(0x7f0000000680)='trusted\x00', &(0x7f00000006c0)={'syz', 0x0}, &(0x7f0000000700)="f9caa6ed6c980512a9ee40fdf64034dca74b6cd29de67f769568422cf6a87d95bed154a0277cfdd4524fb5de4c307bf556a4207c378458c81406e1980d0eb78aa1be83639b69c32475c08a77b9d9e165023982d4e0abda691412ac59cc3d49ff34291655b51c58983ee50cc8112554087630a2f9920c5ecc80e6e1774d9adbfa897c2ad16bd559ccaabe52e0ad714fcc5945ae41dab4c1fb73fac2f5ae3953a24c04dbb959aeca05215b368ef95c11e3f8c25d449c611fbad76bf0b2a6b6135801f41014866126d99dd1ce39428efdca33a6c1b65a3be7dab005f41767cdede574d938ea1c6190422e6bb59cd2959af274f28ec22c2e1b2238", 0xf9, r0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000000c0)={r0, 0x96, 0x41}, &(0x7f0000000280)=ANY=[@ANYBLOB='enc=pkcs1 hash=sha224-ce\x00'/79], &(0x7f0000000380)="0aaf17cc79abecba355973001dd1e2d05624b070b541d0d78a212eb6e3857e8c5aef25b8fc7bd51d313d32b14e5cb3e9fb34833c8d4424892ebc7cbd3a9fe3998c47bf9ce177ec45d1788d70eedc35bf48819012ed685216dda0c35e07a5e13235e59782712b7056597e848ae0662eebe48c80a72c8fbb76d44e819e06aa8c45717abd6877ea002d8221fe67e961bcb59760d6439e53", &(0x7f0000000440)=""/65) mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x5, 0x1) r1 = syz_open_dev$mice(&(0x7f0000000300)='/dev/input/mice\x00', 0x0, 0x12000) setsockopt$inet6_udp_encap(r1, 0x11, 0x64, &(0x7f00000004c0)=0x3, 0x4) syz_init_net_socket$llc(0x1a, 0x1, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000580)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000640)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x48000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)=ANY=[@ANYBLOB="15860000", @ANYRES16=r2, @ANYBLOB="140f28bd7000ffdbdf250100000000000000024100000018001369623a6272696467655f736c6176655f30000000"], 0x34}, 0x1, 0x0, 0x0, 0x4080}, 0xc4) prctl$PR_SET_SECUREBITS(0x1c, 0x23) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r1, 0x4010ae68, &(0x7f0000000500)={0x2, 0x100000}) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 21:40:54 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000008}]}]}}, 0x0, 0x32}, 0x20) 21:40:54 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140), 0x4) syz_emit_ethernet(0x1, &(0x7f0000017f07)=ANY=[@ANYBLOB="ffffffffffff0180a0000000080045000024001f0000002f9078ac14ffaa7f000001b481880b0000000000000800000086dd080088be00000000100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0) 21:40:54 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x10000, 0x0) r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0x71bec9b994fb1e88) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x70, r1, 0x2, 0x70bd2c, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_DEST={0x38, 0x2, [@IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e22}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x80000001}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@initdev={0xfe, 0x88, [], 0x1, 0x0}}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x80000001}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x7}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x40000}, 0x0) 21:40:55 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x10000000000, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:55 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x100001a}]}]}}, 0x0, 0x32}, 0x20) 21:40:55 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendto$llc(r0, &(0x7f00000001c0)="e0772b0e5a36f6bdaaf2960d3f32d30668128a6872cd7ae82ddab5458671e382e2b19b9a7a2677a297bf97ea7d0ee290bfe2", 0x32, 0x48085, &(0x7f0000000200)={0x1a, 0x31f, 0x4, 0x3ff, 0x7, 0x4, @dev={[], 0x10}}, 0x10) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, r1, 0x104, 0x70bd2a, 0x25dfdbfd, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x4}}, ["", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) r2 = syz_open_dev$audion(&(0x7f0000000300)='/dev/audio#\x00', 0x6d300, 0x40) ioctl$EVIOCSCLOCKID(r2, 0x400445a0, &(0x7f0000000380)=0x3) r3 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r0, &(0x7f0000000340)={0x1a, 0xffff, 0x0, 0x0, 0x0, 0x401, @random="43fa0f8f74c4"}, 0x10) bind$llc(r3, &(0x7f0000000040)={0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1, @dev}, 0x10) ioctl$FITRIM(r3, 0xc0185879, &(0x7f0000000000)={0x8, 0x800, 0xffffffffffffffff}) r4 = syz_open_dev$radio(&(0x7f0000000240)='/dev/radio#\x00', 0x0, 0x2) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) ioctl$sock_netrom_SIOCADDRT(r4, 0x890b, &(0x7f0000000280)={0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bpq0='bpq0\x00', 0x9, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x7fff, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) 21:40:55 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140), 0x4) syz_emit_ethernet(0x1, &(0x7f0000017f07)=ANY=[@ANYBLOB="ffffffffffff0180a00000000800450000240000001f002f9078ac14ffaa7f000001b481880b0000000000000800000086dd080088be00000000100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0) 21:40:55 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x100000000000000, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:55 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1001a00}]}]}}, 0x0, 0x32}, 0x20) 21:40:55 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) fstatfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="10000000130007606900000000000000ab0080482600000046000107000000141900010010000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) 21:40:55 executing program 3: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) utime(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x6, 0x4}) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) r0 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x1, 0x8000) getpeername$tipc(r0, &(0x7f0000000180), &(0x7f00000001c0)=0x10) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 21:40:55 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x200000000000000, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:55 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140), 0x4) syz_emit_ethernet(0x1, &(0x7f0000017f07)=ANY=[@ANYBLOB="ffffffffffff0180a000000008004500002400001f00002f9078ac14ffaa7f000001b481880b0000000000000800000086dd080088be00000000100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0) 21:40:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") unshare(0x4000400) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockopt$ax25_int(r1, 0x101, 0xc, &(0x7f0000000000), &(0x7f00000000c0)=0x4) io_setup(0x937c, &(0x7f0000000080)=0x0) recvmmsg(r0, &(0x7f0000004980)=[{{0x0, 0x0, &(0x7f0000001540)=[{&(0x7f0000000200)=""/9, 0x9}, {&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/35, 0x23}, {&(0x7f0000001280)=""/77, 0x4d}, {&(0x7f0000001300)=""/241, 0xf1}, {&(0x7f0000001400)=""/170, 0xaa}, {&(0x7f00000014c0)=""/23, 0x17}, {&(0x7f0000001500)=""/63, 0x3f}], 0x8, &(0x7f00000015c0)=""/135, 0x87}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000001680)=""/167, 0xa7}, {&(0x7f0000001740)=""/176, 0xb0}, {&(0x7f0000001800)=""/167, 0xa7}, {0xffffffffffffffff}, {&(0x7f00000018c0)=""/181, 0xb5}], 0x5, &(0x7f0000001a00)=""/187, 0xbb}, 0x100000000}, {{&(0x7f0000001ac0)=@alg, 0x80, &(0x7f0000001c40)=[{&(0x7f0000001b40)=""/235, 0xeb}], 0x1, &(0x7f0000001c80)=""/174, 0xae}, 0x7}, {{&(0x7f0000001d40)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f00000030c0)=[{&(0x7f0000001dc0)=""/224, 0xe0}, {&(0x7f0000001ec0)=""/44, 0x2c}, {&(0x7f0000001f00)=""/131, 0x83}, {&(0x7f0000001fc0)=""/136, 0x88}, {&(0x7f0000002080)}, {&(0x7f00000020c0)=""/4096, 0x1000}], 0x6, &(0x7f0000003140)=""/222, 0xde}, 0x400}, {{&(0x7f0000003240)=@tipc=@name, 0x80, &(0x7f0000003540)=[{&(0x7f00000032c0)=""/26, 0x1a}, {&(0x7f0000003300)=""/157, 0x9d}, {&(0x7f00000033c0)=""/118, 0x76}, {&(0x7f0000003440)=""/221, 0xdd}], 0x4, &(0x7f0000003580)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000004580)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000004700)=[{&(0x7f0000004600)=""/191, 0xbf}, {&(0x7f00000046c0)=""/14, 0xe}], 0x2}, 0x100000000}, {{&(0x7f0000004740)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x80, &(0x7f00000048c0)=[{&(0x7f00000047c0)=""/254, 0xfe}], 0x1, &(0x7f0000004900)=""/93, 0x5d}, 0x2b}], 0x7, 0x10001, &(0x7f0000004b40)={0x77359400}) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000004b80)='tls\x00', 0x4) io_cancel(r2, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x7, 0x1, r1, &(0x7f0000000100)="1425bc32b560308b44ec2ff114e85abd15e7a179e015b2590175133c0a3418dbbe9554f99b1f81dcc5f441db97c278af0e51451ee8750459df50d9a29f1f43fe360279f618", 0x45, 0xadb, 0x0, 0x1, 0xffffffffffffff9c}, &(0x7f00000001c0)) 21:40:55 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1004000}]}]}}, 0x0, 0x32}, 0x20) 21:40:55 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x800000000000000, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:55 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) fstatfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="3c000000130007606900000000000000ab0080482600000046000107000000141900010010000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) 21:40:55 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140), 0x4) syz_emit_ethernet(0x1, &(0x7f0000017f07)=ANY=[@ANYBLOB="ffffffffffff0180a0000000080045000024000000001f2f9078ac14ffaa7f000001b481880b0000000000000800000086dd080088be00000000100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0) 21:40:55 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x2000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:55 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x1a00000000000000, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:55 executing program 3: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 21:40:55 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x4000000000000000, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:55 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) fstatfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="c0000000130007606900000000000000ab0080482600000046000107000000141900010010000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) 21:40:55 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1fffffff}]}]}}, 0x0, 0x32}, 0x20) 21:40:55 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140), 0x4) syz_emit_ethernet(0x1, &(0x7f0000017f07)=ANY=[@ANYBLOB="ffffffffffff0180a00000000800450000240000001f002f9078ac14ffaa7f000001b481880b0000000000000800000086dd080088be00000000100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0) 21:40:56 executing program 4: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc0585611, &(0x7f0000000100)={0x0, 0x2, 0x0, {0x0, @raw_data="2085f3072c9b42f03f10be83b68ebcf014a0409fdf8be3d3e82c747c7f79f7cee00b443f02000000a91ca25441677d169fb75a152d6eebf4bef6c96076d67f243aebaac6430c9ef1a788e60eb3d0a7c29a5e3416871c8a51df55701a05e0a2f09883c482efaf6dc9e1695038733a23bbf0faf76a1d3fae5c251c4fad507b2ead2f1581057e3f84f3e8503ee570d8069eb53a897d2dd5f3d89629917fb171132181e9f3c510ac5229a6b6096547977578c5795d84cf23fe1d042df97dbd37a4b3d0e338a1b611e3ae"}}) ioctl$VIDIOC_QUERY_DV_TIMINGS(r0, 0x80845663, &(0x7f0000000200)) 21:40:56 executing program 3: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000700)='/proc/capi/capi20ncci\x00', 0x801, 0x0) getpeername(r0, &(0x7f00000007c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f00000006c0)=0x80) clock_gettime(0x0, &(0x7f0000000500)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) bind$rose(r0, &(0x7f0000000600)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}}, 0x1c) futimesat(r0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000580)={{r1, r2/1000+30000}, {r3, r4/1000+30000}}) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x13) r5 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x280000, 0x10000000101) getcwd(&(0x7f0000000640)=""/90, 0x5a) getsockopt$inet_udp_int(r0, 0x11, 0x0, &(0x7f0000000480), &(0x7f00000005c0)=0x4) getsockopt$inet_mreqn(r5, 0x0, 0x23, &(0x7f0000000400)={@rand_addr, @local}, &(0x7f0000000440)=0xc) ioctl$DRM_IOCTL_AGP_INFO(r5, 0x80386433, &(0x7f0000000740)=""/114) execve(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)=[&(0x7f0000000080)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00', &(0x7f00000000c0)='security.capability\x00', &(0x7f0000000180)='security.capability\x00', &(0x7f00000001c0)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00'], &(0x7f0000000380)=[&(0x7f0000000240)='security.capability\x00', &(0x7f0000000280)='em1cpuset$\x00', &(0x7f00000002c0)='{#eth1}&!(keyring\x00', &(0x7f0000000300)='em0\x00']) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 21:40:56 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0xffffffff00000000, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) fstatfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="c00e0000130007606900000000000000ab0080482600000046000107000000141900010010000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) 21:40:56 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x40000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:56 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140), 0x4) syz_emit_ethernet(0x1, &(0x7f0000017f07)=ANY=[@ANYBLOB="ffffffffffff0180a0000000080045000024000000001f2f9078ac14ffaa7f000001b481880b0000000000000800000086dd080088be00000000100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0) 21:40:56 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x2}]}]}}, 0x0, 0x32}, 0x20) 21:40:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) fstatfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="effd0000130007606900000000000000ab0080482600000046000107000000141900010010000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) 21:40:56 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0xffff0000}]}]}}, 0x0, 0x32}, 0x20) 21:40:56 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140), 0x4) syz_emit_ethernet(0x1, &(0x7f0000017f07)=ANY=[@ANYBLOB="ffffffffffff0180a000000008004500002400000000002f9078ac14ffaa7f001f01b481880b0000000000000800000086dd080088be00000000100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0) 21:40:56 executing program 4: r0 = socket(0x0, 0x2, 0x4) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x4100, 0x0) ioctl$KVM_X86_SET_MCE(r1, 0x4040ae9e, &(0x7f0000000140)={0x1000000000000000, 0xd005, 0xfffffffffffff2fe, 0x8, 0x10}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) fcntl$getown(r0, 0x9) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) r2 = socket(0x0, 0x3, 0x0) close(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/userio\x00', 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) sendto(r2, &(0x7f0000000000), 0x0, 0x20000800, &(0x7f00000003c0)=@tipc=@name={0x1e, 0x2, 0x3, {{}, 0x3}}, 0x80) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet6(r2, &(0x7f00000001c0)=""/237, 0xed, 0x0, 0x0, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) fcntl$notify(r0, 0x402, 0x0) getuid() sendmsg$IPVS_CMD_DEL_SERVICE(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000000c0)=ANY=[@ANYBLOB="5311225931bd7c96f306854b7a79a7750418dc5b40db89adfc43f8e04cc847133b1a28c35173"], 0x1}}, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) close(r3) shutdown(0xffffffffffffffff, 0x1) close(r4) pipe(0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') mknod$loop(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x1) 21:40:56 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x8}]}]}}, 0x0, 0x32}, 0x20) 21:40:56 executing program 3: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) r0 = open(&(0x7f0000000600)='./file0\x00', 0x24000, 0x2) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x20, &(0x7f0000000640)=[@in={0x2, 0x4e20, @broadcast}, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1f}}]}, &(0x7f00000006c0)=0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000002000)={r1, 0x1000, "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"}, &(0x7f0000000700)=0x1008) lsetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='com.apple.FinderInfo\x00', &(0x7f0000000340)='ppp0(\'\x00', 0x7, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000380)={{{@in=@dev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@initdev}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000004c0)={{{@in=@remote, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000002c0)=[{&(0x7f0000000140)="b4ced0eeeb3f08778469e3fc8cede6888ea6ed1f4219320bb827f5eb2c5b92340430cf1c647ed0b7a5b32801c7554d83a82847384f585eefc7f2deafc78a6f", 0x3f, 0x80000001}, {&(0x7f0000000180)="5db48f830c67be6e2fc6f1cc939a3fa89006517b58311025560a30565555b9b0c72fb7096e2d349120f1b9b8b56c4502d03f52be6a59de0fabe1c08cb91e619268139990869eb9c37de93f6607", 0x4d, 0x5}, {&(0x7f0000001000)="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", 0x1000, 0xfffffffffffffffb}, {&(0x7f0000000200)="8da9b35511a41ea65f6e83e88a79cc3e55338af913de31cd1342125b65fb3c7d6bef0a797cf8570dc365169dd01ce6e9365d81290884a2e7c3e863b5d0270257c0d0b9703691fdc2fef7eeedc1adaee9ae147dd8ce3f52b5f7b02a0847294b40ff7d6aa34449adb216f750cc6cfddba472401f10ec29e2", 0x77, 0xfff}, {&(0x7f0000000280)="0f8418cf4a58ab04fcc09c021ff2eb3dc20c9af4546678ca69ef4007f3afe5b82fad735b1e53fac714b70566c8a39a0e2e70", 0x32, 0x7}], 0x100080, &(0x7f00000009c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r2, @ANYBLOB=',euid<', @ANYRESDEC=r3, @ANYBLOB="2c657569643d86b5956d365325567d5738266fde787ebb1013f0a857e78751f4e0538eb0308d019b281176992142b274f7dc765b1ea8c57dfad79d7e8d7ff164d9a4dee2bc", @ANYRESDEC=r4, @ANYBLOB=',dont_hash,\x00']) 21:40:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) fstatfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="e03f0300130007606900000000000000ab0080482600000046000107000000141900010010000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) 21:40:56 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000, 0x2}]}]}}, 0x0, 0x32}, 0x20) [ 233.250638][ T26] audit: type=1800 audit(1561153256.707:110): pid=11280 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16948 res=0 21:40:56 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140), 0x4) syz_emit_ethernet(0x1, &(0x7f0000017f07)=ANY=[@ANYBLOB="ffffffffffff0180a000000008004500002400000000002f9078ac14ffaa7f000400b481880b0000000000000800000086dd080088be00000000100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0) 21:40:56 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1a}]}]}}, 0x0, 0x32}, 0x20) 21:40:56 executing program 3: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 21:40:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) fstatfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="79020020130007606900000000000000ab0080482600000046000107000000141900010010000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) 21:40:56 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000, 0x8}]}]}}, 0x0, 0x32}, 0x20) 21:40:57 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1a00}]}]}}, 0x0, 0x32}, 0x20) 21:40:57 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140), 0x4) syz_emit_ethernet(0x1, &(0x7f0000017f07)=ANY=[@ANYBLOB="ffffffffffff0180a000000008004500002400000000002f9078ac14ffaa7f00f000b481880b0000000000000800000086dd080088be00000000100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0) 21:40:57 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x2}]}]}}, 0x0, 0x32}, 0x20) 21:40:57 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) fstatfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="00f0ff7f130007606900000000000000ab0080482600000046000107000000141900010010000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) 21:40:57 executing program 3: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x80000001, 0x400000) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r0, 0x111, 0x1, 0x8, 0x4) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 21:40:57 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x4000}]}]}}, 0x0, 0x32}, 0x20) 21:40:57 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000, 0x1a}]}]}}, 0x0, 0x32}, 0x20) 21:40:57 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x2}]}]}}, 0x0, 0x32}, 0x20) 21:40:57 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140), 0x4) syz_emit_ethernet(0x1, &(0x7f0000017f07)=ANY=[@ANYBLOB="ffffffffffff0180a000000008004500002400000000002f9078ac14ffaa7f00000eb481880b0000000000000800000086dd080088be00000000100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0) 21:40:57 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) fstatfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="effdffff130007606900000000000000ab0080482600000046000107000000141900010010000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) 21:40:57 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x2}]}]}}, 0x0, 0x32}, 0x20) 21:40:57 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:57 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) fstatfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="39000000100007606900000000000000ab0080482600000046000107000000141900010010000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) 21:40:57 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000, 0x1a00}]}]}}, 0x0, 0x32}, 0x20) 21:40:57 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x2000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:57 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 21:40:57 executing program 3: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = syz_open_dev$vivid(&(0x7f0000000040)='/dev/video#\x00', 0x2, 0x2) r1 = open(&(0x7f0000000080)='\x00', 0x80002, 0x102) ioctl$FICLONE(r1, 0x40049409, r0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x7f) 21:40:57 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140), 0x4) syz_emit_ethernet(0x1, &(0x7f0000017f07)=ANY=[@ANYBLOB="ffffffffffff0180a000000008004500002400000000002f9078ac14ffaa7f000002b481880b0000000000000800000086dd080088be00000000100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0) 21:40:57 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000, 0x4000}]}]}}, 0x0, 0x32}, 0x20) 21:40:57 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x8000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:57 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 21:40:57 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140), 0x4) syz_emit_ethernet(0x1, &(0x7f0000017f07)=ANY=[@ANYBLOB="ffffffffffff0180a000000008004500002400000000002f9078ac14ffaa7f000008b481880b0000000000000800000086dd080088be00000000100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0) [ 234.167236][ C1] protocol 88fb is buggy, dev hsr_slave_0 21:40:57 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000, 0x1000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:57 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) fstatfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="39020000130007606900000000000000ab0080482600000046000107000000141900010010000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) 21:40:57 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 21:40:57 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1a000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:57 executing program 3: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000180)={0x0, 0xbb, "6cc328138b9533f589bab0a3dc720ff4d47e655e5d1bce95a22204f26ab6174946efcb285dae30af8bee14bdec0cc2429871364cac91696635775ebc2bacb9c46b1e640bd4714c1a91166feed953a9493d132f96f8c38b3467460c9b780ba14bf40abd9e22036d289300421a73e10183f776096fc95c017711852df187339c81eaccc600c9432ab1bb60584a2a1ddfc64a1cf1baffa36854aaf7a6337993aed8f46d70427483d804e4e314f3f1e2951e10d221aeb8919c6986a25c"}, &(0x7f0000000080)=0xc3) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xfffffffffffffffd, 0xa, 0x3, 0x0, r1}, 0x10) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 21:40:57 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000, 0x2000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:57 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140), 0x4) syz_emit_ethernet(0x1, &(0x7f0000017f07)=ANY=[@ANYBLOB="ffffffffffff0180a000000008004500002400000000002f9078ac14ffaa7f00000eb481880b0000000000000800000086dd080088be00000000100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0) 21:40:57 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x40000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:58 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={0x0, 0x0}, 0x20) 21:40:58 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) fstatfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="39030000130007606900000000000000ab0080482600000046000107000000141900010010000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) 21:40:58 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000, 0x8000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:58 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x10000000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:58 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140), 0x4) syz_emit_ethernet(0x1, &(0x7f0000017f07)=ANY=[@ANYBLOB="ffffffffffff0180a000000008004500002400000000002f9078ac14ffaa7f000001b481880b001f000000000800000086dd080088be00000000100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0) 21:40:58 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) fstatfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="39040000130007606900000000000000ab0080482600000046000107000000141900010010000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) 21:40:58 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={0x0, 0x0}, 0x20) 21:40:58 executing program 3: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000700)='/dev/dmmidi#\x00', 0x200000000, 0x1) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000740)={0x0, @in={{0x2, 0x4e24, @multicast2}}, 0x0, 0x36a}, &(0x7f0000000800)=0x90) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000840)={r1}, &(0x7f0000000880)=0x8) r2 = timerfd_create(0x7, 0x80000) ioctl(r2, 0x1f, &(0x7f0000000400)="c94a9d52454c03fc2ed1ead77cde78feb61e4c05bc1d553fdf097511843f8d20ed4449a744e46463c823a217743fb4a50b90720ce462dcf1592ea8fa2fedf28163c46742e24782cb8fb08ca32a25c56ca8c14d1a3aa0ebdddba25e2debe051a8ed4c9be01cb54724c0a96a94d12b6a4e403964668e7f81067d1769bb1f705d996dbf5e72a40689c5379b47170f5b0ce0262caada718270e53232d896caa4c25c386e67544f97a922c9c239edb0dd15509ee7d0cab047e2bc656d430ab793b35fab4f94cb320b41b79ebab36db4be116711eab5beb0ecec5c64aff0006714b9d911e086ffed46a70076315fd3a939439f35e6b6aa") lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = semget(0x2, 0x0, 0x4) semtimedop(r5, &(0x7f00000000c0)=[{0x3, 0x3ff, 0x1000}, {0x3, 0x3, 0x1000}, {0x6, 0x8}, {0x0, 0x7, 0x1000}, {0x3, 0x41, 0x1000}, {0x7, 0xd0, 0x1800}, {0x2, 0x4, 0x800}, {0x65b2bc934c20876b, 0x3494, 0x800}, {0x3, 0x6bb, 0x1000}], 0x9, &(0x7f0000000180)={0x77359400}) prctl$PR_SET_SECUREBITS(0x1c, 0x23) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$PIO_UNISCRNMAP(r7, 0x4b6a, &(0x7f0000000080)="6025367e6829ade7e96c3fb14717065935c71e1eeccbcea881fa0b038d62fd") semctl$SETVAL(r5, 0x7, 0x10, &(0x7f00000001c0)=0x2) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(r7, 0x4004560e, &(0x7f0000000300)=0xffffffff) ioctl$sock_inet6_tcp_SIOCATMARK(r6, 0x8905, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000280)={&(0x7f0000000240)='./file0\x00', r7}, 0x10) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000500)={0x0, 0x3, 0x8, 0x3}) write$FUSE_ENTRY(r7, &(0x7f0000000580)={0x90, 0xfffffffffffffff5, 0x1, {0x1, 0x2, 0x6, 0x7, 0x0, 0x9, {0x1, 0x7, 0x1378, 0x800, 0x462f, 0xfffffffffffffc01, 0x1, 0x8000, 0x0, 0x0, 0x40, r3, r4, 0x30000, 0x7f}}}, 0x90) ioctl$SG_SET_RESERVED_SIZE(r7, 0x2275, &(0x7f0000000540)=0x4) 21:40:58 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000, 0x1a000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:58 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={0x0, 0x0}, 0x20) 21:40:58 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x100000000000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:58 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) fstatfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="39050000130007606900000000000000ab0080482600000046000107000000141900010010000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) 21:40:58 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000, 0x40000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:58 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140), 0x4) syz_emit_ethernet(0x1, &(0x7f0000017f07)=ANY=[@ANYBLOB="ffffffffffff0180a000000008004500002400000000002f9078ac14ffaa7f000001b481880b0000001f00000800000086dd080088be00000000100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0) 21:40:58 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) 21:40:58 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x200000000000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:58 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000, 0x10000000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:58 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) 21:40:58 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) fstatfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="39060000130007606900000000000000ab0080482600000046000107000000141900010010000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) 21:40:58 executing program 3: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.events\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffff9c, 0x84, 0x72, &(0x7f00000000c0)={0x0, 0x5, 0x30}, &(0x7f0000000180)=0xc) ioctl$SIOCRSSL2CALL(r0, 0x89e2, &(0x7f0000000280)=@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f00000001c0)={r1, @in6={{0xa, 0x4e20, 0x6, @remote, 0xffffffff}}}, 0x84) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000040)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x23) ioctl$sock_ax25_SIOCDELRT(r0, 0x890c, &(0x7f00000002c0)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, 0x6, [@default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}]}) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 21:40:58 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x800000000000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:58 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000, 0x100000000000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:58 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140), 0x4) syz_emit_ethernet(0x1, &(0x7f0000017f07)=ANY=[@ANYBLOB="ffffffffffff0180a000000008004500002400000000002f9078ac14ffaa7f000001b481880b00001f0000000800000086dd080088be00000000100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0) 21:40:58 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) 21:40:58 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1a00000000000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:58 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) 21:40:58 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x4000000000000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:58 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000, 0x200000000000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:58 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) fstatfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="390a0000130007606900000000000000ab0080482600000046000107000000141900010010000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) 21:40:58 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0xc0000, 0x0) ioctl$TCSETA(r0, 0x5406, &(0x7f00000001c0)={0x2, 0x9, 0xa3, 0x8, 0x4, 0x7, 0x3, 0x3, 0x2, 0x12aaa}) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f0000000080)) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f00000000c0), &(0x7f0000000180)=0x4) mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) r1 = fcntl$getown(r0, 0x9) syz_open_procfs$namespace(r1, &(0x7f0000000200)='ns/ipc\x00') lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 21:40:58 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140), 0x4) syz_emit_ethernet(0x1, &(0x7f0000017f07)=ANY=[@ANYBLOB="ffffffffffff0180a000000008004500002400000000002f9078ac14ffaa7f000001b481880b000000001f000800000086dd080088be00000000100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0) 21:40:59 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0xffffffff00000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) 21:40:59 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) fstatfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="390c0000130007606900000000000000ab0080482600000046000107000000141900010010000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) 21:40:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000, 0x800000000000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:59 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140), 0x4) syz_emit_ethernet(0x1, &(0x7f0000017f07)=ANY=[@ANYBLOB="ffffffffffff0180a000000008004500002400000000002f9078ac14ffaa7f000001b481880b0000001f00000800000086dd080088be00000000100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0) 21:40:59 executing program 3: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) r0 = syz_open_dev$audion(&(0x7f00000001c0)='/dev/audio#\x00', 0x5, 0x202) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x18, r1, 0x900, 0x70bd27, 0x25dfdbff, {}, [@TIPC_NLA_NET={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x95}, 0xc0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) r2 = accept$nfc_llcp(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) r3 = syz_open_dev$video4linux(&(0x7f0000000180)='/dev/v4l-subdev#\x00', 0x3f, 0x8300) ioctl$FICLONE(r2, 0x40049409, r3) prctl$PR_SET_SECUREBITS(0x1c, 0x23) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='system.sockprotoname\x00', &(0x7f0000001000)=""/4096, 0x1000) 21:40:59 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, 0x0, 0x32}, 0x20) 21:40:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000, 0x1a00000000000000}]}]}}, 0x0, 0x32}, 0x20) 21:40:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) 21:40:59 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) fstatfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="390f0000130007606900000000000000ab0080482600000046000107000000141900010010000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) 21:40:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) [ 235.851334][T11562] kasan: CONFIG_KASAN_INLINE enabled [ 235.867281][T11562] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 235.933413][T11562] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 235.940404][T11562] CPU: 1 PID: 11562 Comm: syz-executor.5 Not tainted 5.2.0-rc5+ #4 [ 235.941934][ T3880] kobject: 'loop1' (0000000055661160): kobject_uevent_env [ 235.948503][T11562] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 235.948521][T11562] RIP: 0010:btf_struct_resolve+0x42d/0xfc0 21:40:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) 21:40:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000, 0x4000000000000000}]}]}}, 0x0, 0x32}, 0x20) [ 235.948533][T11562] Code: e8 03 42 80 3c 28 00 4d 89 e7 74 08 48 89 df e8 a9 5b 25 00 4c 8b 23 49 8d 5c 24 04 48 89 d8 48 c1 e8 03 48 89 85 68 ff ff ff <42> 0f b6 04 28 84 c0 48 8b 55 c8 0f 85 19 04 00 00 4c 8d 6a fc 48 [ 235.948538][T11562] RSP: 0018:ffff88804d5375f0 EFLAGS: 00010247 [ 235.948547][T11562] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 0000000000040000 [ 235.948558][T11562] RDX: ffffc90010852000 RSI: 0000000000000406 RDI: 0000000000000407 [ 235.959099][ T3880] kobject: 'loop1' (0000000055661160): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 235.965719][T11562] RBP: ffff88804d537690 R08: ffffffff81897f28 R09: ffff88804d53751c 21:40:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32}, 0x20) [ 235.965726][T11562] R10: 0000000000000009 R11: 1ffff11015d46bf7 R12: 0000000000000000 [ 235.965732][T11562] R13: dffffc0000000000 R14: ffff8880997a6840 R15: ffff8880915ef6c0 [ 235.965741][T11562] FS: 00007f6ea15e9700(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 235.965747][T11562] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 235.965758][T11562] CR2: 00007fd11f792890 CR3: 00000000a841f000 CR4: 00000000001406e0 [ 236.057267][ T3880] kobject: 'loop4' (00000000633d1a72): kobject_uevent_env [ 236.062661][T11562] Call Trace: 21:40:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000, 0xffffffff00000000}]}]}}, 0x0, 0x32}, 0x20) [ 236.080770][ T3880] kobject: 'loop4' (00000000633d1a72): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 236.081061][T11562] btf_resolve+0x3ed/0xda0 [ 236.081075][T11562] ? btf_sec_info_cmp+0x110/0x110 [ 236.100752][T11562] ? kasan_kmalloc+0x9/0x10 [ 236.105354][T11562] ? __kmalloc_node+0x4d/0x60 [ 236.110037][T11562] btf_new_fd+0x216a/0x37b0 [ 236.114562][T11562] ? __might_fault+0xf9/0x160 [ 236.119246][T11562] ? btf_release+0xd0/0xd0 [ 236.123758][T11562] __do_sys_bpf+0x1212/0xc5d0 [ 236.128456][T11562] ? tomoyo_file_ioctl+0x23/0x30 [ 236.133403][T11562] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 236.134430][ T3880] kobject: 'loop1' (0000000055661160): kobject_uevent_env [ 236.139539][T11562] ? __bfs+0x550/0x550 [ 236.139551][T11562] ? __lock_acquire+0xcf7/0x1a40 [ 236.139564][T11562] ? __bpf_prog_put_rcu+0x320/0x320 [ 236.139574][T11562] ? __lock_acquire+0xcf7/0x1a40 [ 236.139589][T11562] ? trace_lock_acquire+0x190/0x190 [ 236.139602][T11562] ? kasan_check_read+0x11/0x20 [ 236.139610][T11562] ? do_raw_spin_unlock+0x49/0x260 21:40:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000, 0x0, 0x2}]}]}}, 0x0, 0x32}, 0x20) [ 236.139625][T11562] ? __might_fault+0xf9/0x160 [ 236.139637][T11562] ? kasan_check_read+0x11/0x20 [ 236.139645][T11562] ? _copy_to_user+0xca/0xf0 [ 236.139655][T11562] ? put_timespec64+0x106/0x150 [ 236.139670][T11562] ? ktime_get_raw+0xf0/0xf0 [ 236.147009][ T3880] kobject: 'loop1' (0000000055661160): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 236.150886][T11562] ? prepare_exit_to_usermode+0x1e1/0x4f0 [ 236.150897][T11562] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 236.150905][T11562] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 236.150914][T11562] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 236.150923][T11562] ? do_syscall_64+0x1d/0x140 [ 236.150936][T11562] __x64_sys_bpf+0x7a/0x90 [ 236.150946][T11562] do_syscall_64+0xfe/0x140 [ 236.150960][T11562] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 236.150973][T11562] RIP: 0033:0x4592c9 [ 236.261020][T11562] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 236.280806][T11562] RSP: 002b:00007f6ea15e8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 236.289224][T11562] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004592c9 [ 236.297186][T11562] RDX: 0000000000000020 RSI: 00000000200006c0 RDI: 0000000000000012 [ 236.305148][T11562] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 236.313106][T11562] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6ea15e96d4 [ 236.321099][T11562] R13: 00000000004bf4d3 R14: 00000000004d0aa0 R15: 00000000ffffffff [ 236.329078][T11562] Modules linked in: [ 236.339480][T11562] ---[ end trace 63e4ce8eb90928c5 ]--- [ 236.345076][T11562] RIP: 0010:btf_struct_resolve+0x42d/0xfc0 [ 236.354246][T11562] Code: e8 03 42 80 3c 28 00 4d 89 e7 74 08 48 89 df e8 a9 5b 25 00 4c 8b 23 49 8d 5c 24 04 48 89 d8 48 c1 e8 03 48 89 85 68 ff ff ff <42> 0f b6 04 28 84 c0 48 8b 55 c8 0f 85 19 04 00 00 4c 8d 6a fc 48 [ 236.374016][T11562] RSP: 0018:ffff88804d5375f0 EFLAGS: 00010247 [ 236.377415][ T3880] kobject: 'loop3' (0000000031d2c1f0): kobject_uevent_env [ 236.380153][T11562] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 0000000000040000 [ 236.394220][ T3880] kobject: 'loop3' (0000000031d2c1f0): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 236.395360][T11562] RDX: ffffc90010852000 RSI: 0000000000000406 RDI: 0000000000000407 [ 236.395367][T11562] RBP: ffff88804d537690 R08: ffffffff81897f28 R09: ffff88804d53751c [ 236.395374][T11562] R10: 0000000000000009 R11: 1ffff11015d46bf7 R12: 0000000000000000 [ 236.395380][T11562] R13: dffffc0000000000 R14: ffff8880997a6840 R15: ffff8880915ef6c0 21:40:59 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140), 0x4) syz_emit_ethernet(0x1, &(0x7f0000017f07)=ANY=[@ANYBLOB="ffffffffffff0180a000000008004500002400000000002f9078ac14ffaa7f000001b481880b00000000001f0800000086dd080088be00000000100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0) 21:40:59 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) fstatfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="39100000130007606900000000000000ab0080482600000046000107000000141900010010000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) [ 236.395388][T11562] FS: 00007f6ea15e9700(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 236.395401][T11562] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 236.415395][ T3880] kobject: 'loop1' (0000000055661160): kobject_uevent_env [ 236.423069][T11562] CR2: 0000000000738000 CR3: 00000000a841f000 CR4: 00000000001406e0 [ 236.446378][ T3880] kobject: 'loop1' (0000000055661160): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 236.447361][T11562] Kernel panic - not syncing: Fatal exception [ 236.482854][ T3880] kobject: 'loop2' (00000000f86707ec): kobject_uevent_env [ 236.493399][T11562] Kernel Offset: disabled [ 236.497726][T11562] Rebooting in 86400 seconds..