1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:49:38 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:49:38 executing program 2 (fault-call:7 fault-nth:7): r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 08:49:38 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x14, 0x2, 0x0, 0x1, [@vti_common_policy=[@IFLA_VTI_IKEY={0x8}, @IFLA_VTI_LINK={0x8, 0x1, r4}]]}}}]}, 0x40}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 157.282497][T13943] R13: 00007ffce5b23eff R14: 00007f6925d079c0 R15: 000000000118bf2c [ 157.360602][T13959] FAULT_INJECTION: forcing a failure. [ 157.360602][T13959] name failslab, interval 1, probability 0, space 0, times 0 [ 157.374948][T13959] CPU: 0 PID: 13959 Comm: syz-executor.2 Tainted: G W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 157.386478][T13959] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 157.396505][T13959] Call Trace: [ 157.399781][T13959] dump_stack+0x1b0/0x21e [ 157.404082][T13959] ? devkmsg_release+0x11c/0x11c [ 157.408985][T13959] ? show_regs_print_info+0x12/0x12 [ 157.414148][T13959] ? ip_finish_output2+0x936/0x1810 [ 157.419311][T13959] should_fail+0x6fb/0x860 [ 157.423697][T13959] ? setup_fault_attr+0x2b0/0x2b0 [ 157.428722][T13959] ? prep_new_page+0x11a/0x380 [ 157.433453][T13959] ? dst_alloc+0x137/0x4f0 [ 157.437835][T13959] should_failslab+0x5/0x20 [ 157.442301][T13959] kmem_cache_alloc+0x36/0x250 [ 157.447032][T13959] dst_alloc+0x137/0x4f0 [ 157.451240][T13959] __mkroute_output+0xc94/0x1430 [ 157.456144][T13959] ? mem_cgroup_commit_charge+0x198/0x240 [ 157.461837][T13959] ? ip_route_output_key_hash_rcu+0xf90/0xf90 [ 157.467867][T13959] ? ip_route_output_key_hash_rcu+0x41b/0xf90 [ 157.473900][T13959] ip_route_output_flow+0x150/0x2a0 [ 157.479063][T13959] ? ip_send_skb+0x11e/0x140 [ 157.483621][T13959] ? ipv4_sk_update_pmtu+0x1d40/0x1d40 [ 157.489045][T13959] ? __rcu_read_lock+0x50/0x50 [ 157.493776][T13959] ? selinux_sk_getsecid+0x24/0xb0 [ 157.498853][T13959] udp_sendmsg+0x1731/0x2e80 [ 157.503412][T13959] ? ip_do_fragment+0x2290/0x2290 [ 157.508398][T13959] ? udp_cmsg_send+0x340/0x340 [ 157.513125][T13959] ? __up_read+0x6f/0x1b0 [ 157.517430][T13959] ? selinux_socket_sendmsg+0x10b/0x320 [ 157.522940][T13959] ? selinux_socket_accept+0x580/0x580 [ 157.528364][T13959] ? rw_copy_check_uvector+0x6b/0x310 [ 157.533702][T13959] ? import_iovec+0x171/0x340 [ 157.538342][T13959] ? inet_send_prepare+0x1b7/0x470 [ 157.543419][T13959] ? inet_send_prepare+0x470/0x470 [ 157.548495][T13959] ____sys_sendmsg+0x56f/0x860 [ 157.553226][T13959] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 157.558387][T13959] ? udp_sendmsg+0x75b/0x2e80 [ 157.563030][T13959] ? __sys_sendmmsg+0x46f/0x680 [ 157.567854][T13959] __sys_sendmmsg+0x338/0x680 [ 157.572499][T13959] ? __ia32_sys_sendmsg+0x90/0x90 [ 157.577489][T13959] ? __rcu_read_lock+0x50/0x50 [ 157.582214][T13959] ? __kasan_slab_free+0x1e2/0x220 [ 157.587288][T13959] ? __kasan_slab_free+0x168/0x220 [ 157.592363][T13959] ? slab_free_freelist_hook+0xd0/0x150 [ 157.597870][T13959] ? kmem_cache_free+0xac/0x5c0 [ 157.602686][T13959] ? do_sys_open+0x4a3/0x620 [ 157.607251][T13959] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 157.613280][T13959] ? do_sys_open+0x2fc/0x620 [ 157.617833][T13959] ? proc_fail_nth_write+0x166/0x200 [ 157.623080][T13959] ? _raw_spin_lock+0x170/0x170 [ 157.627893][T13959] ? proc_fail_nth_read+0x1c0/0x1c0 [ 157.633053][T13959] ? memset+0x1f/0x40 [ 157.636997][T13959] ? selinux_socket_setsockopt+0x10b/0x340 [ 157.642765][T13959] ? proc_fail_nth_read+0x1c0/0x1c0 [ 157.647930][T13959] ? memset+0x1f/0x40 [ 157.651875][T13959] ? fsnotify+0x13a0/0x1460 [ 157.656342][T13959] ? __kernel_write+0x340/0x340 [ 157.661158][T13959] ? fsnotify+0x13a0/0x1460 [ 157.665631][T13959] ? security_file_permission+0x128/0x300 [ 157.671319][T13959] ? __sb_end_write+0xa4/0xf0 [ 157.675959][T13959] ? vfs_write+0x427/0x4f0 [ 157.680340][T13959] ? ksys_write+0x237/0x2a0 [ 157.684814][T13959] ? __ia32_sys_read+0x80/0x80 [ 157.689543][T13959] __x64_sys_sendmmsg+0x9c/0xb0 [ 157.694362][T13959] do_syscall_64+0xcb/0x150 [ 157.698831][T13959] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 157.704691][T13959] RIP: 0033:0x45de29 [ 157.708554][T13959] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 157.728123][T13959] RSP: 002b:00007f6925d06c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 157.736496][T13959] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de29 [ 157.744431][T13959] RDX: 000000000800001d RSI: 0000000020007fc0 RDI: 0000000000000003 [ 157.752369][T13959] RBP: 00007f6925d06ca0 R08: 0000000000000000 R09: 0000000000000000 08:49:38 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:49:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(0xffffffffffffffff) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:49:39 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, 0x0, 0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) [ 157.760304][T13959] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 157.768240][T13959] R13: 00007ffce5b23eff R14: 00007f6925d079c0 R15: 000000000118bf2c 08:49:39 executing program 2 (fault-call:7 fault-nth:8): r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 08:49:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC=r0, @ANYRESDEC, @ANYRESDEC], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:49:39 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, 0x0, 0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:49:39 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:49:39 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) [ 157.856191][T13977] FAULT_INJECTION: forcing a failure. [ 157.856191][T13977] name failslab, interval 1, probability 0, space 0, times 0 [ 157.878962][T13977] CPU: 0 PID: 13977 Comm: syz-executor.2 Tainted: G W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 157.890495][T13977] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 157.900516][T13977] Call Trace: [ 157.903805][T13977] dump_stack+0x1b0/0x21e [ 157.908110][T13977] ? devkmsg_release+0x11c/0x11c [ 157.913028][T13977] ? show_regs_print_info+0x12/0x12 [ 157.918206][T13977] ? is_bpf_text_address+0x290/0x2b0 [ 157.923467][T13977] should_fail+0x6fb/0x860 [ 157.927873][T13977] ? setup_fault_attr+0x2b0/0x2b0 [ 157.932879][T13977] ? arch_stack_walk+0x98/0xe0 [ 157.937618][T13977] ? alloc_skb_with_frags+0xb1/0x580 [ 157.942867][T13977] should_failslab+0x5/0x20 [ 157.947337][T13977] __kmalloc_track_caller+0x5d/0x2b0 [ 157.952595][T13977] ? kmem_cache_alloc+0x1d5/0x250 [ 157.957595][T13977] ? alloc_skb_with_frags+0xb1/0x580 [ 157.962854][T13977] __alloc_skb+0xd1/0x4d0 [ 157.967147][T13977] alloc_skb_with_frags+0xb1/0x580 [ 157.972262][T13977] ? __kasan_kmalloc+0x179/0x1b0 [ 157.977175][T13977] sock_alloc_send_pskb+0x87e/0xcc0 [ 157.982337][T13977] ? ip_route_output_flow+0x150/0x2a0 [ 157.987671][T13977] ? udp_sendmsg+0x1731/0x2e80 [ 157.992406][T13977] ? sock_kzfree_s+0x50/0x50 [ 157.996978][T13977] ? __rcu_read_lock+0x50/0x50 [ 158.001733][T13977] ? xfrm_selector_match+0xa71/0xf00 [ 158.006982][T13977] __ip_append_data+0x1fbd/0x31b0 [ 158.011972][T13977] ? dst_alloc+0x137/0x4f0 [ 158.016357][T13977] ? ip_do_fragment+0x2290/0x2290 [ 158.021360][T13977] ? __xfrm_sk_clone_policy+0xac0/0xac0 [ 158.026870][T13977] ? ip_setup_cork+0x810/0x810 [ 158.031596][T13977] ? ipv4_mtu+0x212/0x2c0 [ 158.035888][T13977] ? ip_setup_cork+0x46b/0x810 [ 158.040623][T13977] ? ip_route_output_key_hash_rcu+0x41b/0xf90 [ 158.046671][T13977] ip_make_skb+0x1c9/0x4d0 [ 158.051049][T13977] ? ip_do_fragment+0x2290/0x2290 [ 158.056035][T13977] ? ip_flush_pending_frames+0x2e0/0x2e0 [ 158.061635][T13977] ? __rcu_read_lock+0x50/0x50 [ 158.066364][T13977] udp_sendmsg+0x1d1b/0x2e80 [ 158.070926][T13977] ? ip_do_fragment+0x2290/0x2290 [ 158.075916][T13977] ? udp_cmsg_send+0x340/0x340 [ 158.080643][T13977] ? __up_read+0x6f/0x1b0 [ 158.084938][T13977] ? selinux_socket_sendmsg+0x10b/0x320 [ 158.090445][T13977] ? selinux_socket_accept+0x580/0x580 [ 158.095869][T13977] ? rw_copy_check_uvector+0x6b/0x310 [ 158.101204][T13977] ? inet_send_prepare+0x1b7/0x470 08:49:39 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x14, 0x2, 0x0, 0x1, [@vti_common_policy=[@IFLA_VTI_IKEY={0x8}, @IFLA_VTI_LINK={0x8, 0x1, r4}]]}}}]}, 0x40}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 158.106280][T13977] ? inet_send_prepare+0x470/0x470 [ 158.111355][T13977] ____sys_sendmsg+0x56f/0x860 [ 158.116086][T13977] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 158.121247][T13977] ? udp_sendmsg+0x75b/0x2e80 [ 158.125892][T13977] ? __sys_sendmmsg+0x46f/0x680 [ 158.130709][T13977] __sys_sendmmsg+0x338/0x680 [ 158.135351][T13977] ? __ia32_sys_sendmsg+0x90/0x90 [ 158.140345][T13977] ? __rcu_read_lock+0x50/0x50 [ 158.145083][T13977] ? __kasan_slab_free+0x1e2/0x220 [ 158.150169][T13977] ? __kasan_slab_free+0x168/0x220 [ 158.155265][T13977] ? slab_free_freelist_hook+0xd0/0x150 [ 158.160878][T13977] ? kmem_cache_free+0xac/0x5c0 [ 158.165801][T13977] ? do_sys_open+0x4a3/0x620 [ 158.170409][T13977] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 158.176472][T13977] ? do_sys_open+0x2fc/0x620 [ 158.181024][T13977] ? proc_fail_nth_write+0x166/0x200 [ 158.186274][T13977] ? _raw_spin_lock+0x170/0x170 [ 158.191087][T13977] ? proc_fail_nth_read+0x1c0/0x1c0 [ 158.196249][T13977] ? memset+0x1f/0x40 [ 158.200228][T13977] ? selinux_socket_setsockopt+0x10b/0x340 [ 158.205997][T13977] ? proc_fail_nth_read+0x1c0/0x1c0 [ 158.211172][T13977] ? memset+0x1f/0x40 [ 158.215121][T13977] ? fsnotify+0x13a0/0x1460 [ 158.219596][T13977] ? __kernel_write+0x340/0x340 [ 158.224419][T13977] ? fsnotify+0x13a0/0x1460 [ 158.228889][T13977] ? security_file_permission+0x128/0x300 [ 158.234571][T13977] ? __sb_end_write+0xa4/0xf0 [ 158.239227][T13977] ? vfs_write+0x427/0x4f0 [ 158.243611][T13977] ? ksys_write+0x237/0x2a0 [ 158.248078][T13977] ? __ia32_sys_read+0x80/0x80 [ 158.252806][T13977] __x64_sys_sendmmsg+0x9c/0xb0 [ 158.257718][T13977] do_syscall_64+0xcb/0x150 [ 158.262206][T13977] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 158.268062][T13977] RIP: 0033:0x45de29 [ 158.271931][T13977] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 158.291501][T13977] RSP: 002b:00007f6925d06c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 158.299880][T13977] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de29 08:49:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x0, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:49:39 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, 0x0, 0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:49:39 executing program 2 (fault-call:7 fault-nth:9): r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 08:49:39 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) [ 158.307816][T13977] RDX: 000000000800001d RSI: 0000000020007fc0 RDI: 0000000000000003 [ 158.315752][T13977] RBP: 00007f6925d06ca0 R08: 0000000000000000 R09: 0000000000000000 [ 158.323712][T13977] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000008 [ 158.331653][T13977] R13: 00007ffce5b23eff R14: 00007f6925d079c0 R15: 000000000118bf2c 08:49:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC=r0, @ANYRESDEC, @ANYRESDEC], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:49:39 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) [ 158.406183][T14006] FAULT_INJECTION: forcing a failure. [ 158.406183][T14006] name failslab, interval 1, probability 0, space 0, times 0 [ 158.420440][T14006] CPU: 1 PID: 14006 Comm: syz-executor.2 Tainted: G W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 158.431967][T14006] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 158.441999][T14006] Call Trace: [ 158.445272][T14006] dump_stack+0x1b0/0x21e [ 158.449589][T14006] ? devkmsg_release+0x11c/0x11c [ 158.454506][T14006] ? show_regs_print_info+0x12/0x12 [ 158.459679][T14006] should_fail+0x6fb/0x860 [ 158.464078][T14006] ? setup_fault_attr+0x2b0/0x2b0 [ 158.469068][T14006] ? skb_clone+0x1b2/0x370 [ 158.473449][T14006] should_failslab+0x5/0x20 [ 158.477914][T14006] kmem_cache_alloc+0x36/0x250 [ 158.482653][T14006] skb_clone+0x1b2/0x370 [ 158.486871][T14006] ip_mc_output+0x1ce/0xab0 [ 158.491343][T14006] ? nf_nat_ipv4_local_fn+0x2c2/0x4e0 [ 158.496692][T14006] ? ip_build_and_send_pkt+0x9d0/0x9d0 [ 158.502112][T14006] ? nf_hook_slow+0x1a6/0x1f0 [ 158.506752][T14006] ? __ip_local_out+0x347/0x4a0 [ 158.511568][T14006] ? ip_send_check+0xd0/0xd0 [ 158.516126][T14006] ? __ip_local_out+0x4a0/0x4a0 [ 158.520948][T14006] ? csum_partial+0x379/0x470 [ 158.525590][T14006] ip_send_skb+0xaa/0x140 [ 158.529887][T14006] udp_send_skb+0x8e9/0x1100 [ 158.534443][T14006] udp_sendmsg+0x1d45/0x2e80 [ 158.539002][T14006] ? ip_do_fragment+0x2290/0x2290 [ 158.543988][T14006] ? udp_cmsg_send+0x340/0x340 [ 158.548720][T14006] ? __up_read+0x6f/0x1b0 [ 158.553020][T14006] ? selinux_socket_sendmsg+0x10b/0x320 [ 158.558530][T14006] ? selinux_socket_accept+0x580/0x580 [ 158.563952][T14006] ? rw_copy_check_uvector+0x6b/0x310 [ 158.569296][T14006] ? inet_send_prepare+0x1b7/0x470 [ 158.574377][T14006] ? inet_send_prepare+0x470/0x470 [ 158.579449][T14006] ____sys_sendmsg+0x56f/0x860 [ 158.584180][T14006] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 158.589347][T14006] ? udp_sendmsg+0x75b/0x2e80 [ 158.594003][T14006] ? __sys_sendmmsg+0x46f/0x680 [ 158.598819][T14006] __sys_sendmmsg+0x338/0x680 [ 158.603461][T14006] ? __ia32_sys_sendmsg+0x90/0x90 [ 158.608451][T14006] ? __rcu_read_lock+0x50/0x50 [ 158.613376][T14006] ? __kasan_slab_free+0x1e2/0x220 [ 158.618451][T14006] ? __kasan_slab_free+0x168/0x220 [ 158.623562][T14006] ? slab_free_freelist_hook+0xd0/0x150 [ 158.629078][T14006] ? kmem_cache_free+0xac/0x5c0 [ 158.634014][T14006] ? do_sys_open+0x4a3/0x620 [ 158.638573][T14006] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 158.644603][T14006] ? proc_fail_nth_write+0x166/0x200 [ 158.649852][T14006] ? proc_fail_nth_read+0x1c0/0x1c0 [ 158.655009][T14006] ? memset+0x1f/0x40 [ 158.658967][T14006] ? selinux_socket_setsockopt+0x10b/0x340 [ 158.664739][T14006] ? proc_fail_nth_read+0x1c0/0x1c0 [ 158.669896][T14006] ? memset+0x1f/0x40 [ 158.673839][T14006] ? fsnotify+0x13a0/0x1460 [ 158.678305][T14006] ? __kernel_write+0x340/0x340 [ 158.683118][T14006] ? fsnotify+0x13a0/0x1460 [ 158.687589][T14006] ? security_file_permission+0x128/0x300 [ 158.693273][T14006] ? __sb_end_write+0xa4/0xf0 [ 158.697916][T14006] ? vfs_write+0x427/0x4f0 [ 158.702400][T14006] ? ksys_write+0x237/0x2a0 [ 158.706867][T14006] ? __ia32_sys_read+0x80/0x80 [ 158.711597][T14006] __x64_sys_sendmmsg+0x9c/0xb0 [ 158.716425][T14006] do_syscall_64+0xcb/0x150 [ 158.720891][T14006] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 158.726745][T14006] RIP: 0033:0x45de29 [ 158.730605][T14006] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 08:49:40 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:49:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(0xffffffffffffffff, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC=r0, @ANYRESDEC, @ANYRESDEC], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) [ 158.750171][T14006] RSP: 002b:00007f6925d06c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 158.758545][T14006] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de29 [ 158.766479][T14006] RDX: 000000000800001d RSI: 0000000020007fc0 RDI: 0000000000000003 [ 158.774414][T14006] RBP: 00007f6925d06ca0 R08: 0000000000000000 R09: 0000000000000000 [ 158.782350][T14006] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000009 [ 158.790286][T14006] R13: 00007ffce5b23eff R14: 00007f6925d079c0 R15: 000000000118bf2c 08:49:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(0xffffffffffffffff, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC=r0, @ANYRESDEC, @ANYRESDEC], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:49:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x0, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:49:40 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:49:40 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x14, 0x2, 0x0, 0x1, [@vti_common_policy=[@IFLA_VTI_IKEY={0x8}, @IFLA_VTI_LINK={0x8, 0x1, r4}]]}}}]}, 0x40}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 08:49:40 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:49:40 executing program 2 (fault-call:7 fault-nth:10): r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 08:49:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(0xffffffffffffffff, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC=r0, @ANYRESDEC, @ANYRESDEC], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:49:40 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:49:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x0, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:49:40 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:49:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC=r0, @ANYRESDEC, @ANYRESDEC], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) [ 159.026045][T14048] FAULT_INJECTION: forcing a failure. [ 159.026045][T14048] name failslab, interval 1, probability 0, space 0, times 0 [ 159.054489][T14048] CPU: 1 PID: 14048 Comm: syz-executor.2 Tainted: G W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 159.066130][T14048] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 159.076167][T14048] Call Trace: [ 159.079448][T14048] dump_stack+0x1b0/0x21e [ 159.083758][T14048] ? devkmsg_release+0x11c/0x11c [ 159.088663][T14048] ? show_regs_print_info+0x12/0x12 [ 159.093849][T14048] ? _raw_spin_lock+0xa1/0x170 [ 159.098614][T14048] ? _raw_spin_trylock_bh+0x190/0x190 [ 159.103962][T14048] should_fail+0x6fb/0x860 [ 159.108346][T14048] ? setup_fault_attr+0x2b0/0x2b0 [ 159.113335][T14048] ? _raw_spin_unlock+0x5/0x20 [ 159.118065][T14048] ? ___slab_alloc+0x297/0x450 [ 159.122794][T14048] ? alloc_skb_with_frags+0xb1/0x580 [ 159.128161][T14048] should_failslab+0x5/0x20 [ 159.132631][T14048] __kmalloc_track_caller+0x5d/0x2b0 [ 159.137888][T14048] ? kmem_cache_alloc+0x1d5/0x250 [ 159.142878][T14048] ? alloc_skb_with_frags+0xb1/0x580 [ 159.148134][T14048] __alloc_skb+0xd1/0x4d0 [ 159.152448][T14048] alloc_skb_with_frags+0xb1/0x580 [ 159.157528][T14048] ? __kasan_kmalloc+0x179/0x1b0 [ 159.162431][T14048] sock_alloc_send_pskb+0x87e/0xcc0 [ 159.167596][T14048] ? ip_route_output_flow+0x150/0x2a0 [ 159.172935][T14048] ? udp_sendmsg+0x1731/0x2e80 [ 159.177710][T14048] ? sock_kzfree_s+0x50/0x50 [ 159.182266][T14048] ? __rcu_read_lock+0x50/0x50 [ 159.186996][T14048] ? xfrm_selector_match+0xa71/0xf00 [ 159.192286][T14048] __ip_append_data+0x1fbd/0x31b0 [ 159.197281][T14048] ? dst_alloc+0x137/0x4f0 [ 159.201662][T14048] ? ip_do_fragment+0x2290/0x2290 [ 159.206648][T14048] ? __xfrm_sk_clone_policy+0xac0/0xac0 [ 159.212155][T14048] ? ip_setup_cork+0x810/0x810 [ 159.216879][T14048] ? ipv4_mtu+0x212/0x2c0 [ 159.221210][T14048] ? ip_setup_cork+0x46b/0x810 [ 159.225935][T14048] ? ip_route_output_key_hash_rcu+0x41b/0xf90 [ 159.231962][T14048] ip_make_skb+0x1c9/0x4d0 [ 159.236342][T14048] ? ip_do_fragment+0x2290/0x2290 [ 159.241337][T14048] ? ip_flush_pending_frames+0x2e0/0x2e0 [ 159.246941][T14048] ? __rcu_read_lock+0x50/0x50 [ 159.251666][T14048] udp_sendmsg+0x1d1b/0x2e80 [ 159.256222][T14048] ? ip_do_fragment+0x2290/0x2290 [ 159.261207][T14048] ? udp_cmsg_send+0x340/0x340 [ 159.265931][T14048] ? __up_read+0x6f/0x1b0 [ 159.270223][T14048] ? selinux_socket_sendmsg+0x10b/0x320 [ 159.275730][T14048] ? selinux_socket_accept+0x580/0x580 [ 159.281152][T14048] ? rw_copy_check_uvector+0x6b/0x310 [ 159.286490][T14048] ? inet_send_prepare+0x1b7/0x470 [ 159.291566][T14048] ? inet_send_prepare+0x470/0x470 [ 159.296641][T14048] ____sys_sendmsg+0x56f/0x860 [ 159.301370][T14048] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 159.306543][T14048] ? udp_sendmsg+0x75b/0x2e80 [ 159.311185][T14048] ? __sys_sendmmsg+0x46f/0x680 [ 159.316006][T14048] __sys_sendmmsg+0x338/0x680 [ 159.320667][T14048] ? __ia32_sys_sendmsg+0x90/0x90 [ 159.325668][T14048] ? __rcu_read_lock+0x50/0x50 [ 159.330411][T14048] ? __kasan_slab_free+0x1e2/0x220 [ 159.335485][T14048] ? __kasan_slab_free+0x168/0x220 [ 159.340567][T14048] ? slab_free_freelist_hook+0xd0/0x150 [ 159.346083][T14048] ? kmem_cache_free+0xac/0x5c0 [ 159.350896][T14048] ? do_sys_open+0x4a3/0x620 [ 159.355449][T14048] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 159.361474][T14048] ? do_sys_open+0x2fc/0x620 [ 159.366033][T14048] ? proc_fail_nth_write+0x166/0x200 [ 159.371289][T14048] ? _raw_spin_lock+0x170/0x170 [ 159.376102][T14048] ? proc_fail_nth_read+0x1c0/0x1c0 [ 159.381264][T14048] ? memset+0x1f/0x40 [ 159.385214][T14048] ? selinux_socket_setsockopt+0x10b/0x340 [ 159.390991][T14048] ? proc_fail_nth_read+0x1c0/0x1c0 [ 159.396162][T14048] ? memset+0x1f/0x40 [ 159.400131][T14048] ? fsnotify+0x13a0/0x1460 [ 159.404599][T14048] ? __kernel_write+0x340/0x340 [ 159.409427][T14048] ? fsnotify+0x13a0/0x1460 [ 159.413895][T14048] ? security_file_permission+0x128/0x300 [ 159.419578][T14048] ? __sb_end_write+0xa4/0xf0 [ 159.424217][T14048] ? vfs_write+0x427/0x4f0 [ 159.428597][T14048] ? ksys_write+0x237/0x2a0 [ 159.433064][T14048] ? __ia32_sys_read+0x80/0x80 [ 159.437793][T14048] __x64_sys_sendmmsg+0x9c/0xb0 [ 159.442608][T14048] do_syscall_64+0xcb/0x150 [ 159.447089][T14048] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 159.452946][T14048] RIP: 0033:0x45de29 [ 159.456804][T14048] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 08:49:40 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:49:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x0, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) [ 159.476372][T14048] RSP: 002b:00007f6925d06c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 159.484747][T14048] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de29 [ 159.492683][T14048] RDX: 000000000800001d RSI: 0000000020007fc0 RDI: 0000000000000003 [ 159.500620][T14048] RBP: 00007f6925d06ca0 R08: 0000000000000000 R09: 0000000000000000 [ 159.508557][T14048] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000a [ 159.516492][T14048] R13: 00007ffce5b23eff R14: 00007f6925d079c0 R15: 000000000118bf2c 08:49:40 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:49:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC=r0, @ANYRESDEC, @ANYRESDEC], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:49:40 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x14, 0x2, 0x0, 0x1, [@vti_common_policy=[@IFLA_VTI_IKEY={0x8}, @IFLA_VTI_LINK={0x8, 0x1, r4}]]}}}]}, 0x40}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 08:49:41 executing program 2 (fault-call:7 fault-nth:11): r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 08:49:41 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC=r0, @ANYRESDEC, @ANYRESDEC], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:49:41 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:49:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x0, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:49:41 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(0x0, 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) [ 159.816595][T14084] FAULT_INJECTION: forcing a failure. [ 159.816595][T14084] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 159.832195][T14084] CPU: 1 PID: 14084 Comm: syz-executor.2 Tainted: G W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 159.843712][T14084] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 159.853747][T14084] Call Trace: [ 159.857026][T14084] dump_stack+0x1b0/0x21e [ 159.861339][T14084] ? devkmsg_release+0x11c/0x11c 08:49:41 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) [ 159.866259][T14084] ? show_regs_print_info+0x12/0x12 [ 159.871447][T14084] ? ip_fragment+0x210/0x210 [ 159.876026][T14084] should_fail+0x6fb/0x860 [ 159.880432][T14084] ? setup_fault_attr+0x2b0/0x2b0 [ 159.885444][T14084] ? ip_mc_output+0x8b8/0xab0 [ 159.890095][T14084] __alloc_pages_nodemask+0x1ee/0x7c0 [ 159.895433][T14084] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 159.900943][T14084] ? ip_mc_finish_output+0x3a0/0x3a0 [ 159.906198][T14084] wp_page_copy+0x1a4/0x15a0 [ 159.910908][T14084] ? ip_send_skb+0x11e/0x140 [ 159.915474][T14084] ? add_mm_rss_vec+0x270/0x270 [ 159.920292][T14084] ? vm_normal_page+0x1c9/0x1d0 [ 159.925115][T14084] do_wp_page+0x48d/0x14b0 [ 159.929505][T14084] ? _raw_spin_lock+0xa1/0x170 [ 159.934233][T14084] ? do_swap_page+0x1510/0x1510 [ 159.939047][T14084] handle_mm_fault+0xf6c/0x4140 [ 159.943862][T14084] ? finish_fault+0x230/0x230 [ 159.948517][T14084] ? selinux_socket_sendmsg+0x10b/0x320 [ 159.954044][T14084] ? down_read_trylock+0x17a/0x1d0 [ 159.959130][T14084] do_user_addr_fault+0x48a/0x9f0 [ 159.964124][T14084] page_fault+0x2f/0x40 [ 159.968244][T14084] RIP: 0010:__put_user_4+0x1c/0x30 [ 159.973326][T14084] Code: 1f 00 c3 90 66 2e 0f 1f 84 00 00 00 00 00 65 48 8b 1c 25 40 ed 01 00 48 8b 9b 58 0b 00 00 48 83 eb 03 48 39 d9 73 3f 0f 1f 00 <89> 01 31 c0 0f 1f 00 c3 66 90 66 2e 0f 1f 84 00 00 00 00 00 65 48 [ 159.992997][T14084] RSP: 0018:ffff8881cd797a78 EFLAGS: 00010293 [ 159.999033][T14084] RAX: 0000000000000000 RBX: 00007fffffffeffd RCX: 0000000020008038 [ 160.006976][T14084] RDX: 0000000020008000 RSI: 00000000000005c8 RDI: 00000000000005c9 [ 160.014915][T14084] RBP: ffff8881cd797ee0 R08: ffffffff831f302f R09: ffffffff835da55b [ 160.022858][T14084] R10: ffff8881c77d6c80 R11: 0000000000000002 R12: 1ffff11039af2f74 [ 160.030793][T14084] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000040000 [ 160.038755][T14084] ? udp_sendmsg+0x75b/0x2e80 [ 160.043401][T14084] ? __sys_sendmmsg+0x46f/0x680 [ 160.048244][T14084] __sys_sendmmsg+0x48e/0x680 [ 160.052890][T14084] ? __ia32_sys_sendmsg+0x90/0x90 [ 160.057919][T14084] ? __rcu_read_lock+0x50/0x50 [ 160.062655][T14084] ? __kasan_slab_free+0x1e2/0x220 [ 160.067731][T14084] ? __kasan_slab_free+0x168/0x220 [ 160.072808][T14084] ? slab_free_freelist_hook+0xd0/0x150 [ 160.078316][T14084] ? kmem_cache_free+0xac/0x5c0 [ 160.083131][T14084] ? do_sys_open+0x4a3/0x620 [ 160.087687][T14084] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 160.093718][T14084] ? do_sys_open+0x2fc/0x620 [ 160.098273][T14084] ? proc_fail_nth_write+0x166/0x200 [ 160.103521][T14084] ? proc_fail_nth_read+0x1c0/0x1c0 [ 160.108706][T14084] ? memset+0x1f/0x40 [ 160.112662][T14084] ? selinux_socket_setsockopt+0x10b/0x340 [ 160.118433][T14084] ? proc_fail_nth_read+0x1c0/0x1c0 [ 160.123651][T14084] ? memset+0x1f/0x40 [ 160.127598][T14084] ? fsnotify+0x13a0/0x1460 [ 160.132066][T14084] ? __kernel_write+0x340/0x340 [ 160.136876][T14084] ? fsnotify+0x13a0/0x1460 [ 160.141345][T14084] ? security_file_permission+0x128/0x300 [ 160.147028][T14084] ? __sb_end_write+0xa4/0xf0 [ 160.151688][T14084] ? vfs_write+0x427/0x4f0 [ 160.156066][T14084] ? ksys_write+0x237/0x2a0 [ 160.160534][T14084] ? __ia32_sys_read+0x80/0x80 [ 160.165271][T14084] __x64_sys_sendmmsg+0x9c/0xb0 [ 160.170090][T14084] do_syscall_64+0xcb/0x150 [ 160.174563][T14084] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 160.180444][T14084] RIP: 0033:0x45de29 [ 160.184309][T14084] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 160.203897][T14084] RSP: 002b:00007f6925d06c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 08:49:41 executing program 2 (fault-call:7 fault-nth:12): r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) [ 160.212273][T14084] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de29 [ 160.220210][T14084] RDX: 000000000800001d RSI: 0000000020007fc0 RDI: 0000000000000003 [ 160.228159][T14084] RBP: 00007f6925d06ca0 R08: 0000000000000000 R09: 0000000000000000 [ 160.236129][T14084] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000b [ 160.244108][T14084] R13: 00007ffce5b23eff R14: 00007f6925d079c0 R15: 000000000118bf2c 08:49:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x0, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:49:41 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) [ 160.285963][T14100] FAULT_INJECTION: forcing a failure. [ 160.285963][T14100] name failslab, interval 1, probability 0, space 0, times 0 [ 160.304040][T14100] CPU: 1 PID: 14100 Comm: syz-executor.2 Tainted: G W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 160.315568][T14100] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 160.325604][T14100] Call Trace: [ 160.328881][T14100] dump_stack+0x1b0/0x21e [ 160.333199][T14100] ? devkmsg_release+0x11c/0x11c [ 160.338118][T14100] ? show_regs_print_info+0x12/0x12 [ 160.343294][T14100] ? ip_finish_output2+0x936/0x1810 [ 160.348471][T14100] should_fail+0x6fb/0x860 [ 160.352881][T14100] ? setup_fault_attr+0x2b0/0x2b0 [ 160.357893][T14100] ? prep_new_page+0x11a/0x380 [ 160.362621][T14100] ? dst_alloc+0x137/0x4f0 [ 160.367001][T14100] should_failslab+0x5/0x20 [ 160.371470][T14100] kmem_cache_alloc+0x36/0x250 [ 160.376195][T14100] dst_alloc+0x137/0x4f0 [ 160.380407][T14100] __mkroute_output+0xc94/0x1430 [ 160.385332][T14100] ? mem_cgroup_commit_charge+0x198/0x240 [ 160.391032][T14100] ? ip_route_output_key_hash_rcu+0xf90/0xf90 [ 160.397063][T14100] ? ip_route_output_key_hash_rcu+0x41b/0xf90 [ 160.403110][T14100] ip_route_output_flow+0x150/0x2a0 [ 160.408272][T14100] ? ip_send_skb+0x11e/0x140 [ 160.412826][T14100] ? ipv4_sk_update_pmtu+0x1d40/0x1d40 [ 160.418253][T14100] ? __rcu_read_lock+0x50/0x50 [ 160.422979][T14100] ? selinux_sk_getsecid+0x24/0xb0 [ 160.428060][T14100] udp_sendmsg+0x1731/0x2e80 [ 160.432614][T14100] ? ip_do_fragment+0x2290/0x2290 [ 160.437601][T14100] ? udp_cmsg_send+0x340/0x340 [ 160.442330][T14100] ? selinux_socket_sendmsg+0x10b/0x320 [ 160.447836][T14100] ? selinux_socket_accept+0x580/0x580 [ 160.453255][T14100] ? rw_copy_check_uvector+0x6b/0x310 [ 160.458591][T14100] ? import_iovec+0x171/0x340 [ 160.463231][T14100] ? inet_send_prepare+0x1b7/0x470 [ 160.468319][T14100] ? inet_send_prepare+0x470/0x470 [ 160.473397][T14100] ____sys_sendmsg+0x56f/0x860 [ 160.478129][T14100] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 160.483294][T14100] ? udp_sendmsg+0x75b/0x2e80 [ 160.487936][T14100] ? __sys_sendmmsg+0x46f/0x680 [ 160.492749][T14100] __sys_sendmmsg+0x338/0x680 [ 160.497390][T14100] ? __ia32_sys_sendmsg+0x90/0x90 [ 160.502380][T14100] ? __rcu_read_lock+0x50/0x50 [ 160.507144][T14100] ? __kasan_slab_free+0x1e2/0x220 [ 160.512226][T14100] ? __kasan_slab_free+0x168/0x220 [ 160.517298][T14100] ? slab_free_freelist_hook+0xd0/0x150 [ 160.522807][T14100] ? kmem_cache_free+0xac/0x5c0 [ 160.527620][T14100] ? do_sys_open+0x4a3/0x620 [ 160.532186][T14100] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 160.538220][T14100] ? do_sys_open+0x2fc/0x620 [ 160.542775][T14100] ? proc_fail_nth_write+0x166/0x200 [ 160.548043][T14100] ? proc_fail_nth_read+0x1c0/0x1c0 [ 160.553204][T14100] ? memset+0x1f/0x40 [ 160.557149][T14100] ? selinux_socket_setsockopt+0x10b/0x340 [ 160.562917][T14100] ? proc_fail_nth_read+0x1c0/0x1c0 [ 160.568077][T14100] ? memset+0x1f/0x40 [ 160.572020][T14100] ? fsnotify+0x13a0/0x1460 [ 160.576488][T14100] ? __kernel_write+0x340/0x340 [ 160.581304][T14100] ? fsnotify+0x13a0/0x1460 08:49:41 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x14, 0x2, 0x0, 0x1, [@vti_common_policy=[@IFLA_VTI_IKEY={0x8}, @IFLA_VTI_LINK={0x8, 0x1, r4}]]}}}]}, 0x40}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 160.585788][T14100] ? security_file_permission+0x128/0x300 [ 160.591491][T14100] ? __sb_end_write+0xa4/0xf0 [ 160.596146][T14100] ? vfs_write+0x427/0x4f0 [ 160.600527][T14100] ? ksys_write+0x237/0x2a0 [ 160.604991][T14100] ? __ia32_sys_read+0x80/0x80 [ 160.609721][T14100] __x64_sys_sendmmsg+0x9c/0xb0 [ 160.614545][T14100] do_syscall_64+0xcb/0x150 [ 160.619030][T14100] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 160.624908][T14100] RIP: 0033:0x45de29 [ 160.628793][T14100] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 160.648386][T14100] RSP: 002b:00007f6925d06c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 160.656792][T14100] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de29 [ 160.664729][T14100] RDX: 000000000800001d RSI: 0000000020007fc0 RDI: 0000000000000003 [ 160.672664][T14100] RBP: 00007f6925d06ca0 R08: 0000000000000000 R09: 0000000000000000 08:49:41 executing program 2 (fault-call:7 fault-nth:13): r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) [ 160.680606][T14100] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000c [ 160.688544][T14100] R13: 00007ffce5b23eff R14: 00007f6925d079c0 R15: 000000000118bf2c 08:49:41 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRESDEC=r0, @ANYRESDEC, @ANYRESDEC], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) [ 160.728943][T14116] FAULT_INJECTION: forcing a failure. [ 160.728943][T14116] name failslab, interval 1, probability 0, space 0, times 0 [ 160.747254][T14116] CPU: 1 PID: 14116 Comm: syz-executor.2 Tainted: G W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 160.758785][T14116] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 160.768818][T14116] Call Trace: [ 160.772078][T14116] dump_stack+0x1b0/0x21e [ 160.776393][T14116] ? devkmsg_release+0x11c/0x11c [ 160.781342][T14116] ? show_regs_print_info+0x12/0x12 [ 160.786520][T14116] ? ip_finish_output2+0x936/0x1810 [ 160.791678][T14116] should_fail+0x6fb/0x860 [ 160.796054][T14116] ? setup_fault_attr+0x2b0/0x2b0 [ 160.801042][T14116] ? prep_new_page+0x11a/0x380 [ 160.805778][T14116] ? dst_alloc+0x137/0x4f0 [ 160.810178][T14116] should_failslab+0x5/0x20 [ 160.814646][T14116] kmem_cache_alloc+0x36/0x250 [ 160.819377][T14116] dst_alloc+0x137/0x4f0 [ 160.823585][T14116] __mkroute_output+0xc94/0x1430 [ 160.828491][T14116] ? mem_cgroup_commit_charge+0x198/0x240 [ 160.834172][T14116] ? ip_route_output_key_hash_rcu+0xf90/0xf90 [ 160.840202][T14116] ? ip_route_output_key_hash_rcu+0x41b/0xf90 [ 160.846249][T14116] ip_route_output_flow+0x150/0x2a0 [ 160.851413][T14116] ? ip_send_skb+0x11e/0x140 [ 160.855967][T14116] ? ipv4_sk_update_pmtu+0x1d40/0x1d40 [ 160.861392][T14116] ? __rcu_read_lock+0x50/0x50 [ 160.866123][T14116] ? selinux_sk_getsecid+0x24/0xb0 [ 160.871200][T14116] udp_sendmsg+0x1731/0x2e80 [ 160.875755][T14116] ? ip_do_fragment+0x2290/0x2290 [ 160.880744][T14116] ? udp_cmsg_send+0x340/0x340 [ 160.885476][T14116] ? selinux_socket_sendmsg+0x10b/0x320 [ 160.890986][T14116] ? selinux_socket_accept+0x580/0x580 [ 160.896413][T14116] ? rw_copy_check_uvector+0x6b/0x310 [ 160.901761][T14116] ? import_iovec+0x171/0x340 [ 160.906401][T14116] ? inet_send_prepare+0x1b7/0x470 [ 160.911514][T14116] ? inet_send_prepare+0x470/0x470 [ 160.916588][T14116] ____sys_sendmsg+0x56f/0x860 [ 160.921315][T14116] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 160.926483][T14116] ? udp_sendmsg+0x75b/0x2e80 [ 160.931125][T14116] ? __sys_sendmmsg+0x46f/0x680 [ 160.935941][T14116] __sys_sendmmsg+0x338/0x680 [ 160.940582][T14116] ? __ia32_sys_sendmsg+0x90/0x90 [ 160.945571][T14116] ? __rcu_read_lock+0x50/0x50 [ 160.950301][T14116] ? __kasan_slab_free+0x1e2/0x220 [ 160.955462][T14116] ? __kasan_slab_free+0x168/0x220 [ 160.960545][T14116] ? slab_free_freelist_hook+0xd0/0x150 [ 160.966054][T14116] ? kmem_cache_free+0xac/0x5c0 [ 160.970871][T14116] ? do_sys_open+0x4a3/0x620 [ 160.975430][T14116] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 160.981465][T14116] ? do_sys_open+0x2fc/0x620 [ 160.986044][T14116] ? proc_fail_nth_write+0x166/0x200 [ 160.991296][T14116] ? proc_fail_nth_read+0x1c0/0x1c0 [ 160.996458][T14116] ? memset+0x1f/0x40 [ 161.000407][T14116] ? selinux_socket_setsockopt+0x10b/0x340 [ 161.006178][T14116] ? proc_fail_nth_read+0x1c0/0x1c0 [ 161.011354][T14116] ? memset+0x1f/0x40 [ 161.015310][T14116] ? fsnotify+0x13a0/0x1460 [ 161.019794][T14116] ? __kernel_write+0x340/0x340 [ 161.024610][T14116] ? fsnotify+0x13a0/0x1460 [ 161.029077][T14116] ? security_file_permission+0x128/0x300 [ 161.034759][T14116] ? __sb_end_write+0xa4/0xf0 [ 161.039414][T14116] ? vfs_write+0x427/0x4f0 [ 161.043881][T14116] ? ksys_write+0x237/0x2a0 [ 161.048354][T14116] ? __ia32_sys_read+0x80/0x80 [ 161.053158][T14116] __x64_sys_sendmmsg+0x9c/0xb0 [ 161.057979][T14116] do_syscall_64+0xcb/0x150 [ 161.062450][T14116] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 161.068308][T14116] RIP: 0033:0x45de29 [ 161.072169][T14116] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 161.091852][T14116] RSP: 002b:00007f6925d06c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 161.100236][T14116] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de29 [ 161.108168][T14116] RDX: 000000000800001d RSI: 0000000020007fc0 RDI: 0000000000000003 [ 161.116100][T14116] RBP: 00007f6925d06ca0 R08: 0000000000000000 R09: 0000000000000000 08:49:42 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, 0x0, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:49:42 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(0x0, 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:49:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) socket(0x1e, 0x4, 0x0) connect$tipc(0xffffffffffffffff, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x200fc0) 08:49:42 executing program 2 (fault-call:7 fault-nth:14): r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) [ 161.124045][T14116] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000d [ 161.131991][T14116] R13: 00007ffce5b23eff R14: 00007f6925d079c0 R15: 000000000118bf2c 08:49:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRESDEC=r0, @ANYRESDEC, @ANYRESDEC], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:49:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) socket(0x1e, 0x4, 0x0) connect$tipc(0xffffffffffffffff, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x200fc0) [ 161.195962][T14131] FAULT_INJECTION: forcing a failure. [ 161.195962][T14131] name failslab, interval 1, probability 0, space 0, times 0 08:49:42 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, 0x0, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) [ 161.236302][T14131] CPU: 0 PID: 14131 Comm: syz-executor.2 Tainted: G W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 161.247846][T14131] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 161.257881][T14131] Call Trace: [ 161.261159][T14131] dump_stack+0x1b0/0x21e [ 161.265465][T14131] ? devkmsg_release+0x11c/0x11c [ 161.270367][T14131] ? show_regs_print_info+0x12/0x12 [ 161.275528][T14131] ? is_bpf_text_address+0x290/0x2b0 [ 161.280777][T14131] should_fail+0x6fb/0x860 [ 161.285162][T14131] ? setup_fault_attr+0x2b0/0x2b0 [ 161.290153][T14131] ? arch_stack_walk+0x98/0xe0 [ 161.294883][T14131] ? ___slab_alloc+0x9b/0x450 [ 161.299634][T14131] ? alloc_skb_with_frags+0xb1/0x580 [ 161.304896][T14131] should_failslab+0x5/0x20 [ 161.309366][T14131] __kmalloc_track_caller+0x5d/0x2b0 [ 161.314613][T14131] ? kmem_cache_alloc+0x1d5/0x250 [ 161.319600][T14131] ? alloc_skb_with_frags+0xb1/0x580 [ 161.324892][T14131] __alloc_skb+0xd1/0x4d0 [ 161.329190][T14131] alloc_skb_with_frags+0xb1/0x580 [ 161.334268][T14131] ? __kasan_kmalloc+0x179/0x1b0 [ 161.339173][T14131] sock_alloc_send_pskb+0x87e/0xcc0 [ 161.344337][T14131] ? ip_route_output_flow+0x150/0x2a0 [ 161.349678][T14131] ? udp_sendmsg+0x1731/0x2e80 [ 161.354415][T14131] ? sock_kzfree_s+0x50/0x50 [ 161.358975][T14131] ? __rcu_read_lock+0x50/0x50 [ 161.363708][T14131] ? xfrm_selector_match+0xa71/0xf00 [ 161.368961][T14131] __ip_append_data+0x1fbd/0x31b0 [ 161.373952][T14131] ? dst_alloc+0x137/0x4f0 [ 161.378336][T14131] ? ip_do_fragment+0x2290/0x2290 [ 161.383334][T14131] ? __xfrm_sk_clone_policy+0xac0/0xac0 [ 161.388888][T14131] ? ip_setup_cork+0x810/0x810 [ 161.393616][T14131] ? ipv4_mtu+0x212/0x2c0 [ 161.397910][T14131] ? ip_setup_cork+0x46b/0x810 [ 161.402638][T14131] ? ip_route_output_key_hash_rcu+0x41b/0xf90 [ 161.408675][T14131] ip_make_skb+0x1c9/0x4d0 [ 161.413092][T14131] ? ip_do_fragment+0x2290/0x2290 [ 161.418085][T14131] ? ip_flush_pending_frames+0x2e0/0x2e0 [ 161.423685][T14131] ? __rcu_read_lock+0x50/0x50 [ 161.428413][T14131] udp_sendmsg+0x1d1b/0x2e80 [ 161.432968][T14131] ? ip_do_fragment+0x2290/0x2290 [ 161.437956][T14131] ? udp_cmsg_send+0x340/0x340 [ 161.442724][T14131] ? selinux_socket_sendmsg+0x10b/0x320 [ 161.448233][T14131] ? selinux_socket_accept+0x580/0x580 [ 161.453656][T14131] ? rw_copy_check_uvector+0x6b/0x310 [ 161.458993][T14131] ? inet_send_prepare+0x1b7/0x470 [ 161.464069][T14131] ? inet_send_prepare+0x470/0x470 [ 161.469145][T14131] ____sys_sendmsg+0x56f/0x860 [ 161.473875][T14131] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 161.479036][T14131] ? udp_sendmsg+0x75b/0x2e80 [ 161.483676][T14131] ? __sys_sendmmsg+0x46f/0x680 [ 161.488581][T14131] __sys_sendmmsg+0x338/0x680 [ 161.493246][T14131] ? __ia32_sys_sendmsg+0x90/0x90 [ 161.498292][T14131] ? __rcu_read_lock+0x50/0x50 [ 161.503018][T14131] ? __kasan_slab_free+0x1e2/0x220 [ 161.508093][T14131] ? __kasan_slab_free+0x168/0x220 [ 161.513178][T14131] ? slab_free_freelist_hook+0xd0/0x150 [ 161.518709][T14131] ? kmem_cache_free+0xac/0x5c0 [ 161.523653][T14131] ? do_sys_open+0x4a3/0x620 [ 161.528242][T14131] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 161.534404][T14131] ? do_sys_open+0x2fc/0x620 [ 161.538957][T14131] ? proc_fail_nth_write+0x166/0x200 [ 161.544203][T14131] ? _raw_spin_lock+0x170/0x170 [ 161.549016][T14131] ? proc_fail_nth_read+0x1c0/0x1c0 [ 161.554178][T14131] ? memset+0x1f/0x40 [ 161.558125][T14131] ? selinux_socket_setsockopt+0x10b/0x340 [ 161.563894][T14131] ? proc_fail_nth_read+0x1c0/0x1c0 [ 161.569056][T14131] ? memset+0x1f/0x40 [ 161.573003][T14131] ? fsnotify+0x13a0/0x1460 [ 161.577601][T14131] ? __kernel_write+0x340/0x340 [ 161.582448][T14131] ? fsnotify+0x13a0/0x1460 [ 161.586918][T14131] ? security_file_permission+0x128/0x300 [ 161.592598][T14131] ? __sb_end_write+0xa4/0xf0 [ 161.597239][T14131] ? vfs_write+0x427/0x4f0 [ 161.601620][T14131] ? ksys_write+0x237/0x2a0 [ 161.606092][T14131] ? __ia32_sys_read+0x80/0x80 [ 161.610826][T14131] __x64_sys_sendmmsg+0x9c/0xb0 [ 161.615641][T14131] do_syscall_64+0xcb/0x150 [ 161.620107][T14131] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 161.625965][T14131] RIP: 0033:0x45de29 [ 161.629942][T14131] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 161.649512][T14131] RSP: 002b:00007f6925d06c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 161.657886][T14131] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de29 [ 161.665824][T14131] RDX: 000000000800001d RSI: 0000000020007fc0 RDI: 0000000000000003 [ 161.673765][T14131] RBP: 00007f6925d06ca0 R08: 0000000000000000 R09: 0000000000000000 08:49:42 executing program 2 (fault-call:7 fault-nth:15): r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 08:49:42 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x14, 0x2, 0x0, 0x1, [@vti_common_policy=[@IFLA_VTI_IKEY={0x8}, @IFLA_VTI_LINK={0x8, 0x1, r4}]]}}}]}, 0x40}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 161.681716][T14131] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000e [ 161.689668][T14131] R13: 00007ffce5b23eff R14: 00007f6925d079c0 R15: 000000000118bf2c [ 161.738998][T14148] FAULT_INJECTION: forcing a failure. [ 161.738998][T14148] name failslab, interval 1, probability 0, space 0, times 0 [ 161.755656][T14148] CPU: 0 PID: 14148 Comm: syz-executor.2 Tainted: G W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 161.767176][T14148] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 161.777210][T14148] Call Trace: [ 161.780474][T14148] dump_stack+0x1b0/0x21e [ 161.784773][T14148] ? devkmsg_release+0x11c/0x11c [ 161.789681][T14148] ? show_regs_print_info+0x12/0x12 [ 161.794846][T14148] should_fail+0x6fb/0x860 [ 161.799228][T14148] ? setup_fault_attr+0x2b0/0x2b0 [ 161.804230][T14148] ? skb_clone+0x1b2/0x370 [ 161.808616][T14148] should_failslab+0x5/0x20 [ 161.813091][T14148] kmem_cache_alloc+0x36/0x250 [ 161.817833][T14148] skb_clone+0x1b2/0x370 [ 161.822041][T14148] ip_mc_output+0x1ce/0xab0 [ 161.826532][T14148] ? nf_nat_ipv4_local_fn+0x2c2/0x4e0 [ 161.831873][T14148] ? ip_build_and_send_pkt+0x9d0/0x9d0 [ 161.837301][T14148] ? nf_hook_slow+0x1a6/0x1f0 [ 161.841949][T14148] ? __ip_local_out+0x347/0x4a0 [ 161.846771][T14148] ? ip_send_check+0xd0/0xd0 [ 161.851334][T14148] ? __ip_local_out+0x4a0/0x4a0 [ 161.856152][T14148] ? csum_partial+0x379/0x470 [ 161.860797][T14148] ip_send_skb+0xaa/0x140 [ 161.865094][T14148] udp_send_skb+0x8e9/0x1100 [ 161.869653][T14148] udp_sendmsg+0x1d45/0x2e80 [ 161.874210][T14148] ? ip_do_fragment+0x2290/0x2290 [ 161.879212][T14148] ? udp_cmsg_send+0x340/0x340 [ 161.883952][T14148] ? selinux_socket_sendmsg+0x10b/0x320 [ 161.889471][T14148] ? selinux_socket_accept+0x580/0x580 [ 161.894900][T14148] ? rw_copy_check_uvector+0x6b/0x310 [ 161.900249][T14148] ? inet_send_prepare+0x1b7/0x470 [ 161.905327][T14148] ? inet_send_prepare+0x470/0x470 [ 161.910403][T14148] ____sys_sendmsg+0x56f/0x860 [ 161.915134][T14148] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 161.920294][T14148] ? udp_sendmsg+0x75b/0x2e80 [ 161.924934][T14148] ? __sys_sendmmsg+0x46f/0x680 [ 161.929760][T14148] __sys_sendmmsg+0x338/0x680 [ 161.934405][T14148] ? __ia32_sys_sendmsg+0x90/0x90 [ 161.939396][T14148] ? __rcu_read_lock+0x50/0x50 [ 161.944240][T14148] ? __kasan_slab_free+0x1e2/0x220 [ 161.949322][T14148] ? __kasan_slab_free+0x168/0x220 [ 161.954400][T14148] ? slab_free_freelist_hook+0xd0/0x150 [ 161.959910][T14148] ? kmem_cache_free+0xac/0x5c0 [ 161.964725][T14148] ? do_sys_open+0x4a3/0x620 [ 161.969285][T14148] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 161.975320][T14148] ? do_sys_open+0x2fc/0x620 [ 161.979874][T14148] ? proc_fail_nth_write+0x166/0x200 [ 161.985123][T14148] ? proc_fail_nth_read+0x1c0/0x1c0 [ 161.990391][T14148] ? memset+0x1f/0x40 [ 161.994339][T14148] ? selinux_socket_setsockopt+0x10b/0x340 [ 162.000107][T14148] ? proc_fail_nth_read+0x1c0/0x1c0 [ 162.005269][T14148] ? memset+0x1f/0x40 [ 162.009216][T14148] ? fsnotify+0x13a0/0x1460 [ 162.013698][T14148] ? __kernel_write+0x340/0x340 [ 162.018511][T14148] ? fsnotify+0x13a0/0x1460 [ 162.022983][T14148] ? security_file_permission+0x128/0x300 [ 162.028680][T14148] ? __sb_end_write+0xa4/0xf0 [ 162.033326][T14148] ? vfs_write+0x427/0x4f0 [ 162.037702][T14148] ? ksys_write+0x237/0x2a0 [ 162.042175][T14148] ? __ia32_sys_read+0x80/0x80 [ 162.046917][T14148] __x64_sys_sendmmsg+0x9c/0xb0 [ 162.051740][T14148] do_syscall_64+0xcb/0x150 [ 162.056219][T14148] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 162.062076][T14148] RIP: 0033:0x45de29 [ 162.065939][T14148] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 08:49:43 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(0x0, 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:49:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRESDEC=r0, @ANYRESDEC, @ANYRESDEC], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:49:43 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, 0x0, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) [ 162.085525][T14148] RSP: 002b:00007f6925d06c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 162.093902][T14148] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de29 [ 162.101842][T14148] RDX: 000000000800001d RSI: 0000000020007fc0 RDI: 0000000000000003 [ 162.109781][T14148] RBP: 00007f6925d06ca0 R08: 0000000000000000 R09: 0000000000000000 [ 162.117719][T14148] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000f [ 162.125657][T14148] R13: 00007ffce5b23eff R14: 00007f6925d079c0 R15: 000000000118bf2c 08:49:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) socket(0x1e, 0x4, 0x0) connect$tipc(0xffffffffffffffff, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x200fc0) 08:49:43 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x200fc0) 08:49:43 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:49:43 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x200fc0) 08:49:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, 0x0, 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:49:43 executing program 2 (fault-call:7 fault-nth:16): r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 08:49:43 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:49:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, 0x0, 0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) [ 162.333581][T14181] FAULT_INJECTION: forcing a failure. [ 162.333581][T14181] name failslab, interval 1, probability 0, space 0, times 0 [ 162.355691][T14181] CPU: 0 PID: 14181 Comm: syz-executor.2 Tainted: G W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 162.367234][T14181] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 162.377262][T14181] Call Trace: [ 162.380523][T14181] dump_stack+0x1b0/0x21e [ 162.384837][T14181] ? devkmsg_release+0x11c/0x11c [ 162.389736][T14181] ? show_regs_print_info+0x12/0x12 [ 162.394929][T14181] should_fail+0x6fb/0x860 [ 162.399318][T14181] ? setup_fault_attr+0x2b0/0x2b0 [ 162.404311][T14181] ? dst_alloc+0x137/0x4f0 [ 162.408769][T14181] should_failslab+0x5/0x20 [ 162.413237][T14181] kmem_cache_alloc+0x36/0x250 [ 162.418143][T14181] dst_alloc+0x137/0x4f0 [ 162.422360][T14181] rt_dst_clone+0x53/0x670 [ 162.426790][T14181] ip_mc_finish_output+0xad/0x3a0 [ 162.431779][T14181] ip_mc_output+0x407/0xab0 [ 162.436251][T14181] ? ip_build_and_send_pkt+0x9d0/0x9d0 [ 162.441685][T14181] ? nf_hook_slow+0x1a6/0x1f0 [ 162.446334][T14181] ? ip_mc_output+0xab0/0xab0 [ 162.450974][T14181] ? ip_send_check+0xd0/0xd0 [ 162.455529][T14181] ? __ip_local_out+0x4a0/0x4a0 [ 162.460345][T14181] ? csum_partial+0x379/0x470 [ 162.464992][T14181] ip_send_skb+0xaa/0x140 [ 162.469289][T14181] udp_send_skb+0x8e9/0x1100 [ 162.473844][T14181] udp_sendmsg+0x1d45/0x2e80 [ 162.478400][T14181] ? ip_do_fragment+0x2290/0x2290 [ 162.483397][T14181] ? udp_cmsg_send+0x340/0x340 [ 162.488128][T14181] ? selinux_socket_sendmsg+0x10b/0x320 [ 162.493637][T14181] ? selinux_socket_accept+0x580/0x580 [ 162.499060][T14181] ? rw_copy_check_uvector+0x6b/0x310 [ 162.504397][T14181] ? inet_send_prepare+0x1b7/0x470 [ 162.509472][T14181] ? inet_send_prepare+0x470/0x470 [ 162.514548][T14181] ____sys_sendmsg+0x56f/0x860 [ 162.519278][T14181] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 162.524442][T14181] ? udp_sendmsg+0x75b/0x2e80 [ 162.529081][T14181] ? __sys_sendmmsg+0x46f/0x680 08:49:43 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x14, 0x2, 0x0, 0x1, [@vti_common_policy=[@IFLA_VTI_IKEY={0x8}, @IFLA_VTI_LINK={0x8, 0x1, r4}]]}}}]}, 0x40}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 08:49:43 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x200fc0) [ 162.533894][T14181] __sys_sendmmsg+0x338/0x680 [ 162.538534][T14181] ? __ia32_sys_sendmsg+0x90/0x90 [ 162.543534][T14181] ? __rcu_read_lock+0x50/0x50 [ 162.548280][T14181] ? __kasan_slab_free+0x1e2/0x220 [ 162.553384][T14181] ? __kasan_slab_free+0x168/0x220 [ 162.558477][T14181] ? slab_free_freelist_hook+0xd0/0x150 [ 162.564007][T14181] ? kmem_cache_free+0xac/0x5c0 [ 162.568836][T14181] ? do_sys_open+0x4a3/0x620 [ 162.573391][T14181] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 162.579421][T14181] ? do_sys_open+0x2fc/0x620 [ 162.583978][T14181] ? proc_fail_nth_write+0x166/0x200 [ 162.589231][T14181] ? proc_fail_nth_read+0x1c0/0x1c0 [ 162.594393][T14181] ? memset+0x1f/0x40 [ 162.598337][T14181] ? selinux_socket_setsockopt+0x10b/0x340 [ 162.604108][T14181] ? proc_fail_nth_read+0x1c0/0x1c0 [ 162.609275][T14181] ? memset+0x1f/0x40 [ 162.613234][T14181] ? fsnotify+0x13a0/0x1460 [ 162.617717][T14181] ? __kernel_write+0x340/0x340 [ 162.622533][T14181] ? fsnotify+0x13a0/0x1460 [ 162.627010][T14181] ? security_file_permission+0x128/0x300 [ 162.632691][T14181] ? __sb_end_write+0xa4/0xf0 [ 162.637332][T14181] ? vfs_write+0x427/0x4f0 [ 162.641712][T14181] ? ksys_write+0x237/0x2a0 [ 162.646176][T14181] ? __ia32_sys_read+0x80/0x80 [ 162.650904][T14181] __x64_sys_sendmmsg+0x9c/0xb0 [ 162.655718][T14181] do_syscall_64+0xcb/0x150 [ 162.660203][T14181] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 162.666060][T14181] RIP: 0033:0x45de29 [ 162.669920][T14181] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 162.689489][T14181] RSP: 002b:00007f6925d06c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 162.697875][T14181] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de29 [ 162.705812][T14181] RDX: 000000000800001d RSI: 0000000020007fc0 RDI: 0000000000000003 [ 162.713748][T14181] RBP: 00007f6925d06ca0 R08: 0000000000000000 R09: 0000000000000000 [ 162.721682][T14181] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000010 08:49:43 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:49:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, 0x0, 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) [ 162.729620][T14181] R13: 00007ffce5b23eff R14: 00007f6925d079c0 R15: 000000000118bf2c 08:49:44 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:49:44 executing program 2 (fault-call:7 fault-nth:17): r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 08:49:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, 0x0, 0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:49:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, 0x0, 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:49:44 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) [ 162.892348][T14206] FAULT_INJECTION: forcing a failure. [ 162.892348][T14206] name failslab, interval 1, probability 0, space 0, times 0 [ 162.905114][T14206] CPU: 1 PID: 14206 Comm: syz-executor.2 Tainted: G W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 162.916634][T14206] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 162.926685][T14206] Call Trace: [ 162.929954][T14206] dump_stack+0x1b0/0x21e [ 162.934267][T14206] ? devkmsg_release+0x11c/0x11c [ 162.939181][T14206] ? show_regs_print_info+0x12/0x12 [ 162.944346][T14206] ? ip_finish_output2+0x936/0x1810 [ 162.949510][T14206] should_fail+0x6fb/0x860 [ 162.953891][T14206] ? setup_fault_attr+0x2b0/0x2b0 [ 162.958891][T14206] ? ip_fragment+0x210/0x210 [ 162.963493][T14206] ? dst_alloc+0x137/0x4f0 [ 162.967874][T14206] should_failslab+0x5/0x20 [ 162.972342][T14206] kmem_cache_alloc+0x36/0x250 [ 162.977068][T14206] dst_alloc+0x137/0x4f0 [ 162.981285][T14206] __mkroute_output+0xc94/0x1430 [ 162.986217][T14206] ? ip_route_output_key_hash_rcu+0xf90/0xf90 [ 162.992246][T14206] ? ip_route_output_key_hash_rcu+0x41b/0xf90 [ 162.998318][T14206] ip_route_output_flow+0x150/0x2a0 [ 163.003488][T14206] ? ip_send_skb+0x11e/0x140 [ 163.008049][T14206] ? ipv4_sk_update_pmtu+0x1d40/0x1d40 [ 163.013477][T14206] ? __rcu_read_lock+0x50/0x50 [ 163.018207][T14206] ? selinux_sk_getsecid+0x24/0xb0 [ 163.023286][T14206] udp_sendmsg+0x1731/0x2e80 [ 163.027856][T14206] ? ip_do_fragment+0x2290/0x2290 [ 163.032851][T14206] ? udp_cmsg_send+0x340/0x340 [ 163.037598][T14206] ? selinux_socket_sendmsg+0x10b/0x320 [ 163.043113][T14206] ? selinux_socket_accept+0x580/0x580 [ 163.048549][T14206] ? rw_copy_check_uvector+0x6b/0x310 [ 163.053893][T14206] ? import_iovec+0x171/0x340 [ 163.058542][T14206] ? inet_send_prepare+0x1b7/0x470 [ 163.063620][T14206] ? inet_send_prepare+0x470/0x470 [ 163.068726][T14206] ____sys_sendmsg+0x56f/0x860 [ 163.073454][T14206] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 163.078616][T14206] ? udp_sendmsg+0x75b/0x2e80 [ 163.083261][T14206] ? __sys_sendmmsg+0x46f/0x680 [ 163.088078][T14206] __sys_sendmmsg+0x338/0x680 [ 163.092723][T14206] ? __ia32_sys_sendmsg+0x90/0x90 [ 163.097716][T14206] ? __rcu_read_lock+0x50/0x50 [ 163.102450][T14206] ? __kasan_slab_free+0x1e2/0x220 [ 163.107528][T14206] ? __kasan_slab_free+0x168/0x220 [ 163.112613][T14206] ? slab_free_freelist_hook+0xd0/0x150 [ 163.118122][T14206] ? kmem_cache_free+0xac/0x5c0 [ 163.122936][T14206] ? do_sys_open+0x4a3/0x620 [ 163.127491][T14206] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 163.133520][T14206] ? do_sys_open+0x2fc/0x620 [ 163.138079][T14206] ? proc_fail_nth_write+0x166/0x200 [ 163.143355][T14206] ? proc_fail_nth_read+0x1c0/0x1c0 [ 163.148527][T14206] ? memset+0x1f/0x40 [ 163.152475][T14206] ? selinux_socket_setsockopt+0x10b/0x340 [ 163.158245][T14206] ? proc_fail_nth_read+0x1c0/0x1c0 [ 163.163408][T14206] ? memset+0x1f/0x40 [ 163.167353][T14206] ? fsnotify+0x13a0/0x1460 [ 163.171817][T14206] ? __kernel_write+0x340/0x340 [ 163.176630][T14206] ? fsnotify+0x13a0/0x1460 [ 163.181114][T14206] ? security_file_permission+0x128/0x300 [ 163.186794][T14206] ? __sb_end_write+0xa4/0xf0 [ 163.191436][T14206] ? vfs_write+0x427/0x4f0 [ 163.195818][T14206] ? ksys_write+0x237/0x2a0 [ 163.200283][T14206] ? __ia32_sys_read+0x80/0x80 [ 163.205011][T14206] __x64_sys_sendmmsg+0x9c/0xb0 [ 163.209972][T14206] do_syscall_64+0xcb/0x150 [ 163.214458][T14206] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 163.220329][T14206] RIP: 0033:0x45de29 [ 163.224193][T14206] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 08:49:44 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x200fc0) 08:49:44 executing program 2 (fault-call:7 fault-nth:18): r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 08:49:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, 0x0, 0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) [ 163.243769][T14206] RSP: 002b:00007f6925d06c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 163.252230][T14206] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de29 [ 163.260170][T14206] RDX: 000000000800001d RSI: 0000000020007fc0 RDI: 0000000000000003 [ 163.268108][T14206] RBP: 00007f6925d06ca0 R08: 0000000000000000 R09: 0000000000000000 [ 163.276049][T14206] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000011 [ 163.283985][T14206] R13: 00007ffce5b23eff R14: 00007f6925d079c0 R15: 000000000118bf2c [ 163.325042][T14221] FAULT_INJECTION: forcing a failure. [ 163.325042][T14221] name failslab, interval 1, probability 0, space 0, times 0 [ 163.339782][T14221] CPU: 1 PID: 14221 Comm: syz-executor.2 Tainted: G W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 163.351309][T14221] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 163.361348][T14221] Call Trace: [ 163.364643][T14221] dump_stack+0x1b0/0x21e [ 163.368966][T14221] ? devkmsg_release+0x11c/0x11c 08:49:44 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x14, 0x2, 0x0, 0x1, [@vti_common_policy=[@IFLA_VTI_IKEY={0x8}, @IFLA_VTI_LINK={0x8, 0x1, r4}]]}}}]}, 0x40}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 08:49:44 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) [ 163.373892][T14221] ? show_regs_print_info+0x12/0x12 [ 163.379074][T14221] ? is_bpf_text_address+0x290/0x2b0 [ 163.384342][T14221] should_fail+0x6fb/0x860 [ 163.388758][T14221] ? setup_fault_attr+0x2b0/0x2b0 [ 163.393766][T14221] ? arch_stack_walk+0x98/0xe0 [ 163.398513][T14221] ? __alloc_skb+0x88/0x4d0 [ 163.403005][T14221] should_failslab+0x5/0x20 [ 163.407497][T14221] kmem_cache_alloc+0x36/0x250 [ 163.412237][T14221] __alloc_skb+0x88/0x4d0 [ 163.416535][T14221] alloc_skb_with_frags+0xb1/0x580 [ 163.421612][T14221] ? __kasan_kmalloc+0x179/0x1b0 [ 163.426512][T14221] sock_alloc_send_pskb+0x87e/0xcc0 [ 163.431670][T14221] ? ip_route_output_flow+0x150/0x2a0 [ 163.437002][T14221] ? udp_sendmsg+0x1731/0x2e80 [ 163.441728][T14221] ? sock_kzfree_s+0x50/0x50 [ 163.446287][T14221] ? __rcu_read_lock+0x50/0x50 [ 163.451018][T14221] ? _raw_spin_lock+0xa1/0x170 [ 163.455757][T14221] ? xfrm_selector_match+0xa71/0xf00 [ 163.461018][T14221] __ip_append_data+0x1fbd/0x31b0 [ 163.466016][T14221] ? dst_alloc+0x137/0x4f0 [ 163.470415][T14221] ? ip_do_fragment+0x2290/0x2290 [ 163.475405][T14221] ? __xfrm_sk_clone_policy+0xac0/0xac0 [ 163.480915][T14221] ? ip_setup_cork+0x810/0x810 [ 163.485643][T14221] ? ipv4_mtu+0x212/0x2c0 [ 163.489939][T14221] ? ip_setup_cork+0x46b/0x810 [ 163.494667][T14221] ? ip_route_output_key_hash_rcu+0x41b/0xf90 [ 163.500705][T14221] ip_make_skb+0x1c9/0x4d0 [ 163.505102][T14221] ? ip_do_fragment+0x2290/0x2290 [ 163.510106][T14221] ? ip_flush_pending_frames+0x2e0/0x2e0 [ 163.515703][T14221] ? __rcu_read_lock+0x50/0x50 [ 163.520433][T14221] udp_sendmsg+0x1d1b/0x2e80 [ 163.524988][T14221] ? ip_do_fragment+0x2290/0x2290 [ 163.529984][T14221] ? udp_cmsg_send+0x340/0x340 [ 163.534714][T14221] ? selinux_socket_sendmsg+0x10b/0x320 [ 163.540325][T14221] ? selinux_socket_accept+0x580/0x580 [ 163.545752][T14221] ? rw_copy_check_uvector+0x6b/0x310 [ 163.551092][T14221] ? inet_send_prepare+0x1b7/0x470 [ 163.556176][T14221] ? inet_send_prepare+0x470/0x470 [ 163.561257][T14221] ____sys_sendmsg+0x56f/0x860 [ 163.565985][T14221] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 163.571154][T14221] ? udp_sendmsg+0x75b/0x2e80 [ 163.575800][T14221] ? __sys_sendmmsg+0x46f/0x680 [ 163.580617][T14221] __sys_sendmmsg+0x338/0x680 [ 163.585260][T14221] ? __ia32_sys_sendmsg+0x90/0x90 [ 163.590249][T14221] ? __rcu_read_lock+0x50/0x50 [ 163.595151][T14221] ? __kasan_slab_free+0x1e2/0x220 [ 163.600225][T14221] ? __kasan_slab_free+0x168/0x220 [ 163.605301][T14221] ? slab_free_freelist_hook+0xd0/0x150 [ 163.610811][T14221] ? kmem_cache_free+0xac/0x5c0 [ 163.615629][T14221] ? do_sys_open+0x4a3/0x620 [ 163.620197][T14221] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 163.626235][T14221] ? do_sys_open+0x2fc/0x620 [ 163.630792][T14221] ? proc_fail_nth_write+0x166/0x200 [ 163.636038][T14221] ? _raw_spin_lock+0x170/0x170 [ 163.640869][T14221] ? proc_fail_nth_read+0x1c0/0x1c0 [ 163.646037][T14221] ? memset+0x1f/0x40 [ 163.649982][T14221] ? mod_node_page_state+0xcf/0xf0 [ 163.655069][T14221] ? proc_fail_nth_read+0x1c0/0x1c0 [ 163.660230][T14221] ? memset+0x1f/0x40 [ 163.664180][T14221] ? fsnotify+0x13a0/0x1460 [ 163.668647][T14221] ? __kernel_write+0x340/0x340 [ 163.673466][T14221] ? fsnotify+0x13a0/0x1460 [ 163.677942][T14221] ? security_file_permission+0x128/0x300 [ 163.683631][T14221] ? __sb_end_write+0xa4/0xf0 [ 163.688273][T14221] ? vfs_write+0x427/0x4f0 [ 163.692651][T14221] ? ksys_write+0x237/0x2a0 [ 163.697131][T14221] ? __ia32_sys_read+0x80/0x80 [ 163.701866][T14221] __x64_sys_sendmmsg+0x9c/0xb0 [ 163.706687][T14221] do_syscall_64+0xcb/0x150 [ 163.711155][T14221] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 163.717012][T14221] RIP: 0033:0x45de29 [ 163.720871][T14221] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 163.740437][T14221] RSP: 002b:00007f6925d06c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 163.748812][T14221] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de29 [ 163.756748][T14221] RDX: 000000000800001d RSI: 0000000020007fc0 RDI: 0000000000000003 [ 163.764682][T14221] RBP: 00007f6925d06ca0 R08: 0000000000000000 R09: 0000000000000000 08:49:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC=r0, @ANYRESDEC], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:49:45 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) [ 163.772627][T14221] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000012 [ 163.780570][T14221] R13: 00007ffce5b23eff R14: 00007f6925d079c0 R15: 000000000118bf2c 08:49:45 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x200fc0) 08:49:45 executing program 2 (fault-call:7 fault-nth:19): r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 08:49:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:49:45 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x200fc0) 08:49:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) [ 163.889030][T14249] FAULT_INJECTION: forcing a failure. [ 163.889030][T14249] name failslab, interval 1, probability 0, space 0, times 0 08:49:45 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) [ 163.931693][T14249] CPU: 1 PID: 14249 Comm: syz-executor.2 Tainted: G W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 163.943233][T14249] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 163.953265][T14249] Call Trace: [ 163.956537][T14249] dump_stack+0x1b0/0x21e [ 163.960868][T14249] ? devkmsg_release+0x11c/0x11c [ 163.965789][T14249] ? show_regs_print_info+0x12/0x12 [ 163.970972][T14249] ? is_bpf_text_address+0x290/0x2b0 [ 163.976261][T14249] should_fail+0x6fb/0x860 08:49:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC=r0], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) [ 163.980662][T14249] ? setup_fault_attr+0x2b0/0x2b0 [ 163.985679][T14249] ? arch_stack_walk+0x98/0xe0 [ 163.990422][T14249] ? ___slab_alloc+0x9b/0x450 [ 163.995081][T14249] ? alloc_skb_with_frags+0xb1/0x580 [ 164.000345][T14249] should_failslab+0x5/0x20 [ 164.004833][T14249] __kmalloc_track_caller+0x5d/0x2b0 [ 164.010129][T14249] ? kmem_cache_alloc+0x1d5/0x250 [ 164.015157][T14249] ? alloc_skb_with_frags+0xb1/0x580 [ 164.020420][T14249] __alloc_skb+0xd1/0x4d0 [ 164.024735][T14249] alloc_skb_with_frags+0xb1/0x580 [ 164.029838][T14249] ? __kasan_kmalloc+0x179/0x1b0 [ 164.034772][T14249] sock_alloc_send_pskb+0x87e/0xcc0 [ 164.039987][T14249] ? ip_route_output_flow+0x150/0x2a0 [ 164.045339][T14249] ? udp_sendmsg+0x1731/0x2e80 [ 164.050093][T14249] ? sock_kzfree_s+0x50/0x50 [ 164.054668][T14249] ? __rcu_read_lock+0x50/0x50 [ 164.059420][T14249] ? xfrm_selector_match+0xa71/0xf00 [ 164.064686][T14249] __ip_append_data+0x1fbd/0x31b0 [ 164.069689][T14249] ? dst_alloc+0x137/0x4f0 [ 164.074089][T14249] ? ip_do_fragment+0x2290/0x2290 08:49:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) [ 164.079095][T14249] ? __xfrm_sk_clone_policy+0xac0/0xac0 [ 164.084619][T14249] ? ip_setup_cork+0x810/0x810 [ 164.089364][T14249] ? ipv4_mtu+0x212/0x2c0 [ 164.093679][T14249] ? ip_setup_cork+0x46b/0x810 [ 164.098424][T14249] ? ip_route_output_key_hash_rcu+0x41b/0xf90 [ 164.104471][T14249] ip_make_skb+0x1c9/0x4d0 [ 164.108874][T14249] ? ip_do_fragment+0x2290/0x2290 [ 164.113882][T14249] ? ip_flush_pending_frames+0x2e0/0x2e0 [ 164.119515][T14249] ? __rcu_read_lock+0x50/0x50 [ 164.124278][T14249] udp_sendmsg+0x1d1b/0x2e80 [ 164.128855][T14249] ? ip_do_fragment+0x2290/0x2290 [ 164.133860][T14249] ? udp_cmsg_send+0x340/0x340 [ 164.138605][T14249] ? selinux_socket_sendmsg+0x10b/0x320 [ 164.144131][T14249] ? selinux_socket_accept+0x580/0x580 [ 164.149571][T14249] ? rw_copy_check_uvector+0x6b/0x310 [ 164.154924][T14249] ? inet_send_prepare+0x1b7/0x470 [ 164.160047][T14249] ? inet_send_prepare+0x470/0x470 [ 164.165150][T14249] ____sys_sendmsg+0x56f/0x860 [ 164.169896][T14249] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 164.175074][T14249] ? udp_sendmsg+0x75b/0x2e80 [ 164.179736][T14249] ? __sys_sendmmsg+0x46f/0x680 [ 164.184572][T14249] __sys_sendmmsg+0x338/0x680 [ 164.189230][T14249] ? __ia32_sys_sendmsg+0x90/0x90 [ 164.194241][T14249] ? __rcu_read_lock+0x50/0x50 [ 164.198984][T14249] ? __kasan_slab_free+0x1e2/0x220 [ 164.204077][T14249] ? __kasan_slab_free+0x168/0x220 [ 164.209171][T14249] ? slab_free_freelist_hook+0xd0/0x150 [ 164.214704][T14249] ? kmem_cache_free+0xac/0x5c0 [ 164.219534][T14249] ? do_sys_open+0x4a3/0x620 [ 164.224102][T14249] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 164.230135][T14249] ? do_sys_open+0x2fc/0x620 [ 164.234691][T14249] ? proc_fail_nth_write+0x166/0x200 [ 164.239941][T14249] ? proc_fail_nth_read+0x1c0/0x1c0 [ 164.245114][T14249] ? memset+0x1f/0x40 [ 164.249063][T14249] ? selinux_socket_setsockopt+0x10b/0x340 [ 164.254832][T14249] ? proc_fail_nth_read+0x1c0/0x1c0 [ 164.260010][T14249] ? memset+0x1f/0x40 [ 164.263961][T14249] ? fsnotify+0x13a0/0x1460 [ 164.268429][T14249] ? __kernel_write+0x340/0x340 [ 164.273244][T14249] ? fsnotify+0x13a0/0x1460 [ 164.277804][T14249] ? security_file_permission+0x128/0x300 [ 164.283486][T14249] ? __sb_end_write+0xa4/0xf0 [ 164.288133][T14249] ? vfs_write+0x427/0x4f0 [ 164.292512][T14249] ? ksys_write+0x237/0x2a0 [ 164.296977][T14249] ? __ia32_sys_read+0x80/0x80 [ 164.301725][T14249] __x64_sys_sendmmsg+0x9c/0xb0 [ 164.306541][T14249] do_syscall_64+0xcb/0x150 [ 164.311145][T14249] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 164.317004][T14249] RIP: 0033:0x45de29 [ 164.320866][T14249] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 164.340437][T14249] RSP: 002b:00007f6925d06c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 164.348816][T14249] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de29 [ 164.356789][T14249] RDX: 000000000800001d RSI: 0000000020007fc0 RDI: 0000000000000003 [ 164.364729][T14249] RBP: 00007f6925d06ca0 R08: 0000000000000000 R09: 0000000000000000 [ 164.372680][T14249] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 08:49:45 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x14, 0x2, 0x0, 0x1, [@vti_common_policy=[@IFLA_VTI_IKEY={0x8}, @IFLA_VTI_LINK={0x8, 0x1, r4}]]}}}]}, 0x40}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 08:49:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x0, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:49:45 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x0) [ 164.380617][T14249] R13: 00007ffce5b23eff R14: 00007f6925d079c0 R15: 000000000118bf2c 08:49:45 executing program 2 (fault-call:7 fault-nth:20): r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 08:49:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) [ 164.453318][T14273] FAULT_INJECTION: forcing a failure. [ 164.453318][T14273] name failslab, interval 1, probability 0, space 0, times 0 [ 164.486928][T14273] CPU: 0 PID: 14273 Comm: syz-executor.2 Tainted: G W 5.4.69-syzkaller-00002-g489646b879ed #0 08:49:45 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) [ 164.498450][T14273] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 164.508475][T14273] Call Trace: [ 164.511761][T14273] dump_stack+0x1b0/0x21e [ 164.516100][T14273] ? devkmsg_release+0x11c/0x11c [ 164.521023][T14273] ? show_regs_print_info+0x12/0x12 [ 164.526200][T14273] should_fail+0x6fb/0x860 [ 164.530585][T14273] ? setup_fault_attr+0x2b0/0x2b0 [ 164.535573][T14273] ? skb_clone+0x1b2/0x370 [ 164.539962][T14273] should_failslab+0x5/0x20 [ 164.544445][T14273] kmem_cache_alloc+0x36/0x250 [ 164.549179][T14273] skb_clone+0x1b2/0x370 [ 164.553388][T14273] ip_mc_output+0x1ce/0xab0 [ 164.557856][T14273] ? nf_nat_ipv4_local_fn+0x2c2/0x4e0 [ 164.563208][T14273] ? ip_build_and_send_pkt+0x9d0/0x9d0 [ 164.568637][T14273] ? nf_hook_slow+0x1a6/0x1f0 [ 164.573278][T14273] ? __ip_local_out+0x347/0x4a0 [ 164.578210][T14273] ? ip_send_check+0xd0/0xd0 [ 164.582786][T14273] ? __ip_local_out+0x4a0/0x4a0 [ 164.587627][T14273] ? csum_partial+0x379/0x470 [ 164.592291][T14273] ip_send_skb+0xaa/0x140 [ 164.596583][T14273] udp_send_skb+0x8e9/0x1100 [ 164.601139][T14273] udp_sendmsg+0x1d45/0x2e80 [ 164.605695][T14273] ? ip_do_fragment+0x2290/0x2290 [ 164.610684][T14273] ? udp_cmsg_send+0x340/0x340 [ 164.615416][T14273] ? selinux_socket_sendmsg+0x10b/0x320 [ 164.620962][T14273] ? selinux_socket_accept+0x580/0x580 [ 164.626422][T14273] ? rw_copy_check_uvector+0x6b/0x310 [ 164.631760][T14273] ? inet_send_prepare+0x1b7/0x470 [ 164.636835][T14273] ? inet_send_prepare+0x470/0x470 [ 164.641916][T14273] ____sys_sendmsg+0x56f/0x860 [ 164.646656][T14273] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 164.651824][T14273] ? udp_sendmsg+0x75b/0x2e80 [ 164.656470][T14273] ? __sys_sendmmsg+0x46f/0x680 [ 164.661287][T14273] __sys_sendmmsg+0x338/0x680 [ 164.665941][T14273] ? __ia32_sys_sendmsg+0x90/0x90 [ 164.670939][T14273] ? __rcu_read_lock+0x50/0x50 [ 164.675666][T14273] ? __kasan_slab_free+0x1e2/0x220 [ 164.680741][T14273] ? __kasan_slab_free+0x168/0x220 [ 164.685816][T14273] ? slab_free_freelist_hook+0xd0/0x150 [ 164.691423][T14273] ? kmem_cache_free+0xac/0x5c0 [ 164.696237][T14273] ? do_sys_open+0x4a3/0x620 [ 164.700792][T14273] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 164.706821][T14273] ? do_sys_open+0x2fc/0x620 [ 164.711376][T14273] ? proc_fail_nth_write+0x166/0x200 [ 164.716624][T14273] ? proc_fail_nth_read+0x1c0/0x1c0 [ 164.721793][T14273] ? memset+0x1f/0x40 [ 164.725747][T14273] ? selinux_socket_setsockopt+0x10b/0x340 [ 164.731515][T14273] ? proc_fail_nth_read+0x1c0/0x1c0 [ 164.736676][T14273] ? memset+0x1f/0x40 [ 164.740624][T14273] ? fsnotify+0x13a0/0x1460 [ 164.745089][T14273] ? __kernel_write+0x340/0x340 [ 164.749900][T14273] ? fsnotify+0x13a0/0x1460 [ 164.754368][T14273] ? security_file_permission+0x128/0x300 [ 164.760055][T14273] ? __sb_end_write+0xa4/0xf0 [ 164.764728][T14273] ? vfs_write+0x427/0x4f0 [ 164.769109][T14273] ? ksys_write+0x237/0x2a0 [ 164.773577][T14273] ? __ia32_sys_read+0x80/0x80 [ 164.778309][T14273] __x64_sys_sendmmsg+0x9c/0xb0 [ 164.783120][T14273] do_syscall_64+0xcb/0x150 [ 164.787585][T14273] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 164.793454][T14273] RIP: 0033:0x45de29 [ 164.797462][T14273] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 164.817032][T14273] RSP: 002b:00007f6925d06c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 164.825409][T14273] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de29 [ 164.833354][T14273] RDX: 000000000800001d RSI: 0000000020007fc0 RDI: 0000000000000003 [ 164.841292][T14273] RBP: 00007f6925d06ca0 R08: 0000000000000000 R09: 0000000000000000 08:49:46 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x0) 08:49:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x0, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) [ 164.849242][T14273] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 164.857179][T14273] R13: 00007ffce5b23eff R14: 00007f6925d079c0 R15: 000000000118bf2c 08:49:46 executing program 2 (fault-call:7 fault-nth:21): r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 08:49:46 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) [ 164.953832][T14297] FAULT_INJECTION: forcing a failure. [ 164.953832][T14297] name failslab, interval 1, probability 0, space 0, times 0 [ 164.972389][T14297] CPU: 0 PID: 14297 Comm: syz-executor.2 Tainted: G W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 164.983913][T14297] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 164.993953][T14297] Call Trace: [ 164.997224][T14297] dump_stack+0x1b0/0x21e [ 165.001532][T14297] ? devkmsg_release+0x11c/0x11c [ 165.006457][T14297] ? show_regs_print_info+0x12/0x12 [ 165.011618][T14297] should_fail+0x6fb/0x860 [ 165.016001][T14297] ? setup_fault_attr+0x2b0/0x2b0 [ 165.020991][T14297] ? dst_alloc+0x137/0x4f0 [ 165.025371][T14297] should_failslab+0x5/0x20 [ 165.029844][T14297] kmem_cache_alloc+0x36/0x250 [ 165.034572][T14297] dst_alloc+0x137/0x4f0 [ 165.038795][T14297] rt_dst_clone+0x53/0x670 [ 165.043179][T14297] ip_mc_finish_output+0xad/0x3a0 [ 165.048167][T14297] ip_mc_output+0x407/0xab0 [ 165.052637][T14297] ? ip_build_and_send_pkt+0x9d0/0x9d0 [ 165.058058][T14297] ? nf_hook_slow+0x1a6/0x1f0 [ 165.062695][T14297] ? ip_mc_output+0xab0/0xab0 [ 165.067335][T14297] ? ip_send_check+0xd0/0xd0 [ 165.071890][T14297] ? __ip_local_out+0x4a0/0x4a0 [ 165.076707][T14297] ? csum_partial+0x379/0x470 [ 165.081351][T14297] ip_send_skb+0xaa/0x140 [ 165.085650][T14297] udp_send_skb+0x8e9/0x1100 [ 165.090206][T14297] udp_sendmsg+0x1d45/0x2e80 [ 165.094764][T14297] ? ip_do_fragment+0x2290/0x2290 [ 165.099754][T14297] ? udp_cmsg_send+0x340/0x340 [ 165.104484][T14297] ? selinux_socket_sendmsg+0x10b/0x320 [ 165.109991][T14297] ? selinux_socket_accept+0x580/0x580 [ 165.115416][T14297] ? rw_copy_check_uvector+0x6b/0x310 [ 165.120751][T14297] ? inet_send_prepare+0x1b7/0x470 [ 165.125848][T14297] ? inet_send_prepare+0x470/0x470 [ 165.130923][T14297] ____sys_sendmsg+0x56f/0x860 [ 165.135650][T14297] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 165.140814][T14297] ? udp_sendmsg+0x75b/0x2e80 [ 165.145456][T14297] ? __sys_sendmmsg+0x46f/0x680 [ 165.150274][T14297] __sys_sendmmsg+0x338/0x680 [ 165.154917][T14297] ? __ia32_sys_sendmsg+0x90/0x90 [ 165.159911][T14297] ? __rcu_read_lock+0x50/0x50 [ 165.164642][T14297] ? __kasan_slab_free+0x1e2/0x220 [ 165.169727][T14297] ? __kasan_slab_free+0x168/0x220 [ 165.174800][T14297] ? slab_free_freelist_hook+0xd0/0x150 [ 165.180307][T14297] ? kmem_cache_free+0xac/0x5c0 [ 165.185123][T14297] ? do_sys_open+0x4a3/0x620 [ 165.189679][T14297] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 165.195716][T14297] ? do_sys_open+0x2fc/0x620 [ 165.200270][T14297] ? proc_fail_nth_write+0x166/0x200 [ 165.205520][T14297] ? proc_fail_nth_read+0x1c0/0x1c0 [ 165.210685][T14297] ? memset+0x1f/0x40 [ 165.214634][T14297] ? selinux_socket_setsockopt+0x10b/0x340 [ 165.220402][T14297] ? proc_fail_nth_read+0x1c0/0x1c0 [ 165.225563][T14297] ? memset+0x1f/0x40 [ 165.229510][T14297] ? fsnotify+0x13a0/0x1460 [ 165.233981][T14297] ? __kernel_write+0x340/0x340 [ 165.238796][T14297] ? fsnotify+0x13a0/0x1460 [ 165.243266][T14297] ? security_file_permission+0x128/0x300 [ 165.248946][T14297] ? __sb_end_write+0xa4/0xf0 [ 165.253588][T14297] ? vfs_write+0x427/0x4f0 [ 165.257967][T14297] ? ksys_write+0x237/0x2a0 [ 165.262432][T14297] ? __ia32_sys_read+0x80/0x80 [ 165.267160][T14297] __x64_sys_sendmmsg+0x9c/0xb0 [ 165.271975][T14297] do_syscall_64+0xcb/0x150 [ 165.276442][T14297] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 165.282298][T14297] RIP: 0033:0x45de29 08:49:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:49:46 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x0) 08:49:46 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x14, 0x2, 0x0, 0x1, [@vti_common_policy=[@IFLA_VTI_IKEY={0x8}, @IFLA_VTI_LINK={0x8, 0x1, r4}]]}}}]}, 0x40}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 165.286160][T14297] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 165.305821][T14297] RSP: 002b:00007f6925d06c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 165.314194][T14297] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de29 [ 165.322132][T14297] RDX: 000000000800001d RSI: 0000000020007fc0 RDI: 0000000000000003 [ 165.330069][T14297] RBP: 00007f6925d06ca0 R08: 0000000000000000 R09: 0000000000000000 [ 165.338005][T14297] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 165.345941][T14297] R13: 00007ffce5b23eff R14: 00007f6925d079c0 R15: 000000000118bf2c 08:49:46 executing program 2 (fault-call:7 fault-nth:22): r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) [ 165.449225][T14317] FAULT_INJECTION: forcing a failure. [ 165.449225][T14317] name failslab, interval 1, probability 0, space 0, times 0 [ 165.462095][T14317] CPU: 0 PID: 14317 Comm: syz-executor.2 Tainted: G W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 165.473613][T14317] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 165.483634][T14317] Call Trace: [ 165.486893][T14317] dump_stack+0x1b0/0x21e [ 165.491189][T14317] ? devkmsg_release+0x11c/0x11c [ 165.496091][T14317] ? show_regs_print_info+0x12/0x12 [ 165.501362][T14317] ? ip_finish_output2+0x936/0x1810 [ 165.506520][T14317] should_fail+0x6fb/0x860 [ 165.510932][T14317] ? setup_fault_attr+0x2b0/0x2b0 [ 165.515935][T14317] ? ip_fragment+0x210/0x210 [ 165.520492][T14317] ? dst_alloc+0x137/0x4f0 [ 165.524872][T14317] should_failslab+0x5/0x20 [ 165.529342][T14317] kmem_cache_alloc+0x36/0x250 [ 165.534070][T14317] dst_alloc+0x137/0x4f0 [ 165.538279][T14317] __mkroute_output+0xc94/0x1430 [ 165.543223][T14317] ? ip_route_output_key_hash_rcu+0xf90/0xf90 [ 165.549377][T14317] ? ip_route_output_key_hash_rcu+0x41b/0xf90 [ 165.555409][T14317] ip_route_output_flow+0x150/0x2a0 [ 165.560616][T14317] ? ip_send_skb+0x11e/0x140 [ 165.565173][T14317] ? ipv4_sk_update_pmtu+0x1d40/0x1d40 [ 165.570599][T14317] ? __rcu_read_lock+0x50/0x50 [ 165.575329][T14317] ? selinux_sk_getsecid+0x24/0xb0 [ 165.580408][T14317] udp_sendmsg+0x1731/0x2e80 [ 165.584969][T14317] ? ip_do_fragment+0x2290/0x2290 [ 165.589976][T14317] ? udp_cmsg_send+0x340/0x340 [ 165.594705][T14317] ? selinux_socket_sendmsg+0x10b/0x320 [ 165.600216][T14317] ? selinux_socket_accept+0x580/0x580 [ 165.605640][T14317] ? rw_copy_check_uvector+0x6b/0x310 [ 165.610978][T14317] ? import_iovec+0x171/0x340 [ 165.615620][T14317] ? inet_send_prepare+0x1b7/0x470 [ 165.620696][T14317] ? inet_send_prepare+0x470/0x470 [ 165.625794][T14317] ____sys_sendmsg+0x56f/0x860 [ 165.630525][T14317] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 165.635687][T14317] ? udp_sendmsg+0x75b/0x2e80 [ 165.640325][T14317] ? __sys_sendmmsg+0x46f/0x680 [ 165.645138][T14317] __sys_sendmmsg+0x338/0x680 [ 165.649779][T14317] ? __ia32_sys_sendmsg+0x90/0x90 [ 165.654782][T14317] ? __rcu_read_lock+0x50/0x50 [ 165.659511][T14317] ? __kasan_slab_free+0x1e2/0x220 [ 165.664589][T14317] ? __kasan_slab_free+0x168/0x220 [ 165.669676][T14317] ? slab_free_freelist_hook+0xd0/0x150 [ 165.675183][T14317] ? kmem_cache_free+0xac/0x5c0 [ 165.679998][T14317] ? do_sys_open+0x4a3/0x620 [ 165.684577][T14317] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 165.690607][T14317] ? do_sys_open+0x2fc/0x620 [ 165.695164][T14317] ? proc_fail_nth_write+0x166/0x200 [ 165.700423][T14317] ? proc_fail_nth_read+0x1c0/0x1c0 [ 165.705586][T14317] ? memset+0x1f/0x40 [ 165.709553][T14317] ? selinux_socket_setsockopt+0x10b/0x340 [ 165.715325][T14317] ? proc_fail_nth_read+0x1c0/0x1c0 [ 165.720609][T14317] ? memset+0x1f/0x40 [ 165.724553][T14317] ? fsnotify+0x13a0/0x1460 [ 165.729025][T14317] ? __kernel_write+0x340/0x340 [ 165.733840][T14317] ? fsnotify+0x13a0/0x1460 [ 165.738309][T14317] ? security_file_permission+0x128/0x300 [ 165.744017][T14317] ? __sb_end_write+0xa4/0xf0 [ 165.748658][T14317] ? vfs_write+0x427/0x4f0 [ 165.753058][T14317] ? ksys_write+0x237/0x2a0 [ 165.757604][T14317] ? __ia32_sys_read+0x80/0x80 [ 165.762334][T14317] __x64_sys_sendmmsg+0x9c/0xb0 [ 165.767237][T14317] do_syscall_64+0xcb/0x150 [ 165.771706][T14317] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 165.777562][T14317] RIP: 0033:0x45de29 [ 165.781424][T14317] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 08:49:47 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:49:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x0, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) [ 165.800995][T14317] RSP: 002b:00007f6925d06c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 165.809378][T14317] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de29 [ 165.817320][T14317] RDX: 000000000800001d RSI: 0000000020007fc0 RDI: 0000000000000003 [ 165.825254][T14317] RBP: 00007f6925d06ca0 R08: 0000000000000000 R09: 0000000000000000 [ 165.833192][T14317] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 165.841130][T14317] R13: 00007ffce5b23eff R14: 00007f6925d079c0 R15: 000000000118bf2c 08:49:47 executing program 2 (fault-call:7 fault-nth:23): r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) [ 165.893127][T14327] FAULT_INJECTION: forcing a failure. [ 165.893127][T14327] name failslab, interval 1, probability 0, space 0, times 0 [ 165.915382][T14327] CPU: 0 PID: 14327 Comm: syz-executor.2 Tainted: G W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 165.926909][T14327] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 165.936952][T14327] Call Trace: [ 165.940223][T14327] dump_stack+0x1b0/0x21e [ 165.944528][T14327] ? devkmsg_release+0x11c/0x11c [ 165.949432][T14327] ? show_regs_print_info+0x12/0x12 [ 165.954597][T14327] ? ip_finish_output2+0x936/0x1810 [ 165.959775][T14327] should_fail+0x6fb/0x860 [ 165.964160][T14327] ? setup_fault_attr+0x2b0/0x2b0 [ 165.969150][T14327] ? ip_fragment+0x210/0x210 [ 165.973710][T14327] ? dst_alloc+0x137/0x4f0 [ 165.978104][T14327] should_failslab+0x5/0x20 [ 165.982586][T14327] kmem_cache_alloc+0x36/0x250 [ 165.987317][T14327] dst_alloc+0x137/0x4f0 [ 165.991528][T14327] __mkroute_output+0xc94/0x1430 [ 165.996460][T14327] ? ip_route_output_key_hash_rcu+0xf90/0xf90 [ 166.002493][T14327] ? ip_route_output_key_hash_rcu+0x41b/0xf90 [ 166.008527][T14327] ip_route_output_flow+0x150/0x2a0 [ 166.013706][T14327] ? ip_send_skb+0x11e/0x140 [ 166.018277][T14327] ? ipv4_sk_update_pmtu+0x1d40/0x1d40 [ 166.023703][T14327] ? __rcu_read_lock+0x50/0x50 [ 166.028450][T14327] ? selinux_sk_getsecid+0x24/0xb0 [ 166.033524][T14327] udp_sendmsg+0x1731/0x2e80 [ 166.038081][T14327] ? ip_do_fragment+0x2290/0x2290 [ 166.043066][T14327] ? udp_cmsg_send+0x340/0x340 [ 166.047803][T14327] ? selinux_socket_sendmsg+0x10b/0x320 [ 166.053321][T14327] ? selinux_socket_accept+0x580/0x580 [ 166.058834][T14327] ? rw_copy_check_uvector+0x6b/0x310 [ 166.064182][T14327] ? import_iovec+0x171/0x340 [ 166.068829][T14327] ? inet_send_prepare+0x1b7/0x470 [ 166.073905][T14327] ? inet_send_prepare+0x470/0x470 [ 166.078986][T14327] ____sys_sendmsg+0x56f/0x860 [ 166.083716][T14327] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 166.088880][T14327] ? udp_sendmsg+0x75b/0x2e80 [ 166.093523][T14327] ? __sys_sendmmsg+0x46f/0x680 [ 166.098338][T14327] __sys_sendmmsg+0x338/0x680 [ 166.102991][T14327] ? __ia32_sys_sendmsg+0x90/0x90 [ 166.107980][T14327] ? __rcu_read_lock+0x50/0x50 [ 166.112708][T14327] ? __kasan_slab_free+0x1e2/0x220 [ 166.117780][T14327] ? __kasan_slab_free+0x168/0x220 [ 166.122858][T14327] ? slab_free_freelist_hook+0xd0/0x150 [ 166.128487][T14327] ? kmem_cache_free+0xac/0x5c0 [ 166.133302][T14327] ? do_sys_open+0x4a3/0x620 [ 166.137859][T14327] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 166.143886][T14327] ? do_sys_open+0x2fc/0x620 [ 166.148440][T14327] ? proc_fail_nth_write+0x166/0x200 [ 166.153688][T14327] ? proc_fail_nth_read+0x1c0/0x1c0 [ 166.158850][T14327] ? memset+0x1f/0x40 [ 166.162797][T14327] ? selinux_socket_setsockopt+0x10b/0x340 [ 166.168574][T14327] ? proc_fail_nth_read+0x1c0/0x1c0 [ 166.173747][T14327] ? memset+0x1f/0x40 [ 166.177691][T14327] ? fsnotify+0x13a0/0x1460 [ 166.182159][T14327] ? __kernel_write+0x340/0x340 [ 166.186974][T14327] ? fsnotify+0x13a0/0x1460 [ 166.191444][T14327] ? security_file_permission+0x128/0x300 [ 166.197126][T14327] ? __sb_end_write+0xa4/0xf0 [ 166.201769][T14327] ? vfs_write+0x427/0x4f0 [ 166.206149][T14327] ? ksys_write+0x237/0x2a0 [ 166.210619][T14327] ? __ia32_sys_read+0x80/0x80 [ 166.215350][T14327] __x64_sys_sendmmsg+0x9c/0xb0 [ 166.220166][T14327] do_syscall_64+0xcb/0x150 [ 166.224636][T14327] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 166.230491][T14327] RIP: 0033:0x45de29 [ 166.234355][T14327] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 166.253922][T14327] RSP: 002b:00007f6925d06c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 166.262298][T14327] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de29 [ 166.270252][T14327] RDX: 000000000800001d RSI: 0000000020007fc0 RDI: 0000000000000003 [ 166.278186][T14327] RBP: 00007f6925d06ca0 R08: 0000000000000000 R09: 0000000000000000 [ 166.286123][T14327] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000017 08:49:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:49:47 executing program 1: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:49:47 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, 0x0, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x14, 0x2, 0x0, 0x1, [@vti_common_policy=[@IFLA_VTI_IKEY={0x8}, @IFLA_VTI_LINK={0x8, 0x1, r4}]]}}}]}, 0x40}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 08:49:47 executing program 2 (fault-call:7 fault-nth:24): r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) [ 166.294060][T14327] R13: 00007ffce5b23eff R14: 00007f6925d079c0 R15: 000000000118bf2c [ 166.336627][T14340] FAULT_INJECTION: forcing a failure. [ 166.336627][T14340] name failslab, interval 1, probability 0, space 0, times 0 [ 166.351735][T14340] CPU: 0 PID: 14340 Comm: syz-executor.2 Tainted: G W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 166.363257][T14340] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 166.373277][T14340] Call Trace: [ 166.376536][T14340] dump_stack+0x1b0/0x21e [ 166.380830][T14340] ? devkmsg_release+0x11c/0x11c [ 166.385733][T14340] ? show_regs_print_info+0x12/0x12 [ 166.390900][T14340] ? is_bpf_text_address+0x290/0x2b0 [ 166.396153][T14340] should_fail+0x6fb/0x860 [ 166.400535][T14340] ? setup_fault_attr+0x2b0/0x2b0 [ 166.405526][T14340] ? arch_stack_walk+0x98/0xe0 [ 166.410259][T14340] ? ___slab_alloc+0x9b/0x450 [ 166.414904][T14340] ? alloc_skb_with_frags+0xb1/0x580 [ 166.420153][T14340] should_failslab+0x5/0x20 [ 166.424619][T14340] __kmalloc_track_caller+0x5d/0x2b0 [ 166.429890][T14340] ? kmem_cache_alloc+0x1d5/0x250 [ 166.434877][T14340] ? alloc_skb_with_frags+0xb1/0x580 [ 166.440135][T14340] __alloc_skb+0xd1/0x4d0 [ 166.444431][T14340] alloc_skb_with_frags+0xb1/0x580 [ 166.449525][T14340] ? __kasan_kmalloc+0x179/0x1b0 [ 166.454430][T14340] sock_alloc_send_pskb+0x87e/0xcc0 [ 166.459595][T14340] ? ip_route_output_flow+0x150/0x2a0 [ 166.464929][T14340] ? udp_sendmsg+0x1731/0x2e80 [ 166.469670][T14340] ? sock_kzfree_s+0x50/0x50 [ 166.474226][T14340] ? __rcu_read_lock+0x50/0x50 [ 166.478953][T14340] ? xfrm_selector_match+0xa71/0xf00 [ 166.484209][T14340] __ip_append_data+0x1fbd/0x31b0 [ 166.489200][T14340] ? dst_alloc+0x137/0x4f0 [ 166.493581][T14340] ? ip_do_fragment+0x2290/0x2290 [ 166.498571][T14340] ? __xfrm_sk_clone_policy+0xac0/0xac0 [ 166.504095][T14340] ? ip_setup_cork+0x810/0x810 [ 166.508825][T14340] ? ipv4_mtu+0x212/0x2c0 [ 166.513117][T14340] ? ip_setup_cork+0x46b/0x810 [ 166.517870][T14340] ? ip_route_output_key_hash_rcu+0x41b/0xf90 [ 166.523933][T14340] ip_make_skb+0x1c9/0x4d0 [ 166.528315][T14340] ? ip_do_fragment+0x2290/0x2290 [ 166.533300][T14340] ? ip_flush_pending_frames+0x2e0/0x2e0 [ 166.538925][T14340] ? __rcu_read_lock+0x50/0x50 [ 166.543657][T14340] udp_sendmsg+0x1d1b/0x2e80 [ 166.548213][T14340] ? ip_do_fragment+0x2290/0x2290 [ 166.553201][T14340] ? udp_cmsg_send+0x340/0x340 [ 166.557929][T14340] ? selinux_socket_sendmsg+0x10b/0x320 [ 166.563458][T14340] ? selinux_socket_accept+0x580/0x580 [ 166.568887][T14340] ? rw_copy_check_uvector+0x6b/0x310 [ 166.574226][T14340] ? inet_send_prepare+0x1b7/0x470 [ 166.579423][T14340] ? inet_send_prepare+0x470/0x470 [ 166.584607][T14340] ____sys_sendmsg+0x56f/0x860 [ 166.589336][T14340] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 166.594499][T14340] ? udp_sendmsg+0x75b/0x2e80 [ 166.599249][T14340] ? __sys_sendmmsg+0x46f/0x680 [ 166.604062][T14340] __sys_sendmmsg+0x338/0x680 [ 166.608706][T14340] ? __ia32_sys_sendmsg+0x90/0x90 [ 166.613695][T14340] ? __rcu_read_lock+0x50/0x50 [ 166.618423][T14340] ? __kasan_slab_free+0x1e2/0x220 [ 166.623496][T14340] ? __kasan_slab_free+0x168/0x220 [ 166.628573][T14340] ? slab_free_freelist_hook+0xd0/0x150 [ 166.634172][T14340] ? kmem_cache_free+0xac/0x5c0 [ 166.638986][T14340] ? do_sys_open+0x4a3/0x620 [ 166.643549][T14340] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 166.649578][T14340] ? do_sys_open+0x2fc/0x620 [ 166.654134][T14340] ? proc_fail_nth_write+0x166/0x200 [ 166.659380][T14340] ? _raw_spin_lock+0x170/0x170 [ 166.664196][T14340] ? proc_fail_nth_read+0x1c0/0x1c0 [ 166.669367][T14340] ? memset+0x1f/0x40 [ 166.673317][T14340] ? mod_node_page_state+0xcf/0xf0 [ 166.678390][T14340] ? proc_fail_nth_read+0x1c0/0x1c0 [ 166.683552][T14340] ? memset+0x1f/0x40 [ 166.687499][T14340] ? fsnotify+0x13a0/0x1460 [ 166.691968][T14340] ? __kernel_write+0x340/0x340 [ 166.696782][T14340] ? fsnotify+0x13a0/0x1460 [ 166.701255][T14340] ? security_file_permission+0x128/0x300 [ 166.706936][T14340] ? __sb_end_write+0xa4/0xf0 [ 166.711573][T14340] ? vfs_write+0x427/0x4f0 [ 166.715953][T14340] ? ksys_write+0x237/0x2a0 [ 166.720435][T14340] ? __ia32_sys_read+0x80/0x80 [ 166.725167][T14340] __x64_sys_sendmmsg+0x9c/0xb0 [ 166.729984][T14340] do_syscall_64+0xcb/0x150 [ 166.734461][T14340] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 166.740318][T14340] RIP: 0033:0x45de29 [ 166.744185][T14340] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 166.763753][T14340] RSP: 002b:00007f6925d06c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 166.772124][T14340] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de29 [ 166.780073][T14340] RDX: 000000000800001d RSI: 0000000020007fc0 RDI: 0000000000000003 08:49:48 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:49:48 executing program 2 (fault-call:7 fault-nth:25): r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) [ 166.788011][T14340] RBP: 00007f6925d06ca0 R08: 0000000000000000 R09: 0000000000000000 [ 166.795950][T14340] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000018 [ 166.803893][T14340] R13: 00007ffce5b23eff R14: 00007f6925d079c0 R15: 000000000118bf2c 08:49:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(0xffffffffffffffff) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) [ 166.857603][T14349] FAULT_INJECTION: forcing a failure. [ 166.857603][T14349] name failslab, interval 1, probability 0, space 0, times 0 [ 166.874170][T14349] CPU: 1 PID: 14349 Comm: syz-executor.2 Tainted: G W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 166.885693][T14349] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 166.895715][T14349] Call Trace: [ 166.899016][T14349] dump_stack+0x1b0/0x21e [ 166.903312][T14349] ? devkmsg_release+0x11c/0x11c [ 166.908217][T14349] ? show_regs_print_info+0x12/0x12 [ 166.913380][T14349] should_fail+0x6fb/0x860 [ 166.917771][T14349] ? setup_fault_attr+0x2b0/0x2b0 [ 166.922773][T14349] ? skb_clone+0x1b2/0x370 [ 166.927169][T14349] should_failslab+0x5/0x20 [ 166.931638][T14349] kmem_cache_alloc+0x36/0x250 [ 166.936364][T14349] skb_clone+0x1b2/0x370 [ 166.940567][T14349] ip_mc_output+0x1ce/0xab0 [ 166.945034][T14349] ? nf_nat_ipv4_local_fn+0x2c2/0x4e0 [ 166.950370][T14349] ? ip_build_and_send_pkt+0x9d0/0x9d0 [ 166.955927][T14349] ? nf_hook_slow+0x1a6/0x1f0 [ 166.960669][T14349] ? __ip_local_out+0x347/0x4a0 [ 166.965486][T14349] ? ip_send_check+0xd0/0xd0 [ 166.970038][T14349] ? __ip_local_out+0x4a0/0x4a0 [ 166.974945][T14349] ? csum_partial+0x379/0x470 [ 166.979588][T14349] ip_send_skb+0xaa/0x140 [ 166.983884][T14349] udp_send_skb+0x8e9/0x1100 [ 166.988438][T14349] udp_sendmsg+0x1d45/0x2e80 [ 166.992992][T14349] ? ip_do_fragment+0x2290/0x2290 [ 166.997978][T14349] ? udp_cmsg_send+0x340/0x340 [ 167.002727][T14349] ? selinux_socket_sendmsg+0x10b/0x320 [ 167.008232][T14349] ? selinux_socket_accept+0x580/0x580 [ 167.013650][T14349] ? rw_copy_check_uvector+0x6b/0x310 [ 167.018995][T14349] ? inet_send_prepare+0x1b7/0x470 [ 167.024074][T14349] ? inet_send_prepare+0x470/0x470 [ 167.029150][T14349] ____sys_sendmsg+0x56f/0x860 [ 167.033912][T14349] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 167.039160][T14349] ? udp_sendmsg+0x75b/0x2e80 [ 167.043801][T14349] ? __sys_sendmmsg+0x46f/0x680 [ 167.048624][T14349] __sys_sendmmsg+0x338/0x680 [ 167.053273][T14349] ? __ia32_sys_sendmsg+0x90/0x90 [ 167.058271][T14349] ? __rcu_read_lock+0x50/0x50 [ 167.063006][T14349] ? __kasan_slab_free+0x1e2/0x220 [ 167.068080][T14349] ? __kasan_slab_free+0x168/0x220 [ 167.073173][T14349] ? slab_free_freelist_hook+0xd0/0x150 [ 167.078702][T14349] ? kmem_cache_free+0xac/0x5c0 [ 167.083519][T14349] ? do_sys_open+0x4a3/0x620 [ 167.088075][T14349] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 167.094203][T14349] ? do_sys_open+0x2fc/0x620 [ 167.098758][T14349] ? proc_fail_nth_write+0x166/0x200 [ 167.104009][T14349] ? proc_fail_nth_read+0x1c0/0x1c0 [ 167.109174][T14349] ? memset+0x1f/0x40 [ 167.113119][T14349] ? selinux_socket_setsockopt+0x10b/0x340 [ 167.118891][T14349] ? proc_fail_nth_read+0x1c0/0x1c0 [ 167.124052][T14349] ? memset+0x1f/0x40 [ 167.128001][T14349] ? fsnotify+0x13a0/0x1460 [ 167.132480][T14349] ? __kernel_write+0x340/0x340 [ 167.137298][T14349] ? fsnotify+0x13a0/0x1460 [ 167.141772][T14349] ? security_file_permission+0x128/0x300 [ 167.147484][T14349] ? __sb_end_write+0xa4/0xf0 [ 167.152146][T14349] ? vfs_write+0x427/0x4f0 [ 167.156544][T14349] ? ksys_write+0x237/0x2a0 [ 167.161014][T14349] ? __ia32_sys_read+0x80/0x80 [ 167.165744][T14349] __x64_sys_sendmmsg+0x9c/0xb0 [ 167.170573][T14349] do_syscall_64+0xcb/0x150 [ 167.175045][T14349] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 167.180914][T14349] RIP: 0033:0x45de29 [ 167.184779][T14349] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 167.204347][T14349] RSP: 002b:00007f6925d06c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 167.212809][T14349] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de29 [ 167.220745][T14349] RDX: 000000000800001d RSI: 0000000020007fc0 RDI: 0000000000000003 [ 167.228708][T14349] RBP: 00007f6925d06ca0 R08: 0000000000000000 R09: 0000000000000000 [ 167.236672][T14349] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000019 [ 167.244609][T14349] R13: 00007ffce5b23eff R14: 00007f6925d079c0 R15: 000000000118bf2c 08:49:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:49:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(0xffffffffffffffff) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:49:48 executing program 2 (fault-call:7 fault-nth:26): r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 08:49:48 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, 0x0, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x14, 0x2, 0x0, 0x1, [@vti_common_policy=[@IFLA_VTI_IKEY={0x8}, @IFLA_VTI_LINK={0x8, 0x1, r4}]]}}}]}, 0x40}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 08:49:48 executing program 1: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:49:48 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x0, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) [ 167.391285][T14371] FAULT_INJECTION: forcing a failure. [ 167.391285][T14371] name failslab, interval 1, probability 0, space 0, times 0 [ 167.406017][T14371] CPU: 0 PID: 14371 Comm: syz-executor.2 Tainted: G W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 167.417657][T14371] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 167.427689][T14371] Call Trace: [ 167.430960][T14371] dump_stack+0x1b0/0x21e [ 167.435260][T14371] ? devkmsg_release+0x11c/0x11c [ 167.440168][T14371] ? show_regs_print_info+0x12/0x12 [ 167.445339][T14371] should_fail+0x6fb/0x860 [ 167.449726][T14371] ? setup_fault_attr+0x2b0/0x2b0 [ 167.454718][T14371] ? dst_alloc+0x137/0x4f0 [ 167.459098][T14371] should_failslab+0x5/0x20 [ 167.463567][T14371] kmem_cache_alloc+0x36/0x250 [ 167.468299][T14371] dst_alloc+0x137/0x4f0 [ 167.472509][T14371] rt_dst_clone+0x53/0x670 [ 167.476889][T14371] ip_mc_finish_output+0xad/0x3a0 [ 167.481880][T14371] ip_mc_output+0x407/0xab0 [ 167.486351][T14371] ? ip_build_and_send_pkt+0x9d0/0x9d0 [ 167.491774][T14371] ? nf_hook_slow+0x1a6/0x1f0 [ 167.496417][T14371] ? ip_mc_output+0xab0/0xab0 [ 167.501057][T14371] ? ip_send_check+0xd0/0xd0 [ 167.505611][T14371] ? __ip_local_out+0x4a0/0x4a0 [ 167.510426][T14371] ? csum_partial+0x379/0x470 [ 167.515067][T14371] ip_send_skb+0xaa/0x140 [ 167.519363][T14371] udp_send_skb+0x8e9/0x1100 [ 167.523919][T14371] udp_sendmsg+0x1d45/0x2e80 [ 167.528490][T14371] ? ip_do_fragment+0x2290/0x2290 [ 167.533484][T14371] ? udp_cmsg_send+0x340/0x340 [ 167.538227][T14371] ? selinux_socket_sendmsg+0x10b/0x320 [ 167.543738][T14371] ? selinux_socket_accept+0x580/0x580 [ 167.549161][T14371] ? rw_copy_check_uvector+0x6b/0x310 [ 167.554498][T14371] ? inet_send_prepare+0x1b7/0x470 [ 167.559573][T14371] ? inet_send_prepare+0x470/0x470 [ 167.564649][T14371] ____sys_sendmsg+0x56f/0x860 [ 167.569380][T14371] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 167.574547][T14371] ? udp_sendmsg+0x75b/0x2e80 [ 167.579189][T14371] ? __sys_sendmmsg+0x46f/0x680 [ 167.584005][T14371] __sys_sendmmsg+0x338/0x680 [ 167.588660][T14371] ? __ia32_sys_sendmsg+0x90/0x90 [ 167.593680][T14371] ? __rcu_read_lock+0x50/0x50 [ 167.598424][T14371] ? __kasan_slab_free+0x1e2/0x220 [ 167.603506][T14371] ? __kasan_slab_free+0x168/0x220 [ 167.608583][T14371] ? slab_free_freelist_hook+0xd0/0x150 [ 167.614094][T14371] ? kmem_cache_free+0xac/0x5c0 [ 167.618909][T14371] ? do_sys_open+0x4a3/0x620 [ 167.623464][T14371] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 167.629496][T14371] ? do_sys_open+0x2fc/0x620 [ 167.634051][T14371] ? proc_fail_nth_write+0x166/0x200 [ 167.639300][T14371] ? proc_fail_nth_read+0x1c0/0x1c0 [ 167.644462][T14371] ? memset+0x1f/0x40 [ 167.648411][T14371] ? selinux_socket_setsockopt+0x10b/0x340 [ 167.654180][T14371] ? proc_fail_nth_read+0x1c0/0x1c0 [ 167.659365][T14371] ? memset+0x1f/0x40 [ 167.663316][T14371] ? fsnotify+0x13a0/0x1460 [ 167.667783][T14371] ? __kernel_write+0x340/0x340 [ 167.672595][T14371] ? fsnotify+0x13a0/0x1460 [ 167.677176][T14371] ? security_file_permission+0x128/0x300 [ 167.682857][T14371] ? __sb_end_write+0xa4/0xf0 [ 167.687498][T14371] ? vfs_write+0x427/0x4f0 [ 167.691878][T14371] ? ksys_write+0x237/0x2a0 [ 167.696341][T14371] ? __ia32_sys_read+0x80/0x80 [ 167.701071][T14371] __x64_sys_sendmmsg+0x9c/0xb0 [ 167.705887][T14371] do_syscall_64+0xcb/0x150 [ 167.710355][T14371] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 167.716241][T14371] RIP: 0033:0x45de29 [ 167.720102][T14371] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 08:49:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(0x0, 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) [ 167.739669][T14371] RSP: 002b:00007f6925d06c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 167.748052][T14371] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de29 [ 167.755989][T14371] RDX: 000000000800001d RSI: 0000000020007fc0 RDI: 0000000000000003 [ 167.763926][T14371] RBP: 00007f6925d06ca0 R08: 0000000000000000 R09: 0000000000000000 [ 167.771864][T14371] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000001a [ 167.779802][T14371] R13: 00007ffce5b23eff R14: 00007f6925d079c0 R15: 000000000118bf2c 08:49:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(0xffffffffffffffff) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:49:49 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x0, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:49:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(0x0, 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:49:49 executing program 2 (fault-call:7 fault-nth:27): r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 08:49:49 executing program 1: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x0, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:49:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x0, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:49:49 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x0, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) [ 167.961064][T14400] FAULT_INJECTION: forcing a failure. [ 167.961064][T14400] name failslab, interval 1, probability 0, space 0, times 0 [ 167.973936][T14400] CPU: 0 PID: 14400 Comm: syz-executor.2 Tainted: G W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 167.985456][T14400] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 167.995491][T14400] Call Trace: [ 167.998772][T14400] dump_stack+0x1b0/0x21e [ 168.003079][T14400] ? devkmsg_release+0x11c/0x11c [ 168.007981][T14400] ? show_regs_print_info+0x12/0x12 [ 168.013154][T14400] ? ip_finish_output2+0x936/0x1810 [ 168.018320][T14400] should_fail+0x6fb/0x860 [ 168.022734][T14400] ? setup_fault_attr+0x2b0/0x2b0 [ 168.027721][T14400] ? ip_fragment+0x210/0x210 [ 168.032280][T14400] ? dst_alloc+0x137/0x4f0 [ 168.036688][T14400] should_failslab+0x5/0x20 [ 168.041167][T14400] kmem_cache_alloc+0x36/0x250 [ 168.046023][T14400] dst_alloc+0x137/0x4f0 [ 168.050236][T14400] __mkroute_output+0xc94/0x1430 [ 168.055139][T14400] ? ip_route_output_key_hash_rcu+0xf90/0xf90 [ 168.061167][T14400] ? ip_route_output_key_hash_rcu+0x41b/0xf90 [ 168.067197][T14400] ip_route_output_flow+0x150/0x2a0 [ 168.072357][T14400] ? ip_send_skb+0x11e/0x140 [ 168.076911][T14400] ? ipv4_sk_update_pmtu+0x1d40/0x1d40 [ 168.082447][T14400] ? __rcu_read_lock+0x50/0x50 [ 168.087175][T14400] ? selinux_sk_getsecid+0x24/0xb0 [ 168.092247][T14400] udp_sendmsg+0x1731/0x2e80 [ 168.096926][T14400] ? ip_do_fragment+0x2290/0x2290 [ 168.101914][T14400] ? udp_cmsg_send+0x340/0x340 [ 168.106655][T14400] ? selinux_socket_sendmsg+0x10b/0x320 [ 168.112165][T14400] ? selinux_socket_accept+0x580/0x580 [ 168.117589][T14400] ? rw_copy_check_uvector+0x6b/0x310 [ 168.122931][T14400] ? import_iovec+0x171/0x340 [ 168.127611][T14400] ? inet_send_prepare+0x1b7/0x470 [ 168.132692][T14400] ? inet_send_prepare+0x470/0x470 [ 168.137778][T14400] ____sys_sendmsg+0x56f/0x860 [ 168.142519][T14400] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 168.147689][T14400] ? udp_sendmsg+0x75b/0x2e80 [ 168.152332][T14400] ? __sys_sendmmsg+0x46f/0x680 [ 168.157145][T14400] __sys_sendmmsg+0x338/0x680 08:49:49 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, 0x0, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x14, 0x2, 0x0, 0x1, [@vti_common_policy=[@IFLA_VTI_IKEY={0x8}, @IFLA_VTI_LINK={0x8, 0x1, r4}]]}}}]}, 0x40}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 168.161831][T14400] ? __ia32_sys_sendmsg+0x90/0x90 [ 168.166820][T14400] ? __rcu_read_lock+0x50/0x50 [ 168.171552][T14400] ? __kasan_slab_free+0x1e2/0x220 [ 168.176644][T14400] ? __kasan_slab_free+0x168/0x220 [ 168.181824][T14400] ? slab_free_freelist_hook+0xd0/0x150 [ 168.187354][T14400] ? kmem_cache_free+0xac/0x5c0 [ 168.192185][T14400] ? do_sys_open+0x4a3/0x620 [ 168.196743][T14400] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 168.202777][T14400] ? do_sys_open+0x2fc/0x620 [ 168.207336][T14400] ? proc_fail_nth_write+0x166/0x200 [ 168.212583][T14400] ? proc_fail_nth_read+0x1c0/0x1c0 [ 168.217757][T14400] ? memset+0x1f/0x40 [ 168.221722][T14400] ? selinux_socket_setsockopt+0x10b/0x340 [ 168.227499][T14400] ? proc_fail_nth_read+0x1c0/0x1c0 [ 168.232667][T14400] ? memset+0x1f/0x40 [ 168.236610][T14400] ? fsnotify+0x13a0/0x1460 [ 168.241080][T14400] ? __kernel_write+0x340/0x340 [ 168.245897][T14400] ? fsnotify+0x13a0/0x1460 [ 168.250373][T14400] ? security_file_permission+0x128/0x300 [ 168.256056][T14400] ? __sb_end_write+0xa4/0xf0 [ 168.260694][T14400] ? vfs_write+0x427/0x4f0 [ 168.265071][T14400] ? ksys_write+0x237/0x2a0 [ 168.269539][T14400] ? __ia32_sys_read+0x80/0x80 [ 168.274304][T14400] __x64_sys_sendmmsg+0x9c/0xb0 [ 168.279157][T14400] do_syscall_64+0xcb/0x150 [ 168.283632][T14400] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 168.289498][T14400] RIP: 0033:0x45de29 08:49:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(0x0, 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) [ 168.293358][T14400] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 168.312942][T14400] RSP: 002b:00007f6925d06c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 168.321315][T14400] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de29 [ 168.329254][T14400] RDX: 000000000800001d RSI: 0000000020007fc0 RDI: 0000000000000003 [ 168.337198][T14400] RBP: 00007f6925d06ca0 R08: 0000000000000000 R09: 0000000000000000 [ 168.345133][T14400] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000001b [ 168.353065][T14400] R13: 00007ffce5b23eff R14: 00007f6925d079c0 R15: 000000000118bf2c 08:49:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x200fc0) 08:49:49 executing program 2 (fault-call:7 fault-nth:28): r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) [ 168.424558][T14423] FAULT_INJECTION: forcing a failure. [ 168.424558][T14423] name failslab, interval 1, probability 0, space 0, times 0 [ 168.437368][T14423] CPU: 1 PID: 14423 Comm: syz-executor.2 Tainted: G W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 168.448878][T14423] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 168.458900][T14423] Call Trace: [ 168.462252][T14423] dump_stack+0x1b0/0x21e [ 168.466565][T14423] ? devkmsg_release+0x11c/0x11c [ 168.471470][T14423] ? show_regs_print_info+0x12/0x12 [ 168.476633][T14423] ? is_bpf_text_address+0x290/0x2b0 [ 168.481887][T14423] should_fail+0x6fb/0x860 [ 168.486270][T14423] ? setup_fault_attr+0x2b0/0x2b0 [ 168.491257][T14423] ? arch_stack_walk+0x98/0xe0 [ 168.495987][T14423] ? __alloc_skb+0x88/0x4d0 [ 168.500455][T14423] should_failslab+0x5/0x20 [ 168.504923][T14423] kmem_cache_alloc+0x36/0x250 [ 168.509652][T14423] __alloc_skb+0x88/0x4d0 [ 168.513947][T14423] alloc_skb_with_frags+0xb1/0x580 [ 168.519024][T14423] ? __kasan_kmalloc+0x179/0x1b0 [ 168.523928][T14423] sock_alloc_send_pskb+0x87e/0xcc0 [ 168.529090][T14423] ? ip_route_output_flow+0x150/0x2a0 [ 168.534425][T14423] ? udp_sendmsg+0x1731/0x2e80 [ 168.539154][T14423] ? sock_kzfree_s+0x50/0x50 [ 168.543718][T14423] ? __rcu_read_lock+0x50/0x50 [ 168.548533][T14423] ? xfrm_selector_match+0xa71/0xf00 [ 168.553796][T14423] __ip_append_data+0x1fbd/0x31b0 [ 168.558789][T14423] ? dst_alloc+0x137/0x4f0 [ 168.563172][T14423] ? ip_do_fragment+0x2290/0x2290 [ 168.568161][T14423] ? __xfrm_sk_clone_policy+0xac0/0xac0 [ 168.573671][T14423] ? ip_setup_cork+0x810/0x810 [ 168.578397][T14423] ? ipv4_mtu+0x212/0x2c0 [ 168.582690][T14423] ? ip_setup_cork+0x46b/0x810 [ 168.587418][T14423] ? ip_route_output_key_hash_rcu+0x41b/0xf90 [ 168.593445][T14423] ip_make_skb+0x1c9/0x4d0 [ 168.597837][T14423] ? ip_do_fragment+0x2290/0x2290 [ 168.602828][T14423] ? ip_flush_pending_frames+0x2e0/0x2e0 [ 168.608513][T14423] ? __rcu_read_lock+0x50/0x50 [ 168.613245][T14423] udp_sendmsg+0x1d1b/0x2e80 [ 168.617804][T14423] ? ip_do_fragment+0x2290/0x2290 [ 168.622792][T14423] ? udp_cmsg_send+0x340/0x340 [ 168.627521][T14423] ? selinux_socket_sendmsg+0x10b/0x320 [ 168.633029][T14423] ? selinux_socket_accept+0x580/0x580 [ 168.638455][T14423] ? rw_copy_check_uvector+0x6b/0x310 [ 168.643808][T14423] ? inet_send_prepare+0x1b7/0x470 [ 168.648884][T14423] ? inet_send_prepare+0x470/0x470 [ 168.653958][T14423] ____sys_sendmsg+0x56f/0x860 [ 168.658705][T14423] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 168.663867][T14423] ? udp_sendmsg+0x75b/0x2e80 [ 168.668507][T14423] ? __sys_sendmmsg+0x46f/0x680 [ 168.673324][T14423] __sys_sendmmsg+0x338/0x680 [ 168.677968][T14423] ? __ia32_sys_sendmsg+0x90/0x90 [ 168.682960][T14423] ? __rcu_read_lock+0x50/0x50 [ 168.687692][T14423] ? __kasan_slab_free+0x1e2/0x220 [ 168.692769][T14423] ? __kasan_slab_free+0x168/0x220 [ 168.697844][T14423] ? slab_free_freelist_hook+0xd0/0x150 [ 168.703353][T14423] ? kmem_cache_free+0xac/0x5c0 [ 168.708167][T14423] ? do_sys_open+0x4a3/0x620 [ 168.712733][T14423] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 168.718765][T14423] ? do_sys_open+0x2fc/0x620 [ 168.723320][T14423] ? proc_fail_nth_write+0x166/0x200 [ 168.728582][T14423] ? proc_fail_nth_read+0x1c0/0x1c0 [ 168.733744][T14423] ? memset+0x1f/0x40 [ 168.737694][T14423] ? selinux_socket_setsockopt+0x10b/0x340 [ 168.743477][T14423] ? proc_fail_nth_read+0x1c0/0x1c0 [ 168.748642][T14423] ? memset+0x1f/0x40 [ 168.752591][T14423] ? fsnotify+0x13a0/0x1460 [ 168.757060][T14423] ? __kernel_write+0x340/0x340 [ 168.761887][T14423] ? fsnotify+0x13a0/0x1460 [ 168.766358][T14423] ? security_file_permission+0x128/0x300 [ 168.772041][T14423] ? __sb_end_write+0xa4/0xf0 [ 168.776682][T14423] ? vfs_write+0x427/0x4f0 [ 168.781073][T14423] ? ksys_write+0x237/0x2a0 [ 168.785541][T14423] ? __ia32_sys_read+0x80/0x80 [ 168.790283][T14423] __x64_sys_sendmmsg+0x9c/0xb0 [ 168.795100][T14423] do_syscall_64+0xcb/0x150 [ 168.799567][T14423] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 168.805427][T14423] RIP: 0033:0x45de29 [ 168.809301][T14423] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 168.828871][T14423] RSP: 002b:00007f6925d06c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 168.837350][T14423] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de29 [ 168.845304][T14423] RDX: 000000000800001d RSI: 0000000020007fc0 RDI: 0000000000000003 [ 168.853246][T14423] RBP: 00007f6925d06ca0 R08: 0000000000000000 R09: 0000000000000000 [ 168.861184][T14423] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000001c 08:49:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x0, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:49:50 executing program 2 (fault-call:7 fault-nth:29): r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) [ 168.869124][T14423] R13: 00007ffce5b23eff R14: 00007f6925d079c0 R15: 000000000118bf2c 08:49:50 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x0, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:49:50 executing program 1: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x0, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) [ 168.909472][T14430] FAULT_INJECTION: forcing a failure. [ 168.909472][T14430] name failslab, interval 1, probability 0, space 0, times 0 [ 168.929820][T14430] CPU: 1 PID: 14430 Comm: syz-executor.2 Tainted: G W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 168.941402][T14430] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 168.951457][T14430] Call Trace: [ 168.954739][T14430] dump_stack+0x1b0/0x21e [ 168.959052][T14430] ? devkmsg_release+0x11c/0x11c [ 168.963969][T14430] ? show_regs_print_info+0x12/0x12 [ 168.969136][T14430] ? is_bpf_text_address+0x290/0x2b0 [ 168.974393][T14430] should_fail+0x6fb/0x860 [ 168.978785][T14430] ? setup_fault_attr+0x2b0/0x2b0 [ 168.983775][T14430] ? arch_stack_walk+0x98/0xe0 [ 168.988505][T14430] ? alloc_skb_with_frags+0xb1/0x580 [ 168.993754][T14430] should_failslab+0x5/0x20 [ 168.998221][T14430] __kmalloc_track_caller+0x5d/0x2b0 [ 169.003468][T14430] ? kmem_cache_alloc+0x1d5/0x250 [ 169.008472][T14430] ? alloc_skb_with_frags+0xb1/0x580 [ 169.013720][T14430] __alloc_skb+0xd1/0x4d0 [ 169.018015][T14430] alloc_skb_with_frags+0xb1/0x580 [ 169.023092][T14430] ? __kasan_kmalloc+0x179/0x1b0 [ 169.027995][T14430] sock_alloc_send_pskb+0x87e/0xcc0 [ 169.033156][T14430] ? ip_route_output_flow+0x150/0x2a0 [ 169.038576][T14430] ? udp_sendmsg+0x1731/0x2e80 [ 169.043318][T14430] ? sock_kzfree_s+0x50/0x50 [ 169.047876][T14430] ? __rcu_read_lock+0x50/0x50 [ 169.052605][T14430] ? xfrm_selector_match+0xa71/0xf00 [ 169.057855][T14430] __ip_append_data+0x1fbd/0x31b0 [ 169.062848][T14430] ? dst_alloc+0x137/0x4f0 [ 169.067237][T14430] ? ip_do_fragment+0x2290/0x2290 [ 169.072234][T14430] ? __xfrm_sk_clone_policy+0xac0/0xac0 [ 169.077743][T14430] ? ip_setup_cork+0x810/0x810 [ 169.082472][T14430] ? ipv4_mtu+0x212/0x2c0 [ 169.086767][T14430] ? ip_setup_cork+0x46b/0x810 [ 169.091496][T14430] ? ip_route_output_key_hash_rcu+0x41b/0xf90 [ 169.097529][T14430] ip_make_skb+0x1c9/0x4d0 [ 169.101914][T14430] ? ip_do_fragment+0x2290/0x2290 [ 169.106902][T14430] ? ip_flush_pending_frames+0x2e0/0x2e0 [ 169.112501][T14430] ? __rcu_read_lock+0x50/0x50 [ 169.117232][T14430] udp_sendmsg+0x1d1b/0x2e80 [ 169.121878][T14430] ? ip_do_fragment+0x2290/0x2290 [ 169.126865][T14430] ? udp_cmsg_send+0x340/0x340 [ 169.131598][T14430] ? selinux_socket_sendmsg+0x10b/0x320 [ 169.137108][T14430] ? selinux_socket_accept+0x580/0x580 [ 169.142532][T14430] ? rw_copy_check_uvector+0x6b/0x310 [ 169.147872][T14430] ? inet_send_prepare+0x1b7/0x470 [ 169.152948][T14430] ? inet_send_prepare+0x470/0x470 [ 169.158022][T14430] ____sys_sendmsg+0x56f/0x860 [ 169.162752][T14430] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 169.167933][T14430] ? udp_sendmsg+0x75b/0x2e80 [ 169.172573][T14430] ? __sys_sendmmsg+0x46f/0x680 [ 169.177399][T14430] __sys_sendmmsg+0x338/0x680 [ 169.182042][T14430] ? __ia32_sys_sendmsg+0x90/0x90 [ 169.187032][T14430] ? __rcu_read_lock+0x50/0x50 [ 169.191776][T14430] ? __kasan_slab_free+0x1e2/0x220 [ 169.196852][T14430] ? __kasan_slab_free+0x168/0x220 [ 169.201928][T14430] ? slab_free_freelist_hook+0xd0/0x150 [ 169.207448][T14430] ? kmem_cache_free+0xac/0x5c0 [ 169.212262][T14430] ? do_sys_open+0x4a3/0x620 [ 169.216818][T14430] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 169.222848][T14430] ? do_sys_open+0x2fc/0x620 [ 169.227406][T14430] ? proc_fail_nth_write+0x166/0x200 [ 169.232654][T14430] ? proc_fail_nth_read+0x1c0/0x1c0 [ 169.237814][T14430] ? memset+0x1f/0x40 [ 169.241766][T14430] ? selinux_socket_setsockopt+0x10b/0x340 [ 169.247648][T14430] ? proc_fail_nth_read+0x1c0/0x1c0 [ 169.252808][T14430] ? memset+0x1f/0x40 [ 169.256755][T14430] ? fsnotify+0x13a0/0x1460 [ 169.261228][T14430] ? __kernel_write+0x340/0x340 [ 169.266043][T14430] ? fsnotify+0x13a0/0x1460 [ 169.270527][T14430] ? security_file_permission+0x128/0x300 [ 169.276219][T14430] ? __sb_end_write+0xa4/0xf0 [ 169.280858][T14430] ? vfs_write+0x427/0x4f0 [ 169.285239][T14430] ? ksys_write+0x237/0x2a0 [ 169.289706][T14430] ? __ia32_sys_read+0x80/0x80 [ 169.294433][T14430] __x64_sys_sendmmsg+0x9c/0xb0 [ 169.299250][T14430] do_syscall_64+0xcb/0x150 [ 169.303720][T14430] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 169.309575][T14430] RIP: 0033:0x45de29 [ 169.313435][T14430] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 169.333015][T14430] RSP: 002b:00007f6925d06c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 169.341389][T14430] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de29 [ 169.349327][T14430] RDX: 000000000800001d RSI: 0000000020007fc0 RDI: 0000000000000003 08:49:50 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x14, 0x2, 0x0, 0x1, [@vti_common_policy=[@IFLA_VTI_IKEY={0x8}, @IFLA_VTI_LINK={0x8, 0x1, r4}]]}}}]}, 0x40}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 08:49:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x200fc0) [ 169.357262][T14430] RBP: 00007f6925d06ca0 R08: 0000000000000000 R09: 0000000000000000 [ 169.365197][T14430] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000001d [ 169.373139][T14430] R13: 00007ffce5b23eff R14: 00007f6925d079c0 R15: 000000000118bf2c 08:49:50 executing program 2 (fault-call:7 fault-nth:30): r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 08:49:50 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x0, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:49:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x0, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) [ 169.493675][T14453] FAULT_INJECTION: forcing a failure. [ 169.493675][T14453] name failslab, interval 1, probability 0, space 0, times 0 [ 169.511240][T14453] CPU: 1 PID: 14453 Comm: syz-executor.2 Tainted: G W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 169.522772][T14453] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 169.532896][T14453] Call Trace: [ 169.536174][T14453] dump_stack+0x1b0/0x21e [ 169.540560][T14453] ? devkmsg_release+0x11c/0x11c [ 169.545467][T14453] ? show_regs_print_info+0x12/0x12 [ 169.550633][T14453] should_fail+0x6fb/0x860 [ 169.555015][T14453] ? setup_fault_attr+0x2b0/0x2b0 [ 169.560004][T14453] ? skb_clone+0x1b2/0x370 [ 169.564386][T14453] should_failslab+0x5/0x20 [ 169.568856][T14453] kmem_cache_alloc+0x36/0x250 [ 169.573584][T14453] skb_clone+0x1b2/0x370 [ 169.577802][T14453] ip_mc_output+0x1ce/0xab0 [ 169.582283][T14453] ? nf_nat_ipv4_local_fn+0x2c2/0x4e0 [ 169.587620][T14453] ? ip_build_and_send_pkt+0x9d0/0x9d0 [ 169.593058][T14453] ? nf_hook_slow+0x1a6/0x1f0 [ 169.597698][T14453] ? __ip_local_out+0x347/0x4a0 [ 169.602510][T14453] ? ip_send_check+0xd0/0xd0 [ 169.607063][T14453] ? __ip_local_out+0x4a0/0x4a0 [ 169.611880][T14453] ? csum_partial+0x379/0x470 [ 169.616518][T14453] ip_send_skb+0xaa/0x140 [ 169.620816][T14453] udp_send_skb+0x8e9/0x1100 [ 169.625415][T14453] udp_sendmsg+0x1d45/0x2e80 [ 169.629974][T14453] ? ip_do_fragment+0x2290/0x2290 [ 169.635022][T14453] ? udp_cmsg_send+0x340/0x340 [ 169.639752][T14453] ? selinux_socket_sendmsg+0x10b/0x320 [ 169.645262][T14453] ? selinux_socket_accept+0x580/0x580 [ 169.650683][T14453] ? rw_copy_check_uvector+0x6b/0x310 [ 169.656015][T14453] ? inet_send_prepare+0x1b7/0x470 [ 169.661086][T14453] ? inet_send_prepare+0x470/0x470 [ 169.666222][T14453] ____sys_sendmsg+0x56f/0x860 [ 169.670957][T14453] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 169.676115][T14453] ? udp_sendmsg+0x75b/0x2e80 [ 169.680755][T14453] ? __sys_sendmmsg+0x46f/0x680 [ 169.685566][T14453] __sys_sendmmsg+0x338/0x680 [ 169.690282][T14453] ? __ia32_sys_sendmsg+0x90/0x90 [ 169.695281][T14453] ? __rcu_read_lock+0x50/0x50 [ 169.700014][T14453] ? __kasan_slab_free+0x1e2/0x220 [ 169.705090][T14453] ? __kasan_slab_free+0x168/0x220 [ 169.710168][T14453] ? slab_free_freelist_hook+0xd0/0x150 [ 169.715684][T14453] ? kmem_cache_free+0xac/0x5c0 [ 169.720498][T14453] ? do_sys_open+0x4a3/0x620 [ 169.725095][T14453] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 169.731128][T14453] ? do_sys_open+0x2fc/0x620 [ 169.735693][T14453] ? proc_fail_nth_write+0x166/0x200 [ 169.740977][T14453] ? proc_fail_nth_read+0x1c0/0x1c0 [ 169.746174][T14453] ? memset+0x1f/0x40 [ 169.750166][T14453] ? selinux_socket_setsockopt+0x10b/0x340 [ 169.755940][T14453] ? proc_fail_nth_read+0x1c0/0x1c0 [ 169.761121][T14453] ? memset+0x1f/0x40 [ 169.765072][T14453] ? fsnotify+0x13a0/0x1460 [ 169.769566][T14453] ? __kernel_write+0x340/0x340 [ 169.774379][T14453] ? fsnotify+0x13a0/0x1460 [ 169.778851][T14453] ? security_file_permission+0x128/0x300 [ 169.784560][T14453] ? __sb_end_write+0xa4/0xf0 [ 169.789205][T14453] ? vfs_write+0x427/0x4f0 [ 169.793588][T14453] ? ksys_write+0x237/0x2a0 [ 169.798056][T14453] ? __ia32_sys_read+0x80/0x80 [ 169.802790][T14453] __x64_sys_sendmmsg+0x9c/0xb0 [ 169.807606][T14453] do_syscall_64+0xcb/0x150 [ 169.812078][T14453] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 169.817947][T14453] RIP: 0033:0x45de29 [ 169.821807][T14453] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 08:49:51 executing program 1: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:49:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x200fc0) [ 169.841464][T14453] RSP: 002b:00007f6925d06c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 169.849840][T14453] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de29 [ 169.857778][T14453] RDX: 000000000800001d RSI: 0000000020007fc0 RDI: 0000000000000003 [ 169.865765][T14453] RBP: 00007f6925d06ca0 R08: 0000000000000000 R09: 0000000000000000 [ 169.873703][T14453] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000001e [ 169.881643][T14453] R13: 00007ffce5b23eff R14: 00007f6925d079c0 R15: 000000000118bf2c 08:49:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x0, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:49:51 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x0, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:49:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x200fc0) 08:49:51 executing program 2 (fault-call:7 fault-nth:31): r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 08:49:51 executing program 1: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) [ 170.041352][T14481] FAULT_INJECTION: forcing a failure. [ 170.041352][T14481] name failslab, interval 1, probability 0, space 0, times 0 [ 170.059396][T14481] CPU: 1 PID: 14481 Comm: syz-executor.2 Tainted: G W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 170.070923][T14481] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 170.081065][T14481] Call Trace: [ 170.084339][T14481] dump_stack+0x1b0/0x21e [ 170.088668][T14481] ? devkmsg_release+0x11c/0x11c [ 170.093581][T14481] ? show_regs_print_info+0x12/0x12 [ 170.098828][T14481] should_fail+0x6fb/0x860 [ 170.103210][T14481] ? setup_fault_attr+0x2b0/0x2b0 [ 170.108204][T14481] ? dst_alloc+0x137/0x4f0 [ 170.112586][T14481] should_failslab+0x5/0x20 [ 170.117052][T14481] kmem_cache_alloc+0x36/0x250 [ 170.121785][T14481] dst_alloc+0x137/0x4f0 [ 170.125991][T14481] rt_dst_clone+0x53/0x670 [ 170.130375][T14481] ip_mc_finish_output+0xad/0x3a0 [ 170.135380][T14481] ip_mc_output+0x407/0xab0 [ 170.139850][T14481] ? ip_build_and_send_pkt+0x9d0/0x9d0 [ 170.145287][T14481] ? nf_hook_slow+0x1a6/0x1f0 [ 170.149960][T14481] ? ip_mc_output+0xab0/0xab0 [ 170.154600][T14481] ? ip_send_check+0xd0/0xd0 [ 170.159154][T14481] ? __ip_local_out+0x4a0/0x4a0 [ 170.164054][T14481] ? csum_partial+0x379/0x470 [ 170.168715][T14481] ip_send_skb+0xaa/0x140 [ 170.173040][T14481] udp_send_skb+0x8e9/0x1100 [ 170.177614][T14481] udp_sendmsg+0x1d45/0x2e80 [ 170.182189][T14481] ? ip_do_fragment+0x2290/0x2290 [ 170.187178][T14481] ? udp_cmsg_send+0x340/0x340 [ 170.191930][T14481] ? selinux_socket_sendmsg+0x10b/0x320 [ 170.197451][T14481] ? selinux_socket_accept+0x580/0x580 [ 170.202921][T14481] ? rw_copy_check_uvector+0x6b/0x310 [ 170.208264][T14481] ? inet_send_prepare+0x1b7/0x470 [ 170.213361][T14481] ? inet_send_prepare+0x470/0x470 [ 170.218456][T14481] ____sys_sendmsg+0x56f/0x860 [ 170.223187][T14481] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 170.228358][T14481] ? udp_sendmsg+0x75b/0x2e80 [ 170.233058][T14481] ? __sys_sendmmsg+0x46f/0x680 [ 170.237869][T14481] __sys_sendmmsg+0x338/0x680 [ 170.242518][T14481] ? __ia32_sys_sendmsg+0x90/0x90 [ 170.247623][T14481] ? __rcu_read_lock+0x50/0x50 [ 170.252351][T14481] ? __kasan_slab_free+0x1e2/0x220 [ 170.257423][T14481] ? __kasan_slab_free+0x168/0x220 [ 170.262502][T14481] ? slab_free_freelist_hook+0xd0/0x150 [ 170.268096][T14481] ? kmem_cache_free+0xac/0x5c0 [ 170.272909][T14481] ? do_sys_open+0x4a3/0x620 [ 170.277460][T14481] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 170.283510][T14481] ? do_sys_open+0x2fc/0x620 [ 170.288087][T14481] ? proc_fail_nth_write+0x166/0x200 [ 170.293335][T14481] ? proc_fail_nth_read+0x1c0/0x1c0 [ 170.298498][T14481] ? memset+0x1f/0x40 [ 170.302493][T14481] ? selinux_socket_setsockopt+0x10b/0x340 [ 170.308264][T14481] ? proc_fail_nth_read+0x1c0/0x1c0 [ 170.313428][T14481] ? memset+0x1f/0x40 [ 170.317374][T14481] ? fsnotify+0x13a0/0x1460 [ 170.321880][T14481] ? __kernel_write+0x340/0x340 [ 170.326713][T14481] ? fsnotify+0x13a0/0x1460 [ 170.331188][T14481] ? security_file_permission+0x128/0x300 [ 170.336869][T14481] ? __sb_end_write+0xa4/0xf0 [ 170.341539][T14481] ? vfs_write+0x427/0x4f0 [ 170.345920][T14481] ? ksys_write+0x237/0x2a0 [ 170.350385][T14481] ? __ia32_sys_read+0x80/0x80 [ 170.355113][T14481] __x64_sys_sendmmsg+0x9c/0xb0 [ 170.360029][T14481] do_syscall_64+0xcb/0x150 [ 170.364499][T14481] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 170.370390][T14481] RIP: 0033:0x45de29 08:49:51 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x14, 0x2, 0x0, 0x1, [@vti_common_policy=[@IFLA_VTI_IKEY={0x8}, @IFLA_VTI_LINK={0x8, 0x1, r4}]]}}}]}, 0x40}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 08:49:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x0, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:49:51 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x0, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) [ 170.374248][T14481] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 170.393814][T14481] RSP: 002b:00007f6925d06c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 170.402200][T14481] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de29 [ 170.410152][T14481] RDX: 000000000800001d RSI: 0000000020007fc0 RDI: 0000000000000003 [ 170.418094][T14481] RBP: 00007f6925d06ca0 R08: 0000000000000000 R09: 0000000000000000 [ 170.426039][T14481] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000001f [ 170.433986][T14481] R13: 00007ffce5b23eff R14: 00007f6925d079c0 R15: 000000000118bf2c 08:49:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x200fc0) 08:49:51 executing program 1: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:49:51 executing program 2 (fault-call:7 fault-nth:32): r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 08:49:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x0, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:49:51 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x0, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) [ 170.594399][T14509] FAULT_INJECTION: forcing a failure. [ 170.594399][T14509] name failslab, interval 1, probability 0, space 0, times 0 [ 170.608319][T14509] CPU: 0 PID: 14509 Comm: syz-executor.2 Tainted: G W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 170.619848][T14509] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 170.629881][T14509] Call Trace: [ 170.633153][T14509] dump_stack+0x1b0/0x21e [ 170.637464][T14509] ? devkmsg_release+0x11c/0x11c [ 170.642377][T14509] ? show_regs_print_info+0x12/0x12 [ 170.647543][T14509] should_fail+0x6fb/0x860 [ 170.651924][T14509] ? setup_fault_attr+0x2b0/0x2b0 [ 170.656922][T14509] ? dst_alloc+0x137/0x4f0 [ 170.661298][T14509] should_failslab+0x5/0x20 [ 170.665767][T14509] kmem_cache_alloc+0x36/0x250 [ 170.670494][T14509] dst_alloc+0x137/0x4f0 [ 170.674711][T14509] rt_dst_clone+0x53/0x670 [ 170.679105][T14509] ip_mc_finish_output+0xad/0x3a0 [ 170.684097][T14509] ip_mc_output+0x407/0xab0 [ 170.688568][T14509] ? ip_build_and_send_pkt+0x9d0/0x9d0 [ 170.694059][T14509] ? nf_hook_slow+0x1a6/0x1f0 [ 170.698731][T14509] ? ip_mc_output+0xab0/0xab0 [ 170.703378][T14509] ? ip_send_check+0xd0/0xd0 [ 170.707932][T14509] ? __ip_local_out+0x4a0/0x4a0 [ 170.712751][T14509] ? csum_partial+0x379/0x470 [ 170.717389][T14509] ip_send_skb+0xaa/0x140 [ 170.721692][T14509] udp_send_skb+0x8e9/0x1100 [ 170.726256][T14509] udp_sendmsg+0x1d45/0x2e80 [ 170.730820][T14509] ? ip_do_fragment+0x2290/0x2290 [ 170.735808][T14509] ? udp_cmsg_send+0x340/0x340 [ 170.740536][T14509] ? selinux_socket_sendmsg+0x10b/0x320 [ 170.746052][T14509] ? selinux_socket_accept+0x580/0x580 [ 170.751476][T14509] ? rw_copy_check_uvector+0x6b/0x310 [ 170.756814][T14509] ? inet_send_prepare+0x1b7/0x470 [ 170.761886][T14509] ? inet_send_prepare+0x470/0x470 [ 170.766959][T14509] ____sys_sendmsg+0x56f/0x860 [ 170.771684][T14509] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 170.776844][T14509] ? udp_sendmsg+0x75b/0x2e80 [ 170.781484][T14509] ? __sys_sendmmsg+0x46f/0x680 [ 170.786321][T14509] __sys_sendmmsg+0x338/0x680 [ 170.790984][T14509] ? __ia32_sys_sendmsg+0x90/0x90 [ 170.795970][T14509] ? __rcu_read_lock+0x50/0x50 [ 170.800696][T14509] ? __kasan_slab_free+0x1e2/0x220 [ 170.805767][T14509] ? __kasan_slab_free+0x168/0x220 [ 170.810845][T14509] ? slab_free_freelist_hook+0xd0/0x150 [ 170.816350][T14509] ? kmem_cache_free+0xac/0x5c0 [ 170.821252][T14509] ? do_sys_open+0x4a3/0x620 [ 170.825820][T14509] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 170.831847][T14509] ? do_sys_open+0x2fc/0x620 [ 170.836408][T14509] ? proc_fail_nth_write+0x166/0x200 [ 170.841666][T14509] ? proc_fail_nth_read+0x1c0/0x1c0 [ 170.846827][T14509] ? memset+0x1f/0x40 [ 170.850771][T14509] ? selinux_socket_setsockopt+0x10b/0x340 [ 170.856545][T14509] ? proc_fail_nth_read+0x1c0/0x1c0 [ 170.861725][T14509] ? memset+0x1f/0x40 [ 170.865703][T14509] ? fsnotify+0x13a0/0x1460 [ 170.870189][T14509] ? __kernel_write+0x340/0x340 [ 170.875003][T14509] ? fsnotify+0x13a0/0x1460 [ 170.879472][T14509] ? security_file_permission+0x128/0x300 [ 170.885182][T14509] ? __sb_end_write+0xa4/0xf0 [ 170.889829][T14509] ? vfs_write+0x427/0x4f0 [ 170.894228][T14509] ? ksys_write+0x237/0x2a0 [ 170.898698][T14509] ? __ia32_sys_read+0x80/0x80 [ 170.903460][T14509] __x64_sys_sendmmsg+0x9c/0xb0 [ 170.908309][T14509] do_syscall_64+0xcb/0x150 [ 170.912778][T14509] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 170.918633][T14509] RIP: 0033:0x45de29 [ 170.922526][T14509] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 08:49:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x200fc0) [ 170.942092][T14509] RSP: 002b:00007f6925d06c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 170.950473][T14509] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de29 [ 170.958422][T14509] RDX: 000000000800001d RSI: 0000000020007fc0 RDI: 0000000000000003 [ 170.966358][T14509] RBP: 00007f6925d06ca0 R08: 0000000000000000 R09: 0000000000000000 [ 170.974294][T14509] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000020 [ 170.982232][T14509] R13: 00007ffce5b23eff R14: 00007f6925d079c0 R15: 000000000118bf2c 08:49:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x0) 08:49:52 executing program 1: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:49:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) socket(0x1e, 0x4, 0x0) connect$tipc(0xffffffffffffffff, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x200fc0) 08:49:52 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x14, 0x2, 0x0, 0x1, [@vti_common_policy=[@IFLA_VTI_IKEY={0x8}, @IFLA_VTI_LINK={0x8, 0x1, r4}]]}}}]}, 0x40}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 08:49:52 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x0, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:49:52 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC=r0, @ANYRESDEC, @ANYRESDEC], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:49:52 executing program 2 (fault-call:7 fault-nth:33): r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 08:49:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x0) 08:49:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) socket(0x1e, 0x4, 0x0) connect$tipc(0xffffffffffffffff, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x200fc0) 08:49:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x0) 08:49:52 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x58, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) [ 171.327114][T14547] FAULT_INJECTION: forcing a failure. [ 171.327114][T14547] name failslab, interval 1, probability 0, space 0, times 0 [ 171.376936][T14547] CPU: 0 PID: 14547 Comm: syz-executor.2 Tainted: G W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 171.388478][T14547] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 171.398622][T14547] Call Trace: [ 171.401907][T14547] dump_stack+0x1b0/0x21e [ 171.406217][T14547] ? devkmsg_release+0x11c/0x11c [ 171.411123][T14547] ? show_regs_print_info+0x12/0x12 [ 171.416282][T14547] ? ip_finish_output2+0x936/0x1810 [ 171.421466][T14547] should_fail+0x6fb/0x860 [ 171.425857][T14547] ? setup_fault_attr+0x2b0/0x2b0 [ 171.430856][T14547] ? ip_fragment+0x210/0x210 [ 171.435416][T14547] ? dst_alloc+0x137/0x4f0 [ 171.439795][T14547] should_failslab+0x5/0x20 [ 171.444263][T14547] kmem_cache_alloc+0x36/0x250 [ 171.448992][T14547] dst_alloc+0x137/0x4f0 [ 171.453203][T14547] __mkroute_output+0xc94/0x1430 [ 171.458105][T14547] ? ip_route_output_key_hash_rcu+0xf90/0xf90 [ 171.464135][T14547] ? ip_route_output_key_hash_rcu+0x41b/0xf90 [ 171.470207][T14547] ip_route_output_flow+0x150/0x2a0 [ 171.475372][T14547] ? ip_send_skb+0x11e/0x140 [ 171.479927][T14547] ? ipv4_sk_update_pmtu+0x1d40/0x1d40 [ 171.485350][T14547] ? __rcu_read_lock+0x50/0x50 [ 171.490079][T14547] ? selinux_sk_getsecid+0x24/0xb0 [ 171.495155][T14547] udp_sendmsg+0x1731/0x2e80 [ 171.499712][T14547] ? ip_do_fragment+0x2290/0x2290 [ 171.504699][T14547] ? udp_cmsg_send+0x340/0x340 [ 171.509426][T14547] ? selinux_socket_sendmsg+0x10b/0x320 [ 171.514937][T14547] ? selinux_socket_accept+0x580/0x580 [ 171.520395][T14547] ? rw_copy_check_uvector+0x6b/0x310 [ 171.525732][T14547] ? import_iovec+0x171/0x340 [ 171.530378][T14547] ? inet_send_prepare+0x1b7/0x470 [ 171.535471][T14547] ? inet_send_prepare+0x470/0x470 [ 171.540549][T14547] ____sys_sendmsg+0x56f/0x860 [ 171.545279][T14547] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 171.550440][T14547] ? udp_sendmsg+0x75b/0x2e80 [ 171.555091][T14547] ? __sys_sendmmsg+0x46f/0x680 [ 171.559910][T14547] __sys_sendmmsg+0x338/0x680 [ 171.564557][T14547] ? __ia32_sys_sendmsg+0x90/0x90 [ 171.569553][T14547] ? __rcu_read_lock+0x50/0x50 [ 171.574278][T14547] ? __kasan_slab_free+0x1e2/0x220 [ 171.579354][T14547] ? __kasan_slab_free+0x168/0x220 [ 171.584432][T14547] ? slab_free_freelist_hook+0xd0/0x150 [ 171.589940][T14547] ? kmem_cache_free+0xac/0x5c0 [ 171.594753][T14547] ? do_sys_open+0x4a3/0x620 [ 171.599309][T14547] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 171.605338][T14547] ? do_sys_open+0x2fc/0x620 [ 171.609894][T14547] ? proc_fail_nth_write+0x166/0x200 [ 171.615143][T14547] ? proc_fail_nth_read+0x1c0/0x1c0 [ 171.620304][T14547] ? memset+0x1f/0x40 [ 171.624260][T14547] ? selinux_socket_setsockopt+0x10b/0x340 [ 171.630037][T14547] ? proc_fail_nth_read+0x1c0/0x1c0 [ 171.635200][T14547] ? memset+0x1f/0x40 [ 171.639148][T14547] ? fsnotify+0x13a0/0x1460 [ 171.643619][T14547] ? __kernel_write+0x340/0x340 [ 171.648435][T14547] ? fsnotify+0x13a0/0x1460 [ 171.652905][T14547] ? security_file_permission+0x128/0x300 [ 171.658618][T14547] ? __sb_end_write+0xa4/0xf0 [ 171.663268][T14547] ? vfs_write+0x427/0x4f0 [ 171.667665][T14547] ? ksys_write+0x237/0x2a0 [ 171.672143][T14547] ? __ia32_sys_read+0x80/0x80 [ 171.676867][T14547] __x64_sys_sendmmsg+0x9c/0xb0 [ 171.681696][T14547] do_syscall_64+0xcb/0x150 [ 171.686164][T14547] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 171.692017][T14547] RIP: 0033:0x45de29 [ 171.695881][T14547] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 171.715465][T14547] RSP: 002b:00007f6925d06c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 08:49:52 executing program 2 (fault-call:7 fault-nth:34): r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) [ 171.723847][T14547] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de29 [ 171.731789][T14547] RDX: 000000000800001d RSI: 0000000020007fc0 RDI: 0000000000000003 [ 171.739736][T14547] RBP: 00007f6925d06ca0 R08: 0000000000000000 R09: 0000000000000000 [ 171.747670][T14547] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000021 [ 171.755604][T14547] R13: 00007ffce5b23eff R14: 00007f6925d079c0 R15: 000000000118bf2c 08:49:53 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x58, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) [ 171.797580][T14560] FAULT_INJECTION: forcing a failure. [ 171.797580][T14560] name failslab, interval 1, probability 0, space 0, times 0 [ 171.810350][T14560] CPU: 0 PID: 14560 Comm: syz-executor.2 Tainted: G W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 171.821867][T14560] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 171.831900][T14560] Call Trace: [ 171.835198][T14560] dump_stack+0x1b0/0x21e [ 171.839593][T14560] ? devkmsg_release+0x11c/0x11c [ 171.844497][T14560] ? show_regs_print_info+0x12/0x12 [ 171.849659][T14560] ? is_bpf_text_address+0x290/0x2b0 [ 171.854908][T14560] should_fail+0x6fb/0x860 [ 171.859303][T14560] ? setup_fault_attr+0x2b0/0x2b0 [ 171.864289][T14560] ? arch_stack_walk+0x98/0xe0 [ 171.869015][T14560] ? __alloc_skb+0x88/0x4d0 [ 171.873487][T14560] should_failslab+0x5/0x20 [ 171.877965][T14560] kmem_cache_alloc+0x36/0x250 [ 171.882703][T14560] __alloc_skb+0x88/0x4d0 [ 171.887001][T14560] alloc_skb_with_frags+0xb1/0x580 [ 171.892092][T14560] ? __kasan_kmalloc+0x179/0x1b0 [ 171.897003][T14560] sock_alloc_send_pskb+0x87e/0xcc0 [ 171.902170][T14560] ? ip_route_output_flow+0x150/0x2a0 [ 171.907529][T14560] ? udp_sendmsg+0x1731/0x2e80 [ 171.912258][T14560] ? sock_kzfree_s+0x50/0x50 [ 171.916811][T14560] ? __rcu_read_lock+0x50/0x50 [ 171.921545][T14560] ? xfrm_selector_match+0xa71/0xf00 [ 171.926894][T14560] __ip_append_data+0x1fbd/0x31b0 [ 171.931899][T14560] ? dst_alloc+0x137/0x4f0 [ 171.936277][T14560] ? ip_do_fragment+0x2290/0x2290 [ 171.941264][T14560] ? __xfrm_sk_clone_policy+0xac0/0xac0 [ 171.946780][T14560] ? ip_setup_cork+0x810/0x810 [ 171.951522][T14560] ? ipv4_mtu+0x212/0x2c0 [ 171.955821][T14560] ? ip_setup_cork+0x46b/0x810 [ 171.960549][T14560] ? ip_route_output_key_hash_rcu+0x41b/0xf90 [ 171.966601][T14560] ip_make_skb+0x1c9/0x4d0 [ 171.970983][T14560] ? ip_do_fragment+0x2290/0x2290 [ 171.975974][T14560] ? ip_flush_pending_frames+0x2e0/0x2e0 [ 171.981682][T14560] ? __rcu_read_lock+0x50/0x50 [ 171.986425][T14560] udp_sendmsg+0x1d1b/0x2e80 [ 171.990983][T14560] ? ip_do_fragment+0x2290/0x2290 [ 171.995969][T14560] ? udp_cmsg_send+0x340/0x340 [ 172.000699][T14560] ? selinux_socket_sendmsg+0x10b/0x320 [ 172.006210][T14560] ? selinux_socket_accept+0x580/0x580 [ 172.011633][T14560] ? rw_copy_check_uvector+0x6b/0x310 [ 172.016970][T14560] ? inet_send_prepare+0x1b7/0x470 [ 172.022048][T14560] ? inet_send_prepare+0x470/0x470 [ 172.027123][T14560] ____sys_sendmsg+0x56f/0x860 [ 172.031855][T14560] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 172.037024][T14560] ? udp_sendmsg+0x75b/0x2e80 [ 172.041664][T14560] ? __sys_sendmmsg+0x46f/0x680 [ 172.046503][T14560] __sys_sendmmsg+0x338/0x680 [ 172.051149][T14560] ? __ia32_sys_sendmsg+0x90/0x90 [ 172.056138][T14560] ? __rcu_read_lock+0x50/0x50 [ 172.060866][T14560] ? __kasan_slab_free+0x1e2/0x220 [ 172.065951][T14560] ? __kasan_slab_free+0x168/0x220 [ 172.071032][T14560] ? slab_free_freelist_hook+0xd0/0x150 [ 172.076548][T14560] ? kmem_cache_free+0xac/0x5c0 [ 172.081363][T14560] ? do_sys_open+0x4a3/0x620 [ 172.085970][T14560] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 172.092011][T14560] ? do_sys_open+0x2fc/0x620 [ 172.096572][T14560] ? proc_fail_nth_write+0x166/0x200 [ 172.101821][T14560] ? proc_fail_nth_read+0x1c0/0x1c0 [ 172.106990][T14560] ? memset+0x1f/0x40 [ 172.110941][T14560] ? selinux_socket_setsockopt+0x10b/0x340 [ 172.116711][T14560] ? proc_fail_nth_read+0x1c0/0x1c0 [ 172.121880][T14560] ? memset+0x1f/0x40 [ 172.125835][T14560] ? fsnotify+0x13a0/0x1460 [ 172.130306][T14560] ? __kernel_write+0x340/0x340 [ 172.135137][T14560] ? fsnotify+0x13a0/0x1460 [ 172.139607][T14560] ? security_file_permission+0x128/0x300 [ 172.145291][T14560] ? __sb_end_write+0xa4/0xf0 [ 172.149931][T14560] ? vfs_write+0x427/0x4f0 [ 172.154312][T14560] ? ksys_write+0x237/0x2a0 [ 172.158783][T14560] ? __ia32_sys_read+0x80/0x80 [ 172.163511][T14560] __x64_sys_sendmmsg+0x9c/0xb0 [ 172.168329][T14560] do_syscall_64+0xcb/0x150 [ 172.172797][T14560] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 172.178655][T14560] RIP: 0033:0x45de29 [ 172.182647][T14560] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 172.202215][T14560] RSP: 002b:00007f6925d06c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 172.210591][T14560] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de29 [ 172.218531][T14560] RDX: 000000000800001d RSI: 0000000020007fc0 RDI: 0000000000000003 [ 172.226512][T14560] RBP: 00007f6925d06ca0 R08: 0000000000000000 R09: 0000000000000000 [ 172.234458][T14560] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000022 08:49:53 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x14, 0x2, 0x0, 0x1, [@vti_common_policy=[@IFLA_VTI_IKEY={0x8}, @IFLA_VTI_LINK={0x8, 0x1, r4}]]}}}]}, 0x40}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 08:49:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) socket(0x1e, 0x4, 0x0) connect$tipc(0xffffffffffffffff, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x200fc0) 08:49:53 executing program 2 (fault-call:7 fault-nth:35): r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) [ 172.242394][T14560] R13: 00007ffce5b23eff R14: 00007f6925d079c0 R15: 000000000118bf2c [ 172.297286][T14571] FAULT_INJECTION: forcing a failure. [ 172.297286][T14571] name failslab, interval 1, probability 0, space 0, times 0 [ 172.310188][T14571] CPU: 0 PID: 14571 Comm: syz-executor.2 Tainted: G W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 172.321710][T14571] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 172.331747][T14571] Call Trace: [ 172.335015][T14571] dump_stack+0x1b0/0x21e [ 172.339366][T14571] ? devkmsg_release+0x11c/0x11c [ 172.344269][T14571] ? show_regs_print_info+0x12/0x12 [ 172.349429][T14571] ? is_bpf_text_address+0x290/0x2b0 [ 172.354677][T14571] should_fail+0x6fb/0x860 [ 172.359055][T14571] ? setup_fault_attr+0x2b0/0x2b0 [ 172.364042][T14571] ? arch_stack_walk+0x98/0xe0 [ 172.368769][T14571] ? alloc_skb_with_frags+0xb1/0x580 [ 172.374046][T14571] should_failslab+0x5/0x20 [ 172.378522][T14571] __kmalloc_track_caller+0x5d/0x2b0 [ 172.383777][T14571] ? kmem_cache_alloc+0x1d5/0x250 [ 172.388783][T14571] ? alloc_skb_with_frags+0xb1/0x580 [ 172.394036][T14571] __alloc_skb+0xd1/0x4d0 [ 172.398332][T14571] alloc_skb_with_frags+0xb1/0x580 [ 172.403410][T14571] ? __kasan_kmalloc+0x179/0x1b0 [ 172.408314][T14571] sock_alloc_send_pskb+0x87e/0xcc0 [ 172.413478][T14571] ? ip_route_output_flow+0x150/0x2a0 [ 172.418827][T14571] ? udp_sendmsg+0x1731/0x2e80 [ 172.423573][T14571] ? sock_kzfree_s+0x50/0x50 [ 172.428228][T14571] ? __rcu_read_lock+0x50/0x50 [ 172.432973][T14571] ? xfrm_selector_match+0xa71/0xf00 [ 172.438227][T14571] __ip_append_data+0x1fbd/0x31b0 [ 172.443228][T14571] ? dst_alloc+0x137/0x4f0 [ 172.447611][T14571] ? ip_do_fragment+0x2290/0x2290 [ 172.452603][T14571] ? __xfrm_sk_clone_policy+0xac0/0xac0 [ 172.458200][T14571] ? ip_setup_cork+0x810/0x810 [ 172.462926][T14571] ? ipv4_mtu+0x212/0x2c0 [ 172.467219][T14571] ? ip_setup_cork+0x46b/0x810 [ 172.471947][T14571] ? ip_route_output_key_hash_rcu+0x41b/0xf90 [ 172.477977][T14571] ip_make_skb+0x1c9/0x4d0 [ 172.482369][T14571] ? ip_do_fragment+0x2290/0x2290 [ 172.487357][T14571] ? ip_flush_pending_frames+0x2e0/0x2e0 [ 172.492969][T14571] ? __rcu_read_lock+0x50/0x50 [ 172.497696][T14571] udp_sendmsg+0x1d1b/0x2e80 [ 172.502255][T14571] ? ip_do_fragment+0x2290/0x2290 [ 172.507244][T14571] ? udp_cmsg_send+0x340/0x340 [ 172.511974][T14571] ? selinux_socket_sendmsg+0x10b/0x320 [ 172.517480][T14571] ? selinux_socket_accept+0x580/0x580 [ 172.522904][T14571] ? rw_copy_check_uvector+0x6b/0x310 [ 172.528238][T14571] ? inet_send_prepare+0x1b7/0x470 [ 172.533326][T14571] ? inet_send_prepare+0x470/0x470 [ 172.538405][T14571] ____sys_sendmsg+0x56f/0x860 [ 172.543139][T14571] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 172.548301][T14571] ? udp_sendmsg+0x75b/0x2e80 [ 172.552957][T14571] ? __sys_sendmmsg+0x46f/0x680 [ 172.557774][T14571] __sys_sendmmsg+0x338/0x680 [ 172.562433][T14571] ? __ia32_sys_sendmsg+0x90/0x90 [ 172.567421][T14571] ? __rcu_read_lock+0x50/0x50 [ 172.572148][T14571] ? __kasan_slab_free+0x1e2/0x220 [ 172.577220][T14571] ? __kasan_slab_free+0x168/0x220 [ 172.582301][T14571] ? slab_free_freelist_hook+0xd0/0x150 [ 172.587861][T14571] ? kmem_cache_free+0xac/0x5c0 [ 172.592687][T14571] ? do_sys_open+0x4a3/0x620 [ 172.597243][T14571] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 172.603273][T14571] ? do_sys_open+0x2fc/0x620 [ 172.607825][T14571] ? proc_fail_nth_write+0x166/0x200 [ 172.613070][T14571] ? proc_fail_nth_read+0x1c0/0x1c0 [ 172.618225][T14571] ? memset+0x1f/0x40 [ 172.622170][T14571] ? selinux_socket_setsockopt+0x10b/0x340 [ 172.627952][T14571] ? proc_fail_nth_read+0x1c0/0x1c0 [ 172.633113][T14571] ? memset+0x1f/0x40 [ 172.637059][T14571] ? fsnotify+0x13a0/0x1460 [ 172.641526][T14571] ? __kernel_write+0x340/0x340 [ 172.646340][T14571] ? fsnotify+0x13a0/0x1460 [ 172.650809][T14571] ? security_file_permission+0x128/0x300 [ 172.656492][T14571] ? __sb_end_write+0xa4/0xf0 [ 172.661133][T14571] ? vfs_write+0x427/0x4f0 [ 172.665510][T14571] ? ksys_write+0x237/0x2a0 [ 172.669986][T14571] ? __ia32_sys_read+0x80/0x80 [ 172.674715][T14571] __x64_sys_sendmmsg+0x9c/0xb0 [ 172.679531][T14571] do_syscall_64+0xcb/0x150 [ 172.684001][T14571] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 172.689863][T14571] RIP: 0033:0x45de29 [ 172.693726][T14571] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 172.713294][T14571] RSP: 002b:00007f6925d06c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 172.721669][T14571] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de29 [ 172.729608][T14571] RDX: 000000000800001d RSI: 0000000020007fc0 RDI: 0000000000000003 [ 172.737541][T14571] RBP: 00007f6925d06ca0 R08: 0000000000000000 R09: 0000000000000000 08:49:53 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x58, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:49:54 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC=r0, @ANYRESDEC, @ANYRESDEC], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:49:54 executing program 2 (fault-call:7 fault-nth:36): r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) [ 172.745477][T14571] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000023 [ 172.753413][T14571] R13: 00007ffce5b23eff R14: 00007f6925d079c0 R15: 000000000118bf2c 08:49:54 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:49:54 executing program 0 (fault-call:9 fault-nth:0): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) [ 172.824123][T14585] FAULT_INJECTION: forcing a failure. [ 172.824123][T14585] name failslab, interval 1, probability 0, space 0, times 0 [ 172.852562][T14585] CPU: 1 PID: 14585 Comm: syz-executor.2 Tainted: G W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 172.864188][T14585] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 172.874224][T14585] Call Trace: [ 172.877502][T14585] dump_stack+0x1b0/0x21e [ 172.881813][T14585] ? devkmsg_release+0x11c/0x11c [ 172.886734][T14585] ? show_regs_print_info+0x12/0x12 [ 172.891936][T14585] should_fail+0x6fb/0x860 [ 172.896338][T14585] ? setup_fault_attr+0x2b0/0x2b0 [ 172.901350][T14585] ? skb_clone+0x1b2/0x370 [ 172.905750][T14585] should_failslab+0x5/0x20 [ 172.910240][T14585] kmem_cache_alloc+0x36/0x250 [ 172.914991][T14585] skb_clone+0x1b2/0x370 [ 172.918494][T14592] FAULT_INJECTION: forcing a failure. [ 172.918494][T14592] name failslab, interval 1, probability 0, space 0, times 0 [ 172.919213][T14585] ip_mc_output+0x1ce/0xab0 [ 172.919227][T14585] ? nf_nat_ipv4_local_fn+0x2c2/0x4e0 [ 172.941591][T14585] ? ip_build_and_send_pkt+0x9d0/0x9d0 [ 172.947030][T14585] ? nf_hook_slow+0x1a6/0x1f0 [ 172.951699][T14585] ? __ip_local_out+0x347/0x4a0 [ 172.956522][T14585] ? ip_send_check+0xd0/0xd0 [ 172.961086][T14585] ? __ip_local_out+0x4a0/0x4a0 [ 172.965917][T14585] ? csum_partial+0x379/0x470 [ 172.970562][T14585] ip_send_skb+0xaa/0x140 [ 172.974861][T14585] udp_send_skb+0x8e9/0x1100 [ 172.979420][T14585] udp_sendmsg+0x1d45/0x2e80 [ 172.983981][T14585] ? ip_do_fragment+0x2290/0x2290 [ 172.988973][T14585] ? udp_cmsg_send+0x340/0x340 [ 172.993708][T14585] ? selinux_socket_sendmsg+0x10b/0x320 [ 172.999218][T14585] ? selinux_socket_accept+0x580/0x580 [ 173.004658][T14585] ? rw_copy_check_uvector+0x6b/0x310 [ 173.009999][T14585] ? inet_send_prepare+0x1b7/0x470 [ 173.015099][T14585] ? inet_send_prepare+0x470/0x470 [ 173.020183][T14585] ____sys_sendmsg+0x56f/0x860 [ 173.024916][T14585] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 173.030079][T14585] ? udp_sendmsg+0x75b/0x2e80 [ 173.034725][T14585] ? __sys_sendmmsg+0x46f/0x680 [ 173.039543][T14585] __sys_sendmmsg+0x338/0x680 [ 173.044199][T14585] ? __ia32_sys_sendmsg+0x90/0x90 [ 173.049192][T14585] ? __rcu_read_lock+0x50/0x50 [ 173.053930][T14585] ? __kasan_slab_free+0x1e2/0x220 [ 173.059010][T14585] ? __kasan_slab_free+0x168/0x220 [ 173.064090][T14585] ? slab_free_freelist_hook+0xd0/0x150 [ 173.069690][T14585] ? kmem_cache_free+0xac/0x5c0 [ 173.074506][T14585] ? do_sys_open+0x4a3/0x620 [ 173.079064][T14585] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 173.085128][T14585] ? do_sys_open+0x2fc/0x620 [ 173.089715][T14585] ? proc_fail_nth_write+0x166/0x200 [ 173.094968][T14585] ? proc_fail_nth_read+0x1c0/0x1c0 [ 173.100134][T14585] ? memset+0x1f/0x40 [ 173.104083][T14585] ? selinux_socket_setsockopt+0x10b/0x340 [ 173.109853][T14585] ? proc_fail_nth_read+0x1c0/0x1c0 [ 173.115019][T14585] ? memset+0x1f/0x40 [ 173.118968][T14585] ? fsnotify+0x13a0/0x1460 [ 173.123439][T14585] ? __kernel_write+0x340/0x340 [ 173.128261][T14585] ? fsnotify+0x13a0/0x1460 [ 173.132746][T14585] ? security_file_permission+0x128/0x300 [ 173.138444][T14585] ? __sb_end_write+0xa4/0xf0 [ 173.143088][T14585] ? vfs_write+0x427/0x4f0 [ 173.147472][T14585] ? ksys_write+0x237/0x2a0 [ 173.151940][T14585] ? __ia32_sys_read+0x80/0x80 [ 173.156671][T14585] __x64_sys_sendmmsg+0x9c/0xb0 [ 173.161489][T14585] do_syscall_64+0xcb/0x150 [ 173.165959][T14585] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 173.171818][T14585] RIP: 0033:0x45de29 [ 173.175679][T14585] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 173.195256][T14585] RSP: 002b:00007f6925d06c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 173.203640][T14585] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de29 [ 173.211582][T14585] RDX: 000000000800001d RSI: 0000000020007fc0 RDI: 0000000000000003 08:49:54 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x14, 0x2, 0x0, 0x1, [@vti_common_policy=[@IFLA_VTI_IKEY={0x8}, @IFLA_VTI_LINK={0x8, 0x1, r4}]]}}}]}, 0x40}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 173.219523][T14585] RBP: 00007f6925d06ca0 R08: 0000000000000000 R09: 0000000000000000 [ 173.227463][T14585] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000024 [ 173.235402][T14585] R13: 00007ffce5b23eff R14: 00007f6925d079c0 R15: 000000000118bf2c [ 173.243365][T14592] CPU: 0 PID: 14592 Comm: syz-executor.0 Tainted: G W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 173.254882][T14592] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 173.264919][T14592] Call Trace: [ 173.268201][T14592] dump_stack+0x1b0/0x21e [ 173.272513][T14592] ? devkmsg_release+0x11c/0x11c [ 173.277439][T14592] ? show_regs_print_info+0x12/0x12 [ 173.282613][T14592] ? avc_denied+0x1c0/0x1c0 [ 173.287110][T14592] should_fail+0x6fb/0x860 [ 173.291521][T14592] ? setup_fault_attr+0x2b0/0x2b0 [ 173.296537][T14592] ? avc_has_perm+0xbd/0x260 [ 173.301109][T14592] ? avc_has_perm+0x15f/0x260 [ 173.305767][T14592] ? alloc_pipe_info+0xa1/0x3a0 [ 173.310598][T14592] should_failslab+0x5/0x20 [ 173.315089][T14592] kmem_cache_alloc_trace+0x39/0x270 [ 173.320363][T14592] alloc_pipe_info+0xa1/0x3a0 [ 173.325022][T14592] splice_direct_to_actor+0x94e/0xb00 [ 173.330376][T14592] ? avc_has_perm+0xbd/0x260 [ 173.334946][T14592] ? match_file+0x120/0x120 [ 173.339415][T14592] ? avc_has_perm_noaudit+0x3f0/0x3f0 [ 173.344751][T14592] ? do_splice_direct+0x3d0/0x3d0 [ 173.349741][T14592] ? pipe_to_sendpage+0x300/0x300 [ 173.354737][T14592] ? security_file_permission+0x128/0x300 [ 173.360524][T14592] do_splice_direct+0x279/0x3d0 [ 173.365342][T14592] ? splice_direct_to_actor+0xb00/0xb00 [ 173.370855][T14592] ? security_file_permission+0x128/0x300 [ 173.376541][T14592] do_sendfile+0x89d/0x1110 [ 173.381018][T14592] ? compat_writev+0x390/0x390 [ 173.385748][T14592] ? security_file_permission+0x128/0x300 [ 173.391438][T14592] ? vfs_write+0x427/0x4f0 [ 173.395825][T14592] ? fput_many+0x42/0x1a0 [ 173.400123][T14592] __x64_sys_sendfile64+0x1ae/0x220 [ 173.405293][T14592] ? __ia32_sys_sendfile+0x240/0x240 [ 173.410550][T14592] do_syscall_64+0xcb/0x150 [ 173.415022][T14592] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 173.420883][T14592] RIP: 0033:0x45de29 [ 173.424749][T14592] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 173.444317][T14592] RSP: 002b:00007f5188e43c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 173.452690][T14592] RAX: ffffffffffffffda RBX: 0000000000027ec0 RCX: 000000000045de29 [ 173.460631][T14592] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 173.468719][T14592] RBP: 00007f5188e43ca0 R08: 0000000000000000 R09: 0000000000000000 08:49:54 executing program 2 (fault-call:7 fault-nth:37): r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 08:49:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, 0x0, 0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:49:54 executing program 1 (fault-call:9 fault-nth:0): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) [ 173.476658][T14592] R10: 0000000000200fc0 R11: 0000000000000246 R12: 0000000000000000 [ 173.484599][T14592] R13: 00007ffcf4eb413f R14: 00007f5188e449c0 R15: 000000000118bfd4 08:49:54 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) [ 173.552683][T14606] FAULT_INJECTION: forcing a failure. [ 173.552683][T14606] name failslab, interval 1, probability 0, space 0, times 0 [ 173.569827][T14606] CPU: 1 PID: 14606 Comm: syz-executor.2 Tainted: G W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 173.581358][T14606] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 173.591502][T14606] Call Trace: [ 173.594759][T14606] dump_stack+0x1b0/0x21e [ 173.599206][T14606] ? devkmsg_release+0x11c/0x11c [ 173.604115][T14606] ? show_regs_print_info+0x12/0x12 [ 173.609281][T14606] ? ip_finish_output2+0x936/0x1810 [ 173.614449][T14606] should_fail+0x6fb/0x860 [ 173.618839][T14606] ? setup_fault_attr+0x2b0/0x2b0 [ 173.623829][T14606] ? ip_fragment+0x210/0x210 [ 173.628387][T14606] ? dst_alloc+0x137/0x4f0 [ 173.632770][T14606] should_failslab+0x5/0x20 [ 173.637256][T14606] kmem_cache_alloc+0x36/0x250 [ 173.642001][T14606] dst_alloc+0x137/0x4f0 [ 173.646211][T14606] __mkroute_output+0xc94/0x1430 [ 173.651112][T14606] ? ip_route_output_key_hash_rcu+0xf90/0xf90 [ 173.657142][T14606] ? ip_route_output_key_hash_rcu+0x41b/0xf90 [ 173.663173][T14606] ip_route_output_flow+0x150/0x2a0 [ 173.668351][T14606] ? ip_send_skb+0x11e/0x140 [ 173.673102][T14606] ? ipv4_sk_update_pmtu+0x1d40/0x1d40 [ 173.678525][T14606] ? __rcu_read_lock+0x50/0x50 [ 173.683257][T14606] ? selinux_sk_getsecid+0x24/0xb0 [ 173.688345][T14606] udp_sendmsg+0x1731/0x2e80 [ 173.692902][T14606] ? ip_do_fragment+0x2290/0x2290 [ 173.697891][T14606] ? udp_cmsg_send+0x340/0x340 [ 173.702635][T14606] ? selinux_socket_sendmsg+0x10b/0x320 [ 173.708153][T14606] ? selinux_socket_accept+0x580/0x580 [ 173.713577][T14606] ? rw_copy_check_uvector+0x6b/0x310 [ 173.719002][T14606] ? import_iovec+0x171/0x340 [ 173.723653][T14606] ? inet_send_prepare+0x1b7/0x470 [ 173.728740][T14606] ? inet_send_prepare+0x470/0x470 [ 173.733824][T14606] ____sys_sendmsg+0x56f/0x860 [ 173.738552][T14606] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 173.743711][T14606] ? udp_sendmsg+0x75b/0x2e80 [ 173.748351][T14606] ? __sys_sendmmsg+0x46f/0x680 [ 173.753178][T14606] __sys_sendmmsg+0x338/0x680 [ 173.757819][T14606] ? __ia32_sys_sendmsg+0x90/0x90 [ 173.762807][T14606] ? __rcu_read_lock+0x50/0x50 [ 173.767647][T14606] ? __kasan_slab_free+0x1e2/0x220 [ 173.772720][T14606] ? __kasan_slab_free+0x168/0x220 [ 173.777915][T14606] ? slab_free_freelist_hook+0xd0/0x150 [ 173.783437][T14606] ? kmem_cache_free+0xac/0x5c0 [ 173.788281][T14606] ? do_sys_open+0x4a3/0x620 [ 173.792836][T14606] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 173.798868][T14606] ? do_sys_open+0x2fc/0x620 [ 173.803426][T14606] ? proc_fail_nth_write+0x166/0x200 [ 173.808702][T14606] ? proc_fail_nth_read+0x1c0/0x1c0 [ 173.813883][T14606] ? memset+0x1f/0x40 [ 173.817840][T14606] ? selinux_socket_setsockopt+0x10b/0x340 [ 173.823618][T14606] ? proc_fail_nth_read+0x1c0/0x1c0 [ 173.828794][T14606] ? memset+0x1f/0x40 [ 173.832757][T14606] ? fsnotify+0x13a0/0x1460 [ 173.837352][T14606] ? __kernel_write+0x340/0x340 [ 173.842169][T14606] ? fsnotify+0x13a0/0x1460 [ 173.846638][T14606] ? security_file_permission+0x128/0x300 [ 173.852339][T14606] ? __sb_end_write+0xa4/0xf0 [ 173.856979][T14606] ? vfs_write+0x427/0x4f0 [ 173.861371][T14606] ? ksys_write+0x237/0x2a0 [ 173.865836][T14606] ? __ia32_sys_read+0x80/0x80 [ 173.870564][T14606] __x64_sys_sendmmsg+0x9c/0xb0 [ 173.875378][T14606] do_syscall_64+0xcb/0x150 [ 173.879857][T14606] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 173.885724][T14606] RIP: 0033:0x45de29 [ 173.889597][T14606] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 173.909377][T14606] RSP: 002b:00007f6925d06c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 173.917838][T14606] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de29 [ 173.925900][T14606] RDX: 000000000800001d RSI: 0000000020007fc0 RDI: 0000000000000003 [ 173.933891][T14606] RBP: 00007f6925d06ca0 R08: 0000000000000000 R09: 0000000000000000 [ 173.941828][T14606] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000025 [ 173.949768][T14606] R13: 00007ffce5b23eff R14: 00007f6925d079c0 R15: 000000000118bf2c [ 173.963875][T14614] FAULT_INJECTION: forcing a failure. [ 173.963875][T14614] name failslab, interval 1, probability 0, space 0, times 0 [ 173.976972][T14614] CPU: 0 PID: 14614 Comm: syz-executor.1 Tainted: G W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 173.987318][T14616] FAULT_INJECTION: forcing a failure. [ 173.987318][T14616] name failslab, interval 1, probability 0, space 0, times 0 08:49:55 executing program 2 (fault-call:7 fault-nth:38): r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) [ 173.988494][T14614] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 173.988497][T14614] Call Trace: [ 173.988511][T14614] dump_stack+0x1b0/0x21e [ 173.988522][T14614] ? devkmsg_release+0x11c/0x11c [ 174.023667][T14614] ? show_regs_print_info+0x12/0x12 [ 174.028848][T14614] ? avc_denied+0x1c0/0x1c0 [ 174.033324][T14614] should_fail+0x6fb/0x860 [ 174.037708][T14614] ? setup_fault_attr+0x2b0/0x2b0 [ 174.042697][T14614] ? avc_has_perm+0xbd/0x260 [ 174.047252][T14614] ? avc_has_perm+0x15f/0x260 [ 174.051901][T14614] ? alloc_pipe_info+0xa1/0x3a0 [ 174.056726][T14614] should_failslab+0x5/0x20 [ 174.061235][T14614] kmem_cache_alloc_trace+0x39/0x270 [ 174.066490][T14614] alloc_pipe_info+0xa1/0x3a0 [ 174.071153][T14614] splice_direct_to_actor+0x94e/0xb00 [ 174.076501][T14614] ? avc_has_perm+0xbd/0x260 [ 174.081061][T14614] ? match_file+0x120/0x120 [ 174.085534][T14614] ? avc_has_perm_noaudit+0x3f0/0x3f0 [ 174.090894][T14614] ? do_splice_direct+0x3d0/0x3d0 [ 174.095925][T14614] ? pipe_to_sendpage+0x300/0x300 [ 174.100935][T14614] ? security_file_permission+0x128/0x300 [ 174.106632][T14614] do_splice_direct+0x279/0x3d0 [ 174.111458][T14614] ? splice_direct_to_actor+0xb00/0xb00 [ 174.116975][T14614] ? security_file_permission+0x128/0x300 [ 174.122666][T14614] do_sendfile+0x89d/0x1110 [ 174.127155][T14614] ? compat_writev+0x390/0x390 [ 174.131885][T14614] ? security_file_permission+0x128/0x300 [ 174.137578][T14614] ? vfs_write+0x427/0x4f0 [ 174.141987][T14614] ? fput_many+0x42/0x1a0 [ 174.146283][T14614] __x64_sys_sendfile64+0x1ae/0x220 [ 174.151452][T14614] ? __ia32_sys_sendfile+0x240/0x240 [ 174.156704][T14614] do_syscall_64+0xcb/0x150 [ 174.161175][T14614] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 174.167054][T14614] RIP: 0033:0x45de29 [ 174.170917][T14614] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 174.190499][T14614] RSP: 002b:00007fa46e013c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 08:49:55 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x14, 0x2, 0x0, 0x1, [@vti_common_policy=[@IFLA_VTI_IKEY={0x8}, @IFLA_VTI_LINK={0x8, 0x1, r4}]]}}}]}, 0x40}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 08:49:55 executing program 0 (fault-call:9 fault-nth:1): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:49:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, 0x0, 0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) [ 174.198879][T14614] RAX: ffffffffffffffda RBX: 0000000000027ec0 RCX: 000000000045de29 [ 174.206823][T14614] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 174.214777][T14614] RBP: 00007fa46e013ca0 R08: 0000000000000000 R09: 0000000000000000 [ 174.222729][T14614] R10: 0000000000200fc0 R11: 0000000000000246 R12: 0000000000000000 [ 174.230668][T14614] R13: 00007ffdeacd249f R14: 00007fa46e0149c0 R15: 000000000118bfd4 [ 174.267644][T14616] CPU: 1 PID: 14616 Comm: syz-executor.2 Tainted: G W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 174.279180][T14616] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 174.289207][T14616] Call Trace: [ 174.292470][T14616] dump_stack+0x1b0/0x21e [ 174.296767][T14616] ? devkmsg_release+0x11c/0x11c [ 174.301691][T14616] ? show_regs_print_info+0x12/0x12 [ 174.306905][T14616] ? is_bpf_text_address+0x290/0x2b0 [ 174.312170][T14616] should_fail+0x6fb/0x860 [ 174.316552][T14616] ? setup_fault_attr+0x2b0/0x2b0 [ 174.321545][T14616] ? arch_stack_walk+0x98/0xe0 [ 174.326275][T14616] ? __alloc_skb+0x88/0x4d0 [ 174.330746][T14616] should_failslab+0x5/0x20 [ 174.335226][T14616] kmem_cache_alloc+0x36/0x250 [ 174.339952][T14616] __alloc_skb+0x88/0x4d0 [ 174.344252][T14616] alloc_skb_with_frags+0xb1/0x580 [ 174.349330][T14616] ? __kasan_kmalloc+0x179/0x1b0 [ 174.354232][T14616] sock_alloc_send_pskb+0x87e/0xcc0 [ 174.359408][T14616] ? ip_route_output_flow+0x150/0x2a0 [ 174.364744][T14616] ? udp_sendmsg+0x1731/0x2e80 [ 174.369478][T14616] ? sock_kzfree_s+0x50/0x50 [ 174.374034][T14616] ? __rcu_read_lock+0x50/0x50 [ 174.378771][T14616] ? xfrm_selector_match+0xa71/0xf00 [ 174.384028][T14616] __ip_append_data+0x1fbd/0x31b0 [ 174.389021][T14616] ? dst_alloc+0x137/0x4f0 [ 174.393405][T14616] ? ip_do_fragment+0x2290/0x2290 [ 174.398399][T14616] ? __xfrm_sk_clone_policy+0xac0/0xac0 [ 174.403913][T14616] ? ip_setup_cork+0x810/0x810 [ 174.408645][T14616] ? ipv4_mtu+0x212/0x2c0 [ 174.412943][T14616] ? ip_setup_cork+0x46b/0x810 [ 174.417759][T14616] ? ip_route_output_key_hash_rcu+0x41b/0xf90 [ 174.423789][T14616] ip_make_skb+0x1c9/0x4d0 [ 174.428178][T14616] ? ip_do_fragment+0x2290/0x2290 [ 174.433170][T14616] ? ip_flush_pending_frames+0x2e0/0x2e0 [ 174.438770][T14616] ? __rcu_read_lock+0x50/0x50 [ 174.443499][T14616] udp_sendmsg+0x1d1b/0x2e80 [ 174.448091][T14616] ? ip_do_fragment+0x2290/0x2290 [ 174.453081][T14616] ? udp_cmsg_send+0x340/0x340 [ 174.457812][T14616] ? selinux_socket_sendmsg+0x10b/0x320 [ 174.463325][T14616] ? selinux_socket_accept+0x580/0x580 [ 174.468756][T14616] ? rw_copy_check_uvector+0x6b/0x310 [ 174.474110][T14616] ? inet_send_prepare+0x1b7/0x470 [ 174.479194][T14616] ? inet_send_prepare+0x470/0x470 [ 174.484274][T14616] ____sys_sendmsg+0x56f/0x860 [ 174.489006][T14616] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 174.494170][T14616] ? udp_sendmsg+0x75b/0x2e80 [ 174.498812][T14616] ? __sys_sendmmsg+0x46f/0x680 [ 174.503629][T14616] __sys_sendmmsg+0x338/0x680 [ 174.508299][T14616] ? __ia32_sys_sendmsg+0x90/0x90 [ 174.513288][T14616] ? __rcu_read_lock+0x50/0x50 [ 174.518014][T14616] ? __kasan_slab_free+0x1e2/0x220 [ 174.523086][T14616] ? __kasan_slab_free+0x168/0x220 [ 174.528164][T14616] ? slab_free_freelist_hook+0xd0/0x150 [ 174.533708][T14616] ? kmem_cache_free+0xac/0x5c0 [ 174.538522][T14616] ? do_sys_open+0x4a3/0x620 [ 174.543075][T14616] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 174.549105][T14616] ? do_sys_open+0x2fc/0x620 [ 174.553661][T14616] ? proc_fail_nth_write+0x166/0x200 [ 174.558915][T14616] ? proc_fail_nth_read+0x1c0/0x1c0 [ 174.564080][T14616] ? memset+0x1f/0x40 [ 174.568027][T14616] ? selinux_socket_setsockopt+0x10b/0x340 [ 174.573799][T14616] ? proc_fail_nth_read+0x1c0/0x1c0 [ 174.578963][T14616] ? memset+0x1f/0x40 [ 174.582919][T14616] ? fsnotify+0x13a0/0x1460 [ 174.587390][T14616] ? __kernel_write+0x340/0x340 [ 174.592205][T14616] ? fsnotify+0x13a0/0x1460 [ 174.596677][T14616] ? security_file_permission+0x128/0x300 [ 174.602359][T14616] ? __sb_end_write+0xa4/0xf0 [ 174.607000][T14616] ? vfs_write+0x427/0x4f0 [ 174.611393][T14616] ? ksys_write+0x237/0x2a0 [ 174.615863][T14616] ? __ia32_sys_read+0x80/0x80 [ 174.620596][T14616] __x64_sys_sendmmsg+0x9c/0xb0 [ 174.625415][T14616] do_syscall_64+0xcb/0x150 [ 174.629892][T14616] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 174.635748][T14616] RIP: 0033:0x45de29 [ 174.639628][T14616] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 174.659201][T14616] RSP: 002b:00007f6925d06c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 174.667576][T14616] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de29 [ 174.675550][T14616] RDX: 000000000800001d RSI: 0000000020007fc0 RDI: 0000000000000003 [ 174.683489][T14616] RBP: 00007f6925d06ca0 R08: 0000000000000000 R09: 0000000000000000 [ 174.691430][T14616] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000026 [ 174.699369][T14616] R13: 00007ffce5b23eff R14: 00007f6925d079c0 R15: 000000000118bf2c [ 174.713046][T14622] FAULT_INJECTION: forcing a failure. 08:49:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, 0x0, 0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) [ 174.713046][T14622] name failslab, interval 1, probability 0, space 0, times 0 [ 174.737154][T14622] CPU: 0 PID: 14622 Comm: syz-executor.0 Tainted: G W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 174.748713][T14622] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 174.758767][T14622] Call Trace: [ 174.762050][T14622] dump_stack+0x1b0/0x21e 08:49:55 executing program 1 (fault-call:9 fault-nth:1): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:49:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:49:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) [ 174.766363][T14622] ? devkmsg_release+0x11c/0x11c [ 174.771289][T14622] ? avc_has_perm_noaudit+0x2fc/0x3f0 [ 174.776663][T14622] ? show_regs_print_info+0x12/0x12 [ 174.781848][T14622] ? avc_denied+0x1c0/0x1c0 [ 174.786342][T14622] should_fail+0x6fb/0x860 [ 174.790759][T14622] ? setup_fault_attr+0x2b0/0x2b0 [ 174.795766][T14622] ? setup_fault_attr+0x2b0/0x2b0 [ 174.800790][T14622] ? ___slab_alloc+0x9b/0x450 [ 174.805448][T14622] ? avc_has_perm+0x15f/0x260 [ 174.810107][T14622] ? kcalloc+0x32/0x60 [ 174.814161][T14622] should_failslab+0x5/0x20 08:49:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:49:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) [ 174.818651][T14622] __kmalloc+0x5f/0x2c0 [ 174.822789][T14622] ? kmem_cache_alloc_trace+0xc3/0x270 [ 174.828228][T14622] kcalloc+0x32/0x60 [ 174.832116][T14622] alloc_pipe_info+0x1b9/0x3a0 [ 174.833814][T14637] FAULT_INJECTION: forcing a failure. [ 174.833814][T14637] name failslab, interval 1, probability 0, space 0, times 0 [ 174.836872][T14622] splice_direct_to_actor+0x94e/0xb00 [ 174.836880][T14622] ? avc_has_perm+0xbd/0x260 [ 174.836891][T14622] ? match_file+0x120/0x120 [ 174.863845][T14622] ? avc_has_perm_noaudit+0x3f0/0x3f0 08:49:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) [ 174.869194][T14622] ? do_splice_direct+0x3d0/0x3d0 [ 174.874190][T14622] ? pipe_to_sendpage+0x300/0x300 [ 174.879193][T14622] ? security_file_permission+0x128/0x300 [ 174.884931][T14622] do_splice_direct+0x279/0x3d0 [ 174.889771][T14622] ? splice_direct_to_actor+0xb00/0xb00 [ 174.895298][T14622] ? security_file_permission+0x128/0x300 [ 174.900987][T14622] do_sendfile+0x89d/0x1110 [ 174.905467][T14622] ? compat_writev+0x390/0x390 [ 174.910210][T14622] ? security_file_permission+0x128/0x300 [ 174.915909][T14622] ? vfs_write+0x427/0x4f0 [ 174.920302][T14622] ? fput_many+0x42/0x1a0 [ 174.924621][T14622] __x64_sys_sendfile64+0x1ae/0x220 [ 174.929786][T14622] ? __ia32_sys_sendfile+0x240/0x240 [ 174.935039][T14622] do_syscall_64+0xcb/0x150 [ 174.939509][T14622] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 174.945372][T14622] RIP: 0033:0x45de29 [ 174.949240][T14622] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 174.968817][T14622] RSP: 002b:00007f5188e64c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 174.977268][T14622] RAX: ffffffffffffffda RBX: 0000000000027ec0 RCX: 000000000045de29 [ 174.985208][T14622] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 174.993149][T14622] RBP: 00007f5188e64ca0 R08: 0000000000000000 R09: 0000000000000000 [ 175.001087][T14622] R10: 0000000000200fc0 R11: 0000000000000246 R12: 0000000000000001 [ 175.009116][T14622] R13: 00007ffcf4eb413f R14: 00007f5188e659c0 R15: 000000000118bf2c 08:49:56 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) [ 175.017071][T14637] CPU: 1 PID: 14637 Comm: syz-executor.1 Tainted: G W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 175.028703][T14637] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 175.038754][T14637] Call Trace: [ 175.042045][T14637] dump_stack+0x1b0/0x21e [ 175.046358][T14637] ? devkmsg_release+0x11c/0x11c [ 175.051279][T14637] ? show_regs_print_info+0x12/0x12 [ 175.056450][T14637] ? avc_denied+0x1c0/0x1c0 [ 175.060982][T14637] should_fail+0x6fb/0x860 [ 175.065368][T14637] ? setup_fault_attr+0x2b0/0x2b0 [ 175.070357][T14637] ? setup_fault_attr+0x2b0/0x2b0 [ 175.075352][T14637] ? avc_has_perm+0xbd/0x260 [ 175.080063][T14637] ? avc_has_perm+0x15f/0x260 [ 175.084705][T14637] ? kcalloc+0x32/0x60 [ 175.088767][T14637] should_failslab+0x5/0x20 [ 175.093249][T14637] __kmalloc+0x5f/0x2c0 [ 175.097372][T14637] ? kmem_cache_alloc_trace+0xc3/0x270 [ 175.102829][T14637] kcalloc+0x32/0x60 [ 175.106689][T14637] alloc_pipe_info+0x1b9/0x3a0 [ 175.111434][T14637] splice_direct_to_actor+0x94e/0xb00 [ 175.116790][T14637] ? avc_has_perm+0xbd/0x260 [ 175.121389][T14637] ? match_file+0x120/0x120 [ 175.125864][T14637] ? avc_has_perm_noaudit+0x3f0/0x3f0 [ 175.131203][T14637] ? do_splice_direct+0x3d0/0x3d0 [ 175.136213][T14637] ? pipe_to_sendpage+0x300/0x300 [ 175.141201][T14637] ? security_file_permission+0x128/0x300 [ 175.146912][T14637] do_splice_direct+0x279/0x3d0 [ 175.151723][T14637] ? splice_direct_to_actor+0xb00/0xb00 [ 175.157234][T14637] ? security_file_permission+0x128/0x300 [ 175.162942][T14637] do_sendfile+0x89d/0x1110 [ 175.167411][T14637] ? compat_writev+0x390/0x390 [ 175.172137][T14637] ? security_file_permission+0x128/0x300 [ 175.177818][T14637] ? vfs_write+0x427/0x4f0 [ 175.182198][T14637] ? fput_many+0x42/0x1a0 [ 175.186493][T14637] __x64_sys_sendfile64+0x1ae/0x220 [ 175.191655][T14637] ? __ia32_sys_sendfile+0x240/0x240 [ 175.196905][T14637] do_syscall_64+0xcb/0x150 [ 175.201394][T14637] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 175.207261][T14637] RIP: 0033:0x45de29 [ 175.211121][T14637] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 175.230696][T14637] RSP: 002b:00007fa46e034c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 175.239070][T14637] RAX: ffffffffffffffda RBX: 0000000000027ec0 RCX: 000000000045de29 [ 175.247011][T14637] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 175.255046][T14637] RBP: 00007fa46e034ca0 R08: 0000000000000000 R09: 0000000000000000 [ 175.263086][T14637] R10: 0000000000200fc0 R11: 0000000000000246 R12: 0000000000000001 08:49:56 executing program 2 (fault-call:7 fault-nth:39): r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) [ 175.271046][T14637] R13: 00007ffdeacd249f R14: 00007fa46e0359c0 R15: 000000000118bf2c [ 175.325172][T14651] FAULT_INJECTION: forcing a failure. [ 175.325172][T14651] name failslab, interval 1, probability 0, space 0, times 0 [ 175.338253][T14651] CPU: 0 PID: 14651 Comm: syz-executor.2 Tainted: G W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 175.349800][T14651] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 175.359866][T14651] Call Trace: [ 175.363163][T14651] dump_stack+0x1b0/0x21e [ 175.367495][T14651] ? devkmsg_release+0x11c/0x11c [ 175.372408][T14651] ? show_regs_print_info+0x12/0x12 [ 175.377618][T14651] ? is_bpf_text_address+0x290/0x2b0 [ 175.382874][T14651] should_fail+0x6fb/0x860 [ 175.387263][T14651] ? setup_fault_attr+0x2b0/0x2b0 [ 175.392264][T14651] ? arch_stack_walk+0x98/0xe0 [ 175.397003][T14651] ? alloc_skb_with_frags+0xb1/0x580 [ 175.402252][T14651] should_failslab+0x5/0x20 [ 175.406725][T14651] __kmalloc_track_caller+0x5d/0x2b0 [ 175.411977][T14651] ? kmem_cache_alloc+0x1d5/0x250 [ 175.416977][T14651] ? alloc_skb_with_frags+0xb1/0x580 [ 175.422250][T14651] __alloc_skb+0xd1/0x4d0 [ 175.426548][T14651] alloc_skb_with_frags+0xb1/0x580 [ 175.431625][T14651] ? __kasan_kmalloc+0x179/0x1b0 [ 175.436527][T14651] sock_alloc_send_pskb+0x87e/0xcc0 [ 175.441691][T14651] ? ip_route_output_flow+0x150/0x2a0 [ 175.447029][T14651] ? udp_sendmsg+0x1731/0x2e80 [ 175.451886][T14651] ? sock_kzfree_s+0x50/0x50 [ 175.456446][T14651] ? __rcu_read_lock+0x50/0x50 [ 175.461185][T14651] ? xfrm_selector_match+0xa71/0xf00 [ 175.466438][T14651] __ip_append_data+0x1fbd/0x31b0 [ 175.471433][T14651] ? dst_alloc+0x137/0x4f0 [ 175.475819][T14651] ? ip_do_fragment+0x2290/0x2290 [ 175.480819][T14651] ? __xfrm_sk_clone_policy+0xac0/0xac0 [ 175.486330][T14651] ? ip_setup_cork+0x810/0x810 [ 175.491058][T14651] ? ipv4_mtu+0x212/0x2c0 [ 175.495479][T14651] ? ip_setup_cork+0x46b/0x810 [ 175.500330][T14651] ? ip_route_output_key_hash_rcu+0x41b/0xf90 [ 175.506359][T14651] ip_make_skb+0x1c9/0x4d0 [ 175.510740][T14651] ? ip_do_fragment+0x2290/0x2290 [ 175.515729][T14651] ? ip_flush_pending_frames+0x2e0/0x2e0 [ 175.521353][T14651] ? __rcu_read_lock+0x50/0x50 [ 175.526093][T14651] udp_sendmsg+0x1d1b/0x2e80 [ 175.530663][T14651] ? ip_do_fragment+0x2290/0x2290 [ 175.535668][T14651] ? udp_cmsg_send+0x340/0x340 [ 175.540425][T14651] ? selinux_socket_sendmsg+0x10b/0x320 [ 175.545951][T14651] ? selinux_socket_accept+0x580/0x580 [ 175.551396][T14651] ? rw_copy_check_uvector+0x6b/0x310 [ 175.556766][T14651] ? inet_send_prepare+0x1b7/0x470 [ 175.561858][T14651] ? inet_send_prepare+0x470/0x470 [ 175.566941][T14651] ____sys_sendmsg+0x56f/0x860 [ 175.571677][T14651] ? __sys_sendmsg_sock+0x2a0/0x2a0 [ 175.576843][T14651] ? udp_sendmsg+0x75b/0x2e80 [ 175.581485][T14651] ? __sys_sendmmsg+0x46f/0x680 [ 175.586301][T14651] __sys_sendmmsg+0x338/0x680 [ 175.590944][T14651] ? __ia32_sys_sendmsg+0x90/0x90 [ 175.595935][T14651] ? __rcu_read_lock+0x50/0x50 [ 175.600680][T14651] ? __kasan_slab_free+0x1e2/0x220 [ 175.605841][T14651] ? __kasan_slab_free+0x168/0x220 [ 175.610922][T14651] ? slab_free_freelist_hook+0xd0/0x150 [ 175.616556][T14651] ? kmem_cache_free+0xac/0x5c0 [ 175.621383][T14651] ? do_sys_open+0x4a3/0x620 [ 175.626046][T14651] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 175.632096][T14651] ? do_sys_open+0x2fc/0x620 [ 175.636650][T14651] ? proc_fail_nth_write+0x166/0x200 [ 175.641902][T14651] ? proc_fail_nth_read+0x1c0/0x1c0 [ 175.647067][T14651] ? memset+0x1f/0x40 [ 175.651017][T14651] ? selinux_socket_setsockopt+0x10b/0x340 [ 175.656787][T14651] ? proc_fail_nth_read+0x1c0/0x1c0 [ 175.661952][T14651] ? memset+0x1f/0x40 [ 175.665903][T14651] ? fsnotify+0x13a0/0x1460 [ 175.670378][T14651] ? __kernel_write+0x340/0x340 [ 175.675208][T14651] ? fsnotify+0x13a0/0x1460 [ 175.679679][T14651] ? security_file_permission+0x128/0x300 [ 175.685377][T14651] ? __sb_end_write+0xa4/0xf0 [ 175.690020][T14651] ? vfs_write+0x427/0x4f0 [ 175.694404][T14651] ? ksys_write+0x237/0x2a0 [ 175.698875][T14651] ? __ia32_sys_read+0x80/0x80 [ 175.703608][T14651] __x64_sys_sendmmsg+0x9c/0xb0 [ 175.708427][T14651] do_syscall_64+0xcb/0x150 [ 175.712901][T14651] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 175.718764][T14651] RIP: 0033:0x45de29 [ 175.722627][T14651] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 175.742223][T14651] RSP: 002b:00007f6925d06c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 175.750598][T14651] RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de29 [ 175.758538][T14651] RDX: 000000000800001d RSI: 0000000020007fc0 RDI: 0000000000000003 [ 175.766488][T14651] RBP: 00007f6925d06ca0 R08: 0000000000000000 R09: 0000000000000000 08:49:56 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, 0x0, &(0x7f0000000200)) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x14, 0x2, 0x0, 0x1, [@vti_common_policy=[@IFLA_VTI_IKEY={0x8}, @IFLA_VTI_LINK={0x8}]]}}}]}, 0x40}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 08:49:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:49:56 executing program 0 (fault-call:9 fault-nth:2): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:49:56 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x40, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:49:56 executing program 1 (fault-call:9 fault-nth:2): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) [ 175.774428][T14651] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000027 [ 175.782371][T14651] R13: 00007ffce5b23eff R14: 00007f6925d079c0 R15: 000000000118bf2c [ 175.816641][T14664] FAULT_INJECTION: forcing a failure. 08:49:57 executing program 2 (fault-call:7 fault-nth:40): r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) [ 175.816641][T14664] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 175.828094][T14666] FAULT_INJECTION: forcing a failure. [ 175.828094][T14666] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 175.849144][T14666] CPU: 1 PID: 14666 Comm: syz-executor.0 Tainted: G W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 175.860677][T14666] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 175.870712][T14666] Call Trace: [ 175.873988][T14666] dump_stack+0x1b0/0x21e [ 175.878298][T14666] ? devkmsg_release+0x11c/0x11c [ 175.883208][T14666] ? show_regs_print_info+0x12/0x12 [ 175.888381][T14666] ? unwind_get_return_address_ptr+0x130/0x130 [ 175.894542][T14666] should_fail+0x6fb/0x860 [ 175.898926][T14666] ? setup_fault_attr+0x2b0/0x2b0 [ 175.903921][T14666] __alloc_pages_nodemask+0x1ee/0x7c0 [ 175.909265][T14666] ? xas_load+0x46f/0x4c0 [ 175.913580][T14666] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 175.919097][T14666] ? find_get_entry+0x5da/0x670 [ 175.923916][T14666] ? xa_load+0x323/0x340 [ 175.928237][T14666] __do_page_cache_readahead+0x244/0x510 [ 175.933862][T14666] ? read_cache_pages_invalidate_page+0x1b0/0x1b0 [ 175.940346][T14666] ? unwind_next_frame+0x1c07/0x22b0 [ 175.945597][T14666] ? page_cache_sync_readahead+0xa3/0x3c0 [ 175.951389][T14666] generic_file_read_iter+0x626/0x20a0 [ 175.956823][T14666] ? find_get_pages_range_tag+0xae0/0xae0 [ 175.962513][T14666] ? avc_has_perm_noaudit+0x2fc/0x3f0 [ 175.967852][T14666] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 175.973881][T14666] ? avc_denied+0x1c0/0x1c0 [ 175.978367][T14666] generic_file_splice_read+0x491/0x780 [ 175.983877][T14666] ? splice_shrink_spd+0xb0/0xb0 [ 175.988792][T14666] ? security_file_permission+0x1e9/0x300 [ 175.994477][T14666] ? splice_shrink_spd+0xb0/0xb0 [ 175.999382][T14666] splice_direct_to_actor+0x3cf/0xb00 [ 176.004722][T14666] ? do_splice_direct+0x3d0/0x3d0 [ 176.009711][T14666] ? pipe_to_sendpage+0x300/0x300 [ 176.014720][T14666] ? security_file_permission+0x128/0x300 [ 176.020404][T14666] do_splice_direct+0x279/0x3d0 [ 176.025223][T14666] ? splice_direct_to_actor+0xb00/0xb00 [ 176.030738][T14666] ? security_file_permission+0x128/0x300 [ 176.036430][T14666] do_sendfile+0x89d/0x1110 [ 176.040910][T14666] ? compat_writev+0x390/0x390 [ 176.045643][T14666] ? security_file_permission+0x128/0x300 [ 176.051476][T14666] ? vfs_write+0x427/0x4f0 [ 176.056000][T14666] ? fput_many+0x42/0x1a0 [ 176.060318][T14666] __x64_sys_sendfile64+0x1ae/0x220 [ 176.065485][T14666] ? __ia32_sys_sendfile+0x240/0x240 [ 176.070738][T14666] do_syscall_64+0xcb/0x150 [ 176.075255][T14666] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 176.081124][T14666] RIP: 0033:0x45de29 [ 176.084988][T14666] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 176.104565][T14666] RSP: 002b:00007f5188e64c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 176.112951][T14666] RAX: ffffffffffffffda RBX: 0000000000027ec0 RCX: 000000000045de29 [ 176.120889][T14666] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 176.128839][T14666] RBP: 00007f5188e64ca0 R08: 0000000000000000 R09: 0000000000000000 [ 176.136898][T14666] R10: 0000000000200fc0 R11: 0000000000000246 R12: 0000000000000002 [ 176.144852][T14666] R13: 00007ffcf4eb413f R14: 00007f5188e659c0 R15: 000000000118bf2c [ 176.152823][T14664] CPU: 0 PID: 14664 Comm: syz-executor.1 Tainted: G W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 176.164350][T14664] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 176.174391][T14664] Call Trace: [ 176.177660][T14664] dump_stack+0x1b0/0x21e [ 176.181974][T14664] ? devkmsg_release+0x11c/0x11c [ 176.186891][T14664] ? show_regs_print_info+0x12/0x12 [ 176.192086][T14664] ? unwind_get_return_address_ptr+0x130/0x130 [ 176.198223][T14664] should_fail+0x6fb/0x860 [ 176.202625][T14664] ? setup_fault_attr+0x2b0/0x2b0 [ 176.207630][T14664] __alloc_pages_nodemask+0x1ee/0x7c0 [ 176.212985][T14664] ? xas_load+0x46f/0x4c0 [ 176.217300][T14664] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 176.222848][T14664] ? find_get_entry+0x5da/0x670 08:49:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(0x0, 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:49:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(0x0, 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:49:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(0x0, 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) [ 176.227681][T14664] ? xa_load+0x323/0x340 [ 176.231922][T14664] __do_page_cache_readahead+0x244/0x510 [ 176.237537][T14664] ? read_cache_pages_invalidate_page+0x1b0/0x1b0 [ 176.243934][T14664] ? unwind_next_frame+0x1c07/0x22b0 [ 176.249202][T14664] ? page_cache_sync_readahead+0xa3/0x3c0 [ 176.254903][T14664] generic_file_read_iter+0x626/0x20a0 [ 176.260346][T14664] ? find_get_pages_range_tag+0xae0/0xae0 [ 176.266080][T14664] ? avc_has_perm_noaudit+0x2fc/0x3f0 [ 176.271433][T14664] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 08:49:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x200fc0) 08:49:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x200fc0) [ 176.277482][T14664] ? avc_denied+0x1c0/0x1c0 [ 176.281975][T14664] generic_file_splice_read+0x491/0x780 [ 176.287550][T14664] ? splice_shrink_spd+0xb0/0xb0 [ 176.292476][T14664] ? security_file_permission+0x1e9/0x300 [ 176.298180][T14664] ? splice_shrink_spd+0xb0/0xb0 [ 176.303117][T14664] splice_direct_to_actor+0x3cf/0xb00 [ 176.308472][T14664] ? do_splice_direct+0x3d0/0x3d0 [ 176.313479][T14664] ? pipe_to_sendpage+0x300/0x300 [ 176.318492][T14664] ? security_file_permission+0x128/0x300 [ 176.324199][T14664] do_splice_direct+0x279/0x3d0 08:49:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x200fc0) [ 176.329041][T14664] ? splice_direct_to_actor+0xb00/0xb00 [ 176.334582][T14664] ? security_file_permission+0x128/0x300 [ 176.340297][T14664] do_sendfile+0x89d/0x1110 [ 176.344803][T14664] ? compat_writev+0x390/0x390 [ 176.349555][T14664] ? security_file_permission+0x128/0x300 [ 176.355260][T14664] ? vfs_write+0x427/0x4f0 [ 176.359656][T14664] ? fput_many+0x42/0x1a0 [ 176.363957][T14664] __x64_sys_sendfile64+0x1ae/0x220 [ 176.369122][T14664] ? __ia32_sys_sendfile+0x240/0x240 [ 176.374373][T14664] do_syscall_64+0xcb/0x150 [ 176.378894][T14664] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 176.384792][T14664] RIP: 0033:0x45de29 [ 176.388670][T14664] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 176.408242][T14664] RSP: 002b:00007fa46e034c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 176.416620][T14664] RAX: ffffffffffffffda RBX: 0000000000027ec0 RCX: 000000000045de29 [ 176.424557][T14664] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 176.432544][T14664] RBP: 00007fa46e034ca0 R08: 0000000000000000 R09: 0000000000000000 [ 176.440544][T14664] R10: 0000000000200fc0 R11: 0000000000000246 R12: 0000000000000002 [ 176.448482][T14664] R13: 00007ffdeacd249f R14: 00007fa46e0359c0 R15: 000000000118bf2c 08:49:57 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, 0x0, &(0x7f0000000200)) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x14, 0x2, 0x0, 0x1, [@vti_common_policy=[@IFLA_VTI_IKEY={0x8}, @IFLA_VTI_LINK={0x8}]]}}}]}, 0x40}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 08:49:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x200fc0) 08:49:57 executing program 0 (fault-call:9 fault-nth:3): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:49:57 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x40, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:49:57 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 08:49:57 executing program 1 (fault-call:9 fault-nth:3): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:49:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x200fc0) [ 176.663900][T14703] FAULT_INJECTION: forcing a failure. [ 176.663900][T14703] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 176.686126][T14702] FAULT_INJECTION: forcing a failure. [ 176.686126][T14702] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 176.705324][T14702] CPU: 1 PID: 14702 Comm: syz-executor.1 Tainted: G W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 176.716851][T14702] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 176.726881][T14702] Call Trace: [ 176.730150][T14702] dump_stack+0x1b0/0x21e [ 176.734453][T14702] ? devkmsg_release+0x11c/0x11c [ 176.739392][T14702] ? show_regs_print_info+0x12/0x12 [ 176.744560][T14702] ? kasan_alloc_pages+0x4a/0x60 [ 176.749497][T14702] should_fail+0x6fb/0x860 [ 176.753886][T14702] ? setup_fault_attr+0x2b0/0x2b0 [ 176.758882][T14702] __alloc_pages_nodemask+0x1ee/0x7c0 [ 176.764227][T14702] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 176.769742][T14702] ? find_get_entry+0x5da/0x670 [ 176.774562][T14702] ? xa_load+0x323/0x340 [ 176.778773][T14702] __do_page_cache_readahead+0x244/0x510 [ 176.784374][T14702] ? read_cache_pages_invalidate_page+0x1b0/0x1b0 [ 176.790778][T14702] ? unwind_next_frame+0x1c07/0x22b0 [ 176.796037][T14702] ? page_cache_sync_readahead+0xa3/0x3c0 [ 176.801739][T14702] generic_file_read_iter+0x626/0x20a0 [ 176.807169][T14702] ? find_get_pages_range_tag+0xae0/0xae0 [ 176.812855][T14702] ? avc_has_perm_noaudit+0x2fc/0x3f0 [ 176.818220][T14702] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 176.824278][T14702] ? avc_denied+0x1c0/0x1c0 [ 176.828754][T14702] generic_file_splice_read+0x491/0x780 [ 176.834270][T14702] ? splice_shrink_spd+0xb0/0xb0 [ 176.839179][T14702] ? security_file_permission+0x1e9/0x300 [ 176.844867][T14702] ? splice_shrink_spd+0xb0/0xb0 [ 176.849771][T14702] splice_direct_to_actor+0x3cf/0xb00 [ 176.855112][T14702] ? do_splice_direct+0x3d0/0x3d0 [ 176.860102][T14702] ? pipe_to_sendpage+0x300/0x300 [ 176.865113][T14702] ? security_file_permission+0x128/0x300 [ 176.870819][T14702] do_splice_direct+0x279/0x3d0 [ 176.875643][T14702] ? splice_direct_to_actor+0xb00/0xb00 [ 176.881160][T14702] ? security_file_permission+0x128/0x300 [ 176.886847][T14702] do_sendfile+0x89d/0x1110 [ 176.891319][T14702] ? compat_writev+0x390/0x390 [ 176.896059][T14702] ? security_file_permission+0x128/0x300 [ 176.901748][T14702] ? vfs_write+0x427/0x4f0 [ 176.906129][T14702] ? fput_many+0x42/0x1a0 [ 176.910436][T14702] __x64_sys_sendfile64+0x1ae/0x220 [ 176.915606][T14702] ? __ia32_sys_sendfile+0x240/0x240 [ 176.920878][T14702] do_syscall_64+0xcb/0x150 [ 176.925360][T14702] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 176.931221][T14702] RIP: 0033:0x45de29 [ 176.935100][T14702] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 176.954669][T14702] RSP: 002b:00007fa46e034c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 08:49:58 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x40, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:49:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x200fc0) [ 176.963159][T14702] RAX: ffffffffffffffda RBX: 0000000000027ec0 RCX: 000000000045de29 [ 176.971099][T14702] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 176.979043][T14702] RBP: 00007fa46e034ca0 R08: 0000000000000000 R09: 0000000000000000 [ 176.986984][T14702] R10: 0000000000200fc0 R11: 0000000000000246 R12: 0000000000000003 [ 176.994928][T14702] R13: 00007ffdeacd249f R14: 00007fa46e0359c0 R15: 000000000118bf2c [ 177.002879][T14703] CPU: 0 PID: 14703 Comm: syz-executor.0 Tainted: G W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 177.014410][T14703] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 177.024459][T14703] Call Trace: [ 177.027741][T14703] dump_stack+0x1b0/0x21e [ 177.032059][T14703] ? devkmsg_release+0x11c/0x11c [ 177.036984][T14703] ? show_regs_print_info+0x12/0x12 [ 177.042163][T14703] ? kasan_alloc_pages+0x4a/0x60 [ 177.047104][T14703] should_fail+0x6fb/0x860 [ 177.051506][T14703] ? setup_fault_attr+0x2b0/0x2b0 [ 177.056604][T14703] __alloc_pages_nodemask+0x1ee/0x7c0 08:49:58 executing program 1 (fault-call:9 fault-nth:4): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) [ 177.061969][T14703] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 177.067506][T14703] ? find_get_entry+0x5da/0x670 [ 177.072340][T14703] ? xa_load+0x323/0x340 [ 177.076570][T14703] __do_page_cache_readahead+0x244/0x510 [ 177.082185][T14703] ? read_cache_pages_invalidate_page+0x1b0/0x1b0 [ 177.088586][T14703] ? unwind_next_frame+0x1c07/0x22b0 [ 177.093850][T14703] ? page_cache_sync_readahead+0xa3/0x3c0 [ 177.099555][T14703] generic_file_read_iter+0x626/0x20a0 [ 177.104997][T14703] ? find_get_pages_range_tag+0xae0/0xae0 [ 177.110699][T14703] ? avc_has_perm_noaudit+0x2fc/0x3f0 08:49:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x0) 08:49:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x0) [ 177.116066][T14703] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 177.122121][T14703] ? avc_denied+0x1c0/0x1c0 [ 177.126619][T14703] generic_file_splice_read+0x491/0x780 [ 177.132244][T14703] ? splice_shrink_spd+0xb0/0xb0 [ 177.132738][T14716] FAULT_INJECTION: forcing a failure. [ 177.132738][T14716] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 177.137166][T14703] ? security_file_permission+0x1e9/0x300 [ 177.137174][T14703] ? splice_shrink_spd+0xb0/0xb0 [ 177.137180][T14703] splice_direct_to_actor+0x3cf/0xb00 [ 177.137191][T14703] ? do_splice_direct+0x3d0/0x3d0 [ 177.171343][T14703] ? pipe_to_sendpage+0x300/0x300 [ 177.176381][T14703] ? security_file_permission+0x128/0x300 [ 177.182079][T14703] do_splice_direct+0x279/0x3d0 [ 177.186923][T14703] ? splice_direct_to_actor+0xb00/0xb00 [ 177.192449][T14703] ? security_file_permission+0x128/0x300 [ 177.198226][T14703] do_sendfile+0x89d/0x1110 [ 177.202697][T14703] ? compat_writev+0x390/0x390 [ 177.207426][T14703] ? security_file_permission+0x128/0x300 [ 177.213130][T14703] ? vfs_write+0x427/0x4f0 [ 177.217513][T14703] ? fput_many+0x42/0x1a0 [ 177.221810][T14703] __x64_sys_sendfile64+0x1ae/0x220 [ 177.227006][T14703] ? __ia32_sys_sendfile+0x240/0x240 [ 177.232259][T14703] do_syscall_64+0xcb/0x150 [ 177.236728][T14703] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 177.242604][T14703] RIP: 0033:0x45de29 [ 177.246474][T14703] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 177.266053][T14703] RSP: 002b:00007f5188e64c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 177.274466][T14703] RAX: ffffffffffffffda RBX: 0000000000027ec0 RCX: 000000000045de29 [ 177.282542][T14703] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 177.290499][T14703] RBP: 00007f5188e64ca0 R08: 0000000000000000 R09: 0000000000000000 [ 177.298442][T14703] R10: 0000000000200fc0 R11: 0000000000000246 R12: 0000000000000003 [ 177.306384][T14703] R13: 00007ffcf4eb413f R14: 00007f5188e659c0 R15: 000000000118bf2c [ 177.314334][T14716] CPU: 1 PID: 14716 Comm: syz-executor.1 Tainted: G W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 177.325944][T14716] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 177.335999][T14716] Call Trace: [ 177.339280][T14716] dump_stack+0x1b0/0x21e [ 177.343593][T14716] ? devkmsg_release+0x11c/0x11c [ 177.348514][T14716] ? show_regs_print_info+0x12/0x12 [ 177.353696][T14716] ? kasan_alloc_pages+0x4a/0x60 [ 177.358613][T14716] should_fail+0x6fb/0x860 [ 177.363011][T14716] ? setup_fault_attr+0x2b0/0x2b0 [ 177.368021][T14716] __alloc_pages_nodemask+0x1ee/0x7c0 [ 177.373380][T14716] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 177.378905][T14716] ? find_get_entry+0x5da/0x670 [ 177.383738][T14716] ? xa_load+0x323/0x340 [ 177.387960][T14716] __do_page_cache_readahead+0x244/0x510 [ 177.393583][T14716] ? read_cache_pages_invalidate_page+0x1b0/0x1b0 [ 177.399973][T14716] ? page_cache_sync_readahead+0xa3/0x3c0 [ 177.405675][T14716] generic_file_read_iter+0x626/0x20a0 [ 177.411157][T14716] ? find_get_pages_range_tag+0xae0/0xae0 [ 177.416851][T14716] ? avc_has_perm_noaudit+0x2fc/0x3f0 [ 177.422197][T14716] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 177.428229][T14716] ? avc_denied+0x1c0/0x1c0 [ 177.432704][T14716] generic_file_splice_read+0x491/0x780 [ 177.438222][T14716] ? splice_shrink_spd+0xb0/0xb0 [ 177.443121][T14716] ? security_file_permission+0x1e9/0x300 [ 177.448801][T14716] ? splice_shrink_spd+0xb0/0xb0 [ 177.453803][T14716] splice_direct_to_actor+0x3cf/0xb00 [ 177.459173][T14716] ? do_splice_direct+0x3d0/0x3d0 [ 177.464174][T14716] ? pipe_to_sendpage+0x300/0x300 [ 177.469276][T14716] ? security_file_permission+0x128/0x300 [ 177.475000][T14716] do_splice_direct+0x279/0x3d0 [ 177.479980][T14716] ? splice_direct_to_actor+0xb00/0xb00 [ 177.485497][T14716] ? security_file_permission+0x128/0x300 [ 177.491205][T14716] do_sendfile+0x89d/0x1110 [ 177.495708][T14716] ? compat_writev+0x390/0x390 [ 177.500438][T14716] ? security_file_permission+0x128/0x300 [ 177.506124][T14716] ? vfs_write+0x427/0x4f0 [ 177.510507][T14716] ? fput_many+0x42/0x1a0 [ 177.514813][T14716] __x64_sys_sendfile64+0x1ae/0x220 [ 177.520012][T14716] ? __ia32_sys_sendfile+0x240/0x240 [ 177.525269][T14716] do_syscall_64+0xcb/0x150 [ 177.529739][T14716] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 177.535740][T14716] RIP: 0033:0x45de29 [ 177.539603][T14716] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 177.559171][T14716] RSP: 002b:00007fa46e034c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 08:49:58 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, 0x0, &(0x7f0000000200)) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x14, 0x2, 0x0, 0x1, [@vti_common_policy=[@IFLA_VTI_IKEY={0x8}, @IFLA_VTI_LINK={0x8}]]}}}]}, 0x40}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 08:49:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x0) 08:49:58 executing program 0 (fault-call:9 fault-nth:4): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:49:58 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x80000e0, 0x0) [ 177.567545][T14716] RAX: ffffffffffffffda RBX: 0000000000027ec0 RCX: 000000000045de29 [ 177.575483][T14716] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 177.583419][T14716] RBP: 00007fa46e034ca0 R08: 0000000000000000 R09: 0000000000000000 [ 177.591357][T14716] R10: 0000000000200fc0 R11: 0000000000000246 R12: 0000000000000004 [ 177.599296][T14716] R13: 00007ffdeacd249f R14: 00007fa46e0359c0 R15: 000000000118bf2c 08:49:58 executing program 4: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) [ 177.658738][T14729] FAULT_INJECTION: forcing a failure. [ 177.658738][T14729] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 177.705620][T14729] CPU: 0 PID: 14729 Comm: syz-executor.0 Tainted: G W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 177.717148][T14729] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 177.727182][T14729] Call Trace: [ 177.730478][T14729] dump_stack+0x1b0/0x21e [ 177.734807][T14729] ? devkmsg_release+0x11c/0x11c [ 177.739730][T14729] ? show_regs_print_info+0x12/0x12 [ 177.744916][T14729] ? kasan_alloc_pages+0x4a/0x60 [ 177.749850][T14729] should_fail+0x6fb/0x860 [ 177.754265][T14729] ? setup_fault_attr+0x2b0/0x2b0 [ 177.759273][T14729] __alloc_pages_nodemask+0x1ee/0x7c0 [ 177.764635][T14729] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 177.770164][T14729] ? find_get_entry+0x5da/0x670 [ 177.775011][T14729] ? xa_load+0x323/0x340 [ 177.779239][T14729] __do_page_cache_readahead+0x244/0x510 [ 177.784866][T14729] ? read_cache_pages_invalidate_page+0x1b0/0x1b0 [ 177.791289][T14729] ? unwind_next_frame+0x1c07/0x22b0 [ 177.796585][T14729] ? page_cache_sync_readahead+0xa3/0x3c0 08:49:59 executing program 1 (fault-call:9 fault-nth:5): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) [ 177.802290][T14729] generic_file_read_iter+0x626/0x20a0 [ 177.807733][T14729] ? find_get_pages_range_tag+0xae0/0xae0 [ 177.813437][T14729] ? avc_has_perm_noaudit+0x2fc/0x3f0 [ 177.818794][T14729] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 177.824849][T14729] ? avc_denied+0x1c0/0x1c0 [ 177.825107][T14742] FAULT_INJECTION: forcing a failure. [ 177.825107][T14742] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 177.829337][T14729] generic_file_splice_read+0x491/0x780 [ 177.829348][T14729] ? splice_shrink_spd+0xb0/0xb0 [ 177.829358][T14729] ? security_file_permission+0x1e9/0x300 [ 177.829370][T14729] ? splice_shrink_spd+0xb0/0xb0 [ 177.863717][T14729] splice_direct_to_actor+0x3cf/0xb00 [ 177.869069][T14729] ? do_splice_direct+0x3d0/0x3d0 [ 177.874066][T14729] ? pipe_to_sendpage+0x300/0x300 [ 177.879068][T14729] ? security_file_permission+0x128/0x300 [ 177.884783][T14729] do_splice_direct+0x279/0x3d0 [ 177.889608][T14729] ? splice_direct_to_actor+0xb00/0xb00 [ 177.895126][T14729] ? security_file_permission+0x128/0x300 [ 177.900818][T14729] do_sendfile+0x89d/0x1110 [ 177.905313][T14729] ? compat_writev+0x390/0x390 [ 177.910044][T14729] ? security_file_permission+0x128/0x300 [ 177.915734][T14729] ? vfs_write+0x427/0x4f0 [ 177.920140][T14729] ? fput_many+0x42/0x1a0 [ 177.924435][T14729] __x64_sys_sendfile64+0x1ae/0x220 [ 177.929600][T14729] ? __ia32_sys_sendfile+0x240/0x240 [ 177.934868][T14729] do_syscall_64+0xcb/0x150 [ 177.939338][T14729] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 177.945294][T14729] RIP: 0033:0x45de29 [ 177.949175][T14729] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 177.968768][T14729] RSP: 002b:00007f5188e64c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 177.977158][T14729] RAX: ffffffffffffffda RBX: 0000000000027ec0 RCX: 000000000045de29 [ 177.985103][T14729] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 177.993044][T14729] RBP: 00007f5188e64ca0 R08: 0000000000000000 R09: 0000000000000000 [ 178.000986][T14729] R10: 0000000000200fc0 R11: 0000000000000246 R12: 0000000000000004 [ 178.008927][T14729] R13: 00007ffcf4eb413f R14: 00007f5188e659c0 R15: 000000000118bf2c [ 178.016890][T14742] CPU: 1 PID: 14742 Comm: syz-executor.1 Tainted: G W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 178.028404][T14742] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 178.038425][T14742] Call Trace: [ 178.041684][T14742] dump_stack+0x1b0/0x21e [ 178.045981][T14742] ? devkmsg_release+0x11c/0x11c [ 178.050919][T14742] ? show_regs_print_info+0x12/0x12 [ 178.056091][T14742] ? kasan_alloc_pages+0x4a/0x60 [ 178.061001][T14742] should_fail+0x6fb/0x860 [ 178.065385][T14742] ? setup_fault_attr+0x2b0/0x2b0 [ 178.070386][T14742] __alloc_pages_nodemask+0x1ee/0x7c0 [ 178.075813][T14742] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 178.081326][T14742] ? find_get_entry+0x5da/0x670 [ 178.086166][T14742] ? xa_load+0x323/0x340 [ 178.090396][T14742] __do_page_cache_readahead+0x244/0x510 [ 178.096018][T14742] ? read_cache_pages_invalidate_page+0x1b0/0x1b0 [ 178.102410][T14742] ? unwind_next_frame+0x1c07/0x22b0 [ 178.107674][T14742] ? page_cache_sync_readahead+0xa3/0x3c0 [ 178.113355][T14742] generic_file_read_iter+0x626/0x20a0 [ 178.118801][T14742] ? find_get_pages_range_tag+0xae0/0xae0 [ 178.124504][T14742] ? avc_has_perm_noaudit+0x2fc/0x3f0 [ 178.129858][T14742] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 178.135991][T14742] ? avc_denied+0x1c0/0x1c0 [ 178.140461][T14742] generic_file_splice_read+0x491/0x780 [ 178.145974][T14742] ? splice_shrink_spd+0xb0/0xb0 [ 178.150882][T14742] ? security_file_permission+0x1e9/0x300 [ 178.156565][T14742] ? splice_shrink_spd+0xb0/0xb0 [ 178.161467][T14742] splice_direct_to_actor+0x3cf/0xb00 [ 178.166805][T14742] ? do_splice_direct+0x3d0/0x3d0 [ 178.171796][T14742] ? pipe_to_sendpage+0x300/0x300 [ 178.176786][T14742] ? security_file_permission+0x128/0x300 [ 178.182473][T14742] do_splice_direct+0x279/0x3d0 [ 178.187288][T14742] ? splice_direct_to_actor+0xb00/0xb00 [ 178.192800][T14742] ? security_file_permission+0x128/0x300 [ 178.198483][T14742] do_sendfile+0x89d/0x1110 [ 178.202955][T14742] ? compat_writev+0x390/0x390 [ 178.207685][T14742] ? security_file_permission+0x128/0x300 [ 178.213379][T14742] ? vfs_write+0x427/0x4f0 [ 178.217773][T14742] ? fput_many+0x42/0x1a0 [ 178.222077][T14742] __x64_sys_sendfile64+0x1ae/0x220 [ 178.227260][T14742] ? __ia32_sys_sendfile+0x240/0x240 [ 178.232513][T14742] do_syscall_64+0xcb/0x150 [ 178.237007][T14742] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 178.242866][T14742] RIP: 0033:0x45de29 [ 178.246744][T14742] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 178.266327][T14742] RSP: 002b:00007fa46e034c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 178.274702][T14742] RAX: ffffffffffffffda RBX: 0000000000027ec0 RCX: 000000000045de29 [ 178.282657][T14742] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 178.290597][T14742] RBP: 00007fa46e034ca0 R08: 0000000000000000 R09: 0000000000000000 [ 178.298534][T14742] R10: 0000000000200fc0 R11: 0000000000000246 R12: 0000000000000005 08:49:59 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x4c, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:49:59 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800ffe0, 0x0) [ 178.306471][T14742] R13: 00007ffdeacd249f R14: 00007fa46e0359c0 R15: 000000000118bf2c 08:49:59 executing program 4 (fault-call:9 fault-nth:0): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:49:59 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x14, 0x2, 0x0, 0x1, [@vti_common_policy=[@IFLA_VTI_IKEY={0x8}, @IFLA_VTI_LINK={0x8, 0x1, r4}]]}}}]}, 0x40}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 08:49:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) [ 178.436175][T14753] FAULT_INJECTION: forcing a failure. [ 178.436175][T14753] name failslab, interval 1, probability 0, space 0, times 0 [ 178.492054][T14753] CPU: 0 PID: 14753 Comm: syz-executor.4 Tainted: G W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 178.503595][T14753] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 178.513635][T14753] Call Trace: [ 178.516935][T14753] dump_stack+0x1b0/0x21e [ 178.521248][T14753] ? devkmsg_release+0x11c/0x11c [ 178.526172][T14753] ? show_regs_print_info+0x12/0x12 [ 178.531381][T14753] ? avc_denied+0x1c0/0x1c0 [ 178.535907][T14753] should_fail+0x6fb/0x860 [ 178.540309][T14753] ? setup_fault_attr+0x2b0/0x2b0 [ 178.545324][T14753] ? avc_has_perm+0xbd/0x260 [ 178.549914][T14753] ? avc_has_perm+0x15f/0x260 [ 178.554575][T14753] ? alloc_pipe_info+0xa1/0x3a0 [ 178.559407][T14753] should_failslab+0x5/0x20 [ 178.563904][T14753] kmem_cache_alloc_trace+0x39/0x270 [ 178.569171][T14753] alloc_pipe_info+0xa1/0x3a0 [ 178.573836][T14753] splice_direct_to_actor+0x94e/0xb00 [ 178.579188][T14753] ? avc_has_perm+0xbd/0x260 [ 178.583761][T14753] ? match_file+0x120/0x120 [ 178.588247][T14753] ? avc_has_perm_noaudit+0x3f0/0x3f0 [ 178.593619][T14753] ? do_splice_direct+0x3d0/0x3d0 [ 178.598627][T14753] ? pipe_to_sendpage+0x300/0x300 [ 178.603643][T14753] ? security_file_permission+0x128/0x300 [ 178.609354][T14753] do_splice_direct+0x279/0x3d0 [ 178.614194][T14753] ? splice_direct_to_actor+0xb00/0xb00 [ 178.619725][T14753] ? security_file_permission+0x128/0x300 [ 178.625426][T14753] do_sendfile+0x89d/0x1110 [ 178.629914][T14753] ? compat_writev+0x390/0x390 [ 178.634663][T14753] ? security_file_permission+0x128/0x300 [ 178.640362][T14753] ? vfs_write+0x427/0x4f0 [ 178.644756][T14753] ? fput_many+0x42/0x1a0 [ 178.649067][T14753] __x64_sys_sendfile64+0x1ae/0x220 [ 178.654299][T14753] ? __ia32_sys_sendfile+0x240/0x240 [ 178.659562][T14753] do_syscall_64+0xcb/0x150 [ 178.664031][T14753] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 178.669905][T14753] RIP: 0033:0x45de29 08:49:59 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x4c, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:49:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x7ffff000) 08:49:59 executing program 1 (fault-call:9 fault-nth:6): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:49:59 executing program 4 (fault-call:9 fault-nth:1): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) [ 178.673764][T14753] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 178.693429][T14753] RSP: 002b:00007fb671aeac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 178.701813][T14753] RAX: ffffffffffffffda RBX: 0000000000027ec0 RCX: 000000000045de29 [ 178.709771][T14753] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 178.717714][T14753] RBP: 00007fb671aeaca0 R08: 0000000000000000 R09: 0000000000000000 [ 178.725652][T14753] R10: 0000000000200fc0 R11: 0000000000000246 R12: 0000000000000000 [ 178.733588][T14753] R13: 00007ffdd333603f R14: 00007fb671aeb9c0 R15: 000000000118bf2c [ 178.787656][T14770] FAULT_INJECTION: forcing a failure. [ 178.787656][T14770] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 178.788940][T14771] FAULT_INJECTION: forcing a failure. [ 178.788940][T14771] name failslab, interval 1, probability 0, space 0, times 0 [ 178.814638][T14770] CPU: 0 PID: 14770 Comm: syz-executor.1 Tainted: G W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 178.826213][T14770] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 178.836248][T14770] Call Trace: [ 178.839522][T14770] dump_stack+0x1b0/0x21e [ 178.843837][T14770] ? devkmsg_release+0x11c/0x11c [ 178.848772][T14770] ? show_regs_print_info+0x12/0x12 [ 178.853958][T14770] ? kasan_alloc_pages+0x4a/0x60 [ 178.858914][T14770] should_fail+0x6fb/0x860 [ 178.863312][T14770] ? setup_fault_attr+0x2b0/0x2b0 [ 178.868311][T14770] __alloc_pages_nodemask+0x1ee/0x7c0 [ 178.873662][T14770] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 178.879188][T14770] ? find_get_entry+0x5da/0x670 [ 178.884105][T14770] ? xa_load+0x323/0x340 [ 178.888329][T14770] __do_page_cache_readahead+0x244/0x510 [ 178.893943][T14770] ? read_cache_pages_invalidate_page+0x1b0/0x1b0 [ 178.900357][T14770] ? unwind_next_frame+0x1c07/0x22b0 [ 178.905613][T14770] ? page_cache_sync_readahead+0xa3/0x3c0 [ 178.911418][T14770] generic_file_read_iter+0x626/0x20a0 [ 178.916858][T14770] ? find_get_pages_range_tag+0xae0/0xae0 [ 178.922549][T14770] ? avc_has_perm_noaudit+0x2fc/0x3f0 [ 178.927900][T14770] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 178.933945][T14770] ? avc_denied+0x1c0/0x1c0 [ 178.938434][T14770] generic_file_splice_read+0x491/0x780 [ 178.943971][T14770] ? splice_shrink_spd+0xb0/0xb0 [ 178.948885][T14770] ? security_file_permission+0x1e9/0x300 [ 178.954576][T14770] ? splice_shrink_spd+0xb0/0xb0 [ 178.959485][T14770] splice_direct_to_actor+0x3cf/0xb00 [ 178.964835][T14770] ? do_splice_direct+0x3d0/0x3d0 [ 178.969834][T14770] ? pipe_to_sendpage+0x300/0x300 [ 178.974858][T14770] ? security_file_permission+0x128/0x300 [ 178.980569][T14770] do_splice_direct+0x279/0x3d0 [ 178.985405][T14770] ? splice_direct_to_actor+0xb00/0xb00 [ 178.990932][T14770] ? security_file_permission+0x128/0x300 [ 178.996671][T14770] do_sendfile+0x89d/0x1110 [ 179.001150][T14770] ? compat_writev+0x390/0x390 [ 179.005909][T14770] ? security_file_permission+0x128/0x300 [ 179.011601][T14770] ? vfs_write+0x427/0x4f0 [ 179.016018][T14770] ? fput_many+0x42/0x1a0 [ 179.020338][T14770] __x64_sys_sendfile64+0x1ae/0x220 [ 179.025513][T14770] ? __ia32_sys_sendfile+0x240/0x240 [ 179.030783][T14770] do_syscall_64+0xcb/0x150 [ 179.035268][T14770] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 179.041135][T14770] RIP: 0033:0x45de29 [ 179.045047][T14770] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 179.064635][T14770] RSP: 002b:00007fa46e034c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 179.073026][T14770] RAX: ffffffffffffffda RBX: 0000000000027ec0 RCX: 000000000045de29 [ 179.080978][T14770] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 179.088929][T14770] RBP: 00007fa46e034ca0 R08: 0000000000000000 R09: 0000000000000000 [ 179.096901][T14770] R10: 0000000000200fc0 R11: 0000000000000246 R12: 0000000000000006 [ 179.104860][T14770] R13: 00007ffdeacd249f R14: 00007fa46e0359c0 R15: 000000000118bf2c [ 179.112812][T14771] CPU: 1 PID: 14771 Comm: syz-executor.4 Tainted: G W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 179.124333][T14771] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 179.134369][T14771] Call Trace: [ 179.137644][T14771] dump_stack+0x1b0/0x21e [ 179.141957][T14771] ? devkmsg_release+0x11c/0x11c [ 179.146876][T14771] ? show_regs_print_info+0x12/0x12 [ 179.152072][T14771] ? avc_denied+0x1c0/0x1c0 [ 179.156561][T14771] should_fail+0x6fb/0x860 [ 179.160960][T14771] ? setup_fault_attr+0x2b0/0x2b0 [ 179.165964][T14771] ? setup_fault_attr+0x2b0/0x2b0 [ 179.170973][T14771] ? avc_has_perm+0xbd/0x260 [ 179.175541][T14771] ? avc_has_perm+0x15f/0x260 [ 179.180208][T14771] ? kcalloc+0x32/0x60 [ 179.184256][T14771] should_failslab+0x5/0x20 [ 179.188765][T14771] __kmalloc+0x5f/0x2c0 [ 179.192904][T14771] ? kmem_cache_alloc_trace+0xc3/0x270 [ 179.198344][T14771] kcalloc+0x32/0x60 [ 179.202240][T14771] alloc_pipe_info+0x1b9/0x3a0 [ 179.207005][T14771] splice_direct_to_actor+0x94e/0xb00 [ 179.212402][T14771] ? avc_has_perm+0xbd/0x260 [ 179.216970][T14771] ? match_file+0x120/0x120 [ 179.221457][T14771] ? avc_has_perm_noaudit+0x3f0/0x3f0 [ 179.225530][T14778] FAULT_INJECTION: forcing a failure. [ 179.225530][T14778] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 179.226836][T14771] ? do_splice_direct+0x3d0/0x3d0 [ 179.226842][T14771] ? pipe_to_sendpage+0x300/0x300 [ 179.226850][T14771] ? security_file_permission+0x128/0x300 [ 179.226860][T14771] do_splice_direct+0x279/0x3d0 [ 179.260514][T14771] ? splice_direct_to_actor+0xb00/0xb00 [ 179.266067][T14771] ? security_file_permission+0x128/0x300 [ 179.271759][T14771] do_sendfile+0x89d/0x1110 [ 179.276235][T14771] ? compat_writev+0x390/0x390 [ 179.280993][T14771] ? security_file_permission+0x128/0x300 [ 179.286687][T14771] ? vfs_write+0x427/0x4f0 [ 179.291073][T14771] ? fput_many+0x42/0x1a0 [ 179.295382][T14771] __x64_sys_sendfile64+0x1ae/0x220 [ 179.300552][T14771] ? __ia32_sys_sendfile+0x240/0x240 [ 179.305846][T14771] do_syscall_64+0xcb/0x150 [ 179.310323][T14771] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 179.316186][T14771] RIP: 0033:0x45de29 [ 179.320060][T14771] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 179.339729][T14771] RSP: 002b:00007fb671aeac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 179.348284][T14771] RAX: ffffffffffffffda RBX: 0000000000027ec0 RCX: 000000000045de29 [ 179.356229][T14771] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 179.364173][T14771] RBP: 00007fb671aeaca0 R08: 0000000000000000 R09: 0000000000000000 [ 179.372215][T14771] R10: 0000000000200fc0 R11: 0000000000000246 R12: 0000000000000001 [ 179.380164][T14771] R13: 00007ffdd333603f R14: 00007fb671aeb9c0 R15: 000000000118bf2c 08:50:00 executing program 1 (fault-call:9 fault-nth:7): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) [ 179.389160][T14778] CPU: 0 PID: 14778 Comm: syz-executor.1 Tainted: G W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 179.400687][T14778] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 179.410840][T14778] Call Trace: [ 179.414134][T14778] dump_stack+0x1b0/0x21e [ 179.418453][T14778] ? devkmsg_release+0x11c/0x11c [ 179.423375][T14778] ? show_regs_print_info+0x12/0x12 [ 179.428554][T14778] ? kasan_alloc_pages+0x4a/0x60 [ 179.433474][T14778] should_fail+0x6fb/0x860 [ 179.437877][T14778] ? setup_fault_attr+0x2b0/0x2b0 [ 179.442888][T14778] __alloc_pages_nodemask+0x1ee/0x7c0 [ 179.448246][T14778] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 179.453778][T14778] ? find_get_entry+0x5da/0x670 [ 179.458612][T14778] ? xa_load+0x323/0x340 [ 179.462838][T14778] __do_page_cache_readahead+0x244/0x510 [ 179.468441][T14778] ? read_cache_pages_invalidate_page+0x1b0/0x1b0 [ 179.474830][T14778] ? unwind_next_frame+0x1c07/0x22b0 [ 179.480081][T14778] ? page_cache_sync_readahead+0xa3/0x3c0 [ 179.485770][T14778] generic_file_read_iter+0x626/0x20a0 [ 179.491200][T14778] ? find_get_pages_range_tag+0xae0/0xae0 [ 179.496886][T14778] ? avc_has_perm_noaudit+0x2fc/0x3f0 [ 179.502223][T14778] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 179.508252][T14778] ? avc_denied+0x1c0/0x1c0 [ 179.512775][T14778] generic_file_splice_read+0x491/0x780 [ 179.518288][T14778] ? splice_shrink_spd+0xb0/0xb0 [ 179.523196][T14778] ? security_file_permission+0x1e9/0x300 [ 179.528882][T14778] ? splice_shrink_spd+0xb0/0xb0 [ 179.533814][T14778] splice_direct_to_actor+0x3cf/0xb00 [ 179.539150][T14778] ? do_splice_direct+0x3d0/0x3d0 [ 179.544139][T14778] ? pipe_to_sendpage+0x300/0x300 [ 179.549132][T14778] ? security_file_permission+0x128/0x300 [ 179.554903][T14778] do_splice_direct+0x279/0x3d0 [ 179.559716][T14778] ? splice_direct_to_actor+0xb00/0xb00 [ 179.565228][T14778] ? security_file_permission+0x128/0x300 [ 179.570909][T14778] do_sendfile+0x89d/0x1110 [ 179.575376][T14778] ? compat_writev+0x390/0x390 [ 179.580105][T14778] ? security_file_permission+0x128/0x300 [ 179.585791][T14778] ? vfs_write+0x427/0x4f0 [ 179.590183][T14778] ? fput_many+0x42/0x1a0 [ 179.594477][T14778] __x64_sys_sendfile64+0x1ae/0x220 [ 179.599657][T14778] ? __ia32_sys_sendfile+0x240/0x240 [ 179.604923][T14778] do_syscall_64+0xcb/0x150 [ 179.609394][T14778] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 179.615250][T14778] RIP: 0033:0x45de29 [ 179.619109][T14778] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 08:50:00 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x14, 0x2, 0x0, 0x1, [@vti_common_policy=[@IFLA_VTI_IKEY={0x8}, @IFLA_VTI_LINK={0x8, 0x1, r4}]]}}}]}, 0x40}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 08:50:00 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x2) 08:50:00 executing program 4 (fault-call:9 fault-nth:2): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) [ 179.638727][T14778] RSP: 002b:00007fa46e034c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 179.647120][T14778] RAX: ffffffffffffffda RBX: 0000000000027ec0 RCX: 000000000045de29 [ 179.655054][T14778] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 179.662991][T14778] RBP: 00007fa46e034ca0 R08: 0000000000000000 R09: 0000000000000000 [ 179.671016][T14778] R10: 0000000000200fc0 R11: 0000000000000246 R12: 0000000000000007 [ 179.678972][T14778] R13: 00007ffdeacd249f R14: 00007fa46e0359c0 R15: 000000000118bf2c 08:50:00 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x4c, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) [ 179.711900][T14785] FAULT_INJECTION: forcing a failure. [ 179.711900][T14785] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 179.725814][T14785] CPU: 0 PID: 14785 Comm: syz-executor.4 Tainted: G W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 179.737342][T14785] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 179.747403][T14785] Call Trace: [ 179.750680][T14785] dump_stack+0x1b0/0x21e [ 179.755001][T14785] ? devkmsg_release+0x11c/0x11c [ 179.759925][T14785] ? show_regs_print_info+0x12/0x12 [ 179.765112][T14785] ? unwind_get_return_address_ptr+0x130/0x130 [ 179.771251][T14785] should_fail+0x6fb/0x860 [ 179.775669][T14785] ? setup_fault_attr+0x2b0/0x2b0 [ 179.780677][T14785] __alloc_pages_nodemask+0x1ee/0x7c0 [ 179.786043][T14785] ? xas_load+0x46f/0x4c0 [ 179.790356][T14785] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 179.795885][T14785] ? find_get_entry+0x5da/0x670 [ 179.800737][T14785] ? xa_load+0x323/0x340 [ 179.804965][T14785] __do_page_cache_readahead+0x244/0x510 [ 179.810582][T14785] ? read_cache_pages_invalidate_page+0x1b0/0x1b0 [ 179.816977][T14785] ? unwind_next_frame+0x1c07/0x22b0 [ 179.822246][T14785] ? page_cache_sync_readahead+0xa3/0x3c0 [ 179.827959][T14785] generic_file_read_iter+0x626/0x20a0 [ 179.833424][T14785] ? find_get_pages_range_tag+0xae0/0xae0 [ 179.839125][T14785] ? avc_has_perm_noaudit+0x2fc/0x3f0 [ 179.844479][T14785] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 179.850617][T14785] ? avc_denied+0x1c0/0x1c0 [ 179.855103][T14785] generic_file_splice_read+0x491/0x780 [ 179.860633][T14785] ? splice_shrink_spd+0xb0/0xb0 [ 179.865558][T14785] ? security_file_permission+0x1e9/0x300 [ 179.871257][T14785] ? splice_shrink_spd+0xb0/0xb0 [ 179.876223][T14785] splice_direct_to_actor+0x3cf/0xb00 [ 179.881575][T14785] ? do_splice_direct+0x3d0/0x3d0 [ 179.886740][T14785] ? pipe_to_sendpage+0x300/0x300 [ 179.891749][T14785] ? security_file_permission+0x128/0x300 [ 179.897435][T14785] do_splice_direct+0x279/0x3d0 [ 179.902260][T14785] ? splice_direct_to_actor+0xb00/0xb00 [ 179.907771][T14785] ? security_file_permission+0x128/0x300 [ 179.913454][T14785] do_sendfile+0x89d/0x1110 [ 179.917923][T14785] ? compat_writev+0x390/0x390 [ 179.922652][T14785] ? security_file_permission+0x128/0x300 [ 179.928338][T14785] ? vfs_write+0x427/0x4f0 [ 179.932717][T14785] ? fput_many+0x42/0x1a0 [ 179.937009][T14785] __x64_sys_sendfile64+0x1ae/0x220 [ 179.942172][T14785] ? __ia32_sys_sendfile+0x240/0x240 [ 179.947420][T14785] do_syscall_64+0xcb/0x150 [ 179.951886][T14785] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 179.957742][T14785] RIP: 0033:0x45de29 [ 179.961599][T14785] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 179.981169][T14785] RSP: 002b:00007fb671aeac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 179.989544][T14785] RAX: ffffffffffffffda RBX: 0000000000027ec0 RCX: 000000000045de29 [ 179.997507][T14785] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 08:50:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0xffffffff000) [ 180.005446][T14785] RBP: 00007fb671aeaca0 R08: 0000000000000000 R09: 0000000000000000 [ 180.013386][T14785] R10: 0000000000200fc0 R11: 0000000000000246 R12: 0000000000000002 [ 180.021333][T14785] R13: 00007ffdd333603f R14: 00007fb671aeb9c0 R15: 000000000118bf2c 08:50:01 executing program 1 (fault-call:9 fault-nth:8): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:50:01 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x3) [ 180.116587][T14803] FAULT_INJECTION: forcing a failure. [ 180.116587][T14803] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 180.143718][T14803] CPU: 1 PID: 14803 Comm: syz-executor.1 Tainted: G W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 180.155390][T14803] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 180.165426][T14803] Call Trace: [ 180.168718][T14803] dump_stack+0x1b0/0x21e [ 180.173041][T14803] ? devkmsg_release+0x11c/0x11c [ 180.177958][T14803] ? show_regs_print_info+0x12/0x12 [ 180.183136][T14803] ? kasan_alloc_pages+0x4a/0x60 [ 180.188096][T14803] should_fail+0x6fb/0x860 [ 180.192492][T14803] ? setup_fault_attr+0x2b0/0x2b0 [ 180.197502][T14803] __alloc_pages_nodemask+0x1ee/0x7c0 [ 180.202854][T14803] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 180.208399][T14803] ? find_get_entry+0x5da/0x670 08:50:01 executing program 4 (fault-call:9 fault-nth:3): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) [ 180.213230][T14803] ? xa_load+0x323/0x340 [ 180.217452][T14803] __do_page_cache_readahead+0x244/0x510 [ 180.223070][T14803] ? read_cache_pages_invalidate_page+0x1b0/0x1b0 [ 180.229476][T14803] ? unwind_next_frame+0x1c07/0x22b0 [ 180.234748][T14803] ? page_cache_sync_readahead+0xa3/0x3c0 [ 180.240451][T14803] generic_file_read_iter+0x626/0x20a0 [ 180.245898][T14803] ? find_get_pages_range_tag+0xae0/0xae0 [ 180.251633][T14803] ? avc_has_perm_noaudit+0x2fc/0x3f0 [ 180.256987][T14803] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 180.263038][T14803] ? avc_denied+0x1c0/0x1c0 [ 180.267528][T14803] generic_file_splice_read+0x491/0x780 [ 180.273059][T14803] ? splice_shrink_spd+0xb0/0xb0 [ 180.277985][T14803] ? security_file_permission+0x1e9/0x300 [ 180.283683][T14803] ? splice_shrink_spd+0xb0/0xb0 [ 180.288599][T14803] splice_direct_to_actor+0x3cf/0xb00 [ 180.293951][T14803] ? do_splice_direct+0x3d0/0x3d0 [ 180.298957][T14803] ? pipe_to_sendpage+0x300/0x300 [ 180.303984][T14803] ? security_file_permission+0x128/0x300 [ 180.309686][T14803] do_splice_direct+0x279/0x3d0 [ 180.314519][T14803] ? splice_direct_to_actor+0xb00/0xb00 [ 180.320047][T14803] ? security_file_permission+0x128/0x300 [ 180.325767][T14803] do_sendfile+0x89d/0x1110 [ 180.330256][T14803] ? compat_writev+0x390/0x390 [ 180.335002][T14803] ? security_file_permission+0x128/0x300 [ 180.340796][T14803] ? vfs_write+0x427/0x4f0 [ 180.345203][T14803] ? fput_many+0x42/0x1a0 [ 180.349515][T14803] __x64_sys_sendfile64+0x1ae/0x220 [ 180.354795][T14803] ? __ia32_sys_sendfile+0x240/0x240 [ 180.360065][T14803] do_syscall_64+0xcb/0x150 [ 180.364581][T14803] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 180.370455][T14803] RIP: 0033:0x45de29 [ 180.374331][T14803] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 180.394025][T14803] RSP: 002b:00007fa46e034c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 180.402416][T14803] RAX: ffffffffffffffda RBX: 0000000000027ec0 RCX: 000000000045de29 [ 180.410369][T14803] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 08:50:01 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x58, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) [ 180.418342][T14803] RBP: 00007fa46e034ca0 R08: 0000000000000000 R09: 0000000000000000 [ 180.426294][T14803] R10: 0000000000200fc0 R11: 0000000000000246 R12: 0000000000000008 [ 180.434254][T14803] R13: 00007ffdeacd249f R14: 00007fa46e0359c0 R15: 000000000118bf2c [ 180.457733][T14809] FAULT_INJECTION: forcing a failure. [ 180.457733][T14809] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 180.479128][T14809] CPU: 1 PID: 14809 Comm: syz-executor.4 Tainted: G W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 180.490675][T14809] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 180.500713][T14809] Call Trace: [ 180.503991][T14809] dump_stack+0x1b0/0x21e [ 180.508308][T14809] ? devkmsg_release+0x11c/0x11c [ 180.513235][T14809] ? show_regs_print_info+0x12/0x12 [ 180.518415][T14809] ? kasan_alloc_pages+0x4a/0x60 [ 180.523359][T14809] should_fail+0x6fb/0x860 [ 180.527772][T14809] ? setup_fault_attr+0x2b0/0x2b0 [ 180.532781][T14809] __alloc_pages_nodemask+0x1ee/0x7c0 [ 180.538141][T14809] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 180.543680][T14809] ? find_get_entry+0x5da/0x670 [ 180.548513][T14809] ? xa_load+0x323/0x340 [ 180.552743][T14809] __do_page_cache_readahead+0x244/0x510 [ 180.558358][T14809] ? read_cache_pages_invalidate_page+0x1b0/0x1b0 08:50:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x82, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_config_ext, 0x66020, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) [ 180.564754][T14809] ? unwind_next_frame+0x1c07/0x22b0 [ 180.570020][T14809] ? page_cache_sync_readahead+0xa3/0x3c0 [ 180.575725][T14809] generic_file_read_iter+0x626/0x20a0 [ 180.581174][T14809] ? find_get_pages_range_tag+0xae0/0xae0 [ 180.586876][T14809] ? avc_has_perm_noaudit+0x2fc/0x3f0 [ 180.592231][T14809] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 180.598278][T14809] ? avc_denied+0x1c0/0x1c0 [ 180.602775][T14809] generic_file_splice_read+0x491/0x780 [ 180.608305][T14809] ? splice_shrink_spd+0xb0/0xb0 [ 180.613220][T14809] ? security_file_permission+0x1e9/0x300 [ 180.618907][T14809] ? splice_shrink_spd+0xb0/0xb0 [ 180.623839][T14809] splice_direct_to_actor+0x3cf/0xb00 [ 180.629178][T14809] ? do_splice_direct+0x3d0/0x3d0 [ 180.634166][T14809] ? pipe_to_sendpage+0x300/0x300 [ 180.639157][T14809] ? security_file_permission+0x128/0x300 [ 180.644848][T14809] do_splice_direct+0x279/0x3d0 [ 180.649691][T14809] ? splice_direct_to_actor+0xb00/0xb00 [ 180.655205][T14809] ? security_file_permission+0x128/0x300 [ 180.660887][T14809] do_sendfile+0x89d/0x1110 [ 180.665385][T14809] ? compat_writev+0x390/0x390 [ 180.670130][T14809] ? security_file_permission+0x128/0x300 [ 180.675813][T14809] ? vfs_write+0x427/0x4f0 [ 180.680191][T14809] ? fput_many+0x42/0x1a0 [ 180.684492][T14809] __x64_sys_sendfile64+0x1ae/0x220 [ 180.689655][T14809] ? __ia32_sys_sendfile+0x240/0x240 [ 180.694916][T14809] do_syscall_64+0xcb/0x150 [ 180.699395][T14809] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 180.705253][T14809] RIP: 0033:0x45de29 [ 180.709114][T14809] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 180.728685][T14809] RSP: 002b:00007fb671aeac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 180.737066][T14809] RAX: ffffffffffffffda RBX: 0000000000027ec0 RCX: 000000000045de29 [ 180.745007][T14809] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 180.752947][T14809] RBP: 00007fb671aeaca0 R08: 0000000000000000 R09: 0000000000000000 [ 180.760898][T14809] R10: 0000000000200fc0 R11: 0000000000000246 R12: 0000000000000003 08:50:02 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x14, 0x2, 0x0, 0x1, [@vti_common_policy=[@IFLA_VTI_IKEY={0x8}, @IFLA_VTI_LINK={0x8, 0x1, r4}]]}}}]}, 0x40}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 08:50:02 executing program 1 (fault-call:9 fault-nth:9): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:50:02 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x4) [ 180.768840][T14809] R13: 00007ffdd333603f R14: 00007fb671aeb9c0 R15: 000000000118bf2c [ 180.854703][T14825] FAULT_INJECTION: forcing a failure. [ 180.854703][T14825] name fail_page_alloc, interval 1, probability 0, space 0, times 0 08:50:02 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x58, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) [ 180.894211][T14825] CPU: 1 PID: 14825 Comm: syz-executor.1 Tainted: G W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 180.905846][T14825] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 180.915893][T14825] Call Trace: [ 180.919172][T14825] dump_stack+0x1b0/0x21e [ 180.923488][T14825] ? devkmsg_release+0x11c/0x11c [ 180.928411][T14825] ? show_regs_print_info+0x12/0x12 [ 180.933589][T14825] ? kasan_alloc_pages+0x4a/0x60 [ 180.938522][T14825] should_fail+0x6fb/0x860 [ 180.943016][T14825] ? setup_fault_attr+0x2b0/0x2b0 [ 180.948020][T14825] __alloc_pages_nodemask+0x1ee/0x7c0 [ 180.953375][T14825] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 180.958904][T14825] ? find_get_entry+0x5da/0x670 [ 180.963754][T14825] ? xa_load+0x323/0x340 [ 180.967981][T14825] __do_page_cache_readahead+0x244/0x510 [ 180.973595][T14825] ? read_cache_pages_invalidate_page+0x1b0/0x1b0 [ 180.979995][T14825] ? unwind_next_frame+0x1c07/0x22b0 [ 180.985262][T14825] ? page_cache_sync_readahead+0xa3/0x3c0 [ 180.990969][T14825] generic_file_read_iter+0x626/0x20a0 [ 180.996399][T14825] ? find_get_pages_range_tag+0xae0/0xae0 [ 181.002084][T14825] ? avc_has_perm_noaudit+0x2fc/0x3f0 [ 181.007423][T14825] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 181.013454][T14825] ? avc_denied+0x1c0/0x1c0 [ 181.017940][T14825] generic_file_splice_read+0x491/0x780 [ 181.023456][T14825] ? splice_shrink_spd+0xb0/0xb0 [ 181.028373][T14825] ? security_file_permission+0x1e9/0x300 [ 181.034061][T14825] ? splice_shrink_spd+0xb0/0xb0 [ 181.038964][T14825] splice_direct_to_actor+0x3cf/0xb00 [ 181.044301][T14825] ? do_splice_direct+0x3d0/0x3d0 [ 181.049292][T14825] ? pipe_to_sendpage+0x300/0x300 [ 181.054292][T14825] ? security_file_permission+0x128/0x300 [ 181.059980][T14825] do_splice_direct+0x279/0x3d0 [ 181.064819][T14825] ? splice_direct_to_actor+0xb00/0xb00 [ 181.070334][T14825] ? security_file_permission+0x128/0x300 [ 181.076019][T14825] do_sendfile+0x89d/0x1110 [ 181.080490][T14825] ? compat_writev+0x390/0x390 [ 181.085221][T14825] ? security_file_permission+0x128/0x300 [ 181.090910][T14825] ? vfs_write+0x427/0x4f0 [ 181.095293][T14825] ? fput_many+0x42/0x1a0 [ 181.099588][T14825] __x64_sys_sendfile64+0x1ae/0x220 [ 181.104773][T14825] ? __ia32_sys_sendfile+0x240/0x240 [ 181.110069][T14825] do_syscall_64+0xcb/0x150 [ 181.114558][T14825] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 181.120421][T14825] RIP: 0033:0x45de29 [ 181.124284][T14825] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 181.143851][T14825] RSP: 002b:00007fa46e034c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 181.152227][T14825] RAX: ffffffffffffffda RBX: 0000000000027ec0 RCX: 000000000045de29 [ 181.160167][T14825] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 181.168106][T14825] RBP: 00007fa46e034ca0 R08: 0000000000000000 R09: 0000000000000000 [ 181.176045][T14825] R10: 0000000000200fc0 R11: 0000000000000246 R12: 0000000000000009 [ 181.183981][T14825] R13: 00007ffdeacd249f R14: 00007fa46e0359c0 R15: 000000000118bf2c 08:50:02 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x58, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:50:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:50:02 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x6) 08:50:02 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:50:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x8a) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getpeername$netlink(r1, &(0x7f0000000100), &(0x7f0000000140)=0xc) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket(0x1e, 0x4, 0x0) connect$tipc(r3, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x200fc0) 08:50:02 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:50:02 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x8) 08:50:02 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x14, 0x2, 0x0, 0x1, [@vti_common_policy=[@IFLA_VTI_IKEY={0x8}, @IFLA_VTI_LINK={0x8, 0x1, r4}]]}}}]}, 0x40}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 08:50:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x7ffff000) 08:50:02 executing program 1 (fault-call:9 fault-nth:10): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:50:02 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0xa) 08:50:02 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:50:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000100)='/dev/bsg\x00', 0x1, 0x0) sendmsg$TIPC_CMD_GET_NETID(r3, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0xdfda204c4e847c03}, 0x80) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) dup(r0) sendfile(r1, r4, 0x0, 0x200fc0) [ 181.755229][T14874] FAULT_INJECTION: forcing a failure. [ 181.755229][T14874] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 181.788994][T14874] CPU: 1 PID: 14874 Comm: syz-executor.1 Tainted: G W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 181.800623][T14874] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 181.810660][T14874] Call Trace: [ 181.813935][T14874] dump_stack+0x1b0/0x21e [ 181.818247][T14874] ? devkmsg_release+0x11c/0x11c [ 181.823165][T14874] ? show_regs_print_info+0x12/0x12 [ 181.828344][T14874] ? kasan_alloc_pages+0x4a/0x60 [ 181.833266][T14874] should_fail+0x6fb/0x860 [ 181.837691][T14874] ? setup_fault_attr+0x2b0/0x2b0 [ 181.842711][T14874] __alloc_pages_nodemask+0x1ee/0x7c0 [ 181.848070][T14874] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 181.853601][T14874] ? find_get_entry+0x5da/0x670 [ 181.858439][T14874] ? xa_load+0x323/0x340 [ 181.862668][T14874] __do_page_cache_readahead+0x244/0x510 [ 181.868286][T14874] ? read_cache_pages_invalidate_page+0x1b0/0x1b0 [ 181.874720][T14874] ? unwind_next_frame+0x1c07/0x22b0 [ 181.879988][T14874] ? page_cache_sync_readahead+0xa3/0x3c0 [ 181.885691][T14874] generic_file_read_iter+0x626/0x20a0 [ 181.891138][T14874] ? find_get_pages_range_tag+0xae0/0xae0 [ 181.896840][T14874] ? avc_has_perm_noaudit+0x2fc/0x3f0 [ 181.902192][T14874] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 181.908327][T14874] ? avc_denied+0x1c0/0x1c0 [ 181.912814][T14874] generic_file_splice_read+0x491/0x780 [ 181.918339][T14874] ? splice_shrink_spd+0xb0/0xb0 [ 181.923292][T14874] ? security_file_permission+0x1e9/0x300 [ 181.928991][T14874] ? splice_shrink_spd+0xb0/0xb0 [ 181.933912][T14874] splice_direct_to_actor+0x3cf/0xb00 [ 181.939281][T14874] ? do_splice_direct+0x3d0/0x3d0 [ 181.944285][T14874] ? pipe_to_sendpage+0x300/0x300 [ 181.949288][T14874] ? security_file_permission+0x128/0x300 [ 181.954988][T14874] do_splice_direct+0x279/0x3d0 [ 181.959838][T14874] ? splice_direct_to_actor+0xb00/0xb00 [ 181.965370][T14874] ? security_file_permission+0x128/0x300 [ 181.971072][T14874] do_sendfile+0x89d/0x1110 [ 181.975579][T14874] ? compat_writev+0x390/0x390 [ 181.980324][T14874] ? security_file_permission+0x128/0x300 [ 181.986026][T14874] ? vfs_write+0x427/0x4f0 [ 181.990431][T14874] ? fput_many+0x42/0x1a0 [ 181.994744][T14874] __x64_sys_sendfile64+0x1ae/0x220 [ 181.999931][T14874] ? __ia32_sys_sendfile+0x240/0x240 [ 182.005195][T14874] do_syscall_64+0xcb/0x150 [ 182.009687][T14874] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 182.015561][T14874] RIP: 0033:0x45de29 [ 182.019438][T14874] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 182.039023][T14874] RSP: 002b:00007fa46e034c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 182.047419][T14874] RAX: ffffffffffffffda RBX: 0000000000027ec0 RCX: 000000000045de29 08:50:03 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x4c, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:50:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0xffffffff000) [ 182.055372][T14874] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 182.063334][T14874] RBP: 00007fa46e034ca0 R08: 0000000000000000 R09: 0000000000000000 [ 182.071286][T14874] R10: 0000000000200fc0 R11: 0000000000000246 R12: 000000000000000a [ 182.079239][T14874] R13: 00007ffdeacd249f R14: 00007fa46e0359c0 R15: 000000000118bf2c 08:50:03 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0xf) 08:50:03 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x11) 08:50:03 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x4c, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:50:03 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x1c) 08:50:03 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x14, 0x2, 0x0, 0x1, [@vti_common_policy=[@IFLA_VTI_IKEY={0x8}, @IFLA_VTI_LINK={0x8, 0x1, r4}]]}}}]}, 0x40}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 08:50:03 executing program 1 (fault-call:9 fault-nth:11): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:50:03 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x4c, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:50:03 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r1, 0x800002, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x8a) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x115001, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r3, 0x89f4, &(0x7f0000000240)={'sit0\x00', &(0x7f00000001c0)={'ip6tnl0\x00', 0x0, 0x4, 0x8c, 0xe3, 0xffffffff, 0x8, @private1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x80, 0x7, 0x1, 0x80000000}}) close(r2) r4 = socket(0x1e, 0x4, 0x0) connect$tipc(r4, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendfile(r2, r5, 0x0, 0x200fc0) 08:50:03 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x60) [ 182.456781][T14913] FAULT_INJECTION: forcing a failure. [ 182.456781][T14913] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 182.491211][T14913] CPU: 0 PID: 14913 Comm: syz-executor.1 Tainted: G W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 182.502832][T14913] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 182.512954][T14913] Call Trace: [ 182.516230][T14913] dump_stack+0x1b0/0x21e [ 182.520556][T14913] ? devkmsg_release+0x11c/0x11c [ 182.525483][T14913] ? show_regs_print_info+0x12/0x12 [ 182.530665][T14913] ? kasan_alloc_pages+0x4a/0x60 [ 182.535596][T14913] should_fail+0x6fb/0x860 [ 182.539999][T14913] ? setup_fault_attr+0x2b0/0x2b0 [ 182.545013][T14913] __alloc_pages_nodemask+0x1ee/0x7c0 [ 182.550370][T14913] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 182.555900][T14913] ? find_get_entry+0x5da/0x670 [ 182.560739][T14913] ? xa_load+0x323/0x340 [ 182.564969][T14913] __do_page_cache_readahead+0x244/0x510 [ 182.570597][T14913] ? read_cache_pages_invalidate_page+0x1b0/0x1b0 [ 182.577009][T14913] ? unwind_next_frame+0x1c07/0x22b0 [ 182.582276][T14913] ? page_cache_sync_readahead+0xa3/0x3c0 [ 182.587984][T14913] generic_file_read_iter+0x626/0x20a0 [ 182.593434][T14913] ? find_get_pages_range_tag+0xae0/0xae0 [ 182.599139][T14913] ? avc_has_perm_noaudit+0x2fc/0x3f0 [ 182.604500][T14913] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 182.610547][T14913] ? avc_denied+0x1c0/0x1c0 [ 182.615043][T14913] generic_file_splice_read+0x491/0x780 [ 182.620582][T14913] ? splice_shrink_spd+0xb0/0xb0 [ 182.625511][T14913] ? security_file_permission+0x1e9/0x300 [ 182.631215][T14913] ? splice_shrink_spd+0xb0/0xb0 [ 182.636137][T14913] splice_direct_to_actor+0x3cf/0xb00 [ 182.641494][T14913] ? do_splice_direct+0x3d0/0x3d0 [ 182.646512][T14913] ? pipe_to_sendpage+0x300/0x300 [ 182.651521][T14913] ? security_file_permission+0x128/0x300 [ 182.657220][T14913] do_splice_direct+0x279/0x3d0 [ 182.662054][T14913] ? splice_direct_to_actor+0xb00/0xb00 [ 182.667588][T14913] ? security_file_permission+0x128/0x300 [ 182.673296][T14913] do_sendfile+0x89d/0x1110 [ 182.677782][T14913] ? compat_writev+0x390/0x390 [ 182.682528][T14913] ? security_file_permission+0x128/0x300 [ 182.688232][T14913] ? vfs_write+0x427/0x4f0 [ 182.692633][T14913] ? fput_many+0x42/0x1a0 [ 182.697036][T14913] __x64_sys_sendfile64+0x1ae/0x220 [ 182.702215][T14913] ? __ia32_sys_sendfile+0x240/0x240 08:50:03 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x58, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) [ 182.707580][T14913] do_syscall_64+0xcb/0x150 [ 182.712076][T14913] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 182.717950][T14913] RIP: 0033:0x45de29 [ 182.721828][T14913] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 182.741426][T14913] RSP: 002b:00007fa46e034c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 182.749820][T14913] RAX: ffffffffffffffda RBX: 0000000000027ec0 RCX: 000000000045de29 08:50:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x7, &(0x7f0000000100)=[{0x98, 0x7f, 0x8, 0x8000}, {0x80, 0x5, 0xfa, 0x7}, {0x9, 0x8, 0x6f, 0x9}, {0x3, 0x8, 0x3, 0x31d1}, {0x84, 0x40, 0x5, 0x6}, {0x7, 0x3b, 0x40, 0x6}, {0x2, 0x5, 0x6, 0x2}]}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r1, 0x800002, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x8a) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket(0x1e, 0x4, 0x0) connect$tipc(r3, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x200fc0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) [ 182.757776][T14913] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 182.765743][T14913] RBP: 00007fa46e034ca0 R08: 0000000000000000 R09: 0000000000000000 [ 182.773697][T14913] R10: 0000000000200fc0 R11: 0000000000000246 R12: 000000000000000b [ 182.781655][T14913] R13: 00007ffdeacd249f R14: 00007fa46e0359c0 R15: 000000000118bf2c 08:50:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket(0x10, 0x80002, 0x0) connect$tipc(r1, 0x0, 0x0) ioctl$PPPIOCGCHAN(r1, 0x80047437, &(0x7f0000000100)) r2 = socket$inet6(0xa, 0x400000000001, 0x0) ioctl$TIOCL_SETVESABLANK(r0, 0x541c, &(0x7f00000000c0)) close(r2) r3 = socket(0x1e, 0x4, 0x0) connect$tipc(r3, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x200fc0) 08:50:04 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0xe0) 08:50:04 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x58, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:50:04 executing program 1 (fault-call:9 fault-nth:12): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:50:04 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x58, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) [ 183.046696][T14950] FAULT_INJECTION: forcing a failure. [ 183.046696][T14950] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 183.061744][T14950] CPU: 0 PID: 14950 Comm: syz-executor.1 Tainted: G W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 183.073269][T14950] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 183.083314][T14950] Call Trace: [ 183.086696][T14950] dump_stack+0x1b0/0x21e [ 183.091015][T14950] ? devkmsg_release+0x11c/0x11c [ 183.095937][T14950] ? show_regs_print_info+0x12/0x12 [ 183.101121][T14950] ? kasan_alloc_pages+0x4a/0x60 [ 183.106057][T14950] should_fail+0x6fb/0x860 [ 183.110461][T14950] ? setup_fault_attr+0x2b0/0x2b0 [ 183.115469][T14950] __alloc_pages_nodemask+0x1ee/0x7c0 [ 183.120824][T14950] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 183.126359][T14950] ? find_get_entry+0x5da/0x670 [ 183.131223][T14950] ? xa_load+0x323/0x340 [ 183.135470][T14950] __do_page_cache_readahead+0x244/0x510 [ 183.141088][T14950] ? read_cache_pages_invalidate_page+0x1b0/0x1b0 [ 183.147488][T14950] ? unwind_next_frame+0x1c07/0x22b0 [ 183.152757][T14950] ? page_cache_sync_readahead+0xa3/0x3c0 [ 183.158471][T14950] generic_file_read_iter+0x626/0x20a0 [ 183.163937][T14950] ? find_get_pages_range_tag+0xae0/0xae0 [ 183.169642][T14950] ? avc_has_perm_noaudit+0x2fc/0x3f0 [ 183.175024][T14950] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 183.181075][T14950] ? avc_denied+0x1c0/0x1c0 [ 183.185562][T14950] generic_file_splice_read+0x491/0x780 [ 183.191087][T14950] ? splice_shrink_spd+0xb0/0xb0 [ 183.196027][T14950] ? security_file_permission+0x1e9/0x300 [ 183.201730][T14950] ? splice_shrink_spd+0xb0/0xb0 [ 183.206652][T14950] splice_direct_to_actor+0x3cf/0xb00 [ 183.212006][T14950] ? do_splice_direct+0x3d0/0x3d0 [ 183.217008][T14950] ? pipe_to_sendpage+0x300/0x300 [ 183.222020][T14950] ? security_file_permission+0x128/0x300 [ 183.227724][T14950] do_splice_direct+0x279/0x3d0 [ 183.232557][T14950] ? splice_direct_to_actor+0xb00/0xb00 [ 183.238086][T14950] ? security_file_permission+0x128/0x300 08:50:04 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x14, 0x2, 0x0, 0x1, [@vti_common_policy=[@IFLA_VTI_IKEY={0x8}, @IFLA_VTI_LINK={0x8, 0x1, r4}]]}}}]}, 0x40}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 183.243788][T14950] do_sendfile+0x89d/0x1110 [ 183.248278][T14950] ? compat_writev+0x390/0x390 [ 183.253028][T14950] ? security_file_permission+0x128/0x300 [ 183.258731][T14950] ? vfs_write+0x427/0x4f0 [ 183.263129][T14950] ? fput_many+0x42/0x1a0 [ 183.267450][T14950] __x64_sys_sendfile64+0x1ae/0x220 [ 183.272632][T14950] ? __ia32_sys_sendfile+0x240/0x240 [ 183.277918][T14950] do_syscall_64+0xcb/0x150 [ 183.282408][T14950] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 183.288285][T14950] RIP: 0033:0x45de29 [ 183.292165][T14950] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 183.311761][T14950] RSP: 002b:00007fa46e034c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 183.320151][T14950] RAX: ffffffffffffffda RBX: 0000000000027ec0 RCX: 000000000045de29 [ 183.328128][T14950] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 183.336172][T14950] RBP: 00007fa46e034ca0 R08: 0000000000000000 R09: 0000000000000000 08:50:04 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$LOOP_CLR_FD(r1, 0x4c01) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x800002, 0x0) write$binfmt_aout(r2, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x8a) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = socket(0x1e, 0x4, 0x0) connect$tipc(r4, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x200fc0) [ 183.344124][T14950] R10: 0000000000200fc0 R11: 0000000000000246 R12: 000000000000000c [ 183.352076][T14950] R13: 00007ffdeacd249f R14: 00007fa46e0359c0 R15: 000000000118bf2c 08:50:04 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x1f4) 08:50:04 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x58, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:50:04 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x300) 08:50:04 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x58, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:50:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x800, 0x0) close(r1) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000440)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000000000001050001000000000014000300fc020000000000000000000000000000050001000000000028f6e8e3f54b1261400be9755feefb1f23c288df40579e490225e824a712b5ccd3312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab208d44fb1d27ccefc871df58db47eeac6111786c987cab"], 0x64}, 0x1, 0x0, 0x0, 0x4808}, 0x4000000) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0x64, r2, 0x2, 0x70bd25, 0x25dfdbfe, {}, [@NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @private=0xa010100}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @local}, @NLBL_UNLABEL_A_SECCTX={0x2a, 0x7, 'system_u:object_r:dmidecode_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @remote}]}, 0x64}, 0x1, 0x0, 0x0, 0x4000800}, 0x4) r3 = socket(0x1e, 0x4, 0x0) connect$tipc(r3, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x200fc0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/schedstat\x00', 0x0, 0x0) setsockopt$TIPC_IMPORTANCE(r5, 0x10f, 0x7f, &(0x7f00000001c0)=0x2, 0x4) 08:50:04 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x3e8) 08:50:04 executing program 1 (fault-call:9 fault-nth:13): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:50:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0xa, 0x6) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) [ 183.692538][T14993] FAULT_INJECTION: forcing a failure. [ 183.692538][T14993] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 183.725463][T14993] CPU: 1 PID: 14993 Comm: syz-executor.1 Tainted: G W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 183.737089][T14993] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 183.747158][T14993] Call Trace: [ 183.750444][T14993] dump_stack+0x1b0/0x21e [ 183.754763][T14993] ? devkmsg_release+0x11c/0x11c [ 183.759700][T14993] ? show_regs_print_info+0x12/0x12 [ 183.764877][T14993] ? kasan_alloc_pages+0x4a/0x60 [ 183.769793][T14993] should_fail+0x6fb/0x860 [ 183.774198][T14993] ? setup_fault_attr+0x2b0/0x2b0 [ 183.779203][T14993] __alloc_pages_nodemask+0x1ee/0x7c0 [ 183.784547][T14993] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 183.790093][T14993] ? find_get_entry+0x5da/0x670 [ 183.794910][T14993] ? xa_load+0x323/0x340 [ 183.799119][T14993] __do_page_cache_readahead+0x244/0x510 [ 183.804756][T14993] ? read_cache_pages_invalidate_page+0x1b0/0x1b0 [ 183.811144][T14993] ? unwind_next_frame+0x1c07/0x22b0 [ 183.816411][T14993] ? page_cache_sync_readahead+0xa3/0x3c0 [ 183.822110][T14993] generic_file_read_iter+0x626/0x20a0 [ 183.827536][T14993] ? find_get_pages_range_tag+0xae0/0xae0 [ 183.833219][T14993] ? avc_has_perm_noaudit+0x2fc/0x3f0 [ 183.838554][T14993] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 183.844620][T14993] ? avc_denied+0x1c0/0x1c0 [ 183.849092][T14993] generic_file_splice_read+0x491/0x780 [ 183.854607][T14993] ? splice_shrink_spd+0xb0/0xb0 [ 183.859524][T14993] ? security_file_permission+0x1e9/0x300 [ 183.865207][T14993] ? splice_shrink_spd+0xb0/0xb0 [ 183.870108][T14993] splice_direct_to_actor+0x3cf/0xb00 [ 183.875446][T14993] ? do_splice_direct+0x3d0/0x3d0 [ 183.880434][T14993] ? pipe_to_sendpage+0x300/0x300 [ 183.885431][T14993] ? security_file_permission+0x128/0x300 [ 183.891114][T14993] do_splice_direct+0x279/0x3d0 [ 183.896055][T14993] ? splice_direct_to_actor+0xb00/0xb00 [ 183.901579][T14993] ? security_file_permission+0x128/0x300 [ 183.907260][T14993] do_sendfile+0x89d/0x1110 [ 183.911730][T14993] ? compat_writev+0x390/0x390 [ 183.916460][T14993] ? security_file_permission+0x128/0x300 [ 183.922144][T14993] ? vfs_write+0x427/0x4f0 [ 183.926528][T14993] ? fput_many+0x42/0x1a0 [ 183.930825][T14993] __x64_sys_sendfile64+0x1ae/0x220 [ 183.935989][T14993] ? __ia32_sys_sendfile+0x240/0x240 [ 183.941239][T14993] do_syscall_64+0xcb/0x150 [ 183.945715][T14993] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 183.951572][T14993] RIP: 0033:0x45de29 [ 183.955434][T14993] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 183.975026][T14993] RSP: 002b:00007fa46e034c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 183.983511][T14993] RAX: ffffffffffffffda RBX: 0000000000027ec0 RCX: 000000000045de29 08:50:05 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x58, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:50:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) r4 = open_tree(r3, &(0x7f00000002c0)='./bus\x00', 0x100) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r4, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x30, r5, 0x200, 0x70bd2b, 0x25dfdbfb, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x40010}, 0x40010) r6 = fsmount(r3, 0x0, 0x82) r7 = socket(0x10, 0x80002, 0x0) connect$tipc(r7, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r7, 0x89f5, &(0x7f0000000280)={'syztnl1\x00', &(0x7f0000000200)={'sit0\x00', 0x0, 0x29, 0x6, 0xa3, 0x8, 0x30, @ipv4={[], [], @loopback}, @ipv4={[], [], @broadcast}, 0x0, 0x7800, 0x8, 0x1000}}) sendmsg$NFNL_MSG_CTHELPER_DEL(r6, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x34, 0x2, 0x9, 0x5, 0x0, 0x0, {0x0, 0x0, 0x6}, [@NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x1}}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x101}}, @NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x40001}, 0x80) [ 183.991473][T14993] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 183.999518][T14993] RBP: 00007fa46e034ca0 R08: 0000000000000000 R09: 0000000000000000 [ 184.007456][T14993] R10: 0000000000200fc0 R11: 0000000000000246 R12: 000000000000000d [ 184.015391][T14993] R13: 00007ffdeacd249f R14: 00007fa46e0359c0 R15: 000000000118bf2c 08:50:05 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x14, 0x2, 0x0, 0x1, [@vti_common_policy=[@IFLA_VTI_IKEY={0x8}, @IFLA_VTI_LINK={0x8, 0x1, r4}]]}}}]}, 0x40}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 08:50:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x8a) lseek(r0, 0x800002, 0x2) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f00000000c0)=@nameseq={0x1e, 0x1, 0x3, {0x1, 0x0, 0x1}}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x201, 0x0) write$tun(r3, 0x0, 0x0) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x200fc0) 08:50:05 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x600) 08:50:05 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:50:05 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:50:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x2) setsockopt$inet_tcp_int(r0, 0x6, 0x8, &(0x7f00000002c0)=0x1, 0x4) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f00000018c0)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000001600)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_MCAST_RATE(r5, &(0x7f0000001700)={0x0, 0x0, &(0x7f00000016c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="240004009fff582a47b4f8fa97f5804d25f55039213d8c43ba91c35041b5c73850bde93687", @ANYRES16=r6, @ANYBLOB="010000000000000000005c00000008000300", @ANYRES32=r7, @ANYBLOB='\b\x00k\x00\n\x00\x00\x00'], 0x24}}, 0x0) sendmsg$NL80211_CMD_GET_MPATH(r3, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x50, r6, 0x20, 0x70bd2d, 0x25dfdbfe, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}]}, 0x50}, 0x1, 0x0, 0x0, 0x44}, 0x14) r8 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0xc, 0x121041) write$evdev(r8, &(0x7f0000000040)=[{{}, 0x1, 0x43, 0x2}], 0x18) write$evdev(r8, &(0x7f0000000040), 0x373) sendfile(r1, r8, 0x0, 0x200fc0) 08:50:05 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0xa00) 08:50:05 executing program 1 (fault-call:9 fault-nth:14): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:50:05 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:50:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) [ 184.424304][T15045] FAULT_INJECTION: forcing a failure. [ 184.424304][T15045] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 184.460393][T15045] CPU: 0 PID: 15045 Comm: syz-executor.1 Tainted: G W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 184.472064][T15045] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 184.482102][T15045] Call Trace: [ 184.485383][T15045] dump_stack+0x1b0/0x21e [ 184.489703][T15045] ? devkmsg_release+0x11c/0x11c [ 184.494641][T15045] ? show_regs_print_info+0x12/0x12 [ 184.499829][T15045] ? kasan_alloc_pages+0x4a/0x60 [ 184.504772][T15045] should_fail+0x6fb/0x860 [ 184.509183][T15045] ? setup_fault_attr+0x2b0/0x2b0 [ 184.514206][T15045] __alloc_pages_nodemask+0x1ee/0x7c0 [ 184.519563][T15045] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 184.525093][T15045] ? find_get_entry+0x5da/0x670 [ 184.529928][T15045] ? xa_load+0x323/0x340 [ 184.534153][T15045] __do_page_cache_readahead+0x244/0x510 [ 184.539770][T15045] ? read_cache_pages_invalidate_page+0x1b0/0x1b0 [ 184.546174][T15045] ? unwind_next_frame+0x1c07/0x22b0 [ 184.551457][T15045] ? page_cache_sync_readahead+0xa3/0x3c0 [ 184.557162][T15045] generic_file_read_iter+0x626/0x20a0 [ 184.562610][T15045] ? find_get_pages_range_tag+0xae0/0xae0 [ 184.568312][T15045] ? avc_has_perm_noaudit+0x2fc/0x3f0 08:50:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000018c0)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000001600)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_MCAST_RATE(r2, &(0x7f0000001700)={0x0, 0x0, &(0x7f00000016c0)={&(0x7f0000001640)={0x24, r3, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_MCAST_RATE={0x8, 0x6b, 0xa}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_DEL_MPATH(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000005}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x94, 0x0, 0x200, 0x70bd2c, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}]}, 0x94}, 0x1, 0x0, 0x0, 0xd0}, 0x24044080) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r5, 0x800002, 0x0) write$binfmt_aout(r5, &(0x7f00000000c0)=ANY=[], 0x8a) r6 = socket$inet6(0xa, 0x400000000001, 0x0) close(r6) r7 = socket(0x1e, 0x4, 0x0) connect$tipc(r7, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r8 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r6, r8, 0x0, 0x200fc0) [ 184.573673][T15045] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 184.579728][T15045] ? avc_denied+0x1c0/0x1c0 [ 184.584227][T15045] generic_file_splice_read+0x491/0x780 [ 184.589757][T15045] ? splice_shrink_spd+0xb0/0xb0 [ 184.594684][T15045] ? security_file_permission+0x1e9/0x300 [ 184.600387][T15045] ? splice_shrink_spd+0xb0/0xb0 [ 184.605318][T15045] splice_direct_to_actor+0x3cf/0xb00 [ 184.610673][T15045] ? do_splice_direct+0x3d0/0x3d0 [ 184.615683][T15045] ? pipe_to_sendpage+0x300/0x300 [ 184.620689][T15045] ? security_file_permission+0x128/0x300 [ 184.626393][T15045] do_splice_direct+0x279/0x3d0 [ 184.631229][T15045] ? splice_direct_to_actor+0xb00/0xb00 [ 184.636781][T15045] ? security_file_permission+0x128/0x300 [ 184.642487][T15045] do_sendfile+0x89d/0x1110 [ 184.646974][T15045] ? compat_writev+0x390/0x390 [ 184.651722][T15045] ? security_file_permission+0x128/0x300 [ 184.657425][T15045] ? vfs_write+0x427/0x4f0 [ 184.661827][T15045] ? fput_many+0x42/0x1a0 [ 184.666136][T15045] __x64_sys_sendfile64+0x1ae/0x220 [ 184.671315][T15045] ? __ia32_sys_sendfile+0x240/0x240 [ 184.676594][T15045] do_syscall_64+0xcb/0x150 [ 184.681085][T15045] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 184.686964][T15045] RIP: 0033:0x45de29 [ 184.690842][T15045] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 184.710426][T15045] RSP: 002b:00007fa46e034c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 08:50:05 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x58, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) [ 184.718833][T15045] RAX: ffffffffffffffda RBX: 0000000000027ec0 RCX: 000000000045de29 [ 184.726786][T15045] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 184.734745][T15045] RBP: 00007fa46e034ca0 R08: 0000000000000000 R09: 0000000000000000 [ 184.742703][T15045] R10: 0000000000200fc0 R11: 0000000000000246 R12: 000000000000000e [ 184.750659][T15045] R13: 00007ffdeacd249f R14: 00007fa46e0359c0 R15: 000000000118bf2c 08:50:06 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x14, 0x2, 0x0, 0x1, [@vti_common_policy=[@IFLA_VTI_IKEY={0x8}, @IFLA_VTI_LINK={0x8, 0x1, r4}]]}}}]}, 0x40}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 08:50:06 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x673543e4, 0x0, @perf_bp={&(0x7f0000000340), 0x8}, 0x0, 0x3, 0x0, 0x0, 0x0, 0x400040}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) r3 = socket(0x1e, 0x4, 0x0) connect$tipc(r3, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x200fc2) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$MON_IOCG_STATS(r5, 0x80089203, &(0x7f00000000c0)) r6 = accept$inet(r4, 0x0, &(0x7f0000000100)) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000280)=@get={0x1, &(0x7f0000000200)=""/103, 0x5b}) accept(r6, &(0x7f0000000140)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, &(0x7f00000001c0)=0x80) 08:50:06 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0xf00) 08:50:06 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r1, 0x800002, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x8a) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket(0x1e, 0x4, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0xc02, 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000180)=0x6) write$FUSE_LSEEK(r4, &(0x7f0000000140)={0x18, 0x0, 0x0, {0x8}}, 0x18) connect$tipc(r3, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r2, r5, 0x0, 0x200fc0) 08:50:06 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x58, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:50:06 executing program 1 (fault-call:9 fault-nth:15): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:50:06 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x7fffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) [ 184.963559][T15084] FAULT_INJECTION: forcing a failure. [ 184.963559][T15084] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 185.005491][T15084] CPU: 0 PID: 15084 Comm: syz-executor.1 Tainted: G W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 185.017030][T15084] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 185.027151][T15084] Call Trace: [ 185.030425][T15084] dump_stack+0x1b0/0x21e [ 185.034741][T15084] ? devkmsg_release+0x11c/0x11c [ 185.039678][T15084] ? show_regs_print_info+0x12/0x12 [ 185.044862][T15084] ? kasan_alloc_pages+0x4a/0x60 [ 185.049793][T15084] should_fail+0x6fb/0x860 [ 185.054195][T15084] ? setup_fault_attr+0x2b0/0x2b0 [ 185.059204][T15084] __alloc_pages_nodemask+0x1ee/0x7c0 [ 185.064564][T15084] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 185.070091][T15084] ? find_get_entry+0x5da/0x670 [ 185.075012][T15084] ? xa_load+0x323/0x340 [ 185.079240][T15084] __do_page_cache_readahead+0x244/0x510 [ 185.084868][T15084] ? read_cache_pages_invalidate_page+0x1b0/0x1b0 [ 185.091270][T15084] ? unwind_next_frame+0x1c07/0x22b0 [ 185.096536][T15084] ? page_cache_sync_readahead+0xa3/0x3c0 08:50:06 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@name={0x1e, 0x2, 0x3, {{0x0, 0x1}, 0x2}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:50:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r2, 0x6, 0x25, 0x0, &(0x7f0000000200)) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000100)={0x0, @remote, @initdev}, &(0x7f0000000140)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000180)={@ipv4={[], [], @loopback}, 0x36, r3}) close(r1) r4 = socket(0x1e, 0x4, 0x0) connect$tipc(r4, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r5, 0x0, 0x200fc0) [ 185.102235][T15084] generic_file_read_iter+0x626/0x20a0 [ 185.107686][T15084] ? find_get_pages_range_tag+0xae0/0xae0 [ 185.113386][T15084] ? avc_has_perm_noaudit+0x2fc/0x3f0 [ 185.118773][T15084] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 185.124824][T15084] ? avc_denied+0x1c0/0x1c0 [ 185.129320][T15084] generic_file_splice_read+0x491/0x780 [ 185.134849][T15084] ? splice_shrink_spd+0xb0/0xb0 [ 185.139919][T15084] ? security_file_permission+0x1e9/0x300 [ 185.145641][T15084] ? splice_shrink_spd+0xb0/0xb0 [ 185.150564][T15084] splice_direct_to_actor+0x3cf/0xb00 [ 185.155915][T15084] ? do_splice_direct+0x3d0/0x3d0 [ 185.160922][T15084] ? pipe_to_sendpage+0x300/0x300 [ 185.165943][T15084] ? security_file_permission+0x128/0x300 [ 185.171644][T15084] do_splice_direct+0x279/0x3d0 [ 185.176481][T15084] ? splice_direct_to_actor+0xb00/0xb00 [ 185.182013][T15084] ? security_file_permission+0x128/0x300 [ 185.187712][T15084] do_sendfile+0x89d/0x1110 [ 185.192197][T15084] ? compat_writev+0x390/0x390 [ 185.196945][T15084] ? security_file_permission+0x128/0x300 [ 185.202648][T15084] ? vfs_write+0x427/0x4f0 [ 185.207045][T15084] ? fput_many+0x42/0x1a0 [ 185.211371][T15084] __x64_sys_sendfile64+0x1ae/0x220 [ 185.216567][T15084] ? __ia32_sys_sendfile+0x240/0x240 [ 185.221843][T15084] do_syscall_64+0xcb/0x150 [ 185.226328][T15084] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 185.232212][T15084] RIP: 0033:0x45de29 [ 185.236109][T15084] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 08:50:06 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:50:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x0, 0x8, 0x0, 0x0, 0x400000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x2, 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000100)='./file0\x00', 0x6000c2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000140)={@mcast2, 0x8, 0x0, 0x0, 0x9, 0x400, 0xd85}, 0x20) sendfile(r1, r3, 0x0, 0x200fc0) 08:50:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000100)={0x2, 'veth1\x00', 0x2}, 0x18) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) [ 185.255728][T15084] RSP: 002b:00007fa46e034c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 185.264121][T15084] RAX: ffffffffffffffda RBX: 0000000000027ec0 RCX: 000000000045de29 [ 185.272086][T15084] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 185.280159][T15084] RBP: 00007fa46e034ca0 R08: 0000000000000000 R09: 0000000000000000 [ 185.288115][T15084] R10: 0000000000200fc0 R11: 0000000000000246 R12: 000000000000000f [ 185.296086][T15084] R13: 00007ffdeacd249f R14: 00007fa46e0359c0 R15: 000000000118bf2c 08:50:06 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x14, 0x2, 0x0, 0x1, [@vti_common_policy=[@IFLA_VTI_IKEY={0x8}, @IFLA_VTI_LINK={0x8, 0x1, r4}]]}}}]}, 0x40}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 08:50:06 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x58, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:50:06 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x1100) 08:50:06 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r1, 0x800002, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x8a) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket(0x1e, 0x4, 0x0) connect$tipc(r3, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x200fc0) fgetxattr(r0, &(0x7f0000000180)=@random={'security.', 'SEG6\x00'}, &(0x7f0000000280)=""/184, 0xb8) r5 = socket$inet_udp(0x2, 0x2, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f00000018c0)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000001600)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_MCAST_RATE(r6, &(0x7f0000001700)={0x0, 0x0, &(0x7f00000016c0)={&(0x7f0000001640)={0x24, r7, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r8}, @void}}, [@NL80211_ATTR_MCAST_RATE={0x8, 0x6b, 0xa}]}, 0x24}}, 0x0) r9 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r6, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="a4009f7a2d5ae400"/17, @ANYRES16=r9, @ANYBLOB="100029bd7000fedbdf250300000005000500010000000500050005000000"], 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x4000840) 08:50:06 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') sendmsg$NL80211_CMD_GET_SURVEY(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, r3, 0x200, 0x70bd25, 0x25dfdbfe, {{}, {@void, @val={0xc, 0x99, {0xffffffff, 0x74}}}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x40010}, 0x40000) dup(r2) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x200fc0) r5 = socket(0x10, 0x80002, 0x0) connect$tipc(r5, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r5, 0x541b, &(0x7f0000000200)) 08:50:06 executing program 1 (fault-call:9 fault-nth:16): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) [ 185.773319][T15130] FAULT_INJECTION: forcing a failure. [ 185.773319][T15130] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 185.811739][T15130] CPU: 1 PID: 15130 Comm: syz-executor.1 Tainted: G W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 185.823283][T15130] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 185.833336][T15130] Call Trace: [ 185.836612][T15130] dump_stack+0x1b0/0x21e [ 185.840929][T15130] ? devkmsg_release+0x11c/0x11c [ 185.845852][T15130] ? show_regs_print_info+0x12/0x12 [ 185.851034][T15130] ? kasan_alloc_pages+0x4a/0x60 [ 185.855961][T15130] should_fail+0x6fb/0x860 [ 185.860367][T15130] ? setup_fault_attr+0x2b0/0x2b0 [ 185.865375][T15130] __alloc_pages_nodemask+0x1ee/0x7c0 [ 185.870738][T15130] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 185.876269][T15130] ? find_get_entry+0x5da/0x670 [ 185.881112][T15130] ? xa_load+0x323/0x340 [ 185.885447][T15130] __do_page_cache_readahead+0x244/0x510 [ 185.891061][T15130] ? read_cache_pages_invalidate_page+0x1b0/0x1b0 [ 185.897461][T15130] ? unwind_next_frame+0x1c07/0x22b0 [ 185.902728][T15130] ? page_cache_sync_readahead+0xa3/0x3c0 [ 185.908432][T15130] generic_file_read_iter+0x626/0x20a0 [ 185.913880][T15130] ? find_get_pages_range_tag+0xae0/0xae0 [ 185.919601][T15130] ? avc_has_perm_noaudit+0x2fc/0x3f0 [ 185.924956][T15130] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 185.931007][T15130] ? avc_denied+0x1c0/0x1c0 [ 185.935499][T15130] generic_file_splice_read+0x491/0x780 [ 185.941030][T15130] ? splice_shrink_spd+0xb0/0xb0 [ 185.945952][T15130] ? security_file_permission+0x1e9/0x300 [ 185.951666][T15130] ? splice_shrink_spd+0xb0/0xb0 [ 185.956583][T15130] splice_direct_to_actor+0x3cf/0xb00 [ 185.961947][T15130] ? do_splice_direct+0x3d0/0x3d0 [ 185.966953][T15130] ? pipe_to_sendpage+0x300/0x300 [ 185.971959][T15130] ? security_file_permission+0x128/0x300 [ 185.977659][T15130] do_splice_direct+0x279/0x3d0 [ 185.982504][T15130] ? splice_direct_to_actor+0xb00/0xb00 [ 185.988036][T15130] ? security_file_permission+0x128/0x300 [ 185.993736][T15130] do_sendfile+0x89d/0x1110 [ 185.998223][T15130] ? compat_writev+0x390/0x390 [ 186.002969][T15130] ? security_file_permission+0x128/0x300 [ 186.008681][T15130] ? vfs_write+0x427/0x4f0 [ 186.013105][T15130] ? fput_many+0x42/0x1a0 [ 186.017417][T15130] __x64_sys_sendfile64+0x1ae/0x220 08:50:07 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) [ 186.022602][T15130] ? __ia32_sys_sendfile+0x240/0x240 [ 186.027866][T15130] do_syscall_64+0xcb/0x150 [ 186.032352][T15130] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 186.038225][T15130] RIP: 0033:0x45de29 [ 186.042099][T15130] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 186.061682][T15130] RSP: 002b:00007fa46e034c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 08:50:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r0}, 0x8) fsetxattr$security_selinux(r3, &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000180)='system_u:object_r:anacron_exec_t:s0\x00', 0x24, 0x2) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x200fc0) 08:50:07 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x1c00) [ 186.070061][T15130] RAX: ffffffffffffffda RBX: 0000000000027ec0 RCX: 000000000045de29 [ 186.078000][T15130] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 186.085940][T15130] RBP: 00007fa46e034ca0 R08: 0000000000000000 R09: 0000000000000000 [ 186.093885][T15130] R10: 0000000000200fc0 R11: 0000000000000246 R12: 0000000000000010 [ 186.101836][T15130] R13: 00007ffdeacd249f R14: 00007fa46e0359c0 R15: 000000000118bf2c 08:50:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x1f, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5}, 0x0, 0x0, 0x4000000, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) llistxattr(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)=""/36, 0x24) 08:50:07 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:50:07 executing program 1 (fault-call:9 fault-nth:17): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) [ 186.360226][T15162] FAULT_INJECTION: forcing a failure. [ 186.360226][T15162] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 186.389236][T15162] CPU: 1 PID: 15162 Comm: syz-executor.1 Tainted: G W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 186.400773][T15162] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 186.410806][T15162] Call Trace: [ 186.414070][T15162] dump_stack+0x1b0/0x21e [ 186.418375][T15162] ? devkmsg_release+0x11c/0x11c [ 186.423299][T15162] ? show_regs_print_info+0x12/0x12 [ 186.428462][T15162] ? kasan_alloc_pages+0x4a/0x60 [ 186.433367][T15162] should_fail+0x6fb/0x860 [ 186.437750][T15162] ? setup_fault_attr+0x2b0/0x2b0 [ 186.442743][T15162] __alloc_pages_nodemask+0x1ee/0x7c0 [ 186.448085][T15162] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 186.453596][T15162] ? find_get_entry+0x5da/0x670 [ 186.458409][T15162] ? xa_load+0x323/0x340 [ 186.462617][T15162] __do_page_cache_readahead+0x244/0x510 [ 186.468217][T15162] ? read_cache_pages_invalidate_page+0x1b0/0x1b0 [ 186.474596][T15162] ? unwind_next_frame+0x1c07/0x22b0 [ 186.479852][T15162] ? page_cache_sync_readahead+0xa3/0x3c0 [ 186.485544][T15162] generic_file_read_iter+0x626/0x20a0 [ 186.490984][T15162] ? find_get_pages_range_tag+0xae0/0xae0 [ 186.496668][T15162] ? avc_has_perm_noaudit+0x2fc/0x3f0 [ 186.502009][T15162] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 186.508039][T15162] ? avc_denied+0x1c0/0x1c0 [ 186.512510][T15162] generic_file_splice_read+0x491/0x780 [ 186.518019][T15162] ? splice_shrink_spd+0xb0/0xb0 [ 186.522925][T15162] ? security_file_permission+0x1e9/0x300 [ 186.528610][T15162] ? splice_shrink_spd+0xb0/0xb0 [ 186.533515][T15162] splice_direct_to_actor+0x3cf/0xb00 [ 186.538854][T15162] ? do_splice_direct+0x3d0/0x3d0 [ 186.543863][T15162] ? pipe_to_sendpage+0x300/0x300 [ 186.548871][T15162] ? security_file_permission+0x128/0x300 [ 186.554559][T15162] do_splice_direct+0x279/0x3d0 [ 186.559377][T15162] ? splice_direct_to_actor+0xb00/0xb00 [ 186.564890][T15162] ? security_file_permission+0x128/0x300 [ 186.570575][T15162] do_sendfile+0x89d/0x1110 [ 186.575044][T15162] ? compat_writev+0x390/0x390 [ 186.579792][T15162] ? security_file_permission+0x128/0x300 [ 186.585493][T15162] ? vfs_write+0x427/0x4f0 [ 186.589899][T15162] ? fput_many+0x42/0x1a0 [ 186.594202][T15162] __x64_sys_sendfile64+0x1ae/0x220 [ 186.599366][T15162] ? __ia32_sys_sendfile+0x240/0x240 [ 186.604619][T15162] do_syscall_64+0xcb/0x150 [ 186.609090][T15162] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 186.614956][T15162] RIP: 0033:0x45de29 [ 186.618821][T15162] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 186.638408][T15162] RSP: 002b:00007fa46e034c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 186.646784][T15162] RAX: ffffffffffffffda RBX: 0000000000027ec0 RCX: 000000000045de29 08:50:07 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x14, 0x2, 0x0, 0x1, [@vti_common_policy=[@IFLA_VTI_IKEY={0x8}, @IFLA_VTI_LINK={0x8, 0x1, r4}]]}}}]}, 0x40}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 08:50:07 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:50:07 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x2000) [ 186.654732][T15162] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 186.662674][T15162] RBP: 00007fa46e034ca0 R08: 0000000000000000 R09: 0000000000000000 [ 186.670614][T15162] R10: 0000000000200fc0 R11: 0000000000000246 R12: 0000000000000011 [ 186.678552][T15162] R13: 00007ffdeacd249f R14: 00007fa46e0359c0 R15: 000000000118bf2c 08:50:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0xa) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000540)={{{@in=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) sendmmsg$inet(r3, &(0x7f0000000f00)=[{{&(0x7f0000000180)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000500)=[{&(0x7f0000000240)="3c27210ee25ed6b24ef40c212d1a78648d2512b2790c9ca1de7f493026f72f28488003d4c0c6d27069d05f086abcd528c96818a48e189415b8624f081c9831076b1757c8bc351fa3274bc3a7614ebdbffe7e3debae8670afd20dcfa778bc074bdc1b56fa27d09cbc6ca93b5bdba3221516bc55d3051db68209b98d6ff5f441b7653d2f4646ccc0957cbf0ea0e821f68b6b41fc111c3264f777fa8937407646acb5a7b9a2e7e6a58855bad99c68ee0170c30a1ee4805c63d07d4e472c3857c8c51ce01643be680d190c2ca759e6b60cd5972c3b56a1c370140c84a035c74d715f224a195ca6584b424c96996056769f310e22883e", 0xf4}, {&(0x7f0000000340)="951723c15082516a8acca8e5ec7d3c5c8afe5d8addf51f682a2f41819e7ff8e200b9ae8c19643d721ef8ab5c6ae440f7415898bc8eb597b8fa93a0097c3b2ec8b62dff8e57dd8e2931cca8fe33c8538d735a583706120384664105e0fe194cf19b40ba29dd8a2b2f32b84ae6f87edf36c0ab84bc50f55c1533bff529bbebdabecf77b0a6d0877108d91f0f5fff4e439df418938d5cfd1b59d2bb56d0fa768400c687545bf496ce26eacdba88d04d9686fcd830faccd3cb52ffecb749d19e207b1ef7da4164b1873b9a34f54b6d842345", 0xd0}, {&(0x7f00000001c0)="33ff505254172bfd9daaa0abca15f6109e", 0x11}, {&(0x7f0000000440)="c52c532ede50d0fb21837ed468e572455efd4528f7a325372b452c523a71f369b7adbaecab8e8519b229d3e163903ffcc140502e49de54e48af2b1f829d4ce7c5d276fa7f0f341eabcac5d34dfeb41e8fa4f2c326315bef2526f404fa3300d6aef4e77113c619477c15b3a12dd16450b38507d148dafe017269a191a8edc3df1f7c18d6313c35deffe3f8f4ddc57f70290bc58cbfd5f051b80143ff5b5e24725845eb4c3caea82bd4a279fd6b8118d5d99d24138b4ee17e3585557", 0xbb}], 0x4, &(0x7f0000000680)=[@ip_ttl={{0x14, 0x0, 0x2, 0x1f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x7}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @private=0xa010100, @empty}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @private=0xa010102}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x331}}], 0x88}}, {{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000740)="47d404b187314047316d5040fa8235f2987e080ba95cb9f214a5fecbde89cac0810006eea260f4d97bb8d9d02cebe9ea30781a0d9ce807c1dd216672084662fe97", 0x41}, {&(0x7f00000007c0)="108ada52f454aafe91b6b2ffc831fd6aa738b3481d99458e096e09349e06d9affaa7ac9bfe70ff5036ba640dd97efb626067af9505f962010aec3da225f7a3f784fba61c26020f0293bb3ff0b7ed1c674095", 0x52}, {&(0x7f0000000840)="68b435e2a0fd5cd9adfb836a7a002017febd4006184a7478272e2e969fb68e667b406b7c41a556b3ae8f6eadad799664c9ca1138d8213168e33b2887e8728646704f0324168d7df1dec6f9cdcf9f0fd72444fe9d4b600a53986e03bd8e10adbc62b6891794282fbee28a817d434d65c60f2555ba697727c89c30f94855582a14ebf5218d910932cb", 0x88}, {&(0x7f0000000900)="df74afb8dfcceecf69ff04e8b85b426aa02a9c8f0d700347554f302c8141ab195eee3c1fecdabe1113b41177f4a7bd689bcc4f07a62332facf8cd8367e9c99e3dced97b08d4591e9b3419a4e61f0404ba2635e5a56ea1b8ed5506c8de0bae28ba25c29f0e534434055ef7730531d2178c50059cd8bcef203447d78ec4deccd08a8288fba4dbbcbcaf3d4f26c9d28502c91d5694e98293b1ed47ddaa5ae8a054473a1d8070c7b09f04c94683f6fcd3d6cac9fa43b23c8dd8d6e28d761c1b6bf93208a782fdf116daf093f97a2bde693a941f353fdc3", 0xd5}], 0x4, &(0x7f0000000a40)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_retopts={{0x40, 0x0, 0x7, {[@lsrr={0x83, 0xb, 0x94, [@multicast2, @multicast1]}, @timestamp_addr={0x44, 0x24, 0xd4, 0x1, 0x5, [{@empty, 0xfffffeff}, {@empty, 0x9}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x6e}, {@local, 0x2}]}]}}}, @ip_retopts={{0xa8, 0x0, 0x7, {[@timestamp_addr={0x44, 0x34, 0xf0, 0x1, 0x5, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@multicast2, 0x1}, {@private=0x1, 0x6}, {@loopback, 0x200}, {@local, 0x400}, {@private=0xa010102}]}, @timestamp={0x44, 0x8, 0x10, 0x0, 0xd, [0xffff]}, @timestamp_prespec={0x44, 0x24, 0x96, 0x3, 0x8, [{@rand_addr=0x64010102, 0x5}, {@empty, 0x3ff}, {@dev={0xac, 0x14, 0x14, 0x11}, 0xfffffffb}, {@broadcast, 0x9}]}, @cipso={0x86, 0xf, 0x0, [{0x4, 0x7, "378d3713c4"}, {0x0, 0x2}]}, @end, @lsrr={0x83, 0xb, 0x7a, [@empty, @local]}, @timestamp={0x44, 0x10, 0xb4, 0x0, 0x1, [0x8001, 0xff, 0x200]}, @timestamp_addr={0x44, 0xc, 0xa4, 0x1, 0xc, [{@empty, 0x5}]}, @noop]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x5}}], 0x118}}, {{&(0x7f0000000b80)={0x2, 0x4e24, @multicast2}, 0x10, &(0x7f0000000c80)=[{&(0x7f0000000bc0)="ffca630217211babd2ae2f841eee4fee832183519d2150e8fcc0b462b4283f175b56bf04999cd80d009bbdf57cf3a19af107276b6a17f1bf86374a3a2d5c87b7ef4ebf78455b796e7667b97692d27f0d48264a4a15771097aaecbcdeb114266db0c90be0d05dbaff982ee3b60c140bfe52a7f87155309c10922dfbdcb72e3361d70cfef2e57cfc16d24b6982b3c27bae3398c752db264fc145c66a6d063590c2d5131d1244afd10354ba8aab598b8ac1c11f489a2f3710efc19b66", 0xbb}], 0x1, &(0x7f0000000cc0)=[@ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x82, 0x6, "42733998"}, @ssrr={0x89, 0x13, 0xa9, [@empty, @remote, @multicast1, @multicast1]}, @generic={0x86, 0xa, "f74eb60a6820ac28"}, @noop, @noop, @ra={0x94, 0x4}, @generic={0x89, 0x11, "0843b143085baa4edf023c5b932cf4"}, @end]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x5}}], 0x68}}, {{&(0x7f0000000d40)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000ec0)=[{&(0x7f0000000d80)="776742c24ad67a47dbe0e99fed7e6ca498", 0x11}, {&(0x7f0000000dc0)="289fa0d5d18e6a2f3d7e6e9b46fc968f3c95e974bedb19bc4242cd22e2f6a4cd1d4a", 0x22}, {&(0x7f0000000e00)="08f145f3d4370de283694aa08e2a1663a185221766a63d52fe73e52ef5f17bdd0f50aee811d21cefd582ada08f03e18284fa6ec84183628a0355ee7b17ee9bd161966f12eb0dabf70d239f0efce2cc653685a93ae0db246ab9903689f26309371a8b8e2a130f417e67b3f1076c01b9b1d29127229965998d053796372dd3e6b071ebba3944f44f430da977e8fdd49428871ac9efc0d54f25867cfd365fdcbdd4322aeb9388", 0xa5}], 0x3}}], 0x4, 0x84) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r5, 0x6, 0x25, 0x0, &(0x7f0000000200)) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f0000000140)={'erspan0\x00', &(0x7f0000000100)=@ethtool_modinfo={0x42, 0x3ff, 0x8}}) r6 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r6, 0x0, 0x200fc0) 08:50:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000000c0)=@v1={0x0, @adiantum, 0x4, "94a670724f13c598"}) sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, 0x0, 0x20, 0x70bd28, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20801}, 0x4c004) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = socket$tipc(0x1e, 0x2, 0x0) pipe2(&(0x7f0000000240)={0xffffffffffffffff}, 0x80800) splice(r4, &(0x7f0000000200)=0x3, r5, &(0x7f0000000280)=0xffffffffffffff7f, 0x5249, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:50:08 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x58, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:50:08 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x4000) 08:50:08 executing program 1 (fault-call:9 fault-nth:18): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:50:08 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x58, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) [ 186.968788][T15194] FAULT_INJECTION: forcing a failure. [ 186.968788][T15194] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 187.010716][T15194] CPU: 1 PID: 15194 Comm: syz-executor.1 Tainted: G W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 187.022365][T15194] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 187.032405][T15194] Call Trace: [ 187.035685][T15194] dump_stack+0x1b0/0x21e [ 187.040000][T15194] ? devkmsg_release+0x11c/0x11c [ 187.044918][T15194] ? show_regs_print_info+0x12/0x12 [ 187.050100][T15194] ? kasan_alloc_pages+0x4a/0x60 [ 187.055022][T15194] should_fail+0x6fb/0x860 [ 187.059428][T15194] ? setup_fault_attr+0x2b0/0x2b0 [ 187.064440][T15194] __alloc_pages_nodemask+0x1ee/0x7c0 [ 187.069796][T15194] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 187.075347][T15194] ? find_get_entry+0x5da/0x670 [ 187.080181][T15194] ? xa_load+0x323/0x340 [ 187.084419][T15194] __do_page_cache_readahead+0x244/0x510 [ 187.090062][T15194] ? read_cache_pages_invalidate_page+0x1b0/0x1b0 [ 187.096468][T15194] ? unwind_next_frame+0x1c07/0x22b0 [ 187.101741][T15194] ? page_cache_sync_readahead+0xa3/0x3c0 [ 187.107445][T15194] generic_file_read_iter+0x626/0x20a0 [ 187.112893][T15194] ? find_get_pages_range_tag+0xae0/0xae0 [ 187.118601][T15194] ? avc_has_perm_noaudit+0x2fc/0x3f0 [ 187.123953][T15194] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 187.130003][T15194] ? avc_denied+0x1c0/0x1c0 [ 187.134490][T15194] generic_file_splice_read+0x491/0x780 [ 187.140019][T15194] ? splice_shrink_spd+0xb0/0xb0 [ 187.145038][T15194] ? security_file_permission+0x1e9/0x300 [ 187.150726][T15194] ? splice_shrink_spd+0xb0/0xb0 [ 187.155629][T15194] splice_direct_to_actor+0x3cf/0xb00 [ 187.160967][T15194] ? do_splice_direct+0x3d0/0x3d0 [ 187.165954][T15194] ? pipe_to_sendpage+0x300/0x300 [ 187.170942][T15194] ? security_file_permission+0x128/0x300 [ 187.176621][T15194] do_splice_direct+0x279/0x3d0 [ 187.181435][T15194] ? splice_direct_to_actor+0xb00/0xb00 [ 187.186959][T15194] ? security_file_permission+0x128/0x300 [ 187.192784][T15194] do_sendfile+0x89d/0x1110 [ 187.197275][T15194] ? compat_writev+0x390/0x390 [ 187.202014][T15194] ? security_file_permission+0x128/0x300 [ 187.207698][T15194] ? vfs_write+0x427/0x4f0 [ 187.212091][T15194] ? fput_many+0x42/0x1a0 [ 187.216386][T15194] __x64_sys_sendfile64+0x1ae/0x220 [ 187.221547][T15194] ? __ia32_sys_sendfile+0x240/0x240 [ 187.226829][T15194] do_syscall_64+0xcb/0x150 [ 187.231296][T15194] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 187.237160][T15194] RIP: 0033:0x45de29 [ 187.241030][T15194] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 08:50:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0xff, 0x0, 0x0, 0x0, 0x40004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000000000000}, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000018c0)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000001600)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_MCAST_RATE(r2, &(0x7f0000001700)={0x0, 0x0, &(0x7f00000016c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="087ae943b4bda9eb17dabcd0628030e3def7d9b320febc88c39720d8c53eb023a0a1cc5a53236349732b21e8c1bda5c65695a8bc2af68331e7d28cec729116a3aaf4f88789bc7302d6d99b1c3c75ac0b7e89450358ab9bc26e", @ANYRES16=r3, @ANYBLOB="010000000000000000005c00000008000300", @ANYRES32=r4, @ANYBLOB='\b\x00k\x00\n\x00\x00\x00'], 0x24}}, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0xc8, 0x0, 0x100, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0xb, 0x5}, {0x6, 0x11, 0x6}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0xb, 0x9}, {0x6, 0x11, 0x8000}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0xb, 0x3f}, {0x6}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x20}, {0x6}}]}, 0xc8}, 0x1, 0x0, 0x0, 0x880}, 0x8008010) sched_rr_get_interval(0x0, &(0x7f00000000c0)) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r5 = socket$inet6(0xa, 0x400000000001, 0x0) close(r5) r6 = socket(0x1e, 0x4, 0x0) r7 = syz_io_uring_complete(0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(r7, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x64, 0x0, 0x2, 0x70bd26, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x80000000}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x1}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x4}]}, 0x64}, 0x1, 0x0, 0x0, 0x840}, 0x50) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000100)={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x38}}, {0xc, @random="942c55915048"}, 0x44, {0x2, 0x4e23, @multicast2}, 'sit0\x00'}) connect$tipc(r6, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r8 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r5, r8, 0x0, 0x200fc0) [ 187.260599][T15194] RSP: 002b:00007fa46e034c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 187.268977][T15194] RAX: ffffffffffffffda RBX: 0000000000027ec0 RCX: 000000000045de29 [ 187.276914][T15194] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 187.284850][T15194] RBP: 00007fa46e034ca0 R08: 0000000000000000 R09: 0000000000000000 [ 187.292792][T15194] R10: 0000000000200fc0 R11: 0000000000000246 R12: 0000000000000012 [ 187.300729][T15194] R13: 00007ffdeacd249f R14: 00007fa46e0359c0 R15: 000000000118bf2c 08:50:08 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x6000) 08:50:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0xc, 0x121041) write$evdev(r1, &(0x7f0000000040)=[{{}, 0x1, 0x43, 0x2}], 0x18) write$evdev(r1, &(0x7f0000000040), 0x373) write$binfmt_aout(r1, &(0x7f0000000100)=ANY=[], 0x8a) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='sessionid\x00') setsockopt$inet6_icmp_ICMP_FILTER(r3, 0x1, 0x1, &(0x7f0000000100)={0x40}, 0x4) r4 = socket(0x1e, 0x4, 0x0) connect$tipc(r4, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r2, r5, 0x0, 0x200fc0) 08:50:08 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x14, 0x2, 0x0, 0x1, [@vti_common_policy=[@IFLA_VTI_IKEY={0x8}, @IFLA_VTI_LINK={0x8, 0x1, r4}]]}}}]}, 0x40}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 08:50:08 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x58, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:50:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0xfe, 0x4, 0x0, 0x0, 0xa40ad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x8, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0xc, 0x121041) write$evdev(r1, &(0x7f0000000040)=[{{}, 0x1, 0x43, 0x2}], 0x18) write$evdev(r1, &(0x7f0000000040), 0x373) r2 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0xc, 0x121041) write$evdev(r2, &(0x7f0000000040)=[{{}, 0x1, 0x43, 0x2}], 0x18) write$evdev(r2, &(0x7f0000000040), 0x373) r3 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0xc, 0x121041) write$evdev(r3, &(0x7f0000000040)=[{{}, 0x1, 0x43, 0x2}], 0x18) write$evdev(r3, &(0x7f0000000040), 0x373) r4 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0xc, 0x121041) write$binfmt_aout(r4, &(0x7f00000000c0)=ANY=[], 0x8a) r5 = socket$inet6(0xa, 0x400000000001, 0x0) close(r5) r6 = socket(0x1e, 0x4, 0x0) connect$tipc(r6, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r7 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r5, r7, 0x0, 0x200fc0) 08:50:08 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:50:08 executing program 1 (fault-call:9 fault-nth:19): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:50:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f00000018c0)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000001600)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_MCAST_RATE(r4, &(0x7f0000001700)={0x0, 0x0, &(0x7f00000016c0)={&(0x7f0000001640)={0x24, r5, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r6}, @void}}, [@NL80211_ATTR_MCAST_RATE={0x8, 0x6b, 0xa}]}, 0x24}}, 0x0) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000140)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r4, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r7, 0x10, 0x70bd29, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x575ff283e63382c8}, 0x4010800) r8 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r8, 0x0, 0x200fc0) 08:50:08 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0xe0ff) [ 187.573874][T15228] FAULT_INJECTION: forcing a failure. [ 187.573874][T15228] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 187.602682][T15228] CPU: 1 PID: 15228 Comm: syz-executor.1 Tainted: G W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 187.614293][T15228] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 187.624473][T15228] Call Trace: [ 187.627768][T15228] dump_stack+0x1b0/0x21e [ 187.632077][T15228] ? devkmsg_release+0x11c/0x11c [ 187.637031][T15228] ? show_regs_print_info+0x12/0x12 [ 187.642214][T15228] ? kasan_alloc_pages+0x4a/0x60 [ 187.647131][T15228] should_fail+0x6fb/0x860 [ 187.651514][T15228] ? setup_fault_attr+0x2b0/0x2b0 [ 187.656520][T15228] __alloc_pages_nodemask+0x1ee/0x7c0 [ 187.661975][T15228] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 187.667497][T15228] ? find_get_entry+0x5da/0x670 [ 187.672309][T15228] ? xa_load+0x323/0x340 [ 187.676521][T15228] __do_page_cache_readahead+0x244/0x510 [ 187.682138][T15228] ? read_cache_pages_invalidate_page+0x1b0/0x1b0 [ 187.688530][T15228] ? unwind_next_frame+0x1c07/0x22b0 [ 187.693781][T15228] ? page_cache_sync_readahead+0xa3/0x3c0 [ 187.699471][T15228] generic_file_read_iter+0x626/0x20a0 [ 187.704896][T15228] ? find_get_pages_range_tag+0xae0/0xae0 [ 187.710605][T15228] ? avc_has_perm_noaudit+0x2fc/0x3f0 [ 187.715942][T15228] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 187.721978][T15228] ? avc_denied+0x1c0/0x1c0 [ 187.726479][T15228] generic_file_splice_read+0x491/0x780 [ 187.732019][T15228] ? splice_shrink_spd+0xb0/0xb0 [ 187.736951][T15228] ? security_file_permission+0x1e9/0x300 [ 187.742654][T15228] ? splice_shrink_spd+0xb0/0xb0 [ 187.747587][T15228] splice_direct_to_actor+0x3cf/0xb00 [ 187.752941][T15228] ? do_splice_direct+0x3d0/0x3d0 [ 187.757959][T15228] ? pipe_to_sendpage+0x300/0x300 [ 187.762967][T15228] ? security_file_permission+0x128/0x300 [ 187.768674][T15228] do_splice_direct+0x279/0x3d0 [ 187.773518][T15228] ? splice_direct_to_actor+0xb00/0xb00 [ 187.779061][T15228] ? security_file_permission+0x128/0x300 [ 187.784775][T15228] do_sendfile+0x89d/0x1110 [ 187.789267][T15228] ? compat_writev+0x390/0x390 [ 187.794010][T15228] ? security_file_permission+0x128/0x300 [ 187.799706][T15228] ? vfs_write+0x427/0x4f0 [ 187.804097][T15228] ? fput_many+0x42/0x1a0 [ 187.808401][T15228] __x64_sys_sendfile64+0x1ae/0x220 [ 187.813721][T15228] ? __ia32_sys_sendfile+0x240/0x240 [ 187.818976][T15228] do_syscall_64+0xcb/0x150 [ 187.823446][T15228] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 187.829303][T15228] RIP: 0033:0x45de29 [ 187.833205][T15228] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 187.852773][T15228] RSP: 002b:00007fa46e034c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 187.861151][T15228] RAX: ffffffffffffffda RBX: 0000000000027ec0 RCX: 000000000045de29 08:50:09 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0xe803) [ 187.869091][T15228] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 187.877029][T15228] RBP: 00007fa46e034ca0 R08: 0000000000000000 R09: 0000000000000000 [ 187.884964][T15228] R10: 0000000000200fc0 R11: 0000000000000246 R12: 0000000000000013 [ 187.892925][T15228] R13: 00007ffdeacd249f R14: 00007fa46e0359c0 R15: 000000000118bf2c 08:50:09 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0xf401) 08:50:09 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:50:09 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:50:09 executing program 1 (fault-call:9 fault-nth:20): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) [ 188.098221][T15262] FAULT_INJECTION: forcing a failure. [ 188.098221][T15262] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 188.111661][T15262] CPU: 1 PID: 15262 Comm: syz-executor.1 Tainted: G W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 188.123201][T15262] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 188.133236][T15262] Call Trace: [ 188.136511][T15262] dump_stack+0x1b0/0x21e [ 188.140843][T15262] ? devkmsg_release+0x11c/0x11c [ 188.145783][T15262] ? show_regs_print_info+0x12/0x12 [ 188.150966][T15262] ? kasan_alloc_pages+0x4a/0x60 [ 188.155886][T15262] should_fail+0x6fb/0x860 [ 188.160290][T15262] ? setup_fault_attr+0x2b0/0x2b0 [ 188.165311][T15262] __alloc_pages_nodemask+0x1ee/0x7c0 [ 188.170682][T15262] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 188.176227][T15262] ? find_get_entry+0x5da/0x670 [ 188.181071][T15262] ? xa_load+0x323/0x340 [ 188.185297][T15262] __do_page_cache_readahead+0x244/0x510 [ 188.190925][T15262] ? read_cache_pages_invalidate_page+0x1b0/0x1b0 [ 188.197323][T15262] ? unwind_next_frame+0x1c07/0x22b0 [ 188.202597][T15262] ? page_cache_sync_readahead+0xa3/0x3c0 [ 188.208313][T15262] generic_file_read_iter+0x626/0x20a0 [ 188.213761][T15262] ? find_get_pages_range_tag+0xae0/0xae0 [ 188.219480][T15262] ? avc_has_perm_noaudit+0x2fc/0x3f0 [ 188.224831][T15262] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 188.230878][T15262] ? avc_denied+0x1c0/0x1c0 [ 188.235367][T15262] generic_file_splice_read+0x491/0x780 [ 188.240901][T15262] ? splice_shrink_spd+0xb0/0xb0 [ 188.245829][T15262] ? security_file_permission+0x1e9/0x300 [ 188.251531][T15262] ? splice_shrink_spd+0xb0/0xb0 [ 188.256474][T15262] splice_direct_to_actor+0x3cf/0xb00 [ 188.261831][T15262] ? do_splice_direct+0x3d0/0x3d0 [ 188.266856][T15262] ? pipe_to_sendpage+0x300/0x300 [ 188.271865][T15262] ? security_file_permission+0x128/0x300 [ 188.277565][T15262] do_splice_direct+0x279/0x3d0 [ 188.282397][T15262] ? splice_direct_to_actor+0xb00/0xb00 [ 188.287924][T15262] ? security_file_permission+0x128/0x300 [ 188.293623][T15262] do_sendfile+0x89d/0x1110 08:50:09 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x14, 0x2, 0x0, 0x1, [@vti_common_policy=[@IFLA_VTI_IKEY={0x8}, @IFLA_VTI_LINK={0x8, 0x1, r4}]]}}}]}, 0x40}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 188.298111][T15262] ? compat_writev+0x390/0x390 [ 188.302854][T15262] ? security_file_permission+0x128/0x300 [ 188.308554][T15262] ? vfs_write+0x427/0x4f0 [ 188.312981][T15262] ? fput_many+0x42/0x1a0 [ 188.317320][T15262] __x64_sys_sendfile64+0x1ae/0x220 [ 188.322502][T15262] ? __ia32_sys_sendfile+0x240/0x240 [ 188.327768][T15262] do_syscall_64+0xcb/0x150 [ 188.332261][T15262] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 188.338130][T15262] RIP: 0033:0x45de29 [ 188.342012][T15262] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 188.361602][T15262] RSP: 002b:00007fa46e034c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 188.369995][T15262] RAX: ffffffffffffffda RBX: 0000000000027ec0 RCX: 000000000045de29 [ 188.377995][T15262] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 188.385946][T15262] RBP: 00007fa46e034ca0 R08: 0000000000000000 R09: 0000000000000000 08:50:09 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0xff03) [ 188.393901][T15262] R10: 0000000000200fc0 R11: 0000000000000246 R12: 0000000000000014 [ 188.401854][T15262] R13: 00007ffdeacd249f R14: 00007fa46e0359c0 R15: 000000000118bf2c 08:50:09 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:50:09 executing program 1 (fault-call:9 fault-nth:21): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:50:09 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0xffe0) 08:50:09 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x34000) [ 188.668013][T15283] FAULT_INJECTION: forcing a failure. [ 188.668013][T15283] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 188.703943][T15283] CPU: 0 PID: 15283 Comm: syz-executor.1 Tainted: G W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 188.715570][T15283] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 188.725603][T15283] Call Trace: [ 188.728881][T15283] dump_stack+0x1b0/0x21e [ 188.733204][T15283] ? devkmsg_release+0x11c/0x11c [ 188.738146][T15283] ? show_regs_print_info+0x12/0x12 [ 188.743324][T15283] ? kasan_alloc_pages+0x4a/0x60 [ 188.748293][T15283] should_fail+0x6fb/0x860 [ 188.752700][T15283] ? setup_fault_attr+0x2b0/0x2b0 [ 188.757711][T15283] __alloc_pages_nodemask+0x1ee/0x7c0 [ 188.763066][T15283] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 188.768598][T15283] ? find_get_entry+0x5da/0x670 [ 188.773433][T15283] ? xa_load+0x323/0x340 [ 188.777700][T15283] __do_page_cache_readahead+0x244/0x510 [ 188.783357][T15283] ? read_cache_pages_invalidate_page+0x1b0/0x1b0 [ 188.789768][T15283] ? unwind_next_frame+0x1c07/0x22b0 [ 188.795051][T15283] ? page_cache_sync_readahead+0xa3/0x3c0 [ 188.800793][T15283] generic_file_read_iter+0x626/0x20a0 [ 188.806276][T15283] ? find_get_pages_range_tag+0xae0/0xae0 [ 188.811987][T15283] ? avc_has_perm_noaudit+0x2fc/0x3f0 [ 188.817342][T15283] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 188.823390][T15283] ? avc_denied+0x1c0/0x1c0 [ 188.827878][T15283] generic_file_splice_read+0x491/0x780 [ 188.833422][T15283] ? splice_shrink_spd+0xb0/0xb0 [ 188.838342][T15283] ? security_file_permission+0x1e9/0x300 [ 188.844042][T15283] ? splice_shrink_spd+0xb0/0xb0 [ 188.848962][T15283] splice_direct_to_actor+0x3cf/0xb00 [ 188.854318][T15283] ? do_splice_direct+0x3d0/0x3d0 [ 188.859326][T15283] ? pipe_to_sendpage+0x300/0x300 [ 188.864334][T15283] ? security_file_permission+0x128/0x300 [ 188.870033][T15283] do_splice_direct+0x279/0x3d0 [ 188.874866][T15283] ? splice_direct_to_actor+0xb00/0xb00 [ 188.880414][T15283] ? security_file_permission+0x128/0x300 [ 188.886119][T15283] do_sendfile+0x89d/0x1110 [ 188.890608][T15283] ? compat_writev+0x390/0x390 [ 188.895352][T15283] ? security_file_permission+0x128/0x300 [ 188.901064][T15283] ? vfs_write+0x427/0x4f0 [ 188.905465][T15283] ? fput_many+0x42/0x1a0 [ 188.909798][T15283] __x64_sys_sendfile64+0x1ae/0x220 [ 188.915011][T15283] ? __ia32_sys_sendfile+0x240/0x240 [ 188.920281][T15283] do_syscall_64+0xcb/0x150 [ 188.924768][T15283] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 188.930641][T15283] RIP: 0033:0x45de29 [ 188.934529][T15283] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 188.954112][T15283] RSP: 002b:00007fa46e034c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 188.962509][T15283] RAX: ffffffffffffffda RBX: 0000000000027ec0 RCX: 000000000045de29 [ 188.970472][T15283] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 188.978629][T15283] RBP: 00007fa46e034ca0 R08: 0000000000000000 R09: 0000000000000000 [ 188.986587][T15283] R10: 0000000000200fc0 R11: 0000000000000246 R12: 0000000000000015 [ 188.994536][T15283] R13: 00007ffdeacd249f R14: 00007fa46e0359c0 R15: 000000000118bf2c 08:50:10 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:50:10 executing program 1 (fault-call:9 fault-nth:22): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:50:10 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 08:50:10 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) [ 189.186900][T15299] FAULT_INJECTION: forcing a failure. [ 189.186900][T15299] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 189.226055][T15299] CPU: 1 PID: 15299 Comm: syz-executor.1 Tainted: G W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 189.237752][T15299] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 189.247789][T15299] Call Trace: [ 189.251084][T15299] dump_stack+0x1b0/0x21e [ 189.255427][T15299] ? devkmsg_release+0x11c/0x11c [ 189.260352][T15299] ? show_regs_print_info+0x12/0x12 [ 189.265623][T15299] ? kasan_alloc_pages+0x4a/0x60 [ 189.270550][T15299] should_fail+0x6fb/0x860 [ 189.274953][T15299] ? setup_fault_attr+0x2b0/0x2b0 [ 189.279976][T15299] __alloc_pages_nodemask+0x1ee/0x7c0 08:50:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x200001, 0x0) r3 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x3b098348da759bc6) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000240)='batadv\x00') sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000380)={&(0x7f0000000440)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="010e2bb57000fddbdf250f00000005002f000000000091003a000400000008002b00030000000800310000010000e28c00000000000000065661731853"], 0x34}}, 0x4000) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r4, 0x0, 0x0, 0x25dfdbff, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000800}, 0x1) sendmsg$BATADV_CMD_GET_GATEWAYS(r3, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x13008f2b}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="20004dbd70020000000e0a00000005002f000100000005002a0000000000"], 0x24}, 0x1, 0x0, 0x0, 0x80c5}, 0x44000) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x34, r4, 0x224, 0x70bd27, 0x25dfdbfb, {}, [@BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x800}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x34}}, 0x8000) close(r1) r5 = socket(0x1e, 0x4, 0x0) connect$tipc(r5, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r7 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0xc, 0x121041) write$evdev(r7, &(0x7f0000000040)=[{{}, 0x1, 0x43, 0x2}], 0x18) write$evdev(r7, &(0x7f0000000040), 0x373) sendfile(r7, r6, 0x0, 0x4) [ 189.285419][T15299] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 189.290951][T15299] ? find_get_entry+0x5da/0x670 [ 189.295787][T15299] ? xa_load+0x323/0x340 [ 189.300034][T15299] __do_page_cache_readahead+0x244/0x510 [ 189.305662][T15299] ? read_cache_pages_invalidate_page+0x1b0/0x1b0 [ 189.312085][T15299] ? unwind_next_frame+0x1c07/0x22b0 [ 189.317344][T15299] ? page_cache_sync_readahead+0xa3/0x3c0 [ 189.323041][T15299] generic_file_read_iter+0x626/0x20a0 [ 189.328485][T15299] ? find_get_pages_range_tag+0xae0/0xae0 [ 189.334188][T15299] ? avc_has_perm_noaudit+0x2fc/0x3f0 [ 189.339547][T15299] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 189.345595][T15299] ? avc_denied+0x1c0/0x1c0 [ 189.350083][T15299] generic_file_splice_read+0x491/0x780 [ 189.355619][T15299] ? splice_shrink_spd+0xb0/0xb0 [ 189.360545][T15299] ? security_file_permission+0x1e9/0x300 [ 189.366250][T15299] ? splice_shrink_spd+0xb0/0xb0 [ 189.371197][T15299] splice_direct_to_actor+0x3cf/0xb00 [ 189.376559][T15299] ? do_splice_direct+0x3d0/0x3d0 [ 189.381568][T15299] ? pipe_to_sendpage+0x300/0x300 08:50:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3400000013f6ac2a0c004bf9acaedf2e7a409388758ad591f36fbd09faf5ac2ee60299cdf5d4767f45a679795397bbdcc649513e7739adba01896e7a53bbd6b85b4f1b118997c89279a560f387e97bed82d57dcb7e49b147e24bf2a74657abca3b40825e", @ANYRES16, @ANYBLOB="200026bd7000fbdbdf2502000b0dba000020000c801c000b8008000900f4fd7c5e08000a002f0b0000080009001d1f746af0c480ddf0ee90636911b730cbe6148722ed2d88a385d289c116bade19e156b56195a6525e08f76cfb695b4a10aeefa245c1c64be5c6dc16c022316cab5f5e6d3a87"], 0x34}, 0x1, 0x0, 0x0, 0x90}, 0x4021) sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000400}, 0xc, &(0x7f0000000100)={&(0x7f0000000500)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16, @ANYBLOB="00722dbd7000ffdbdf000000000000000300030000000800010003000000080002000000000008000100ffffffff08000100020000005528103b51da8aa1d0284c7a8d5b80631804e73e4fe5c680f65cffcc25913eca718e132fa2acb00fa71f2e7b2f"], 0x3c}, 0x1, 0x0, 0x0, 0x20000012}, 0x80) sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f00000002c0)=ANY=[@ANYBLOB="74010000", @ANYRES16, @ANYBLOB="00012abd7000fcdbdf250200000008000200000000002c00048005000300070000000500030001000000050003000100000005000300070000000500030005000000080002000200000024010880240007800800050071a0c800080006005400000008000500bda87e4b080005009b8e812c0c00078008000500f8df457b0c00078008000600fc0000005400078008000500adfd480d080006006300000008000500927b504a080006009700000008000600f200000008000500db2f2e3d080005000030ec1c0800060017000000080006000f0000000800050023bc2d101c00078008000500256d99210800050067ed6f210880050077e6ff092c0007800800060015000000080006008a000000080005008abb3970080005004d69cf3708000500f73def3d2c000780080005009cbb4c29080006009400000008000600c60000000800060013000000080005005c2407031c00078008000600dc000000080005002a96d656080005001eabc710"], 0x174}, 0x1, 0x0, 0x0, 0x40001}, 0x10) sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, 0x0, 0x8, 0x70bd27, 0x25dfdbfe, {}, [@NLBL_CIPSOV4_A_TAGLST={0xc, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x1}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x2}]}, 0x28}, 0x1, 0x0, 0x0, 0x4}, 0x10) sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16, @ANYBLOB="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"], 0x1b0}, 0x1, 0x0, 0x0, 0xc5}, 0x4000000) sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000140)={0x1d0, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x1}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_MLSLVLLST={0x104, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x53}]}, {0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xc8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x6c}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x369d454d}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x36}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xb0}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x14}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x7d}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xc4}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1d}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x81}]}, {0x4}, {0x44, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x62a48a9d}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x62fc}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xec}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x3d}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x45244306}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x6d}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1dff707a}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf}]}, {0x44, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5a14472a}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1edae018}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7131d3d1}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x52}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf7}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x19655a3a}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xc7}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x9ad06a0}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xd1}]}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x98, 0xc, 0x0, 0x1, [{0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2e4109ef}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1159}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x38a7}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5463e527}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6886}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x630dd744}]}, {0x44, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3c928d94}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x87c5}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x299abade}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa024}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x24ce9fe2}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5ea910ee}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3c06a8c7}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4c60}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x45b2}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x79766ae6}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x666556a1}]}]}]}, 0x1d0}, 0x1, 0x0, 0x0, 0x4008000}, 0x48890) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x70, 0x0, 0x20, 0x70bd25, 0x25dfdbfd, {}, [@NLBL_CIPSOV4_A_MLSLVLLST={0x5c, 0x8, 0x0, 0x1, [{0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xcd}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6ef5a49e}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x14cb89ca}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x516c8028}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x97}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x6b}]}, {0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3f4c010a}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x14}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe0}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x21}]}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x882}, 0x4040) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r4, 0x6, 0x25, 0x0, &(0x7f0000000200)) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e24, 0x7b57, @private2={0xfc, 0x2, [], 0x1}, 0x1}, 0x1c) sendfile(r1, r3, 0x0, 0x200fc0) [ 189.386579][T15299] ? security_file_permission+0x128/0x300 [ 189.392278][T15299] do_splice_direct+0x279/0x3d0 [ 189.397116][T15299] ? splice_direct_to_actor+0xb00/0xb00 [ 189.402649][T15299] ? security_file_permission+0x128/0x300 [ 189.408380][T15299] do_sendfile+0x89d/0x1110 [ 189.412868][T15299] ? compat_writev+0x390/0x390 [ 189.417619][T15299] ? security_file_permission+0x128/0x300 [ 189.423331][T15299] ? vfs_write+0x427/0x4f0 [ 189.427732][T15299] ? fput_many+0x42/0x1a0 [ 189.432047][T15299] __x64_sys_sendfile64+0x1ae/0x220 [ 189.437228][T15299] ? __ia32_sys_sendfile+0x240/0x240 [ 189.442496][T15299] do_syscall_64+0xcb/0x150 [ 189.446994][T15299] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 189.452869][T15299] RIP: 0033:0x45de29 [ 189.456755][T15299] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 189.476339][T15299] RSP: 002b:00007fa46e034c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 08:50:10 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r1, 0x800002, 0x0) lstat(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0x8a) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0xc, 0x121041) write$evdev(r3, &(0x7f0000000040)=[{{}, 0x1, 0x43, 0x2}], 0x18) write$evdev(r3, &(0x7f0000000040), 0x373) r4 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0xc, 0x121041) write$evdev(r4, &(0x7f0000000040)=[{{}, 0x1, 0x43, 0x2}], 0x18) write$evdev(r4, &(0x7f0000000040), 0x373) poll(&(0x7f0000000180)=[{r0, 0x4}, {r3, 0x100}, {r4, 0xd10c594b6cf61462}], 0x3, 0x3ff) close(r2) r5 = socket(0x1e, 0x4, 0x0) connect$tipc(r5, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r2, r6, 0x0, 0x200fc0) 08:50:10 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x40000) [ 189.484755][T15299] RAX: ffffffffffffffda RBX: 0000000000027ec0 RCX: 000000000045de29 [ 189.492730][T15299] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 189.500686][T15299] RBP: 00007fa46e034ca0 R08: 0000000000000000 R09: 0000000000000000 [ 189.508637][T15299] R10: 0000000000200fc0 R11: 0000000000000246 R12: 0000000000000016 [ 189.516690][T15299] R13: 00007ffdeacd249f R14: 00007fa46e0359c0 R15: 000000000118bf2c 08:50:10 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(0x0, &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:50:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mknodat(r2, &(0x7f00000001c0)='./bus\x00', 0x20, 0x9) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x8a) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = socket(0x1e, 0x4, 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000001600)={'wlan1\x00'}) sendto$inet(r5, &(0x7f0000000200)="0800000000000000e4bde13f0a7dac61cd1b1a7f734dff08601f7e0d5786a1428000000000000003f5af119ae1c432a580ca2de756fde6675d0cd57bb03a7e8a1ca80f721fb16aa6da24", 0x4a, 0x20004081, &(0x7f0000000180)={0x2, 0x4a24, @multicast1}, 0x10) connect$tipc(r4, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) ioctl$RTC_PIE_ON(r0, 0x7005) sendfile(r3, r6, 0x0, 0x200fc0) 08:50:10 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x200000) 08:50:10 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(0x0, &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:50:10 executing program 1 (fault-call:9 fault-nth:23): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) [ 189.798232][T15340] FAULT_INJECTION: forcing a failure. [ 189.798232][T15340] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 189.841855][T15340] CPU: 0 PID: 15340 Comm: syz-executor.1 Tainted: G W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 189.853401][T15340] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 189.863442][T15340] Call Trace: [ 189.866722][T15340] dump_stack+0x1b0/0x21e [ 189.871037][T15340] ? devkmsg_release+0x11c/0x11c [ 189.875966][T15340] ? show_regs_print_info+0x12/0x12 [ 189.881147][T15340] ? kasan_alloc_pages+0x4a/0x60 [ 189.886077][T15340] should_fail+0x6fb/0x860 [ 189.890486][T15340] ? setup_fault_attr+0x2b0/0x2b0 [ 189.895498][T15340] __alloc_pages_nodemask+0x1ee/0x7c0 [ 189.900854][T15340] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 189.906379][T15340] ? find_get_entry+0x5da/0x670 [ 189.911218][T15340] ? xa_load+0x323/0x340 [ 189.915425][T15340] __do_page_cache_readahead+0x244/0x510 [ 189.921022][T15340] ? read_cache_pages_invalidate_page+0x1b0/0x1b0 [ 189.927398][T15340] ? unwind_next_frame+0x1c07/0x22b0 [ 189.932644][T15340] ? page_cache_sync_readahead+0xa3/0x3c0 [ 189.938378][T15340] generic_file_read_iter+0x626/0x20a0 [ 189.943808][T15340] ? find_get_pages_range_tag+0xae0/0xae0 [ 189.949490][T15340] ? avc_has_perm_noaudit+0x2fc/0x3f0 [ 189.954825][T15340] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 189.960861][T15340] ? avc_denied+0x1c0/0x1c0 [ 189.965329][T15340] generic_file_splice_read+0x491/0x780 [ 189.970846][T15340] ? splice_shrink_spd+0xb0/0xb0 [ 189.975769][T15340] ? security_file_permission+0x1e9/0x300 [ 189.981455][T15340] ? splice_shrink_spd+0xb0/0xb0 [ 189.986356][T15340] splice_direct_to_actor+0x3cf/0xb00 [ 189.991691][T15340] ? do_splice_direct+0x3d0/0x3d0 [ 189.996685][T15340] ? pipe_to_sendpage+0x300/0x300 [ 190.001671][T15340] ? security_file_permission+0x128/0x300 [ 190.007351][T15340] do_splice_direct+0x279/0x3d0 [ 190.012184][T15340] ? splice_direct_to_actor+0xb00/0xb00 [ 190.017696][T15340] ? security_file_permission+0x128/0x300 [ 190.023379][T15340] do_sendfile+0x89d/0x1110 [ 190.027846][T15340] ? compat_writev+0x390/0x390 [ 190.032619][T15340] ? security_file_permission+0x128/0x300 [ 190.038298][T15340] ? vfs_write+0x427/0x4f0 [ 190.042691][T15340] ? fput_many+0x42/0x1a0 [ 190.046993][T15340] __x64_sys_sendfile64+0x1ae/0x220 [ 190.052176][T15340] ? __ia32_sys_sendfile+0x240/0x240 [ 190.057425][T15340] do_syscall_64+0xcb/0x150 [ 190.061916][T15340] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 190.067789][T15340] RIP: 0033:0x45de29 [ 190.071650][T15340] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 08:50:11 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(0x0, &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:50:11 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 08:50:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0xc, 0x121041) write$evdev(r2, &(0x7f0000000040)=[{{}, 0x1, 0x43, 0x2}], 0x18) write$evdev(r2, &(0x7f0000000040), 0x373) fcntl$addseals(r2, 0x409, 0x4) close(r1) r3 = socket(0x1e, 0x4, 0x0) connect$tipc(r3, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x200fc0) [ 190.091225][T15340] RSP: 002b:00007fa46e034c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 190.099719][T15340] RAX: ffffffffffffffda RBX: 0000000000027ec0 RCX: 000000000045de29 [ 190.107656][T15340] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 190.115591][T15340] RBP: 00007fa46e034ca0 R08: 0000000000000000 R09: 0000000000000000 [ 190.123525][T15340] R10: 0000000000200fc0 R11: 0000000000000246 R12: 0000000000000017 [ 190.131460][T15340] R13: 00007ffdeacd249f R14: 00007fa46e0359c0 R15: 000000000118bf2c 08:50:11 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x400300) 08:50:11 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:50:11 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r1, 0x800002, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0x8a) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) fchmod(r0, 0x23d567633b6ecada) socketpair(0x8, 0x5, 0x1, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPCTNL_MSG_CT_NEW(r3, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0xf0, 0x0, 0x1, 0x301, 0x0, 0x0, {0x1, 0x0, 0x2}, [@CTA_MARK_MASK={0x8, 0x15, 0x1, 0x0, 0x2}, @CTA_LABELS={0x18, 0x16, 0x1, 0x0, [0x9, 0x9, 0x6, 0x200, 0x6]}, @CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_PROTO={0x4}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @broadcast}, @CTA_NAT_V6_MINIP={0x14, 0x4, @private2={0xfc, 0x2, [], 0x1}}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @empty}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @private=0xa010102}, @CTA_NAT_PROTO={0x1c, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e21}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e24}]}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @local}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast2}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @local}]}, @CTA_PROTOINFO={0x40, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0x3c, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_WSCALE_ORIGINAL={0x5, 0x2, 0x9}, @CTA_PROTOINFO_TCP_STATE={0x5, 0x1, 0xd1}, @CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x5, 0xb4}}, @CTA_PROTOINFO_TCP_FLAGS_ORIGINAL={0x6, 0x4, {0x7, 0x6}}, @CTA_PROTOINFO_TCP_WSCALE_REPLY={0x5, 0x3, 0x80}, @CTA_PROTOINFO_TCP_STATE={0x5, 0x1, 0x77}, @CTA_PROTOINFO_TCP_WSCALE_REPLY={0x5}]}}, @CTA_MARK_MASK={0x8, 0x15, 0x1, 0x0, 0x3}]}, 0xf0}, 0x1, 0x0, 0x0, 0x20001}, 0x4000) r4 = socket(0x1e, 0x4, 0x0) connect$tipc(r4, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x200fc0) 08:50:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) fcntl$setflags(r1, 0x2, 0x1) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:50:11 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:50:11 executing program 1 (fault-call:9 fault-nth:24): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) [ 190.459440][T15379] FAULT_INJECTION: forcing a failure. [ 190.459440][T15379] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 190.489403][T15379] CPU: 0 PID: 15379 Comm: syz-executor.1 Tainted: G W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 190.500943][T15379] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 190.510980][T15379] Call Trace: [ 190.514265][T15379] dump_stack+0x1b0/0x21e [ 190.518578][T15379] ? devkmsg_release+0x11c/0x11c [ 190.523500][T15379] ? show_regs_print_info+0x12/0x12 [ 190.528835][T15379] ? kasan_alloc_pages+0x4a/0x60 [ 190.533747][T15379] should_fail+0x6fb/0x860 [ 190.538132][T15379] ? setup_fault_attr+0x2b0/0x2b0 [ 190.543122][T15379] __alloc_pages_nodemask+0x1ee/0x7c0 [ 190.548471][T15379] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 190.553983][T15379] ? find_get_entry+0x5da/0x670 [ 190.558859][T15379] ? xa_load+0x323/0x340 [ 190.563068][T15379] __do_page_cache_readahead+0x244/0x510 [ 190.568670][T15379] ? read_cache_pages_invalidate_page+0x1b0/0x1b0 [ 190.575050][T15379] ? unwind_next_frame+0x1c07/0x22b0 [ 190.580306][T15379] ? page_cache_sync_readahead+0xa3/0x3c0 [ 190.586001][T15379] generic_file_read_iter+0x626/0x20a0 [ 190.591436][T15379] ? find_get_pages_range_tag+0xae0/0xae0 [ 190.597121][T15379] ? avc_has_perm_noaudit+0x2fc/0x3f0 [ 190.602470][T15379] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 190.608501][T15379] ? avc_denied+0x1c0/0x1c0 [ 190.613004][T15379] generic_file_splice_read+0x491/0x780 [ 190.618514][T15379] ? splice_shrink_spd+0xb0/0xb0 [ 190.623506][T15379] ? security_file_permission+0x1e9/0x300 [ 190.629190][T15379] ? splice_shrink_spd+0xb0/0xb0 [ 190.634091][T15379] splice_direct_to_actor+0x3cf/0xb00 [ 190.639428][T15379] ? do_splice_direct+0x3d0/0x3d0 [ 190.644503][T15379] ? pipe_to_sendpage+0x300/0x300 [ 190.649491][T15379] ? security_file_permission+0x128/0x300 [ 190.655174][T15379] do_splice_direct+0x279/0x3d0 [ 190.659989][T15379] ? splice_direct_to_actor+0xb00/0xb00 [ 190.665496][T15379] ? security_file_permission+0x128/0x300 [ 190.671181][T15379] do_sendfile+0x89d/0x1110 [ 190.675647][T15379] ? compat_writev+0x390/0x390 [ 190.680380][T15379] ? security_file_permission+0x128/0x300 [ 190.686065][T15379] ? vfs_write+0x427/0x4f0 [ 190.690446][T15379] ? fput_many+0x42/0x1a0 [ 190.694743][T15379] __x64_sys_sendfile64+0x1ae/0x220 [ 190.699915][T15379] ? __ia32_sys_sendfile+0x240/0x240 [ 190.705170][T15379] do_syscall_64+0xcb/0x150 [ 190.709657][T15379] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 190.715515][T15379] RIP: 0033:0x45de29 [ 190.719376][T15379] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 190.738945][T15379] RSP: 002b:00007fa46e034c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 190.747321][T15379] RAX: ffffffffffffffda RBX: 0000000000027ec0 RCX: 000000000045de29 08:50:12 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:50:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r2, 0x6, 0x25, 0x0, &(0x7f0000000200)) ioctl$sock_SIOCADDDLCI(r1, 0x8980, &(0x7f0000000100)={'batadv_slave_1\x00', 0x5}) close(r1) r3 = socket(0x1e, 0x4, 0x0) connect$tipc(r3, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x200fc0) 08:50:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) r1 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSTI(r1, 0x5412, 0xeeaf) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket(0x2c, 0x4, 0x0) connect$tipc(r3, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x200fc0) 08:50:12 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x1000000) [ 190.755256][T15379] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 190.763194][T15379] RBP: 00007fa46e034ca0 R08: 0000000000000000 R09: 0000000000000000 [ 190.771141][T15379] R10: 0000000000200fc0 R11: 0000000000000246 R12: 0000000000000018 [ 190.779100][T15379] R13: 00007ffdeacd249f R14: 00007fa46e0359c0 R15: 000000000118bf2c 08:50:12 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 08:50:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) setsockopt$inet6_mtu(r3, 0x29, 0x17, &(0x7f00000000c0)=0x5, 0x4) 08:50:12 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:50:12 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x2000000) 08:50:12 executing program 1 (fault-call:9 fault-nth:25): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:50:12 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) [ 191.077104][T15416] FAULT_INJECTION: forcing a failure. [ 191.077104][T15416] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 191.118813][T15416] CPU: 1 PID: 15416 Comm: syz-executor.1 Tainted: G W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 191.130350][T15416] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 191.140389][T15416] Call Trace: [ 191.143669][T15416] dump_stack+0x1b0/0x21e [ 191.147986][T15416] ? devkmsg_release+0x11c/0x11c [ 191.152909][T15416] ? show_regs_print_info+0x12/0x12 [ 191.158087][T15416] ? kasan_alloc_pages+0x4a/0x60 [ 191.163008][T15416] should_fail+0x6fb/0x860 [ 191.167410][T15416] ? setup_fault_attr+0x2b0/0x2b0 [ 191.172425][T15416] __alloc_pages_nodemask+0x1ee/0x7c0 [ 191.177778][T15416] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 191.183314][T15416] ? find_get_entry+0x5da/0x670 [ 191.188146][T15416] ? xa_load+0x323/0x340 [ 191.192370][T15416] __do_page_cache_readahead+0x244/0x510 [ 191.197989][T15416] ? read_cache_pages_invalidate_page+0x1b0/0x1b0 [ 191.204384][T15416] ? unwind_next_frame+0x1c07/0x22b0 [ 191.209652][T15416] ? page_cache_sync_readahead+0xa3/0x3c0 [ 191.215357][T15416] generic_file_read_iter+0x626/0x20a0 [ 191.220806][T15416] ? find_get_pages_range_tag+0xae0/0xae0 [ 191.226508][T15416] ? avc_has_perm_noaudit+0x2fc/0x3f0 [ 191.231862][T15416] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 191.237915][T15416] ? avc_denied+0x1c0/0x1c0 [ 191.242400][T15416] generic_file_splice_read+0x491/0x780 [ 191.247925][T15416] ? splice_shrink_spd+0xb0/0xb0 [ 191.252858][T15416] ? security_file_permission+0x1e9/0x300 [ 191.258541][T15416] ? splice_shrink_spd+0xb0/0xb0 [ 191.263451][T15416] splice_direct_to_actor+0x3cf/0xb00 [ 191.268791][T15416] ? do_splice_direct+0x3d0/0x3d0 [ 191.273780][T15416] ? pipe_to_sendpage+0x300/0x300 [ 191.278789][T15416] ? security_file_permission+0x128/0x300 [ 191.284471][T15416] do_splice_direct+0x279/0x3d0 [ 191.289296][T15416] ? splice_direct_to_actor+0xb00/0xb00 [ 191.294867][T15416] ? security_file_permission+0x128/0x300 [ 191.300565][T15416] do_sendfile+0x89d/0x1110 [ 191.305034][T15416] ? compat_writev+0x390/0x390 [ 191.309766][T15416] ? security_file_permission+0x128/0x300 [ 191.315537][T15416] ? vfs_write+0x427/0x4f0 [ 191.319929][T15416] ? fput_many+0x42/0x1a0 [ 191.324224][T15416] __x64_sys_sendfile64+0x1ae/0x220 [ 191.329389][T15416] ? __ia32_sys_sendfile+0x240/0x240 [ 191.334766][T15416] do_syscall_64+0xcb/0x150 [ 191.339274][T15416] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 191.345129][T15416] RIP: 0033:0x45de29 [ 191.348997][T15416] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 08:50:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_ext={0x1c, 0xb, &(0x7f0000000140)=@raw=[@generic={0x6, 0x7, 0x8, 0xfffe, 0x7ff}, @jmp={0x5, 0x1, 0x9, 0xa, 0x5, 0x10, 0x10}, @ldst={0x0, 0x0, 0x2, 0x8, 0x8, 0x6}, @map={0x18, 0x1, 0x1, 0x0, r0}, @map={0x18, 0x3, 0x1, 0x0, r0}, @ldst={0x1, 0x3, 0x6, 0x2, 0x6, 0xc, 0xfffffffffffffff0}, @map_val={0x18, 0xb, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x54900000}, @func={0x85, 0x0, 0x1, 0x0, 0x7}], &(0x7f00000001c0)='GPL\x00', 0x2a1, 0x90, &(0x7f0000000200)=""/144, 0x41000, 0xd, [], 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x7}, 0x10, 0x22c18, r0}, 0x78) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(r1, 0x8008f511, &(0x7f00000003c0)) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x8a) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000100)='NLBL_CALIPSO\x00') r3 = socket(0x1e, 0x4, 0x0) connect$tipc(r3, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x200fc0) [ 191.368687][T15416] RSP: 002b:00007fa46e034c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 191.377180][T15416] RAX: ffffffffffffffda RBX: 0000000000027ec0 RCX: 000000000045de29 [ 191.385127][T15416] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 191.393063][T15416] RBP: 00007fa46e034ca0 R08: 0000000000000000 R09: 0000000000000000 [ 191.401002][T15416] R10: 0000000000200fc0 R11: 0000000000000246 R12: 0000000000000019 [ 191.409044][T15416] R13: 00007ffdeacd249f R14: 00007fa46e0359c0 R15: 000000000118bf2c 08:50:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x2, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x1e8) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TUNGETIFF(r3, 0x800454d2, &(0x7f0000000100)={'wg2\x00'}) close(r1) r4 = socket(0x1e, 0x4, 0x0) connect$tipc(r4, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r5, 0x0, 0x200fc0) ioctl$PPPIOCSNPMODE(0xffffffffffffffff, 0x4008744b, &(0x7f0000000040)={0x8057}) 08:50:12 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x3000000) 08:50:12 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:50:12 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, 0x0, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:50:12 executing program 1 (fault-call:9 fault-nth:26): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) [ 191.725534][T15453] FAULT_INJECTION: forcing a failure. [ 191.725534][T15453] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 191.753098][T15453] CPU: 1 PID: 15453 Comm: syz-executor.1 Tainted: G W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 191.764641][T15453] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 191.774680][T15453] Call Trace: [ 191.777958][T15453] dump_stack+0x1b0/0x21e [ 191.782278][T15453] ? devkmsg_release+0x11c/0x11c [ 191.787205][T15453] ? show_regs_print_info+0x12/0x12 [ 191.792389][T15453] ? kasan_alloc_pages+0x4a/0x60 [ 191.797316][T15453] should_fail+0x6fb/0x860 [ 191.801720][T15453] ? setup_fault_attr+0x2b0/0x2b0 [ 191.806734][T15453] __alloc_pages_nodemask+0x1ee/0x7c0 [ 191.812096][T15453] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 191.817626][T15453] ? find_get_entry+0x5da/0x670 [ 191.822461][T15453] ? xa_load+0x323/0x340 [ 191.826707][T15453] __do_page_cache_readahead+0x244/0x510 [ 191.832328][T15453] ? read_cache_pages_invalidate_page+0x1b0/0x1b0 [ 191.838749][T15453] ? unwind_next_frame+0x1c07/0x22b0 [ 191.844023][T15453] ? page_cache_sync_readahead+0xa3/0x3c0 [ 191.849731][T15453] generic_file_read_iter+0x626/0x20a0 [ 191.855179][T15453] ? find_get_pages_range_tag+0xae0/0xae0 [ 191.860882][T15453] ? avc_has_perm_noaudit+0x2fc/0x3f0 [ 191.866239][T15453] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 191.872289][T15453] ? avc_denied+0x1c0/0x1c0 [ 191.876791][T15453] generic_file_splice_read+0x491/0x780 [ 191.882322][T15453] ? splice_shrink_spd+0xb0/0xb0 [ 191.887334][T15453] ? security_file_permission+0x1e9/0x300 [ 191.893073][T15453] ? splice_shrink_spd+0xb0/0xb0 [ 191.898008][T15453] splice_direct_to_actor+0x3cf/0xb00 [ 191.903367][T15453] ? do_splice_direct+0x3d0/0x3d0 [ 191.908372][T15453] ? pipe_to_sendpage+0x300/0x300 [ 191.913381][T15453] ? security_file_permission+0x128/0x300 [ 191.919080][T15453] do_splice_direct+0x279/0x3d0 [ 191.923917][T15453] ? splice_direct_to_actor+0xb00/0xb00 [ 191.929460][T15453] ? security_file_permission+0x128/0x300 [ 191.935162][T15453] do_sendfile+0x89d/0x1110 [ 191.939670][T15453] ? compat_writev+0x390/0x390 [ 191.944414][T15453] ? security_file_permission+0x128/0x300 [ 191.950112][T15453] ? vfs_write+0x427/0x4f0 [ 191.954514][T15453] ? fput_many+0x42/0x1a0 [ 191.958833][T15453] __x64_sys_sendfile64+0x1ae/0x220 [ 191.964026][T15453] ? __ia32_sys_sendfile+0x240/0x240 [ 191.969298][T15453] do_syscall_64+0xcb/0x150 [ 191.973788][T15453] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 191.979674][T15453] RIP: 0033:0x45de29 [ 191.983553][T15453] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 192.003139][T15453] RSP: 002b:00007fa46e034c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 192.011516][T15453] RAX: ffffffffffffffda RBX: 0000000000027ec0 RCX: 000000000045de29 08:50:13 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 08:50:13 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x4000000) 08:50:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f000000b000/0x2000)=nil, 0x2000, 0x0, r4) pkey_free(r4) sendfile(r1, r3, 0x0, 0x200fc0) 08:50:13 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, 0x0, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:50:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) socket(0x1e, 0x4, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x200fc0) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f00000018c0)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000001600)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_MCAST_RATE(r4, &(0x7f0000001700)={0x0, 0x0, &(0x7f00000016c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0b3dac6a12000c0001", @ANYRES16=r5, @ANYBLOB="010000000000000000005c00000008000300", @ANYRES32=r6, @ANYBLOB='\b\x00k\x00\n\x00\x00\x00'], 0x24}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000140)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_START_AP(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x5c, r5, 0x400, 0x70bd27, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r7}, @val={0xc, 0x99, {0x2382, 0x21}}}}, [@NL80211_ATTR_P2P_OPPPS={0x5}, @NL80211_ATTR_SMPS_MODE={0x5, 0xd5, 0x2}, @NL80211_ATTR_HIDDEN_SSID={0x8, 0x7e, 0x2}, @NL80211_ATTR_TWT_RESPONDER={0x4}, @chandef_params=[@NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x5}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x27}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x15cc}]]}, 0x5c}, 0x1, 0x0, 0x0, 0x80080a4}, 0x8098) [ 192.019586][T15453] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 192.027524][T15453] RBP: 00007fa46e034ca0 R08: 0000000000000000 R09: 0000000000000000 [ 192.035460][T15453] R10: 0000000000200fc0 R11: 0000000000000246 R12: 000000000000001a [ 192.043397][T15453] R13: 00007ffdeacd249f R14: 00007fa46e0359c0 R15: 000000000118bf2c 08:50:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x8a) lsetxattr$trusted_overlay_opaque(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket(0x1e, 0x4, 0x0) connect$tipc(r3, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x200fc0) 08:50:13 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, 0x0, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:50:13 executing program 1 (fault-call:9 fault-nth:27): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) [ 192.287968][T15481] FAULT_INJECTION: forcing a failure. [ 192.287968][T15481] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 192.301519][T15481] CPU: 1 PID: 15481 Comm: syz-executor.1 Tainted: G W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 192.313059][T15481] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 192.323182][T15481] Call Trace: [ 192.326456][T15481] dump_stack+0x1b0/0x21e [ 192.330778][T15481] ? devkmsg_release+0x11c/0x11c [ 192.335705][T15481] ? show_regs_print_info+0x12/0x12 [ 192.340900][T15481] ? kasan_alloc_pages+0x4a/0x60 [ 192.345826][T15481] should_fail+0x6fb/0x860 [ 192.350229][T15481] ? setup_fault_attr+0x2b0/0x2b0 [ 192.355257][T15481] __alloc_pages_nodemask+0x1ee/0x7c0 [ 192.360638][T15481] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 192.366173][T15481] ? find_get_entry+0x5da/0x670 [ 192.371006][T15481] ? xa_load+0x323/0x340 [ 192.375236][T15481] __do_page_cache_readahead+0x244/0x510 [ 192.380877][T15481] ? read_cache_pages_invalidate_page+0x1b0/0x1b0 [ 192.387275][T15481] ? unwind_next_frame+0x1c07/0x22b0 [ 192.392568][T15481] ? page_cache_sync_readahead+0xa3/0x3c0 [ 192.398302][T15481] generic_file_read_iter+0x626/0x20a0 [ 192.403750][T15481] ? find_get_pages_range_tag+0xae0/0xae0 [ 192.409458][T15481] ? avc_has_perm_noaudit+0x2fc/0x3f0 [ 192.414811][T15481] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 192.420866][T15481] ? avc_denied+0x1c0/0x1c0 [ 192.425340][T15481] generic_file_splice_read+0x491/0x780 [ 192.430853][T15481] ? splice_shrink_spd+0xb0/0xb0 [ 192.435763][T15481] ? security_file_permission+0x1e9/0x300 [ 192.441447][T15481] ? splice_shrink_spd+0xb0/0xb0 [ 192.446348][T15481] splice_direct_to_actor+0x3cf/0xb00 [ 192.451690][T15481] ? do_splice_direct+0x3d0/0x3d0 [ 192.456679][T15481] ? pipe_to_sendpage+0x300/0x300 [ 192.461672][T15481] ? security_file_permission+0x128/0x300 [ 192.467357][T15481] do_splice_direct+0x279/0x3d0 [ 192.472173][T15481] ? splice_direct_to_actor+0xb00/0xb00 [ 192.477685][T15481] ? security_file_permission+0x128/0x300 [ 192.483368][T15481] do_sendfile+0x89d/0x1110 [ 192.487850][T15481] ? compat_writev+0x390/0x390 [ 192.492578][T15481] ? security_file_permission+0x128/0x300 [ 192.498262][T15481] ? vfs_write+0x427/0x4f0 [ 192.502655][T15481] ? fput_many+0x42/0x1a0 [ 192.506950][T15481] __x64_sys_sendfile64+0x1ae/0x220 [ 192.512112][T15481] ? __ia32_sys_sendfile+0x240/0x240 [ 192.517362][T15481] do_syscall_64+0xcb/0x150 [ 192.521833][T15481] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 192.527690][T15481] RIP: 0033:0x45de29 [ 192.531552][T15481] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 192.551124][T15481] RSP: 002b:00007fa46e034c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 192.559503][T15481] RAX: ffffffffffffffda RBX: 0000000000027ec0 RCX: 000000000045de29 [ 192.567441][T15481] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 192.575377][T15481] RBP: 00007fa46e034ca0 R08: 0000000000000000 R09: 0000000000000000 08:50:13 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) [ 192.583317][T15481] R10: 0000000000200fc0 R11: 0000000000000246 R12: 000000000000001b [ 192.591255][T15481] R13: 00007ffdeacd249f R14: 00007fa46e0359c0 R15: 000000000118bf2c 08:50:13 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x25, 0x0, &(0x7f0000000200)) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000001180), &(0x7f00000011c0)=0x4) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r1, 0x800002, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x8a) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000001380)=0x1, 0x4) r2 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000001140)={@empty}, 0x14) close(r2) r3 = socket(0x1e, 0x4, 0x0) connect$tipc(r3, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = syz_genetlink_get_family_id$fou(&(0x7f0000001240)='fou\x00') sendmsg$FOU_CMD_GET(r4, &(0x7f0000001340)={&(0x7f0000001200)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000001300)={&(0x7f0000001280)={0x50, r5, 0x400, 0x70bd27, 0x25dfdbff, {}, [@FOU_ATTR_LOCAL_V4={0x8, 0x6, @empty}, @FOU_ATTR_TYPE={0x5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast2}, @FOU_ATTR_AF={0x5, 0x2, 0xa}, @FOU_ATTR_PEER_V4={0x8, 0x8, @initdev={0xac, 0x1e, 0x1, 0x0}}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @ipv4={[], [], @multicast2}}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000}, 0x0) r6 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r2, r6, 0x0, 0x200fc0) r7 = signalfd(r6, &(0x7f0000000100)={[0x1]}, 0x8) pwrite64(r7, &(0x7f0000000140)="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", 0x1000, 0x2) 08:50:13 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x6000000) [ 192.700035][T15492] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15492 comm=syz-executor.0 08:50:14 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x8000000) 08:50:14 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 08:50:14 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) [ 192.978248][T15496] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15496 comm=syz-executor.0 08:50:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) getuid() connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:50:14 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0xb, 0x80042) mmap$usbfs(&(0x7f0000ffd000/0x2000)=nil, 0xfaff, 0x7ffffffffffef, 0x13, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r1, 0x800002, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x8a) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/ip_tables_names\x00') sendmsg$NFT_MSG_GETSETELEM(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x20, 0xd, 0xa, 0x301, 0x0, 0x0, {0x5}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz0\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000002}, 0x4) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = socket(0x1e, 0x4, 0x0) connect$tipc(r4, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x200fc0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r6, 0x6, 0x25, 0x0, &(0x7f0000000200)) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r7, 0x6, 0x25, 0x0, &(0x7f0000000200)) getsockname$inet6(r7, &(0x7f0000000280)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000002c0)=0x1c) 08:50:14 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0xa000000) 08:50:14 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:50:14 executing program 1 (fault-call:9 fault-nth:28): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) [ 193.095791][T15524] FAULT_INJECTION: forcing a failure. [ 193.095791][T15524] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 193.150317][T15524] CPU: 1 PID: 15524 Comm: syz-executor.1 Tainted: G W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 193.162030][T15524] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 193.172073][T15524] Call Trace: [ 193.175356][T15524] dump_stack+0x1b0/0x21e [ 193.179675][T15524] ? devkmsg_release+0x11c/0x11c [ 193.184604][T15524] ? show_regs_print_info+0x12/0x12 [ 193.189787][T15524] ? kasan_alloc_pages+0x4a/0x60 [ 193.194715][T15524] should_fail+0x6fb/0x860 [ 193.199121][T15524] ? setup_fault_attr+0x2b0/0x2b0 [ 193.204143][T15524] __alloc_pages_nodemask+0x1ee/0x7c0 [ 193.209505][T15524] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 193.215036][T15524] ? find_get_entry+0x5da/0x670 [ 193.219874][T15524] ? xa_load+0x323/0x340 [ 193.224102][T15524] __do_page_cache_readahead+0x244/0x510 [ 193.229737][T15524] ? read_cache_pages_invalidate_page+0x1b0/0x1b0 [ 193.236135][T15524] ? unwind_next_frame+0x1c07/0x22b0 [ 193.241401][T15524] ? page_cache_sync_readahead+0xa3/0x3c0 [ 193.247108][T15524] generic_file_read_iter+0x626/0x20a0 [ 193.252558][T15524] ? find_get_pages_range_tag+0xae0/0xae0 [ 193.258274][T15524] ? avc_has_perm_noaudit+0x2fc/0x3f0 [ 193.263634][T15524] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 193.269686][T15524] ? avc_denied+0x1c0/0x1c0 [ 193.274178][T15524] generic_file_splice_read+0x491/0x780 [ 193.279711][T15524] ? splice_shrink_spd+0xb0/0xb0 [ 193.284638][T15524] ? security_file_permission+0x1e9/0x300 [ 193.290344][T15524] ? splice_shrink_spd+0xb0/0xb0 [ 193.295265][T15524] splice_direct_to_actor+0x3cf/0xb00 [ 193.300624][T15524] ? do_splice_direct+0x3d0/0x3d0 [ 193.305642][T15524] ? pipe_to_sendpage+0x300/0x300 [ 193.310658][T15524] ? security_file_permission+0x128/0x300 [ 193.316358][T15524] do_splice_direct+0x279/0x3d0 [ 193.321200][T15524] ? splice_direct_to_actor+0xb00/0xb00 [ 193.326732][T15524] ? security_file_permission+0x128/0x300 [ 193.332435][T15524] do_sendfile+0x89d/0x1110 [ 193.336934][T15524] ? compat_writev+0x390/0x390 [ 193.341684][T15524] ? security_file_permission+0x128/0x300 [ 193.347388][T15524] ? vfs_write+0x427/0x4f0 [ 193.351803][T15524] ? fput_many+0x42/0x1a0 [ 193.356123][T15524] __x64_sys_sendfile64+0x1ae/0x220 [ 193.361305][T15524] ? __ia32_sys_sendfile+0x240/0x240 [ 193.366585][T15524] do_syscall_64+0xcb/0x150 [ 193.371076][T15524] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 193.376951][T15524] RIP: 0033:0x45de29 [ 193.380830][T15524] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 193.400415][T15524] RSP: 002b:00007fa46e034c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 193.408807][T15524] RAX: ffffffffffffffda RBX: 0000000000027ec0 RCX: 000000000045de29 [ 193.416763][T15524] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 193.424715][T15524] RBP: 00007fa46e034ca0 R08: 0000000000000000 R09: 0000000000000000 [ 193.432677][T15524] R10: 0000000000200fc0 R11: 0000000000000246 R12: 000000000000001c [ 193.440634][T15524] R13: 00007ffdeacd249f R14: 00007fa46e0359c0 R15: 000000000118bf2c 08:50:14 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:50:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) r4 = fcntl$dupfd(r3, 0x406, r0) sendmsg$IPVS_CMD_NEW_DAEMON(r4, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800104}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xac, 0x0, 0x400, 0x3ff, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x800080}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x40}, @IPVS_CMD_ATTR_DAEMON={0x30, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_bond\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_STATE={0x8}]}, @IPVS_CMD_ATTR_DAEMON={0x44, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}]}]}, 0xac}, 0x1, 0x0, 0x0, 0x801}, 0xc890) 08:50:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000140)={'ip6_vti0\x00', 0x0, 0x29, 0x80, 0x1f, 0xc0, 0xc, @private0, @ipv4={[], [], @multicast1}, 0x8, 0x7, 0x3ff, 0x3}}) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000100), 0xc, &(0x7f0000000240)={&(0x7f0000000200)=@deltclass={0x38, 0x29, 0x0, 0x70bd2a, 0x25dfdbfc, {0x0, 0x0, 0x0, r4, {0x5, 0x3}, {0x6, 0x8}, {0xd, 0x7}}, [@TCA_RATE={0x6, 0x5, {0x9, 0x4}}, @tclass_kind_options=@c_taprio={0xb, 0x1, 'taprio\x00'}]}, 0x38}, 0x1, 0x0, 0x0, 0x4041}, 0xc0) sendfile(r1, r3, 0x0, 0x200fc0) 08:50:14 executing program 1 (fault-call:9 fault-nth:29): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:50:14 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0xf000000) [ 193.648447][T15545] FAULT_INJECTION: forcing a failure. [ 193.648447][T15545] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 193.693166][T15545] CPU: 1 PID: 15545 Comm: syz-executor.1 Tainted: G W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 193.704703][T15545] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 193.714734][T15545] Call Trace: [ 193.718040][T15545] dump_stack+0x1b0/0x21e [ 193.722360][T15545] ? devkmsg_release+0x11c/0x11c [ 193.727307][T15545] ? show_regs_print_info+0x12/0x12 [ 193.732508][T15545] ? kasan_alloc_pages+0x4a/0x60 [ 193.737431][T15545] should_fail+0x6fb/0x860 [ 193.741832][T15545] ? setup_fault_attr+0x2b0/0x2b0 [ 193.746838][T15545] __alloc_pages_nodemask+0x1ee/0x7c0 [ 193.752196][T15545] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 193.757722][T15545] ? find_get_entry+0x5da/0x670 [ 193.762583][T15545] ? xa_load+0x323/0x340 [ 193.766809][T15545] __do_page_cache_readahead+0x244/0x510 [ 193.772442][T15545] ? read_cache_pages_invalidate_page+0x1b0/0x1b0 [ 193.778842][T15545] ? unwind_next_frame+0x1c07/0x22b0 [ 193.784110][T15545] ? page_cache_sync_readahead+0xa3/0x3c0 [ 193.789814][T15545] generic_file_read_iter+0x626/0x20a0 [ 193.795261][T15545] ? find_get_pages_range_tag+0xae0/0xae0 [ 193.800962][T15545] ? avc_has_perm_noaudit+0x2fc/0x3f0 [ 193.806316][T15545] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 193.812365][T15545] ? avc_denied+0x1c0/0x1c0 [ 193.816852][T15545] generic_file_splice_read+0x491/0x780 [ 193.822383][T15545] ? splice_shrink_spd+0xb0/0xb0 [ 193.827336][T15545] ? security_file_permission+0x1e9/0x300 [ 193.833036][T15545] ? splice_shrink_spd+0xb0/0xb0 [ 193.838086][T15545] splice_direct_to_actor+0x3cf/0xb00 [ 193.843442][T15545] ? do_splice_direct+0x3d0/0x3d0 [ 193.848450][T15545] ? pipe_to_sendpage+0x300/0x300 [ 193.853490][T15545] ? security_file_permission+0x128/0x300 [ 193.859235][T15545] do_splice_direct+0x279/0x3d0 [ 193.864071][T15545] ? splice_direct_to_actor+0xb00/0xb00 [ 193.869606][T15545] ? security_file_permission+0x128/0x300 [ 193.875320][T15545] do_sendfile+0x89d/0x1110 [ 193.879805][T15545] ? compat_writev+0x390/0x390 [ 193.884554][T15545] ? security_file_permission+0x128/0x300 [ 193.890251][T15545] ? vfs_write+0x427/0x4f0 [ 193.894651][T15545] ? fput_many+0x42/0x1a0 [ 193.898979][T15545] __x64_sys_sendfile64+0x1ae/0x220 [ 193.904162][T15545] ? __ia32_sys_sendfile+0x240/0x240 [ 193.909427][T15545] do_syscall_64+0xcb/0x150 [ 193.913923][T15545] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 193.919801][T15545] RIP: 0033:0x45de29 [ 193.923674][T15545] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 08:50:15 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 08:50:15 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:50:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000180)={0xea28}, 0x8) r2 = socket(0x1e, 0x4, 0x0) write$P9_RLOCK(r0, &(0x7f00000000c0)={0x8, 0x35, 0x1, 0x3}, 0x8) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) utimensat(r3, &(0x7f0000000100)='./bus/file0\x00', &(0x7f0000000140)={{}, {0x77359400}}, 0x100) r4 = dup(r0) r5 = socket$inet_udp(0x2, 0x2, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f00000018c0)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000001600)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_MCAST_RATE(r6, &(0x7f0000001700)={0x0, 0x0, &(0x7f00000016c0)={&(0x7f0000001640)={0x24, r7, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r8}, @void}}, [@NL80211_ATTR_MCAST_RATE={0x8, 0x6b, 0xa}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_UNEXPECTED_FRAME(r4, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, 0x0, 0x200, 0x70bd25, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r8}, @void}}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20008000}, 0x8008000) sendfile(r1, r3, 0x0, 0x200fc0) 08:50:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) r4 = accept$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000140)=0x14) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r4, 0xf502, 0x0) [ 193.943245][T15545] RSP: 002b:00007fa46e034c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 193.951618][T15545] RAX: ffffffffffffffda RBX: 0000000000027ec0 RCX: 000000000045de29 [ 193.959561][T15545] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 193.967500][T15545] RBP: 00007fa46e034ca0 R08: 0000000000000000 R09: 0000000000000000 [ 193.975463][T15545] R10: 0000000000200fc0 R11: 0000000000000246 R12: 000000000000001d [ 193.983403][T15545] R13: 00007ffdeacd249f R14: 00007fa46e0359c0 R15: 000000000118bf2c 08:50:15 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:50:15 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:50:15 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x11000000) 08:50:15 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:50:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xffffffffffff1399}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = accept$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000140)=0x1c) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000180)=0x3, 0x4) close(r1) r3 = socket(0x1e, 0x4, 0x0) execveat(r0, &(0x7f00000001c0)='./bus\x00', &(0x7f00000003c0)=[&(0x7f0000000200)=',\x00', &(0x7f0000000240)='**!]\x00', &(0x7f0000000280)='\x00', &(0x7f00000002c0)='\'\x00', &(0x7f0000000300)='G#-$:}\x00', &(0x7f0000000340)='-[]H^{+%!,}\x00', &(0x7f0000000380)='%%^$%(F%*\x00'], &(0x7f0000000500)=[&(0x7f0000000400)='*^@0\\{@\x00', &(0x7f0000000440)='\x00', &(0x7f0000000480)=']\x00', &(0x7f00000004c0)='\x00'], 0x400) connect$tipc(r3, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x200fc0) 08:50:15 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:50:15 executing program 1 (fault-call:9 fault-nth:30): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:50:15 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) [ 194.353013][T15593] FAULT_INJECTION: forcing a failure. [ 194.353013][T15593] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 194.370990][T15593] CPU: 1 PID: 15593 Comm: syz-executor.1 Tainted: G W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 194.382520][T15593] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 194.392558][T15593] Call Trace: [ 194.395835][T15593] dump_stack+0x1b0/0x21e [ 194.400152][T15593] ? devkmsg_release+0x11c/0x11c [ 194.405081][T15593] ? show_regs_print_info+0x12/0x12 [ 194.410267][T15593] ? kasan_alloc_pages+0x4a/0x60 [ 194.415193][T15593] should_fail+0x6fb/0x860 [ 194.419601][T15593] ? setup_fault_attr+0x2b0/0x2b0 [ 194.424617][T15593] __alloc_pages_nodemask+0x1ee/0x7c0 [ 194.430057][T15593] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 194.435580][T15593] ? find_get_entry+0x5da/0x670 [ 194.440396][T15593] ? xa_load+0x323/0x340 [ 194.444602][T15593] __do_page_cache_readahead+0x244/0x510 [ 194.450237][T15593] ? read_cache_pages_invalidate_page+0x1b0/0x1b0 [ 194.456626][T15593] ? unwind_next_frame+0x1c07/0x22b0 [ 194.461874][T15593] ? page_cache_sync_readahead+0xa3/0x3c0 [ 194.467563][T15593] generic_file_read_iter+0x626/0x20a0 [ 194.472988][T15593] ? find_get_pages_range_tag+0xae0/0xae0 [ 194.478675][T15593] ? avc_has_perm_noaudit+0x2fc/0x3f0 [ 194.484010][T15593] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 194.490078][T15593] ? avc_denied+0x1c0/0x1c0 [ 194.494547][T15593] generic_file_splice_read+0x491/0x780 [ 194.500053][T15593] ? splice_shrink_spd+0xb0/0xb0 [ 194.504957][T15593] ? security_file_permission+0x1e9/0x300 [ 194.510640][T15593] ? splice_shrink_spd+0xb0/0xb0 [ 194.515541][T15593] splice_direct_to_actor+0x3cf/0xb00 [ 194.520878][T15593] ? do_splice_direct+0x3d0/0x3d0 [ 194.525878][T15593] ? pipe_to_sendpage+0x300/0x300 [ 194.530863][T15593] ? security_file_permission+0x128/0x300 [ 194.536545][T15593] do_splice_direct+0x279/0x3d0 [ 194.541370][T15593] ? splice_direct_to_actor+0xb00/0xb00 [ 194.546878][T15593] ? security_file_permission+0x128/0x300 [ 194.552559][T15593] do_sendfile+0x89d/0x1110 [ 194.557022][T15593] ? compat_writev+0x390/0x390 [ 194.561759][T15593] ? security_file_permission+0x128/0x300 [ 194.567441][T15593] ? vfs_write+0x427/0x4f0 [ 194.571820][T15593] ? fput_many+0x42/0x1a0 [ 194.576214][T15593] __x64_sys_sendfile64+0x1ae/0x220 [ 194.581390][T15593] ? __ia32_sys_sendfile+0x240/0x240 [ 194.586656][T15593] do_syscall_64+0xcb/0x150 [ 194.591123][T15593] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 194.596975][T15593] RIP: 0033:0x45de29 [ 194.600836][T15593] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 194.620403][T15593] RSP: 002b:00007fa46e034c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 194.628777][T15593] RAX: ffffffffffffffda RBX: 0000000000027ec0 RCX: 000000000045de29 [ 194.636727][T15593] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 194.644662][T15593] RBP: 00007fa46e034ca0 R08: 0000000000000000 R09: 0000000000000000 [ 194.652609][T15593] R10: 0000000000200fc0 R11: 0000000000000246 R12: 000000000000001e [ 194.660560][T15593] R13: 00007ffdeacd249f R14: 00007fa46e0359c0 R15: 000000000118bf2c 08:50:16 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 08:50:16 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:50:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$IP_VS_SO_GET_INFO(r4, 0x0, 0x481, &(0x7f00000000c0), &(0x7f0000000100)=0xc) sendfile(r1, r3, 0x0, 0x200fc0) 08:50:16 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x1c000000) 08:50:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f00000018c0)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000001600)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_MCAST_RATE(r3, &(0x7f0000001700)={0x0, 0x0, &(0x7f00000016c0)={&(0x7f0000001640)={0x24, r4, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r5}, @void}}, [@NL80211_ATTR_MCAST_RATE={0x8, 0x6b, 0xa}]}, 0x24}}, 0x0) r6 = socket$inet_udp(0x2, 0x2, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$nl80211(&(0x7f00000018c0)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r6, 0x8933, &(0x7f0000001600)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_MCAST_RATE(r7, &(0x7f0000001700)={0x0, 0x0, &(0x7f00000016c0)={&(0x7f0000001640)={0x24, r8, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r9}, @void}}, [@NL80211_ATTR_MCAST_RATE={0x8, 0x6b, 0xa}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_NEW_STATION(r2, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x3c, r4, 0x4, 0x70bd25, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r9}, @val={0xc, 0x99, {0x3, 0x66}}}}, [@NL80211_ATTR_PEER_AID={0x6, 0xb5, 0x1cf}, @NL80211_ATTR_STA_FLAGS2={0xc, 0x43, {0x5, 0x10001}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000}, 0x1000) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r10 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r10, 0x0, 0x200fc0) 08:50:16 executing program 1 (fault-call:9 fault-nth:31): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:50:16 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:50:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000100)='pids.current\x00', 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7, 0x1b, 0x2}, 0x7) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x8a) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket(0x1e, 0x4, 0x0) connect$tipc(r3, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r4 = open(&(0x7f0000000080)='./bus\x00', 0x226202, 0x0) sendfile(r2, r4, 0x0, 0x200fc0) 08:50:16 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) [ 194.867271][T15615] FAULT_INJECTION: forcing a failure. [ 194.867271][T15615] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 194.908470][T15615] CPU: 0 PID: 15615 Comm: syz-executor.1 Tainted: G W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 194.920014][T15615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 194.930050][T15615] Call Trace: [ 194.933325][T15615] dump_stack+0x1b0/0x21e [ 194.937647][T15615] ? devkmsg_release+0x11c/0x11c [ 194.942569][T15615] ? show_regs_print_info+0x12/0x12 [ 194.947836][T15615] ? kasan_alloc_pages+0x4a/0x60 [ 194.952754][T15615] should_fail+0x6fb/0x860 [ 194.957155][T15615] ? setup_fault_attr+0x2b0/0x2b0 [ 194.962166][T15615] __alloc_pages_nodemask+0x1ee/0x7c0 [ 194.967534][T15615] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 194.973063][T15615] ? find_get_entry+0x5da/0x670 [ 194.977894][T15615] ? xa_load+0x323/0x340 [ 194.982127][T15615] __do_page_cache_readahead+0x244/0x510 [ 194.987777][T15615] ? read_cache_pages_invalidate_page+0x1b0/0x1b0 [ 194.994180][T15615] ? unwind_next_frame+0x1c07/0x22b0 [ 194.999449][T15615] ? page_cache_sync_readahead+0xa3/0x3c0 08:50:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x8a) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000180)={0x0, 'team_slave_0\x00', 0x1}, 0x18) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/meminfo\x00', 0x0, 0x0) ioctl$EVIOCRMFF(r3, 0x40044581, &(0x7f0000000140)=0x6) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x200fc0) [ 195.005151][T15615] generic_file_read_iter+0x626/0x20a0 [ 195.010597][T15615] ? find_get_pages_range_tag+0xae0/0xae0 [ 195.016315][T15615] ? avc_has_perm_noaudit+0x2fc/0x3f0 [ 195.021676][T15615] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 195.027729][T15615] ? avc_denied+0x1c0/0x1c0 [ 195.032218][T15615] generic_file_splice_read+0x491/0x780 [ 195.037750][T15615] ? splice_shrink_spd+0xb0/0xb0 [ 195.042671][T15615] ? security_file_permission+0x1e9/0x300 [ 195.048379][T15615] ? splice_shrink_spd+0xb0/0xb0 [ 195.053296][T15615] splice_direct_to_actor+0x3cf/0xb00 [ 195.058652][T15615] ? do_splice_direct+0x3d0/0x3d0 [ 195.063657][T15615] ? pipe_to_sendpage+0x300/0x300 [ 195.068669][T15615] ? security_file_permission+0x128/0x300 [ 195.074389][T15615] do_splice_direct+0x279/0x3d0 [ 195.079233][T15615] ? splice_direct_to_actor+0xb00/0xb00 [ 195.084765][T15615] ? security_file_permission+0x128/0x300 [ 195.090463][T15615] do_sendfile+0x89d/0x1110 [ 195.094950][T15615] ? compat_writev+0x390/0x390 [ 195.099804][T15615] ? security_file_permission+0x128/0x300 [ 195.105505][T15615] ? vfs_write+0x427/0x4f0 [ 195.109908][T15615] ? fput_many+0x42/0x1a0 [ 195.114235][T15615] __x64_sys_sendfile64+0x1ae/0x220 [ 195.119416][T15615] ? __ia32_sys_sendfile+0x240/0x240 [ 195.124689][T15615] do_syscall_64+0xcb/0x150 [ 195.129181][T15615] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 195.135053][T15615] RIP: 0033:0x45de29 [ 195.138931][T15615] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 08:50:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:50:16 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) [ 195.158643][T15615] RSP: 002b:00007fa46e034c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 195.167042][T15615] RAX: ffffffffffffffda RBX: 0000000000027ec0 RCX: 000000000045de29 [ 195.175002][T15615] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 195.182957][T15615] RBP: 00007fa46e034ca0 R08: 0000000000000000 R09: 0000000000000000 [ 195.190913][T15615] R10: 0000000000200fc0 R11: 0000000000000246 R12: 000000000000001f [ 195.198872][T15615] R13: 00007ffdeacd249f R14: 00007fa46e0359c0 R15: 000000000118bf2c 08:50:16 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 08:50:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x3, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) open(&(0x7f00000000c0)='./bus\x00', 0x200100, 0x1ee) 08:50:16 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:50:16 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x20000000) 08:50:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x677}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = syz_open_dev$hiddev(&(0x7f0000000100)='/dev/usb/hiddev#\x00', 0x6, 0x280803) fsync(r2) r3 = socket(0x1e, 0x4, 0x0) connect$tipc(r3, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x200fc0) 08:50:16 executing program 1 (fault-call:9 fault-nth:32): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:50:16 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:50:16 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) read(r0, &(0x7f00000000c0)=""/91, 0x57) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x800000000}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r0, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r1, 0x800002, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0x8a) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket(0x1e, 0x4, 0x0) connect$tipc(r3, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000140)='lp\x00', 0x3) sendfile(r2, r4, 0x0, 0x200fc0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$TIOCGSID(r4, 0x5429, &(0x7f00000000c0)=0x0) fcntl$lock(r5, 0x25, &(0x7f0000000100)={0x1, 0x1, 0x4, 0x1f, r6}) [ 195.675368][T15657] FAULT_INJECTION: forcing a failure. [ 195.675368][T15657] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 195.726364][T15663] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 195.731439][T15657] CPU: 0 PID: 15657 Comm: syz-executor.1 Tainted: G W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 195.747112][T15657] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 195.757147][T15657] Call Trace: [ 195.760427][T15657] dump_stack+0x1b0/0x21e [ 195.764738][T15657] ? devkmsg_release+0x11c/0x11c [ 195.769660][T15657] ? show_regs_print_info+0x12/0x12 [ 195.774839][T15657] ? kasan_alloc_pages+0x4a/0x60 [ 195.779758][T15657] should_fail+0x6fb/0x860 [ 195.784158][T15657] ? setup_fault_attr+0x2b0/0x2b0 [ 195.789166][T15657] __alloc_pages_nodemask+0x1ee/0x7c0 [ 195.794524][T15657] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 195.800061][T15657] ? find_get_entry+0x5da/0x670 [ 195.804892][T15657] ? xa_load+0x323/0x340 [ 195.809121][T15657] __do_page_cache_readahead+0x244/0x510 [ 195.814740][T15657] ? read_cache_pages_invalidate_page+0x1b0/0x1b0 [ 195.821138][T15657] ? unwind_next_frame+0x1c07/0x22b0 08:50:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="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"], &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='bdev\x00', 0x160041, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) truncate(&(0x7f0000000100)='./bus\x00', 0x4) r1 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0xc, 0x121041) write$evdev(r1, &(0x7f0000000040)=[{{}, 0x1, 0x43, 0x2}], 0x18) write$evdev(r1, &(0x7f0000000040), 0x373) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYRESOCT=r1], 0x8a) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) mincore(&(0x7f0000ffd000/0x3000)=nil, 0x3000, &(0x7f0000000240)=""/251) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$MON_IOCQ_RING_SIZE(r3, 0x9205) r4 = socket$inet6(0xa, 0x400000000001, 0x0) close(r4) r5 = socket(0x1e, 0x4, 0x0) connect$tipc(r5, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r4, r6, 0x0, 0x200fc0) [ 195.826423][T15657] ? page_cache_sync_readahead+0xa3/0x3c0 [ 195.832133][T15657] generic_file_read_iter+0x626/0x20a0 [ 195.837577][T15657] ? find_get_pages_range_tag+0xae0/0xae0 [ 195.843278][T15657] ? avc_has_perm_noaudit+0x2fc/0x3f0 [ 195.848639][T15657] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 195.854713][T15657] ? avc_denied+0x1c0/0x1c0 [ 195.859185][T15657] generic_file_splice_read+0x491/0x780 [ 195.864693][T15657] ? splice_shrink_spd+0xb0/0xb0 [ 195.869645][T15657] ? security_file_permission+0x1e9/0x300 [ 195.875382][T15657] ? splice_shrink_spd+0xb0/0xb0 [ 195.880286][T15657] splice_direct_to_actor+0x3cf/0xb00 [ 195.885637][T15657] ? do_splice_direct+0x3d0/0x3d0 [ 195.890647][T15657] ? pipe_to_sendpage+0x300/0x300 [ 195.895659][T15657] ? security_file_permission+0x128/0x300 [ 195.901368][T15657] do_splice_direct+0x279/0x3d0 [ 195.906250][T15657] ? splice_direct_to_actor+0xb00/0xb00 [ 195.911869][T15657] ? security_file_permission+0x128/0x300 [ 195.917567][T15657] do_sendfile+0x89d/0x1110 [ 195.922055][T15657] ? compat_writev+0x390/0x390 [ 195.926824][T15657] ? security_file_permission+0x128/0x300 [ 195.932535][T15657] ? vfs_write+0x427/0x4f0 [ 195.936932][T15657] ? fput_many+0x42/0x1a0 [ 195.941247][T15657] __x64_sys_sendfile64+0x1ae/0x220 [ 195.946430][T15657] ? __ia32_sys_sendfile+0x240/0x240 [ 195.951715][T15657] do_syscall_64+0xcb/0x150 [ 195.956196][T15657] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 195.962055][T15657] RIP: 0033:0x45de29 [ 195.965914][T15657] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 195.985502][T15657] RSP: 002b:00007fa46e034c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 195.993878][T15657] RAX: ffffffffffffffda RBX: 0000000000027ec0 RCX: 000000000045de29 [ 196.001839][T15657] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 196.009791][T15657] RBP: 00007fa46e034ca0 R08: 0000000000000000 R09: 0000000000000000 [ 196.017727][T15657] R10: 0000000000200fc0 R11: 0000000000000246 R12: 0000000000000020 08:50:17 executing program 4: r0 = ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x101}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r1, 0x800002, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0x8a) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket(0x1e, 0x4, 0x0) connect$tipc(r3, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r4 = accept4$inet(r3, &(0x7f0000000100)={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x10, 0x800) setsockopt$IP_VS_SO_SET_DELDEST(r4, 0x0, 0x488, &(0x7f0000000180)={{0x2f, @local, 0x3f, 0x4, 'lc\x00', 0x1, 0x9, 0x3d}, {@broadcast, 0x4e22, 0x2004, 0x6, 0x91d, 0x3f}}, 0x44) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r2, r5, 0x0, 0x200fc0) 08:50:17 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) [ 196.025787][T15657] R13: 00007ffdeacd249f R14: 00007fa46e0359c0 R15: 000000000118bf2c 08:50:17 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) [ 196.070853][T15679] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 196.113088][T15683] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 08:50:17 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x40000000) 08:50:17 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:50:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x2, {0x40, 0x4}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:50:17 executing program 1 (fault-call:9 fault-nth:33): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:50:17 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000140), &(0x7f0000000180)=0xc) fsconfig$FSCONFIG_SET_PATH(r1, 0x3, &(0x7f00000000c0)=',\x00', &(0x7f0000000100)='./bus\x00', 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x800002, 0x0) write$binfmt_aout(r2, &(0x7f00000000c0)=ANY=[], 0x8a) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = socket(0x1e, 0x4, 0x0) connect$tipc(r4, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x200fc0) 08:50:17 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 196.503024][T15699] FAULT_INJECTION: forcing a failure. [ 196.503024][T15699] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 196.517828][T15702] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 196.528291][T15699] CPU: 0 PID: 15699 Comm: syz-executor.1 Tainted: G W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 196.539813][T15699] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 196.549860][T15699] Call Trace: [ 196.553137][T15699] dump_stack+0x1b0/0x21e [ 196.557470][T15699] ? devkmsg_release+0x11c/0x11c [ 196.562392][T15699] ? show_regs_print_info+0x12/0x12 [ 196.567571][T15699] ? kasan_alloc_pages+0x4a/0x60 [ 196.572509][T15699] should_fail+0x6fb/0x860 [ 196.576907][T15699] ? setup_fault_attr+0x2b0/0x2b0 [ 196.581922][T15699] __alloc_pages_nodemask+0x1ee/0x7c0 [ 196.587283][T15699] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 196.592814][T15699] ? find_get_entry+0x5da/0x670 [ 196.597650][T15699] ? xa_load+0x323/0x340 [ 196.601875][T15699] __do_page_cache_readahead+0x244/0x510 [ 196.607495][T15699] ? read_cache_pages_invalidate_page+0x1b0/0x1b0 [ 196.613886][T15699] ? unwind_next_frame+0x1c07/0x22b0 [ 196.619147][T15699] ? page_cache_sync_readahead+0xa3/0x3c0 [ 196.624832][T15699] generic_file_read_iter+0x626/0x20a0 [ 196.630265][T15699] ? find_get_pages_range_tag+0xae0/0xae0 [ 196.635954][T15699] ? avc_has_perm_noaudit+0x2fc/0x3f0 [ 196.641291][T15699] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 196.647354][T15699] ? avc_denied+0x1c0/0x1c0 [ 196.651825][T15699] generic_file_splice_read+0x491/0x780 [ 196.657346][T15699] ? splice_shrink_spd+0xb0/0xb0 [ 196.662303][T15699] ? security_file_permission+0x1e9/0x300 [ 196.668020][T15699] ? splice_shrink_spd+0xb0/0xb0 [ 196.672939][T15699] splice_direct_to_actor+0x3cf/0xb00 [ 196.678344][T15699] ? do_splice_direct+0x3d0/0x3d0 [ 196.683351][T15699] ? pipe_to_sendpage+0x300/0x300 [ 196.688362][T15699] ? security_file_permission+0x128/0x300 [ 196.694068][T15699] do_splice_direct+0x279/0x3d0 [ 196.698928][T15699] ? splice_direct_to_actor+0xb00/0xb00 [ 196.704460][T15699] ? security_file_permission+0x128/0x300 [ 196.710144][T15699] do_sendfile+0x89d/0x1110 [ 196.714613][T15699] ? compat_writev+0x390/0x390 [ 196.719344][T15699] ? security_file_permission+0x128/0x300 [ 196.725082][T15699] ? vfs_write+0x427/0x4f0 [ 196.729466][T15699] ? fput_many+0x42/0x1a0 [ 196.733760][T15699] __x64_sys_sendfile64+0x1ae/0x220 [ 196.738921][T15699] ? __ia32_sys_sendfile+0x240/0x240 [ 196.744169][T15699] do_syscall_64+0xcb/0x150 [ 196.748645][T15699] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 196.754504][T15699] RIP: 0033:0x45de29 [ 196.758448][T15699] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 196.778017][T15699] RSP: 002b:00007fa46e034c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 196.786405][T15699] RAX: ffffffffffffffda RBX: 0000000000027ec0 RCX: 000000000045de29 [ 196.794339][T15699] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 08:50:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) r4 = socket(0x10, 0x80002, 0x0) connect$tipc(r4, 0x0, 0x0) setsockopt$inet6_udp_encap(r4, 0x11, 0x64, &(0x7f0000000100)=0x4, 0x4) prctl$PR_GET_KEEPCAPS(0x7) 08:50:18 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:50:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket(0x11, 0x2, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) r4 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x5e) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000480)=@newlink={0x34, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x54, 0x0, 0x75ef47cb53a6b89, 0x70bd2a, 0x25dfdbff, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x1}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x9}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x8}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x88e9}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x8001}]}, 0x54}, 0x1, 0x0, 0x0, 0x40000}, 0x4000040) r6 = socket(0x1e, 0x4, 0x0) connect$tipc(r6, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r7 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r7, 0x0, 0x200fc0) mmap$perf(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x4, 0x50, r0, 0x100000001) [ 196.802275][T15699] RBP: 00007fa46e034ca0 R08: 0000000000000000 R09: 0000000000000000 [ 196.810214][T15699] R10: 0000000000200fc0 R11: 0000000000000246 R12: 0000000000000021 [ 196.818305][T15699] R13: 00007ffdeacd249f R14: 00007fa46e0359c0 R15: 000000000118bf2c 08:50:18 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x60000000) 08:50:18 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) [ 196.876987][T15714] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 08:50:18 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) [ 196.950369][T15723] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 08:50:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000100)={'syzkaller0\x00', @multicast}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ_RESET(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x2c, 0x15, 0xa, 0x801, 0x0, 0x0, {0x0, 0x0, 0x6}, [@NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0x4008000) ioctl$EVIOCGVERSION(r0, 0x80044501, &(0x7f00000000c0)=""/11) close(r1) r3 = socket(0x1e, 0x4, 0x0) connect$tipc(r3, &(0x7f0000000000)=@id={0x1e, 0x3, 0x1, {0x4e22, 0x2}}, 0xffffffffffffffcb) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x200fc0) 08:50:18 executing program 1 (fault-call:9 fault-nth:34): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:50:18 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) [ 197.022828][T15728] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 197.098284][T15738] FAULT_INJECTION: forcing a failure. [ 197.098284][T15738] name failslab, interval 1, probability 0, space 0, times 0 [ 197.110870][T15738] CPU: 0 PID: 15738 Comm: syz-executor.1 Tainted: G W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 197.122387][T15738] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 197.124850][T15739] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 197.132419][T15738] Call Trace: [ 197.132434][T15738] dump_stack+0x1b0/0x21e [ 197.132442][T15738] ? devkmsg_release+0x11c/0x11c [ 197.132449][T15738] ? show_regs_print_info+0x12/0x12 [ 197.132458][T15738] ? memset+0x1f/0x40 [ 197.132466][T15738] ? unwind_next_frame+0x1c07/0x22b0 [ 197.132476][T15738] should_fail+0x6fb/0x860 [ 197.132484][T15738] ? setup_fault_attr+0x2b0/0x2b0 [ 197.132491][T15738] ? xas_create+0xe07/0x1360 [ 197.132498][T15738] should_failslab+0x5/0x20 [ 197.132504][T15738] kmem_cache_alloc+0x36/0x250 [ 197.132511][T15738] xas_create+0xe07/0x1360 [ 197.132519][T15738] ? get_mem_cgroup_from_mm+0x27b/0x2c0 [ 197.132525][T15738] xas_store+0x93/0x13b0 [ 197.132532][T15738] ? _raw_spin_lock_irq+0xa2/0x180 [ 197.132538][T15738] ? _raw_spin_lock_irqsave+0x1c0/0x1c0 [ 197.132544][T15738] ? xas_load+0x46f/0x4c0 [ 197.132554][T15738] __add_to_page_cache_locked+0x390/0x8a0 [ 197.132563][T15738] ? add_to_page_cache_locked+0x30/0x30 [ 197.132572][T15738] ? workingset_activation+0x150/0x150 [ 197.132590][T15738] ? unwind_next_frame+0x1c07/0x22b0 [ 197.132598][T15738] add_to_page_cache_lru+0x11d/0x280 [ 197.132605][T15738] ? __add_to_page_cache_locked+0x8a0/0x8a0 [ 197.132611][T15738] ? memset+0x1f/0x40 [ 197.132617][T15738] ? unwind_next_frame+0x1c07/0x22b0 [ 197.132625][T15738] ext4_mpage_readpages+0x467/0x1eb0 [ 197.132633][T15738] ? __rcu_read_lock+0x50/0x50 [ 197.132643][T15738] ? ext4_end_bio+0x590/0x590 [ 197.132648][T15738] ? prep_new_page+0x11a/0x380 [ 197.132656][T15738] ? ext4_readpages+0x8b/0x110 [ 197.132664][T15738] ? ext4_journalled_set_page_dirty+0x30/0x30 [ 197.132670][T15738] read_pages+0x108/0x3f0 [ 197.132678][T15738] ? __do_page_cache_readahead+0x510/0x510 [ 197.132685][T15738] ? find_get_entry+0x5da/0x670 [ 197.132691][T15738] ? xa_load+0x323/0x340 [ 197.132697][T15738] __do_page_cache_readahead+0x470/0x510 [ 197.132706][T15738] ? read_cache_pages_invalidate_page+0x1b0/0x1b0 [ 197.132712][T15738] ? unwind_next_frame+0x1c07/0x22b0 [ 197.132718][T15738] ? page_cache_sync_readahead+0xa3/0x3c0 [ 197.132725][T15738] generic_file_read_iter+0x626/0x20a0 [ 197.132735][T15738] ? find_get_pages_range_tag+0xae0/0xae0 [ 197.132742][T15738] ? avc_has_perm_noaudit+0x2fc/0x3f0 [ 197.132748][T15738] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 197.132754][T15738] ? avc_denied+0x1c0/0x1c0 [ 197.132763][T15738] generic_file_splice_read+0x491/0x780 [ 197.132771][T15738] ? splice_shrink_spd+0xb0/0xb0 [ 197.132780][T15738] ? security_file_permission+0x1e9/0x300 [ 197.132786][T15738] ? splice_shrink_spd+0xb0/0xb0 [ 197.132792][T15738] splice_direct_to_actor+0x3cf/0xb00 [ 197.132799][T15738] ? do_splice_direct+0x3d0/0x3d0 [ 197.132804][T15738] ? pipe_to_sendpage+0x300/0x300 [ 197.132811][T15738] ? security_file_permission+0x128/0x300 [ 197.132817][T15738] do_splice_direct+0x279/0x3d0 [ 197.132823][T15738] ? splice_direct_to_actor+0xb00/0xb00 [ 197.132831][T15738] ? security_file_permission+0x128/0x300 [ 197.132836][T15738] do_sendfile+0x89d/0x1110 [ 197.132843][T15738] ? compat_writev+0x390/0x390 [ 197.132850][T15738] ? security_file_permission+0x128/0x300 [ 197.132856][T15738] ? vfs_write+0x427/0x4f0 [ 197.132861][T15738] ? fput_many+0x42/0x1a0 [ 197.132868][T15738] __x64_sys_sendfile64+0x1ae/0x220 [ 197.132875][T15738] ? __ia32_sys_sendfile+0x240/0x240 [ 197.132883][T15738] do_syscall_64+0xcb/0x150 [ 197.132889][T15738] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 197.132895][T15738] RIP: 0033:0x45de29 [ 197.132901][T15738] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 197.132912][T15738] RSP: 002b:00007fa46e034c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 08:50:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) faccessat(r0, &(0x7f00000000c0)='./file0\x00', 0x188) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) syz_usb_connect(0x4, 0x1163, &(0x7f0000000100)={{0x12, 0x1, 0x201, 0x56, 0x19, 0x2f, 0x40, 0x1b3d, 0x4701, 0xb07e, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1151, 0x4, 0x2, 0x7f, 0x10, 0x1f, [{{0x9, 0x4, 0x9e, 0x5, 0xe, 0x52, 0xeb, 0x3a, 0xeb, [], [{{0x9, 0x5, 0x80, 0x4, 0x400, 0x4, 0x80, 0x81}}, {{0x9, 0x5, 0xf, 0x10, 0x8, 0x7e, 0x4, 0x8, [@generic={0x79, 0x6, "33d737b4b12a2b93e144e502d67565ddeb680b5f1507d17c799a6c01eec4d048ca9b43a0702e9caf7f5144909a9658caa2c853024f51fb85f36ecde9a49677c60704ab8184aa684560fd98edeb8d36805482f54eb0b3dbe1d906c53a1b5a6968ed1e04a6d06ca80e7dcc9d99e9989a97303417fe0deae6"}, @generic={0x1b, 0x8, "ccc6b39f311ad30509296a72ac19e39863e6fe0a3f9c209ede"}]}}, {{0x9, 0x5, 0x1, 0x0, 0x39f, 0x8f, 0x9, 0x7f, [@uac_iso={0x7, 0x25, 0x1, 0x1, 0x4, 0xe6}]}}, {{0x9, 0x5, 0x5, 0x3, 0x40, 0x7f, 0x3f, 0x5, [@generic={0x3f, 0x3, "496a4cbb0cfd42410fa1244b18332daa12218421bdef590b8631db146cee3d8911f972def5c3951a441618c6e98d1c1dd52198df61b67e9e07e12f017f"}, @generic={0x3b, 0x24, "4ea735eb7b11f37db5189cae6ef9a45c667cf49d6beb43ed6d64db57c083b301617aeafd9df4931c992c32c46e9152cfb27df7d41bc5e18820"}]}}, {{0x9, 0x5, 0xd, 0x2, 0x3ff, 0xad, 0x7, 0x8, [@generic={0xe9, 0x23, "1f565b728c764e8e331feae173f4177478f2e2ed8df6d9ca09dd884414f8261535f8756e531c8cd0d72e58f9f66cc7179e073c771b21c08e669b42621f10173e6b749be1c244a6308e82259501f6de456090e9ba8851328a517889347cdf14a17c87df7a31224d7d69747fe0b6ee4b697392ffc11fe29d50c982523b98b201eeebad0621fb7af5b0b021fb204156de7deddcc59c60dbee9ccc2df5d3a01eb031adbd0b6b14212478c1d644f0246f1882d9e71e5507e0e8e8af6808efe8f0d3622024d0f047c1daa04261a9ca59cde6b6d68b847dda1556ff8bb8646463c77665dec0ee7e32ce3c"}, @uac_iso={0x7, 0x25, 0x1, 0x81, 0x1f, 0x7}]}}, {{0x9, 0x5, 0x5, 0x0, 0x60, 0x1, 0x19, 0x7}}, {{0x9, 0x5, 0x80, 0xc, 0x40, 0x2, 0x3, 0x7}}, {{0x9, 0x5, 0x7, 0x10, 0x20, 0xf7, 0x3, 0x81, [@uac_iso={0x7, 0x25, 0x1, 0x80, 0x5, 0x3}, @uac_iso={0x7, 0x25, 0x1, 0xc2, 0x80, 0x7}]}}, {{0x9, 0x5, 0xe, 0x1, 0x400, 0x6, 0x40, 0x1f}}, {{0x9, 0x5, 0xc, 0x1, 0x10, 0x48, 0xff, 0xc8, [@generic={0xeb, 0x6, "501a7a81aa8514b351aa3a34ac274930311bc628b58593018b10139717e940765a543dc22797d12949037bb999d92171607f73a3b91e34f8538a250aeb128a271a7cd2b2a57ff1a639ac35fe9ff18a9e94b2ce2bdc78060ba7366101517aded4ebbefac0e7c84ccf80b13fa3f770f0de0a038a73f491363b19e7c853a0139e188308562919bba24858aaa46de529e4a98d5c4454c880cb660882110c7c4d6d6f8fd0fbb4f7ba97da6ca74de0a13cdad8289a19b5191e6ad74df83ca7044334684b8f860333e89ae8fe068aff0ea4f17ea3d7b0ce913d33e7b3355a67aff586bbf89cba48e79e326b97"}]}}, {{0x9, 0x5, 0x2, 0x10, 0x10, 0x7, 0x7f, 0x9, [@uac_iso={0x7, 0x25, 0x1, 0x82, 0x7f, 0x4}, @generic={0x4b, 0x10, "f8df4bff92cae625a62cb68d90859f622f59d4dd5946c03b2efe7ebe7ad3d5c32bca45835e02c67760b52fc17c6f984de8df0dde724a312d1348223b20fa6e72c5508cd1536cac0e52"}]}}, {{0x9, 0x5, 0x1, 0x0, 0x0, 0x81, 0x8, 0x1, [@uac_iso={0x7, 0x25, 0x1, 0x2, 0xfe}, @generic={0x55, 0xc, "e00ba3ccdab10550a4a04ba145b06fae0ba2983d233e994a63297d2e858e60a17b1288318f3dd4d0f189296f3d88a2ca9d629e3abbb2e6250f052956a29434de2e781795cb208d52d8fd3c6a37e74c684b46a4"}]}}, {{0x9, 0x5, 0x6, 0x10, 0x3ff, 0x40, 0x3, 0x0, [@generic={0x69, 0x4, "3dc460552b49502eeeec0d323000aec6670b3d20c26caf0397910d627046eb8175dc5a4faf5f6cbe64af2f0951161eb15f61c6f99ef88c990cc87a30b06b02844b9f9319418b9993625e2f0f4af1a68d70fdd56324e93cad2269a7c54f5eb2065821746c5a2a5c"}, @uac_iso={0x7, 0x25, 0x1, 0x81, 0xff, 0x9}]}}, {{0x9, 0x5, 0x9, 0x4, 0x400, 0xff, 0x5, 0x7f}}]}}, {{0x9, 0x4, 0x73, 0xff, 0xc, 0xa, 0x77, 0xf4, 0x3f, [@hid_hid={0x9, 0x21, 0x6, 0x5d, 0x1, {0x22, 0x9cc}}, @cdc_ecm={{0x8, 0x24, 0x6, 0x0, 0x0, "2c7a95"}, {0x5, 0x24, 0x0, 0x6}, {0xd, 0x24, 0xf, 0x1, 0x0, 0xc4d8, 0x1000, 0x5}, [@network_terminal={0x7, 0x24, 0xa, 0x8, 0x59, 0x6, 0xa1}, @country_functional={0xe, 0x24, 0x7, 0xbd, 0x8, [0x8, 0xd6, 0x8, 0x0]}, @dmm={0x7, 0x24, 0x14, 0x6, 0x93}]}], [{{0x9, 0x5, 0x6, 0x8, 0x8, 0x4, 0x4, 0x5, [@generic={0x8c, 0x30, "3095d0957a3e768ce36e50d67bc2d1504d17dc1e49af3bd66fa2854f49d5f6eecf62534e1f3455d4fe1435b2f652c6a1eb98f2ee29e600fd34909261373cf199a699de03f0480ff07ac84cbd1c84cb2d8e3d46dc41667cfc10b20fbbe217998a421e43e3a845f400ba6e9772279368e5c25cdfa0005745472c6d88e73f263b7043e82d67b1e7cdadd9c2"}]}}, {{0x9, 0x5, 0x3, 0x10, 0x3ff, 0x9, 0x0, 0x1, [@uac_iso={0x7, 0x25, 0x1, 0x1, 0x10, 0x9}]}}, {{0x9, 0x5, 0xb, 0x2, 0x400, 0x4d, 0x7f, 0x48, [@generic={0x37, 0x1, "5f7073b5185fa05e46382c320afc13f70336475a00507794ce9c7238baba85507d8aa66fb3d3037996c1b966b691fac535aa5b53bc"}, @generic={0xf4, 0x10, "2ca70b217e3c03ea5079afe99dd7adc3700c41a6f167f360b08f7b405673f09001a5b1325f504722f77bfc1eaf94f2585bd5357e32b2625933a1b41174c667dfd65d1065c1f09c75ec8b58238980afe51f0600d6376588eaa8f8a4a607138f0bdf81bdc4a8b20707262ab713afc35e417ad5065dee91aab4fa32c94811b7d1d101f493c4d39741c41b098ee94431c2dc432983c61488ee6dbe9bdb8c2d42dcb684dd88d8591d9072632c29717976462bb4f66c68e5813264ae7ec13ae16e287825d90f57e59f0aff6be79993475ebd995e0acab470733763428cafafaa34262b30daf29e15f7bc5d654c358e7ec1c30ab3f7"}]}}, {{0x9, 0x5, 0xf, 0xc, 0x10, 0x1, 0x91, 0x6}}, {{0x9, 0x5, 0xd, 0x1, 0x400, 0x7, 0x1f, 0x0, [@uac_iso={0x7, 0x25, 0x1, 0x83, 0x2, 0x9}]}}, {{0x9, 0x5, 0x9, 0xc, 0x3ff, 0x3f, 0xc0, 0x80, [@generic={0xc5, 0x21, "bb3dc5865ea523a95d9aa131ed2628eca34225967e6b6eacf7cd949bfd092243115e75ed55cc2122021a74822b97069e9b53eda4f4ddb4c6e4586b97b2b39c95fbc5b50349ecc24a3438bd91caa87456df015d8652f066b05113e9e44b7b2c9bfc0c173ab0d979137a7f5e11eb14e15ffedd5bc885142ef887cf5706b5399471055ed3c070f7fd80b4d6c4d3f9076b3221784a3d58dabaab8d4ec81a251ca2979dc3eff43dc3dc4dd91a1f5a1c3092559ecf3b0a507c49f2bdae80822c1112cb7afcd9"}]}}, {{0x9, 0x5, 0x80, 0x0, 0x40, 0x20, 0x7f, 0x6}}, {{0x9, 0x5, 0xe, 0x1, 0x20, 0x1, 0x7, 0x8}}, {{0x9, 0x5, 0xb, 0x8, 0x8, 0x81, 0x7f, 0x4}}, {{0x9, 0x5, 0xb, 0x0, 0x200, 0x3, 0x1, 0x2}}, {{0x9, 0x5, 0xa, 0x0, 0x8, 0x7, 0x0, 0x20}}, {{0x9, 0x5, 0xf, 0x0, 0x200, 0x7, 0x2, 0x1}}]}}, {{0x9, 0x4, 0xc, 0x7f, 0xe, 0x11, 0xac, 0xd, 0x1, [@uac_as={[@format_type_i_continuous={0xa, 0x24, 0x2, 0x1, 0x1, 0x4, 0x0, 0x7, '\'', "e4"}, @as_header={0x7, 0x24, 0x1, 0x0, 0xb8, 0x1001}, @as_header={0x7, 0x24, 0x1, 0x1, 0xbe, 0x3}]}, @uac_as], [{{0x9, 0x5, 0xd, 0x0, 0x40, 0x3e, 0x3, 0x3}}, {{0x9, 0x5, 0x1, 0x0, 0x10, 0x4, 0x1, 0xfc, [@generic={0x8e, 0x9, "dee1b10ef7c395bd0b3a2af222dbce75f8247d6137538da8f1059d1686dd78aedb046262827300017818943445fa781eac25f67e18fda3a735bf716a499a5ca55ce0f4fac4ae812085b588714b819ff044f422a1c5eb77de1461115cf915e16e112f3aa8b00e059e6d2e0ae56e5f663fd3c243ca054422d697c6ee3a58d59dc8bc33e55066a0671f3f6f1121"}]}}, {{0x9, 0x5, 0x7, 0x1, 0x200, 0x81, 0x0, 0x0, [@uac_iso={0x7, 0x25, 0x1, 0x1, 0x3, 0x8}]}}, {{0x9, 0x5, 0xc, 0x0, 0x8, 0x81, 0x80, 0x2, [@generic={0x36, 0x6, "11491479a55efd885e3a9d043253fd740b361c721d1319991a971f253f280773446d4979bdef663ad52f5efb01b572153f374c3c"}]}}, {{0x9, 0x5, 0x1, 0x0, 0x10, 0x3f, 0x5c, 0xb8, [@uac_iso={0x7, 0x25, 0x1, 0x82, 0x1, 0x1}, @uac_iso={0x7, 0x25, 0x1, 0x100, 0xb9, 0x1f}]}}, {{0x9, 0x5, 0xf, 0x4, 0x8, 0x7f, 0x5, 0x80}}, {{0x9, 0x5, 0xc4682a4075af0af9, 0x0, 0x8, 0x40, 0x81, 0x7}}, {{0x9, 0x5, 0x2, 0x0, 0x3ff, 0x0, 0x58, 0x9, [@uac_iso={0x7, 0x25, 0x1, 0x81, 0x4}, @uac_iso={0x7, 0x25, 0x1, 0x3, 0x3f, 0x7f}]}}, {{0x9, 0x5, 0xe, 0x10, 0x200, 0xce, 0x81, 0x80, [@generic={0x49, 0x10, "a2f02ad005964b4b17502acf8c8e33add5637b27806f2c96afc48d8ec4b57ba3f690c268cd2bb41ff68582bc1c3844a9d7ac763f60ee96aeac283116a50868e062822cf8bd9cb3"}]}}, {{0x9, 0x5, 0x8, 0xc, 0x10, 0x6, 0x7f, 0x20}}, {{0x9, 0x5, 0xd, 0xc, 0x3ff, 0xda}}, {{0x9, 0x5, 0xb, 0x1, 0x8, 0x3, 0x7f, 0x40}}, {{0x9, 0x5, 0xe, 0x2, 0x10, 0x3, 0xf7, 0x8, [@uac_iso={0x7, 0x25, 0x1, 0x2, 0x0, 0x7fff}, @uac_iso={0x7, 0x25, 0x1, 0x1, 0x9, 0x8}]}}, {{0x9, 0x5, 0xe, 0x10, 0x8, 0x81, 0x20}}]}}, {{0x9, 0x4, 0xa9, 0x40, 0xf, 0x32, 0xe7, 0x6, 0x0, [@cdc_ncm={{0xb, 0x24, 0x6, 0x0, 0x1, "504aa3274398"}, {0x5, 0x24, 0x0, 0x2}, {0xd, 0x24, 0xf, 0x1, 0x10001, 0x8, 0x8, 0x6}, {0x6, 0x24, 0x1a, 0x7, 0x22}, [@acm={0x4}, @mdlm_detail={0x1b, 0x24, 0x13, 0x7, "371c84f466e181be2d3e12c35c045e8a7bc9f0cbb85e05"}]}, @cdc_ncm={{0x5}, {0x5, 0x24, 0x0, 0x2}, {0xd, 0x24, 0xf, 0x1, 0x6, 0x1, 0xff80, 0x40}, {0x6, 0x24, 0x1a, 0x3cad, 0x32}, [@acm={0x4}, @network_terminal={0x7, 0x24, 0xa, 0x1, 0x5, 0x7f, 0x81}, @mbim_extended={0x8, 0x24, 0x1c, 0x8, 0x15, 0x7f}, @mbim={0xc, 0x24, 0x1b, 0x0, 0x81, 0x5, 0xde, 0x6, 0x1f}]}], [{{0x9, 0x5, 0x8, 0x10, 0x400, 0x7, 0x0, 0x2, [@generic={0xf9, 0x21, "9756607c43baa12a83a2d1d0b4401c4ee44f9616c9e1f6d1caf5abb7d72d3ce2c3171650ea7082eb85a419fab7008f45d27024caf9778ea6a2cf5fe57aa9a9829dde50884d989d9d587e1ddb0e8d88d90daec56c77cc0a458e3c92e9929237512d6cf338ce32f20d60e4872c45ec6d57d9fe12921bb69589cf4ce4d92c03c382e4197089315a091fc0bd510a3bd6fcefbe8e710d9626093c87d26a6ce36fe11575e16b0082274966f1798fc6f3663d3c7e97f8d48638bde79afa67a934a2b49d26f037f9431e5ead28795a9bb63f96d13dfa848c2ecd9f0e0869fef3c5628dc322bd1c4de75d55163d372fba2f185f6d2d200f15c59995"}]}}, {{0x9, 0x5, 0xf, 0x8, 0x20, 0x9, 0x3, 0x6a, [@uac_iso={0x7, 0x25, 0x1, 0x2, 0xcf, 0x3}, @generic={0x37, 0x10, "582a2b0db02f54cf90fedf9f3a7ea27ba538b9fbbc05ea0d858bc77e9ae271f2df29e64a3dc548bee9e6efe479215cd61ed148b55a"}]}}, {{0x9, 0x5, 0x2, 0xc, 0x400, 0xf6, 0x7, 0x0, [@generic={0x6a, 0x9, "349c94a9162e675732b15e74bfa2359c1a73f280e42570f2ccc4641c00e4d6c9f65f39d2e02e40715be1c39f5f5909018f54af79e54387fa4a1982871058ee26c3dfda58ce4f33fb54b7b6e9e88cadc8b7437bf84a8df4f7ffca94ea4dc82192098d7a26f8149e1c"}]}}, {{0x9, 0x5, 0x5, 0x10, 0x40, 0xfe, 0x1, 0x2}}, {{0x9, 0x5, 0x80, 0x0, 0x40, 0x4, 0x0, 0x3, [@generic={0xf2, 0x22, "56c0b0480520cd4a0e4073472498e7489f15f87296d1329e37737f7581cc1586dc2e5ff6f6d5bd71076ff9601280cf6d15f143ee3599ca11cde097197329033dc9c9b873a0ffc8197f503be83c03be39a66f5af4eb2555c003531647308ac5ad83fb2f23212dc51c6a7fdff0bb60de1f328767b6b5f0d04eb7f3dc7e432aa24c002fa992e8bfd609f35992cd695b2eb0663ed4660ea34eef2383e6854feefdab8978f7d5a2b0dfa252d3f5311b298662bf713ed965555dd676a63a97e99eb4323a87bc9b8b1d08061cbcb8350501eaa2f0086314214329f8b11e26bd4af2256852e92ece82c5869171c5a0c3fa54da2d"}, @uac_iso={0x7, 0x25, 0x1, 0x80, 0x4, 0xba91}]}}, {{0x9, 0x5, 0xa, 0x2, 0x8, 0x3f, 0x3, 0x9, [@generic={0x55, 0xb, "c64fe565338f3200f15c457012ce19f09130340dfa05c3cd1027156ea1b0afa572945ea4400258eb60bf9f5f59c20e65bc310eb31e173206ef5823a6450f2aff2c2677d55cda288122548d647b83de7902a47a"}, @uac_iso={0x7, 0x25, 0x1, 0x0, 0x5, 0xd6af}]}}, {{0x9, 0x5, 0x9, 0x0, 0x10, 0x7, 0xff, 0x1f, [@generic={0x37, 0x24, "8f235d14ab65b7be2f78edd9960b16b4d29519dbd6b15c91351660f7af684f8225060093812c643bbd831e48d5700207c9570a2827"}]}}, {{0x9, 0x5, 0x80, 0x10, 0x10, 0x5, 0xff, 0x20, [@uac_iso={0x7, 0x25, 0x1, 0x0, 0x4, 0x8001}]}}, {{0x9, 0x5, 0x9, 0x1, 0x8, 0x0, 0x0, 0xf5, [@uac_iso={0x7, 0x25, 0x1, 0x0, 0x1}]}}, {{0x9, 0x5, 0x0, 0x0, 0x400, 0x20, 0x1, 0x7f, [@generic={0x92, 0x4, "7ab5a3a58451b669796fcda4735a96062e8b1c6dab194b30f11bb5a0e54af0f36a4592b0e1aaad08eeab1924ef6770d8e626d0a6c72b4bf481d40dfa6d0dfae5f54fff2caf8fa3255101b82efa7f642384e506c1dbd136e40f024dd00b44d6f0b7e0a38f87db656cc572971f0154a89164c0f2e06e3f58767e99cefcdd5b15a1fb57855778bff22b4d3e8f77154a4a2b"}, @generic={0xa8, 0x1, "e097faceef0c3beea43ade3db8bc607aa509a5ca544af7ca106220d57a07eb06771bc91ec1fc6565d7f3a7d43d07bad33aa03ce8ef3a0b6434b93e3e765d7378f693864f36fbe36c35f6e1b16131516b208111a82ffbf77eca370536130e16934a2a2dcfa8310a8b1a43200ec73bf2d5ac9c017d01ef957f6d9fc3dad5ec0b5ef8aa6af3cc50ba5c5613f050fddd1a3c8c368cc76fff3b82249e528db5a478be300319bad59e"}]}}, {{0x9, 0x5, 0x2, 0x3, 0x200, 0x81, 0xc, 0x8, [@generic={0xc0, 0x31, "639c045258399d67c953eabdd9943127832bc2e9796c7738fc52107116ee6b885611e370f19b3c021dbd1be10aab3ce1be3b9abdde9c4aae492eb5d2000fb6f3782d528862f8f5426086ae3cb4db7ed1ea536d8ff69481df5727e67f0e2a08118824fd2cf1070b9df683fcb9e9841fc818d744d112dd62c8898891d95afaa5e157dabe6b1541aa5a0d28652edf720d58403b6531217a0138a76dbf849d031494041bfdc97a2764ea3f921e019a1ecd3cffcfe9566c544a991620133920ef"}, @uac_iso={0x7, 0x25, 0x1, 0x82, 0x3}]}}, {{0x9, 0x5, 0x4, 0x4, 0x200, 0x3f, 0x1, 0x5, [@generic={0x24, 0x9, "29ec6bb9a9876ffa4b0f034b191b58d42aac1c6669667de8344374ee3d4c1444dd27"}, @generic={0x9b, 0x11, "25859b2763c3e9573dbf114f825cd8f2c6a9366f2ab701d75aab68904ddfbf0edf5478a8c893d956e61678ce496336986446c54ea45d9ef3957f0d58c5b9d955682ba1e1acd077e4ce1de880c87c73ab8bd5087a51999eb541097740d8c96f1e506ddaded3d2bdefa066b9ba5019594cac3c794a1a6453d319504a11fd9cdfd72a20cc8cf1658995ff23e90e0b06044195f183ac3bf884d88d"}]}}, {{0x9, 0x5, 0x4, 0x10, 0x8, 0x0, 0x2, 0xf9, [@generic={0x51, 0x1, "53ea2f825c80f25a753e448c776e9fa51242a0109859d43a6dbfb6275970cb11cd33e08039e51a3e47978b2e937e747b5843b96d3fe66c133080c00db666439725c17a00b5ad4c4fc602c670b497ad"}, @generic={0x30, 0x27, "8d13fa10f3eb9c6e17db5dc9ac72e3733d838852b6cd47242251a17914d39cbc6f35cc10193862363324bc03391a"}]}}, {{0x9, 0x5, 0x4, 0x0, 0x20, 0x1, 0x3, 0x2}}, {{0x9, 0x5, 0xc, 0x0, 0x40, 0xf3, 0x5, 0x20}}]}}]}}]}}, &(0x7f00000015c0)={0xa, &(0x7f0000001280)={0xa, 0x6, 0x250, 0x2, 0x75, 0x5, 0x8, 0x7f}, 0x20, &(0x7f00000012c0)={0x5, 0xf, 0x20, 0x4, [@ext_cap={0x7, 0x10, 0x2, 0x8, 0x5, 0x9, 0x40}, @ptm_cap={0x3}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x7, 0x7, 0xa1, 0x7}, @ext_cap={0x7, 0x10, 0x2, 0x10, 0x3, 0xc, 0x3}]}, 0x7, [{0x33, &(0x7f0000001300)=@string={0x33, 0x3, "f726b9bb1589d9d084e538a6bef276899da4ab8af7f34089bb07f6fd07e0305d7319245e1689545a05c53112e58757cb68"}}, {0x86, &(0x7f0000001340)=@string={0x86, 0x3, "242561a6f6563d2b35b81efd1d7d970afff559b315929aa4875fe2a87e9b6cfcbae21f62284a4271e098073d425d9649aeae5f44005757e1fba0faeb24c4ea5542d18591748a7fe382e255ad39a047ab22116f96b7422df7ed08cdb4ed8ed81926d8cc75d65cdeaff2d33736cf297d8985b370ab51bece4758edb8f41b2fc90bf79d3ce7"}}, {0x4, &(0x7f0000001400)=@lang_id={0x4, 0x3, 0x40c}}, {0x4, &(0x7f0000001440)=@lang_id={0x4, 0x3, 0xc0a}}, {0x4, &(0x7f0000001480)=@lang_id={0x4, 0x3, 0xc04}}, {0x83, &(0x7f00000014c0)=@string={0x83, 0x3, "02e78771c1386528a2c07eb0a50d222d0b7f765a669e779c72597fa0f87317d14bea741afea2dbba8fa1e828e7bc8a5ce5b5aac12a9ad4fbb564007f28bf0782dd40f802ad1508640359b4ff02ace3c98311bebb78b44e3f214b8d22c85b311320657425184fc50f9d73d8a9e062960cd98ffc5f33112cf51c15915eca3e2fc911"}}, {0x4, &(0x7f0000001580)=@lang_id={0x4, 0x3, 0x1801}}]}) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:50:18 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:50:18 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x40, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x14, 0x2, 0x0, 0x1, [@vti_common_policy=[@IFLA_VTI_IKEY={0x8}, @IFLA_VTI_LINK={0x8, 0x1, r4}]]}}}]}, 0x40}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 08:50:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) [ 197.496717][T15738] RAX: ffffffffffffffda RBX: 0000000000027ec0 RCX: 000000000045de29 [ 197.504654][T15738] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 197.512702][T15738] RBP: 00007fa46e034ca0 R08: 0000000000000000 R09: 0000000000000000 [ 197.520771][T15738] R10: 0000000000200fc0 R11: 0000000000000246 R12: 0000000000000022 [ 197.528755][T15738] R13: 00007ffdeacd249f R14: 00007fa46e0359c0 R15: 000000000118bf2c 08:50:18 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:50:18 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x97ffffff) [ 197.573065][T15747] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 08:50:18 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:50:18 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:50:18 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c66000000000800"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:50:18 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c66000000000800"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:50:19 executing program 1 (fault-call:9 fault-nth:35): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:50:19 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0xe0ffffff) [ 197.838341][T15783] FAULT_INJECTION: forcing a failure. [ 197.838341][T15783] name failslab, interval 1, probability 0, space 0, times 0 [ 197.851380][T15783] CPU: 1 PID: 15783 Comm: syz-executor.1 Tainted: G W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 197.862906][T15783] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 197.872929][T15783] Call Trace: [ 197.876214][T15783] dump_stack+0x1b0/0x21e [ 197.880517][T15783] ? devkmsg_release+0x11c/0x11c [ 197.885428][T15783] ? show_regs_print_info+0x12/0x12 [ 197.890733][T15783] ? kmem_cache_alloc+0x1d5/0x250 [ 197.895748][T15783] ? workingset_activation+0x150/0x150 [ 197.901178][T15783] should_fail+0x6fb/0x860 [ 197.905564][T15783] ? setup_fault_attr+0x2b0/0x2b0 [ 197.910556][T15783] ? mem_cgroup_charge_statistics+0x12a/0x7d0 [ 197.916588][T15783] ? get_mem_cgroup_from_mm+0x27b/0x2c0 [ 197.922099][T15783] ? __alloc_skb+0x88/0x4d0 [ 197.926569][T15783] should_failslab+0x5/0x20 [ 197.931039][T15783] kmem_cache_alloc+0x36/0x250 [ 197.935779][T15783] __alloc_skb+0x88/0x4d0 [ 197.940075][T15783] ? xas_nomem+0x177/0x1b0 [ 197.944457][T15783] tipc_msg_build+0x74a/0x1b20 [ 197.949191][T15783] ? _local_bh_enable+0x30/0x30 [ 197.954011][T15783] ? tipc_nametbl_lookup_dst_nodes+0x33f/0x380 [ 197.960129][T15783] tipc_sendmcast+0x92a/0xeb0 [ 197.964777][T15783] ? tipc_send_group_unicast+0x7d0/0x7d0 [ 197.970380][T15783] ? memset+0x1f/0x40 [ 197.974337][T15783] ? unwind_next_frame+0x1c07/0x22b0 [ 197.979588][T15783] ? wait_woken+0x250/0x250 [ 197.984059][T15783] ? ext4_mpage_readpages+0x1e31/0x1eb0 [ 197.989569][T15783] __tipc_sendmsg+0x120d/0x2d30 [ 197.994386][T15783] ? local_bh_enable+0x20/0x20 [ 197.999125][T15783] ? blk_flush_plug_list+0x4b7/0x500 [ 198.004376][T15783] ? prep_new_page+0x11a/0x380 [ 198.009161][T15783] ? _raw_spin_lock_bh+0xa4/0x180 [ 198.014184][T15783] ? _local_bh_enable+0x30/0x30 [ 198.019001][T15783] ? memset+0x1f/0x40 [ 198.022953][T15783] ? selinux_socket_sendmsg+0x10b/0x320 [ 198.028494][T15783] ? lock_sock_nested+0x25a/0x320 [ 198.033502][T15783] ? xas_load+0x468/0x4c0 [ 198.037798][T15783] ? ktime_get_coarse_real_ts64+0xd9/0xf0 [ 198.043522][T15783] ? tipc_recvmsg+0x17c0/0x17c0 [ 198.048359][T15783] tipc_sendmsg+0x51/0x70 [ 198.052661][T15783] kernel_sendmsg+0xe2/0x120 [ 198.057233][T15783] sock_no_sendpage+0x13f/0x1b0 [ 198.062047][T15783] ? __receive_sock+0xb0/0xb0 [ 198.066690][T15783] ? ktime_get_coarse_real_ts64+0xd9/0xf0 [ 198.072371][T15783] ? __receive_sock+0xb0/0xb0 [ 198.077055][T15783] sock_sendpage+0xd0/0x120 [ 198.081528][T15783] pipe_to_sendpage+0x23b/0x300 [ 198.086362][T15783] ? sock_fasync+0xf0/0xf0 [ 198.090744][T15783] ? generic_splice_sendpage+0x200/0x200 [ 198.096556][T15783] ? atime_needs_update+0x2cf/0x570 [ 198.101723][T15783] ? page_cache_pipe_buf_confirm+0x113/0x210 [ 198.107668][T15783] __splice_from_pipe+0x2d3/0x870 [ 198.112682][T15783] ? generic_splice_sendpage+0x200/0x200 [ 198.118282][T15783] generic_splice_sendpage+0x172/0x200 [ 198.123709][T15783] ? iter_file_splice_write+0xf20/0xf20 [ 198.129221][T15783] ? direct_splice_actor+0x25/0x120 [ 198.134399][T15783] splice_direct_to_actor+0x496/0xb00 [ 198.139736][T15783] ? do_splice_direct+0x3d0/0x3d0 [ 198.144725][T15783] ? pipe_to_sendpage+0x300/0x300 [ 198.149715][T15783] ? security_file_permission+0x128/0x300 [ 198.155403][T15783] do_splice_direct+0x279/0x3d0 [ 198.160230][T15783] ? splice_direct_to_actor+0xb00/0xb00 [ 198.165755][T15783] ? security_file_permission+0x128/0x300 [ 198.171435][T15783] do_sendfile+0x89d/0x1110 [ 198.175914][T15783] ? compat_writev+0x390/0x390 [ 198.180642][T15783] ? security_file_permission+0x128/0x300 [ 198.186326][T15783] ? vfs_write+0x427/0x4f0 [ 198.190705][T15783] ? fput_many+0x42/0x1a0 [ 198.195018][T15783] __x64_sys_sendfile64+0x1ae/0x220 [ 198.200189][T15783] ? __ia32_sys_sendfile+0x240/0x240 [ 198.205437][T15783] do_syscall_64+0xcb/0x150 [ 198.209906][T15783] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 198.215782][T15783] RIP: 0033:0x45de29 [ 198.219648][T15783] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 198.239254][T15783] RSP: 002b:00007fa46e034c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 198.247634][T15783] RAX: ffffffffffffffda RBX: 0000000000027ec0 RCX: 000000000045de29 [ 198.255570][T15783] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 198.263508][T15783] RBP: 00007fa46e034ca0 R08: 0000000000000000 R09: 0000000000000000 [ 198.271446][T15783] R10: 0000000000200fc0 R11: 0000000000000246 R12: 0000000000000023 [ 198.279386][T15783] R13: 00007ffdeacd249f R14: 00007fa46e0359c0 R15: 000000000118bf2c 08:50:19 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') fchdir(r0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f00000000c0)='.\x00', 0x1000011) getdents64(r0, &(0x7f0000001580)=""/4109, 0x100d) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x800002, 0x0) write$binfmt_aout(r2, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x8a) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = socket(0x1e, 0x4, 0x0) connect$tipc(r4, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x200fc0) 08:50:19 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c66000000000800"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:50:19 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0xe8030000) 08:50:19 executing program 1 (fault-call:9 fault-nth:36): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:50:19 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x40, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x14, 0x2, 0x0, 0x1, [@vti_common_policy=[@IFLA_VTI_IKEY={0x8}, @IFLA_VTI_LINK={0x8, 0x1, r4}]]}}}]}, 0x40}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 08:50:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$RTC_WIE_OFF(r3, 0x7010) close(r1) r4 = socket(0x1e, 0x4, 0x0) connect$tipc(r4, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r5, 0x0, 0x200fc0) 08:50:20 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) [ 198.778662][T15801] FAULT_INJECTION: forcing a failure. [ 198.778662][T15801] name failslab, interval 1, probability 0, space 0, times 0 [ 198.793908][ T22] audit: type=1400 audit(1602060620.002:10): avc: denied { write } for pid=15794 comm="syz-executor.0" name="fdinfo" dev="proc" ino=37317 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=1 [ 198.797344][T15801] CPU: 0 PID: 15801 Comm: syz-executor.1 Tainted: G W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 198.828608][T15801] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 198.838641][T15801] Call Trace: [ 198.841929][T15801] dump_stack+0x1b0/0x21e [ 198.843124][ T22] audit: type=1400 audit(1602060620.002:11): avc: denied { add_name } for pid=15794 comm="syz-executor.0" name="bus" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=1 [ 198.846343][T15801] ? devkmsg_release+0x11c/0x11c [ 198.846350][T15801] ? show_regs_print_info+0x12/0x12 [ 198.846363][T15801] ? kmem_cache_alloc+0x1d5/0x250 [ 198.880802][T15808] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 198.882834][T15801] ? workingset_update_node+0xe7/0x150 [ 198.882844][T15801] should_fail+0x6fb/0x860 [ 198.882852][T15801] ? setup_fault_attr+0x2b0/0x2b0 [ 198.882863][T15801] ? setup_fault_attr+0x2b0/0x2b0 [ 198.911867][T15801] ? mem_cgroup_charge_statistics+0x12a/0x7d0 08:50:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x844}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x20000, 0x0) ioctl$PPPIOCGUNIT(r2, 0x80047456, &(0x7f0000000100)) close(r1) r3 = socket(0x1e, 0x4, 0x0) connect$tipc(r3, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x200fc0) [ 198.912318][ T22] audit: type=1400 audit(1602060620.002:12): avc: denied { create } for pid=15794 comm="syz-executor.0" name="bus" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:kernel_t:s0 tclass=file permissive=1 [ 198.917911][T15801] ? get_mem_cgroup_from_mm+0x27b/0x2c0 [ 198.917920][T15801] ? tipc_msg_build+0x74a/0x1b20 [ 198.917925][T15801] should_failslab+0x5/0x20 [ 198.917936][T15801] __kmalloc_track_caller+0x5d/0x2b0 [ 198.959470][T15801] ? kmem_cache_alloc+0x1d5/0x250 [ 198.964519][T15801] ? tipc_msg_build+0x74a/0x1b20 [ 198.969442][T15801] __alloc_skb+0xd1/0x4d0 [ 198.973753][T15801] tipc_msg_build+0x74a/0x1b20 08:50:20 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) [ 198.978502][T15801] ? _local_bh_enable+0x30/0x30 [ 198.983353][T15801] ? tipc_nametbl_lookup_dst_nodes+0x33f/0x380 [ 198.989489][T15801] tipc_sendmcast+0x92a/0xeb0 [ 198.994152][T15801] ? tipc_send_group_unicast+0x7d0/0x7d0 [ 198.999774][T15801] ? memset+0x1f/0x40 [ 199.003744][T15801] ? wait_woken+0x250/0x250 [ 199.008227][T15801] ? ext4_mpage_readpages+0x1e31/0x1eb0 [ 199.013757][T15801] __tipc_sendmsg+0x120d/0x2d30 [ 199.018590][T15801] ? local_bh_enable+0x20/0x20 [ 199.023372][T15801] ? blk_flush_plug_list+0x4b7/0x500 [ 199.028641][T15801] ? prep_new_page+0x11a/0x380 [ 199.033390][T15801] ? _raw_spin_lock_bh+0xa4/0x180 [ 199.038394][T15801] ? _local_bh_enable+0x30/0x30 [ 199.043225][T15801] ? memset+0x1f/0x40 [ 199.047201][T15801] ? selinux_socket_sendmsg+0x10b/0x320 [ 199.052733][T15801] ? lock_sock_nested+0x25a/0x320 [ 199.057855][T15801] ? xas_load+0x468/0x4c0 [ 199.062297][T15801] ? ktime_get_coarse_real_ts64+0xd9/0xf0 [ 199.068010][T15801] ? tipc_recvmsg+0x17c0/0x17c0 [ 199.072840][T15801] tipc_sendmsg+0x51/0x70 08:50:20 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:50:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) fsetxattr(r1, &(0x7f00000000c0)=@known='system.advise\x00', &(0x7f0000000100)='--\x97p\x00', 0x5, 0x2) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket(0x1e, 0x4, 0x0) connect$tipc(r3, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x200fc0) 08:50:20 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) [ 199.077160][T15801] kernel_sendmsg+0xe2/0x120 [ 199.081730][T15801] sock_no_sendpage+0x13f/0x1b0 [ 199.086564][T15801] ? __receive_sock+0xb0/0xb0 [ 199.091228][T15801] ? ktime_get_coarse_real_ts64+0xd9/0xf0 [ 199.096935][T15801] ? __receive_sock+0xb0/0xb0 [ 199.101593][T15801] sock_sendpage+0xd0/0x120 [ 199.106081][T15801] pipe_to_sendpage+0x23b/0x300 [ 199.110916][T15801] ? sock_fasync+0xf0/0xf0 [ 199.115312][T15801] ? generic_splice_sendpage+0x200/0x200 [ 199.120926][T15801] ? atime_needs_update+0x2cf/0x570 [ 199.126107][T15801] ? page_cache_pipe_buf_confirm+0x113/0x210 [ 199.132120][T15801] __splice_from_pipe+0x2d3/0x870 [ 199.137128][T15801] ? generic_splice_sendpage+0x200/0x200 [ 199.142739][T15801] generic_splice_sendpage+0x172/0x200 [ 199.148179][T15801] ? iter_file_splice_write+0xf20/0xf20 [ 199.153702][T15801] ? direct_splice_actor+0x25/0x120 [ 199.158882][T15801] splice_direct_to_actor+0x496/0xb00 [ 199.164236][T15801] ? do_splice_direct+0x3d0/0x3d0 [ 199.169237][T15801] ? pipe_to_sendpage+0x300/0x300 [ 199.174245][T15801] ? security_file_permission+0x128/0x300 [ 199.179956][T15801] do_splice_direct+0x279/0x3d0 [ 199.184788][T15801] ? splice_direct_to_actor+0xb00/0xb00 [ 199.190315][T15801] ? security_file_permission+0x128/0x300 [ 199.196017][T15801] do_sendfile+0x89d/0x1110 [ 199.200516][T15801] ? compat_writev+0x390/0x390 [ 199.205370][T15801] ? security_file_permission+0x128/0x300 [ 199.211070][T15801] ? vfs_write+0x427/0x4f0 [ 199.215466][T15801] ? fput_many+0x42/0x1a0 [ 199.219781][T15801] __x64_sys_sendfile64+0x1ae/0x220 [ 199.224984][T15801] ? __ia32_sys_sendfile+0x240/0x240 [ 199.230256][T15801] do_syscall_64+0xcb/0x150 [ 199.234749][T15801] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 199.240626][T15801] RIP: 0033:0x45de29 [ 199.244496][T15801] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 199.264063][T15801] RSP: 002b:00007fa46e034c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 199.272442][T15801] RAX: ffffffffffffffda RBX: 0000000000027ec0 RCX: 000000000045de29 08:50:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x8a) sendmsg$SOCK_DESTROY(r0, &(0x7f0000001480)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001440)={&(0x7f0000000140)={0x12dc, 0x15, 0x200, 0x70bd2d, 0x25dfdbfe, {0x1e, 0x7f}, [@INET_DIAG_REQ_BYTECODE={0x86, 0x1, "77f1b35d8181e95a902d14ec580edda1368a8a62534c3cf3b469e5c4e0dc2405f879935b9db5c61f4503abcbb05230755da61d1491fe7220f063238d5e68b2d3114bd976b43389d54349869460da5be579e69390f25b1afaf6eb74e3b5914ad12079b6c74db4f02284fd1a82e8523ed6323ceeb6d9244e3e6c8baa66d20a443d1ee0"}, @INET_DIAG_REQ_BYTECODE={0xfb, 0x1, "657432eab484452ebdfb413c0d967d3f42fd06d98a6bbd2ffb045f258c4e0f743753520ff1efa1c80d6c435be551deb886cf8eb44ce2c8199e54035b7a37e935be16cd64c9652f5a54c1f11861533226c1eb6ab301a55b11fcac7ffe6ab576d79ee8c77faf06f9d0ea2625398336eb00bcf633d55347e303ca17962e2add5add4891b3ee217854d5c918bc4452b68d90e4feb16bf3145cccd61152986ec36e52aeb54a93a8a2c1641a312b73876a1586087a0e0425d3c5d3e20efe4fbc80236afffa868bda913c9a24670cf63ae12d3d52244b517ac7102574164219867fb8bc2b7af468f2f2c524f7d6ddc8d80f0be378850ad19f1c84"}, @INET_DIAG_REQ_BYTECODE={0x1004, 0x1, "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"}, @INET_DIAG_REQ_BYTECODE={0x4f, 0x1, "8978b0aee72b51f437ccc9c5c5bce83865be00b9712d6d35ebce143fd22fb16e28fcb24dd22466ff63b4033f396dda23fed760766f1a09bb34dd889b62364ad3a8039944b1e02266756544"}, @INET_DIAG_REQ_BYTECODE={0xcc, 0x1, "281627137f0290a808b09cb46b10c7bffe661e1858589c0617e3d04ad8be0d4e6be22959fb6cb785758dc33fe5f83f4f34ef3956e7c7830448c8f6fd758b6db067715809c957bd7f7374e87c6aa7027fa80d547a431607587de7d34c806d47357cb629b9479ca9d1f3cfd47622467f058e79a500a2cb23a3c2ca474606c69c47cb140ac10dfb04cf50bf718c370f1df00fbfaaf9bdfe8ae01b1d6d506b59dfd4fa87d12e35fb7ac2c944a554de3c909ddf6d7a2678521e9c8c471649d61ec835e6bbd3410515206b"}, @INET_DIAG_REQ_BYTECODE={0x24, 0x1, "d6e952c6dba3d01401d41a1b94a405349f84e3bf92779a1d84b3fdc94a7bfe6a"}]}, 0x12dc}, 0x1, 0x0, 0x0, 0x2004c804}, 0x10) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) sendmsg$GTP_CMD_GETPDP(r0, &(0x7f0000001580)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001540)={&(0x7f0000001500)={0x1c, 0x0, 0x10, 0x70bd25, 0x25dfdbff, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20004000}, 0x200000c0) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:50:20 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) [ 199.280382][T15801] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 199.288410][T15801] RBP: 00007fa46e034ca0 R08: 0000000000000000 R09: 0000000000000000 [ 199.296349][T15801] R10: 0000000000200fc0 R11: 0000000000000246 R12: 0000000000000024 [ 199.304287][T15801] R13: 00007ffdeacd249f R14: 00007fa46e0359c0 R15: 000000000118bf2c 08:50:20 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0xeffdffff) 08:50:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) sendfile(r1, 0xffffffffffffffff, 0x0, 0x200fc0) 08:50:20 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x40, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x14, 0x2, 0x0, 0x1, [@vti_common_policy=[@IFLA_VTI_IKEY={0x8}, @IFLA_VTI_LINK={0x8, 0x1, r4}]]}}}]}, 0x40}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 08:50:20 executing program 1 (fault-call:9 fault-nth:37): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:50:20 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:50:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x802, 0x0) ioctl$VT_DISALLOCATE(r4, 0x5608) sendfile(r1, r3, 0x0, 0x200fc0) 08:50:20 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0xf4010000) 08:50:20 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:50:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f00000001c0)={0x0, 0x6d, &(0x7f0000000140)="3ec0d319b96628e7b11b628a4e34ab0328553635f519a1a75e38ee31855bbbffa913a931a6f026506d001002e5ef00a8c3fa49e757848e6845875445cca4ef4cbbb609c029e82736197c7b12a0414606271d7165cc9659f6a9607895a319ed81cc8115521df661ff2471742dbe"}) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = socket(0x10, 0x80002, 0x0) connect$tipc(r2, 0x0, 0x0) ioctl$SIOCSIFMTU(r2, 0x8922, &(0x7f0000000100)={'veth0_to_bridge\x00'}) close(r1) r3 = socket(0x1e, 0x4, 0x0) connect$tipc(r3, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x200fc0) 08:50:20 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) [ 199.609911][T15855] FAULT_INJECTION: forcing a failure. [ 199.609911][T15855] name failslab, interval 1, probability 0, space 0, times 0 [ 199.623426][T15855] CPU: 1 PID: 15855 Comm: syz-executor.1 Tainted: G W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 199.634949][T15855] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 199.644995][T15855] Call Trace: [ 199.648271][T15855] dump_stack+0x1b0/0x21e [ 199.652596][T15855] ? devkmsg_release+0x11c/0x11c [ 199.657534][T15855] ? show_regs_print_info+0x12/0x12 [ 199.662715][T15855] ? kmem_cache_alloc+0x1d5/0x250 [ 199.667725][T15855] ? workingset_activation+0x150/0x150 [ 199.673172][T15855] should_fail+0x6fb/0x860 [ 199.677581][T15855] ? setup_fault_attr+0x2b0/0x2b0 [ 199.682588][T15855] ? __alloc_skb+0x88/0x4d0 [ 199.687079][T15855] should_failslab+0x5/0x20 [ 199.691565][T15855] kmem_cache_alloc+0x36/0x250 [ 199.696327][T15855] __alloc_skb+0x88/0x4d0 [ 199.700637][T15855] ? __check_object_size+0x2e5/0x3b0 [ 199.705908][T15855] tipc_msg_build+0xcf5/0x1b20 [ 199.710658][T15855] tipc_sendmcast+0x92a/0xeb0 [ 199.715317][T15855] ? tipc_send_group_unicast+0x7d0/0x7d0 [ 199.720936][T15855] ? memset+0x1f/0x40 [ 199.724901][T15855] ? unwind_next_frame+0x1c07/0x22b0 [ 199.730166][T15855] ? wait_woken+0x250/0x250 [ 199.734662][T15855] ? ext4_mpage_readpages+0x1e31/0x1eb0 [ 199.740194][T15855] __tipc_sendmsg+0x120d/0x2d30 [ 199.745044][T15855] ? local_bh_enable+0x20/0x20 [ 199.749788][T15855] ? blk_flush_plug_list+0x4b7/0x500 [ 199.755066][T15855] ? prep_new_page+0x11a/0x380 [ 199.759810][T15855] ? _raw_spin_lock_bh+0xa4/0x180 [ 199.764821][T15855] ? _local_bh_enable+0x30/0x30 [ 199.769653][T15855] ? memset+0x1f/0x40 [ 199.773618][T15855] ? selinux_socket_sendmsg+0x10b/0x320 [ 199.779146][T15855] ? lock_sock_nested+0x25a/0x320 [ 199.784150][T15855] ? xas_load+0x468/0x4c0 [ 199.788470][T15855] ? ktime_get_coarse_real_ts64+0xd9/0xf0 [ 199.794178][T15855] ? tipc_recvmsg+0x17c0/0x17c0 [ 199.799006][T15855] tipc_sendmsg+0x51/0x70 [ 199.803360][T15855] kernel_sendmsg+0xe2/0x120 [ 199.807931][T15855] sock_no_sendpage+0x13f/0x1b0 [ 199.812760][T15855] ? __receive_sock+0xb0/0xb0 [ 199.817420][T15855] ? ktime_get_coarse_real_ts64+0xd9/0xf0 [ 199.823117][T15855] ? __receive_sock+0xb0/0xb0 [ 199.827777][T15855] sock_sendpage+0xd0/0x120 [ 199.832264][T15855] pipe_to_sendpage+0x23b/0x300 [ 199.837222][T15855] ? sock_fasync+0xf0/0xf0 [ 199.841624][T15855] ? generic_splice_sendpage+0x200/0x200 [ 199.847238][T15855] ? atime_needs_update+0x2cf/0x570 [ 199.852418][T15855] ? page_cache_pipe_buf_confirm+0x113/0x210 08:50:20 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:50:20 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="28000000100001080000", @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:50:20 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="28000000100001080000", @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:50:20 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="28000000100001080000", @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) [ 199.858388][T15855] __splice_from_pipe+0x2d3/0x870 [ 199.863399][T15855] ? generic_splice_sendpage+0x200/0x200 [ 199.869017][T15855] generic_splice_sendpage+0x172/0x200 [ 199.874461][T15855] ? iter_file_splice_write+0xf20/0xf20 [ 199.880012][T15855] ? direct_splice_actor+0x25/0x120 [ 199.885204][T15855] splice_direct_to_actor+0x496/0xb00 [ 199.890566][T15855] ? do_splice_direct+0x3d0/0x3d0 [ 199.895574][T15855] ? pipe_to_sendpage+0x300/0x300 [ 199.900589][T15855] ? security_file_permission+0x128/0x300 [ 199.906295][T15855] do_splice_direct+0x279/0x3d0 [ 199.911133][T15855] ? splice_direct_to_actor+0xb00/0xb00 [ 199.916686][T15855] ? security_file_permission+0x128/0x300 [ 199.922394][T15855] do_sendfile+0x89d/0x1110 [ 199.926867][T15855] ? compat_writev+0x390/0x390 [ 199.931594][T15855] ? security_file_permission+0x128/0x300 [ 199.937276][T15855] ? vfs_write+0x427/0x4f0 [ 199.941654][T15855] ? fput_many+0x42/0x1a0 [ 199.945949][T15855] __x64_sys_sendfile64+0x1ae/0x220 [ 199.951123][T15855] ? __ia32_sys_sendfile+0x240/0x240 [ 199.956392][T15855] do_syscall_64+0xcb/0x150 [ 199.960884][T15855] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 199.966759][T15855] RIP: 0033:0x45de29 [ 199.970648][T15855] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 199.990222][T15855] RSP: 002b:00007fa46e034c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 199.998619][T15855] RAX: ffffffffffffffda RBX: 0000000000027ec0 RCX: 000000000045de29 [ 200.006569][T15855] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 200.014563][T15855] RBP: 00007fa46e034ca0 R08: 0000000000000000 R09: 0000000000000000 [ 200.022503][T15855] R10: 0000000000200fc0 R11: 0000000000000246 R12: 0000000000000025 [ 200.030439][T15855] R13: 00007ffdeacd249f R14: 00007fa46e0359c0 R15: 000000000118bf2c 08:50:21 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x14, 0x2, 0x0, 0x1, [@vti_common_policy=[@IFLA_VTI_IKEY={0x8}, @IFLA_VTI_LINK={0x8, 0x1, r4}]]}}}]}, 0x40}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 08:50:21 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800000000000000", @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:50:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x40) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000180)=""/4096) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x8a) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket(0x1e, 0x4, 0x0) connect$tipc(r3, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x200fc0) r5 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self\x00', 0x230e03, 0x0) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r5, 0xf502, 0x0) 08:50:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000002300)={0x9, 0x2, &(0x7f0000002200)=@raw=[@call={0x85, 0x0, 0x0, 0x31}, @jmp={0x5, 0x0, 0x1, 0x7, 0x7, 0xfffffffffffffff4, 0xffffffffffffffff}], &(0x7f0000002240)='GPL\x00', 0x6, 0x0, 0x0, 0x41000, 0xcb14374a7aeba61d, [], 0x0, 0x21, r0, 0x8, &(0x7f0000002280)={0x1, 0x2}, 0x8, 0x10, &(0x7f00000022c0)={0x0, 0x9, 0x10001, 0x6}, 0x10, 0xffffffffffffffff, r0}, 0x78) ioctl$FITRIM(r3, 0xc0185879, &(0x7f0000002380)={0x200, 0x6, 0xdb23}) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r5 = socket$key(0xf, 0x3, 0x2) ioctl$sock_inet_SIOCGIFPFLAGS(r4, 0x8935, &(0x7f00000021c0)={'dummy0\x00'}) recvmmsg(r5, &(0x7f0000002140)=[{{0x0, 0x0, &(0x7f0000002100)=[{&(0x7f00000000c0)=""/4096, 0x1000}, {&(0x7f00000010c0)=""/4096, 0x1000}, {&(0x7f00000020c0)=""/54, 0x36}], 0x3}}], 0x1, 0x102, &(0x7f0000002180)={0x77359400}) sendfile(r1, r4, 0x0, 0x200fc0) 08:50:21 executing program 1 (fault-call:9 fault-nth:38): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:50:21 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0xff030000) 08:50:21 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800000000000000", @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) [ 200.408020][T15901] FAULT_INJECTION: forcing a failure. [ 200.408020][T15901] name failslab, interval 1, probability 0, space 0, times 0 [ 200.439055][T15901] CPU: 1 PID: 15901 Comm: syz-executor.1 Tainted: G W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 200.450593][T15901] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 200.460629][T15901] Call Trace: [ 200.463909][T15901] dump_stack+0x1b0/0x21e [ 200.468223][T15901] ? devkmsg_release+0x11c/0x11c [ 200.473144][T15901] ? show_regs_print_info+0x12/0x12 [ 200.478323][T15901] ? kmem_cache_alloc+0x1d5/0x250 [ 200.483330][T15901] ? workingset_update_node+0xe7/0x150 [ 200.488789][T15901] should_fail+0x6fb/0x860 [ 200.493190][T15901] ? setup_fault_attr+0x2b0/0x2b0 [ 200.498195][T15901] ? setup_fault_attr+0x2b0/0x2b0 [ 200.503289][T15901] ? tipc_msg_build+0xcf5/0x1b20 [ 200.508205][T15901] should_failslab+0x5/0x20 [ 200.512693][T15901] __kmalloc_track_caller+0x5d/0x2b0 [ 200.517961][T15901] ? kmem_cache_alloc+0x1d5/0x250 [ 200.522971][T15901] ? tipc_msg_build+0xcf5/0x1b20 [ 200.527894][T15901] __alloc_skb+0xd1/0x4d0 [ 200.532206][T15901] tipc_msg_build+0xcf5/0x1b20 [ 200.536957][T15901] tipc_sendmcast+0x92a/0xeb0 [ 200.541635][T15901] ? tipc_send_group_unicast+0x7d0/0x7d0 [ 200.547252][T15901] ? memset+0x1f/0x40 [ 200.551218][T15901] ? unwind_next_frame+0x1c07/0x22b0 [ 200.556484][T15901] ? wait_woken+0x250/0x250 [ 200.560973][T15901] ? ext4_mpage_readpages+0x1e31/0x1eb0 [ 200.566502][T15901] __tipc_sendmsg+0x120d/0x2d30 [ 200.571351][T15901] ? local_bh_enable+0x20/0x20 [ 200.576099][T15901] ? blk_flush_plug_list+0x4b7/0x500 [ 200.581372][T15901] ? prep_new_page+0x11a/0x380 [ 200.586134][T15901] ? _raw_spin_lock_bh+0xa4/0x180 [ 200.591154][T15901] ? _local_bh_enable+0x30/0x30 [ 200.595996][T15901] ? memset+0x1f/0x40 [ 200.599965][T15901] ? selinux_socket_sendmsg+0x10b/0x320 08:50:21 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800000000000000", @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:50:21 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/18, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) [ 200.605500][T15901] ? lock_sock_nested+0x25a/0x320 [ 200.610508][T15901] ? xas_load+0x468/0x4c0 [ 200.614823][T15901] ? ktime_get_coarse_real_ts64+0xd9/0xf0 [ 200.620529][T15901] ? tipc_recvmsg+0x17c0/0x17c0 [ 200.625367][T15901] tipc_sendmsg+0x51/0x70 [ 200.629684][T15901] kernel_sendmsg+0xe2/0x120 [ 200.634258][T15901] sock_no_sendpage+0x13f/0x1b0 [ 200.639095][T15901] ? __receive_sock+0xb0/0xb0 [ 200.643756][T15901] ? ktime_get_coarse_real_ts64+0xd9/0xf0 [ 200.649456][T15901] ? __receive_sock+0xb0/0xb0 [ 200.654117][T15901] sock_sendpage+0xd0/0x120 08:50:21 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/18, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:50:21 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/18, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:50:21 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/19, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) [ 200.658783][T15901] pipe_to_sendpage+0x23b/0x300 [ 200.663634][T15901] ? sock_fasync+0xf0/0xf0 [ 200.668033][T15901] ? generic_splice_sendpage+0x200/0x200 [ 200.673647][T15901] ? atime_needs_update+0x2cf/0x570 [ 200.678841][T15901] ? page_cache_pipe_buf_confirm+0x113/0x210 [ 200.684807][T15901] __splice_from_pipe+0x2d3/0x870 [ 200.689816][T15901] ? generic_splice_sendpage+0x200/0x200 [ 200.695434][T15901] generic_splice_sendpage+0x172/0x200 [ 200.700879][T15901] ? iter_file_splice_write+0xf20/0xf20 [ 200.706418][T15901] ? direct_splice_actor+0x25/0x120 [ 200.711617][T15901] splice_direct_to_actor+0x496/0xb00 [ 200.716980][T15901] ? do_splice_direct+0x3d0/0x3d0 [ 200.722010][T15901] ? pipe_to_sendpage+0x300/0x300 [ 200.727020][T15901] ? security_file_permission+0x128/0x300 [ 200.732714][T15901] do_splice_direct+0x279/0x3d0 [ 200.737529][T15901] ? splice_direct_to_actor+0xb00/0xb00 [ 200.743041][T15901] ? security_file_permission+0x128/0x300 [ 200.748778][T15901] do_sendfile+0x89d/0x1110 [ 200.753385][T15901] ? compat_writev+0x390/0x390 [ 200.758117][T15901] ? security_file_permission+0x128/0x300 [ 200.763800][T15901] ? vfs_write+0x427/0x4f0 [ 200.768182][T15901] ? fput_many+0x42/0x1a0 [ 200.772477][T15901] __x64_sys_sendfile64+0x1ae/0x220 [ 200.777642][T15901] ? __ia32_sys_sendfile+0x240/0x240 [ 200.782931][T15901] do_syscall_64+0xcb/0x150 [ 200.787399][T15901] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 200.793257][T15901] RIP: 0033:0x45de29 [ 200.797119][T15901] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 200.816688][T15901] RSP: 002b:00007fa46e034c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 200.825158][T15901] RAX: ffffffffffffffda RBX: 0000000000027ec0 RCX: 000000000045de29 [ 200.833095][T15901] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 200.841033][T15901] RBP: 00007fa46e034ca0 R08: 0000000000000000 R09: 0000000000000000 [ 200.849014][T15901] R10: 0000000000200fc0 R11: 0000000000000246 R12: 0000000000000026 [ 200.856953][T15901] R13: 00007ffdeacd249f R14: 00007fa46e0359c0 R15: 000000000118bf2c 08:50:22 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x14, 0x2, 0x0, 0x1, [@vti_common_policy=[@IFLA_VTI_IKEY={0x8}, @IFLA_VTI_LINK={0x8, 0x1, r4}]]}}}]}, 0x40}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 08:50:22 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/19, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) 08:50:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/rt6_stats\x00') lstat(&(0x7f0000000200)='./bus\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='./bus\x00', &(0x7f0000000180)='fuseblk\x00', 0x4000, &(0x7f00000002c0)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}, {@max_read={'max_read', 0x3d, 0x400}}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}], [{@fowner_eq={'fowner'}}, {@hash='hash'}, {@subj_role={'subj_role', 0x3d, '}(&,\''}}, {@obj_type={'obj_type'}}]}}) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r5, 0x0, 0x200fc0) 08:50:22 executing program 1 (fault-call:9 fault-nth:39): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x1e, 0x4, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200fc0) 08:50:22 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0xffff0000) 08:50:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240), 0x7}, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000100)={0x0, 0x1, 0x80}) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x8a) r1 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0xc, 0x161041) write$evdev(r1, &(0x7f0000000040)=[{{}, 0x1, 0x43, 0x2}], 0x18) write$evdev(r1, &(0x7f0000000040), 0x373) r2 = accept$packet(r0, 0x0, &(0x7f0000000280)=0xfffffd42) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f00000002c0)={r2, 0x5f, 0x8}) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="20d30a53a75100e1ff", @ANYRES16=0x0, @ANYBLOB="00022cbd7000feefdf253b00000004008e000800570036040000"], 0x20}, 0x1, 0x0, 0x0, 0x800}, 0x40) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) write$evdev(0xffffffffffffffff, &(0x7f00000006c0)=[{{}, 0x0, 0x5, 0x6}, {{}, 0x5, 0x623d, 0x1}, {{}, 0x17, 0x12, 0x6}], 0x48) vmsplice(0xffffffffffffffff, &(0x7f00000007c0)=[{&(0x7f0000000300)="eb186633202e43205f3d689f1e956a76f877ca01d412940ced378d86f88e9b224976ea54e8c1", 0x26}, {&(0x7f0000000340)="3a8c62fdd4609c1b28138f8cdb279d119c1e774932e87ab285e5ee2b970eab8665909ee95246bf090c11caa48d257c8a1c7fa51feb8c77356cc4d2fe", 0x3c}, {&(0x7f0000000380)="128f38a8bb40edb2ebcf209693f88d93bbabc970798891d8ac132bf642119f626dc6a7ecc2e29da9e5071709645dd02f4f6c77aea0924ddc0e9f9a0c86e4fed5f2e67e9551685c264ec13079e69e061f7d406d59598d6119ec2d5204b91b81cd100772bcf3664c1e4338241200c2717d7551abb0a31a7938288e9ba69815bb4bcc21f6a2b901fabb7740c783cb3f9f1fc8ea3dad86dca29062fa4c1d869de51d9a08c56da2db49c95fcacfe2855c72ec7b20495145d708b02479c8c9f63bdb9711f3308d22df51e31ba7202726e5b20822199f9ef326efb85e640aa80d72d80d0387ac24272d2123fc377aba0f4ee87800beb51ba3934d98a7", 0xf9}, {&(0x7f0000000480)="68eaaab92577744bebaeda23c32b57dd5480f8b7ce146bea169f0626bb71e682026b980e8d11a79176436683de58b96d4d17271d82942557978807e8286e6b046f97129ef7b9111688bce869c4784336f68f99dd3b8ba55130c91f43b3eaf9ece05331b30909f01d4c3b19745bbfe2524df7c778d370b773020ab41e4ba925a3d1ab68bb16b505e13aae8085697c1a1b26fb9a606f2edd2320c4ef51c8c2f58cb2865239c5ddd75ab4a3", 0xaa}, {&(0x7f0000000540)="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", 0xfe}, {&(0x7f0000000840)="3cdb2ab8a6d079323630e816bd8cb850f3a0e9ec60507cef69faeb6c7135ed077fd7c809428a55f3f58e51b9d8dc3167e98b120419256146fbaddf9c8dd8b591a2bb9268116d9e24627daa5116f2829c505e441389c008774305a321ecb3d70a45eff65a3eeb68ffbaa3abbdbe2ebfd83bf29f9894098b2240214c2b6aeccbbad6a525519e734e91f9698faf2f998658780de536370c3156d0b01ee481ba50837e5633edd4c46c392ed7a2f877ef0a85e4a1fa3c4f3a142fc24adedc39f6492d659fc2786258c0d85e4b0099443b7cf95684f87c7c74fe0663f0ad0c61f21d409f1368900adcca63d3f4025d88dc0791672322123fd27139a4", 0xf9}, {&(0x7f0000000740)="f24f07683a7f3099020c18ec3ff5f7abc09e270ce51d2e5c6bafd96a4f836c018a184c9ba34098b16433c134626c059f8bbddf12aa508230c4593f5bd52f3cd13e42594c821086ac6488543e691b71ceed559baa1d5541e5a2d64a757f", 0x5d}], 0x7, 0x3) r4 = socket(0x1e, 0x4, 0x0) connect$tipc(r4, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f00000000c0)=0x400) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x200fc0) [ 201.225520][T15947] FAULT_INJECTION: forcing a failure. [ 201.225520][T15947] name failslab, interval 1, probability 0, space 0, times 0 [ 201.238445][T15947] CPU: 1 PID: 15947 Comm: syz-executor.1 Tainted: G W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 201.249976][T15947] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 201.260009][T15947] Call Trace: [ 201.263282][T15947] dump_stack+0x1b0/0x21e [ 201.267599][T15947] ? devkmsg_release+0x11c/0x11c 08:50:22 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/19, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) [ 201.272163][T15946] __nla_validate_parse: 12 callbacks suppressed [ 201.272181][T15946] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 201.272515][T15947] ? show_regs_print_info+0x12/0x12 [ 201.272534][T15947] should_fail+0x6fb/0x860 [ 201.297483][T15947] ? setup_fault_attr+0x2b0/0x2b0 [ 201.302498][T15947] ? unwind_get_return_address+0x48/0x90 [ 201.308139][T15947] ? arch_stack_walk+0x98/0xe0 [ 201.312888][T15947] ? __alloc_skb+0x88/0x4d0 [ 201.317381][T15947] should_failslab+0x5/0x20 08:50:22 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) [ 201.318644][T15954] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 201.321865][T15947] kmem_cache_alloc+0x36/0x250 [ 201.321875][T15947] __alloc_skb+0x88/0x4d0 [ 201.321884][T15947] ? __do_page_cache_readahead+0x470/0x510 [ 201.321891][T15947] skb_copy+0xe3/0x740 [ 201.321899][T15947] ? memcpy+0x38/0x50 [ 201.321907][T15947] tipc_buf_append+0x461/0xad0 [ 201.321919][T15947] ? __kasan_kmalloc+0x117/0x1b0 [ 201.363536][T15947] ? tipc_msg_create+0x3a0/0x3a0 [ 201.368454][T15947] ? skb_clone+0x1f4/0x370 08:50:22 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) [ 201.372864][T15947] tipc_msg_reassemble+0x331/0x590 [ 201.377956][T15947] ? tipc_msg_lookup_dest+0x980/0x980 [ 201.383307][T15947] ? xas_create+0x1269/0x1360 [ 201.387967][T15947] ? __rcu_read_lock+0x50/0x50 [ 201.392711][T15947] ? should_fail+0x182/0x860 [ 201.397287][T15947] ? should_fail+0x182/0x860 [ 201.401945][T15947] ? setup_fault_attr+0x2b0/0x2b0 [ 201.406976][T15947] tipc_mcast_xmit+0x223/0x16c0 [ 201.411815][T15947] ? tipc_bcast_dec_bearer_dst_cnt+0x240/0x240 [ 201.417950][T15947] ? perf_trace_tipc_sk_class+0x46e/0x5e0 [ 201.423654][T15947] ? tipc_sk_filtering+0x149/0x500 [ 201.425153][T15948] fuse: Bad value for 'user_id' [ 201.428765][T15947] ? trace_event_raw_event_tipc_sk_class+0x4b0/0x4b0 [ 201.428772][T15947] tipc_sendmcast+0xc00/0xeb0 [ 201.428784][T15947] ? tipc_send_group_unicast+0x7d0/0x7d0 [ 201.428795][T15947] ? memset+0x1f/0x40 [ 201.428803][T15947] ? unwind_next_frame+0x1c07/0x22b0 [ 201.428811][T15947] ? wait_woken+0x250/0x250 [ 201.428820][T15947] ? ext4_mpage_readpages+0x1e31/0x1eb0 [ 201.428827][T15947] __tipc_sendmsg+0x120d/0x2d30 [ 201.428836][T15947] ? local_bh_enable+0x20/0x20 [ 201.428844][T15947] ? blk_flush_plug_list+0x4b7/0x500 [ 201.428851][T15947] ? prep_new_page+0x11a/0x380 [ 201.428858][T15947] ? _raw_spin_lock_bh+0xa4/0x180 [ 201.428865][T15947] ? _local_bh_enable+0x30/0x30 [ 201.428871][T15947] ? memset+0x1f/0x40 [ 201.428878][T15947] ? selinux_socket_sendmsg+0x10b/0x320 [ 201.428889][T15947] ? lock_sock_nested+0x25a/0x320 [ 201.513788][T15947] ? xas_load+0x468/0x4c0 [ 201.518098][T15947] ? ktime_get_coarse_real_ts64+0xd9/0xf0 [ 201.523794][T15947] ? tipc_recvmsg+0x17c0/0x17c0 [ 201.528631][T15947] tipc_sendmsg+0x51/0x70 [ 201.532946][T15947] kernel_sendmsg+0xe2/0x120 [ 201.537519][T15947] sock_no_sendpage+0x13f/0x1b0 [ 201.542352][T15947] ? __receive_sock+0xb0/0xb0 [ 201.547136][T15947] ? ktime_get_coarse_real_ts64+0xd9/0xf0 [ 201.552834][T15947] ? __receive_sock+0xb0/0xb0 [ 201.557492][T15947] sock_sendpage+0xd0/0x120 [ 201.561976][T15947] pipe_to_sendpage+0x23b/0x300 [ 201.566804][T15947] ? sock_fasync+0xf0/0xf0 [ 201.571199][T15947] ? generic_splice_sendpage+0x200/0x200 08:50:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) r1 = syz_io_uring_complete(0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x68, r2, 0x400, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x9]}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x401}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x4}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x89f]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000080}, 0x80) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x8a) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = socket(0x1e, 0x4, 0x0) connect$tipc(r4, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:default_t:s0\x00', 0x1f, 0x0) sendfile(r3, r5, 0x0, 0x200fc0) sendmsg$NLBL_UNLABEL_C_STATICADD(r4, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, 0x0, 0x4, 0x70bd2a, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @local}]}, 0x1c}, 0x1, 0x0, 0x0, 0x88}, 0x40800) [ 201.576811][T15947] ? atime_needs_update+0x2cf/0x570 [ 201.581993][T15947] ? page_cache_pipe_buf_confirm+0x113/0x210 [ 201.587956][T15947] __splice_from_pipe+0x2d3/0x870 [ 201.592945][T15947] ? generic_splice_sendpage+0x200/0x200 [ 201.598679][T15947] generic_splice_sendpage+0x172/0x200 [ 201.604104][T15947] ? iter_file_splice_write+0xf20/0xf20 [ 201.609613][T15947] ? direct_splice_actor+0x25/0x120 [ 201.614814][T15947] splice_direct_to_actor+0x496/0xb00 [ 201.620153][T15947] ? do_splice_direct+0x3d0/0x3d0 [ 201.625142][T15947] ? pipe_to_sendpage+0x300/0x300 [ 201.630132][T15947] ? security_file_permission+0x128/0x300 [ 201.635816][T15947] do_splice_direct+0x279/0x3d0 [ 201.640632][T15947] ? splice_direct_to_actor+0xb00/0xb00 [ 201.646144][T15947] ? security_file_permission+0x128/0x300 [ 201.651827][T15947] do_sendfile+0x89d/0x1110 [ 201.656310][T15947] ? compat_writev+0x390/0x390 [ 201.661037][T15947] ? security_file_permission+0x128/0x300 [ 201.666719][T15947] ? vfs_write+0x427/0x4f0 [ 201.671110][T15947] ? fput_many+0x42/0x1a0 [ 201.675404][T15947] __x64_sys_sendfile64+0x1ae/0x220 [ 201.680565][T15947] ? __ia32_sys_sendfile+0x240/0x240 [ 201.685814][T15947] do_syscall_64+0xcb/0x150 [ 201.690289][T15947] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 201.696153][T15947] RIP: 0033:0x45de29 [ 201.700015][T15947] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 201.719582][T15947] RSP: 002b:00007fa46e034c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 201.727958][T15947] RAX: ffffffffffffffda RBX: 0000000000027ec0 RCX: 000000000045de29 [ 201.735900][T15947] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 201.743844][T15947] RBP: 00007fa46e034ca0 R08: 0000000000000000 R09: 0000000000000000 [ 201.751780][T15947] R10: 0000000000200fc0 R11: 0000000000000246 R12: 0000000000000027 [ 201.759744][T15947] R13: 00007ffdeacd249f R14: 00007fa46e0359c0 R15: 000000000118bf2c [ 201.768611][T15947] tipc: Failed do clone local mcast rcv buffer [ 201.775493][T15947] ================================================================== [ 201.783546][T15947] BUG: KASAN: use-after-free in tipc_mcast_xmit+0x1026/0x16c0 [ 201.790978][T15947] Read of size 8 at addr ffff8881d3758780 by task syz-executor.1/15947 [ 201.799187][T15947] [ 201.801594][T15947] CPU: 1 PID: 15947 Comm: syz-executor.1 Tainted: G W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 201.813102][T15947] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 201.823134][T15947] Call Trace: [ 201.826405][T15947] dump_stack+0x1b0/0x21e [ 201.830718][T15947] ? show_regs_print_info+0x12/0x12 [ 201.835896][T15947] ? printk+0xc0/0x104 [ 201.839959][T15947] ? printk+0xc0/0x104 [ 201.844011][T15947] print_address_description+0x96/0x5d0 [ 201.849538][T15947] ? devkmsg_release+0x11c/0x11c [ 201.854460][T15947] ? skb_clone+0x1f4/0x370 [ 201.858855][T15947] ? kfree_skb+0x1b6/0x220 [ 201.863254][T15947] ? tipc_msg_reassemble+0x3e2/0x590 [ 201.868523][T15947] __kasan_report+0x14b/0x1c0 [ 201.873186][T15947] ? tipc_mcast_xmit+0x1026/0x16c0 08:50:23 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r1, 0x800002, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0xc, 0xac041) write$evdev(r2, &(0x7f0000000040)=[{{}, 0x1, 0x43, 0x2}], 0x18) write$evdev(r2, &(0x7f0000000040), 0x373) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[@ANYRESOCT=r0], 0x8a) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = socket(0x1e, 0x4, 0x0) connect$tipc(r4, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x200fc0) [ 201.878278][T15947] kasan_report+0x27/0x50 [ 201.882589][T15947] tipc_mcast_xmit+0x1026/0x16c0 [ 201.887511][T15947] ? tipc_bcast_dec_bearer_dst_cnt+0x240/0x240 [ 201.893636][T15947] ? perf_trace_tipc_sk_class+0x46e/0x5e0 [ 201.899324][T15947] ? tipc_sk_filtering+0x149/0x500 [ 201.904401][T15947] ? trace_event_raw_event_tipc_sk_class+0x4b0/0x4b0 [ 201.911057][T15947] tipc_sendmcast+0xc00/0xeb0 [ 201.915697][T15947] ? tipc_send_group_unicast+0x7d0/0x7d0 [ 201.921296][T15947] ? memset+0x1f/0x40 [ 201.925253][T15947] ? unwind_next_frame+0x1c07/0x22b0 [ 201.930500][T15947] ? wait_woken+0x250/0x250 [ 201.934970][T15947] ? ext4_mpage_readpages+0x1e31/0x1eb0 [ 201.940484][T15947] __tipc_sendmsg+0x120d/0x2d30 [ 201.945487][T15947] ? local_bh_enable+0x20/0x20 [ 201.950230][T15947] ? blk_flush_plug_list+0x4b7/0x500 [ 201.955481][T15947] ? prep_new_page+0x11a/0x380 [ 201.960279][T15947] ? _raw_spin_lock_bh+0xa4/0x180 [ 201.965440][T15947] ? _local_bh_enable+0x30/0x30 [ 201.970283][T15947] ? memset+0x1f/0x40 [ 201.974233][T15947] ? selinux_socket_sendmsg+0x10b/0x320 [ 201.979747][T15947] ? lock_sock_nested+0x25a/0x320 [ 201.984753][T15947] ? xas_load+0x468/0x4c0 [ 201.989049][T15947] ? ktime_get_coarse_real_ts64+0xd9/0xf0 [ 201.994733][T15947] ? tipc_recvmsg+0x17c0/0x17c0 [ 201.999548][T15947] tipc_sendmsg+0x51/0x70 [ 202.003853][T15947] kernel_sendmsg+0xe2/0x120 [ 202.008404][T15947] sock_no_sendpage+0x13f/0x1b0 [ 202.013242][T15947] ? __receive_sock+0xb0/0xb0 [ 202.017897][T15947] ? ktime_get_coarse_real_ts64+0xd9/0xf0 [ 202.023580][T15947] ? __receive_sock+0xb0/0xb0 [ 202.028231][T15947] sock_sendpage+0xd0/0x120 [ 202.032713][T15947] pipe_to_sendpage+0x23b/0x300 [ 202.037528][T15947] ? sock_fasync+0xf0/0xf0 [ 202.041917][T15947] ? generic_splice_sendpage+0x200/0x200 [ 202.047525][T15947] ? atime_needs_update+0x2cf/0x570 [ 202.052707][T15947] ? page_cache_pipe_buf_confirm+0x113/0x210 [ 202.058655][T15947] __splice_from_pipe+0x2d3/0x870 [ 202.063652][T15947] ? generic_splice_sendpage+0x200/0x200 [ 202.069252][T15947] generic_splice_sendpage+0x172/0x200 [ 202.074675][T15947] ? iter_file_splice_write+0xf20/0xf20 [ 202.080188][T15947] ? direct_splice_actor+0x25/0x120 [ 202.085363][T15947] splice_direct_to_actor+0x496/0xb00 [ 202.090699][T15947] ? do_splice_direct+0x3d0/0x3d0 [ 202.095685][T15947] ? pipe_to_sendpage+0x300/0x300 [ 202.100699][T15947] ? security_file_permission+0x128/0x300 [ 202.106501][T15947] do_splice_direct+0x279/0x3d0 [ 202.111324][T15947] ? splice_direct_to_actor+0xb00/0xb00 [ 202.116835][T15947] ? security_file_permission+0x128/0x300 [ 202.122517][T15947] do_sendfile+0x89d/0x1110 [ 202.126986][T15947] ? compat_writev+0x390/0x390 [ 202.131712][T15947] ? security_file_permission+0x128/0x300 [ 202.137397][T15947] ? vfs_write+0x427/0x4f0 [ 202.141790][T15947] ? fput_many+0x42/0x1a0 [ 202.146083][T15947] __x64_sys_sendfile64+0x1ae/0x220 [ 202.151506][T15947] ? __ia32_sys_sendfile+0x240/0x240 [ 202.156752][T15947] do_syscall_64+0xcb/0x150 [ 202.161237][T15947] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 202.167093][T15947] RIP: 0033:0x45de29 [ 202.170971][T15947] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 202.190538][T15947] RSP: 002b:00007fa46e034c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 202.198915][T15947] RAX: ffffffffffffffda RBX: 0000000000027ec0 RCX: 000000000045de29 [ 202.206853][T15947] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 202.214795][T15947] RBP: 00007fa46e034ca0 R08: 0000000000000000 R09: 0000000000000000 [ 202.222731][T15947] R10: 0000000000200fc0 R11: 0000000000000246 R12: 0000000000000027 [ 202.230669][T15947] R13: 00007ffdeacd249f R14: 00007fa46e0359c0 R15: 000000000118bf2c [ 202.238604][T15947] [ 202.240898][T15947] Allocated by task 15947: [ 202.245279][T15947] __kasan_kmalloc+0x117/0x1b0 [ 202.250032][T15947] kmem_cache_alloc+0x1d5/0x250 [ 202.254859][T15947] __alloc_skb+0x88/0x4d0 [ 202.259179][T15947] tipc_msg_build+0x74a/0x1b20 [ 202.263935][T15947] tipc_sendmcast+0x92a/0xeb0 [ 202.268571][T15947] __tipc_sendmsg+0x120d/0x2d30 [ 202.273385][T15947] tipc_sendmsg+0x51/0x70 [ 202.277678][T15947] kernel_sendmsg+0xe2/0x120 [ 202.282230][T15947] sock_no_sendpage+0x13f/0x1b0 [ 202.287052][T15947] sock_sendpage+0xd0/0x120 [ 202.291528][T15947] pipe_to_sendpage+0x23b/0x300 [ 202.296353][T15947] __splice_from_pipe+0x2d3/0x870 [ 202.301381][T15947] generic_splice_sendpage+0x172/0x200 [ 202.306820][T15947] splice_direct_to_actor+0x496/0xb00 [ 202.312156][T15947] do_splice_direct+0x279/0x3d0 [ 202.316980][T15947] do_sendfile+0x89d/0x1110 [ 202.321447][T15947] __x64_sys_sendfile64+0x1ae/0x220 [ 202.326607][T15947] do_syscall_64+0xcb/0x150 [ 202.331080][T15947] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 202.336932][T15947] [ 202.339225][T15947] Freed by task 15947: [ 202.343258][T15947] __kasan_slab_free+0x168/0x220 [ 202.348165][T15947] slab_free_freelist_hook+0xd0/0x150 [ 202.353520][T15947] kmem_cache_free+0xac/0x5c0 [ 202.358158][T15947] tipc_buf_append+0x2d1/0xad0 [ 202.362883][T15947] tipc_msg_reassemble+0x331/0x590 [ 202.367954][T15947] tipc_mcast_xmit+0x223/0x16c0 [ 202.372822][T15947] tipc_sendmcast+0xc00/0xeb0 [ 202.377487][T15947] __tipc_sendmsg+0x120d/0x2d30 [ 202.382311][T15947] tipc_sendmsg+0x51/0x70 [ 202.386608][T15947] kernel_sendmsg+0xe2/0x120 [ 202.391162][T15947] sock_no_sendpage+0x13f/0x1b0 [ 202.396009][T15947] sock_sendpage+0xd0/0x120 [ 202.400477][T15947] pipe_to_sendpage+0x23b/0x300 [ 202.405293][T15947] __splice_from_pipe+0x2d3/0x870 [ 202.410291][T15947] generic_splice_sendpage+0x172/0x200 [ 202.415710][T15947] splice_direct_to_actor+0x496/0xb00 [ 202.421043][T15947] do_splice_direct+0x279/0x3d0 [ 202.425857][T15947] do_sendfile+0x89d/0x1110 [ 202.430323][T15947] __x64_sys_sendfile64+0x1ae/0x220 [ 202.435484][T15947] do_syscall_64+0xcb/0x150 [ 202.439950][T15947] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 202.445803][T15947] [ 202.448099][T15947] The buggy address belongs to the object at ffff8881d3758780 [ 202.448099][T15947] which belongs to the cache skbuff_fclone_cache of size 488 [ 202.462914][T15947] The buggy address is located 0 bytes inside of [ 202.462914][T15947] 488-byte region [ffff8881d3758780, ffff8881d3758968) [ 202.475973][T15947] The buggy address belongs to the page: [ 202.481571][T15947] page:ffffea00074dd600 refcount:1 mapcount:0 mapping:ffff8881daa93180 index:0x0 compound_mapcount: 0 [ 202.492460][T15947] flags: 0x8000000000010200(slab|head) [ 202.497884][T15947] raw: 8000000000010200 dead000000000100 dead000000000122 ffff8881daa93180 [ 202.506430][T15947] raw: 0000000000000000 00000000800c000c 00000001ffffffff 0000000000000000 [ 202.514993][T15947] page dumped because: kasan: bad access detected [ 202.521366][T15947] [ 202.523659][T15947] Memory state around the buggy address: [ 202.529252][T15947] ffff8881d3758680: 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc fc [ 202.537276][T15947] ffff8881d3758700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 202.545299][T15947] >ffff8881d3758780: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 202.553323][T15947] ^ [ 202.557360][T15947] ffff8881d3758800: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 202.565384][T15947] ffff8881d3758880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 202.573495][T15947] ================================================================== 08:50:23 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x14, 0x2, 0x0, 0x1, [@vti_common_policy=[@IFLA_VTI_IKEY={0x8}, @IFLA_VTI_LINK={0x8, 0x1, r4}]]}}}]}, 0x40}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 202.581524][T15947] Disabling lock debugging due to kernel taint [ 202.593646][T15947] ================================================================== [ 202.601717][T15947] BUG: KASAN: double-free or invalid-free in kmem_cache_free+0xac/0x5c0 [ 202.610023][T15947] [ 202.612382][T15947] CPU: 1 PID: 15947 Comm: syz-executor.1 Tainted: G B W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 202.624001][T15947] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 202.634036][T15947] Call Trace: [ 202.637308][T15947] dump_stack+0x1b0/0x21e [ 202.641617][T15947] ? _raw_spin_trylock_bh+0x190/0x190 [ 202.646990][T15947] ? show_regs_print_info+0x12/0x12 [ 202.652165][T15947] ? printk+0xc0/0x104 [ 202.656284][T15947] ? kmem_cache_free+0xac/0x5c0 [ 202.661101][T15947] ? kmem_cache_free+0xac/0x5c0 [ 202.665918][T15947] print_address_description+0x96/0x5d0 [ 202.671428][T15947] ? devkmsg_release+0x11c/0x11c [ 202.676349][T15947] ? kmem_cache_free+0xac/0x5c0 [ 202.681163][T15947] ? kmem_cache_free+0xac/0x5c0 [ 202.686011][T15947] kasan_report_invalid_free+0x54/0xc0 [ 202.691446][T15947] __kasan_slab_free+0x102/0x220 [ 202.696351][T15947] ? cmp_ex_search+0x6d/0x90 [ 202.700919][T15947] ? __start___ex_table+0x717c/0xa620 [ 202.706255][T15947] ? bsearch+0x9b/0xc0 [ 202.710290][T15947] ? search_extable+0xf0/0xf0 [ 202.714929][T15947] ? csum_partial_copy_generic+0x1fce/0x3ef0 [ 202.720872][T15947] ? __stop_notes+0xc/0xc [ 202.725174][T15947] ? search_extable+0xaf/0xf0 [ 202.729827][T15947] ? __rcu_read_lock+0x50/0x50 [ 202.734570][T15947] ? trim_init_extable+0x3e0/0x3e0 [ 202.739663][T15947] ? csum_partial_copy_generic+0x1fce/0x3ef0 [ 202.745626][T15947] ? __start___ex_table+0x717c/0xa620 [ 202.750979][T15947] ? __start___ex_table+0x717c/0xa620 [ 202.756333][T15947] ? kasan_report+0x27/0x50 [ 202.760820][T15947] ? ex_handler_refcount+0x130/0x170 [ 202.766090][T15947] ? ex_handler_fault+0xa0/0xa0 [ 202.770943][T15947] ? __start___ex_table+0x7184/0xa620 [ 202.776300][T15947] ? fixup_exception+0x92/0xd0 [ 202.781045][T15947] ? do_trap+0x148/0x340 [ 202.785269][T15947] ? schedule_preempt_disabled+0x20/0x20 [ 202.790884][T15947] ? csum_partial_copy_generic+0x1fce/0x3ef0 [ 202.796846][T15947] ? csum_partial_copy_generic+0x1fce/0x3ef0 [ 202.802947][T15947] slab_free_freelist_hook+0xd0/0x150 [ 202.808287][T15947] ? tipc_mcast_xmit+0x10a8/0x16c0 [ 202.813374][T15947] kmem_cache_free+0xac/0x5c0 [ 202.818021][T15947] ? kasan_report+0x27/0x50 [ 202.822640][T15947] tipc_mcast_xmit+0x10a8/0x16c0 [ 202.827546][T15947] ? tipc_bcast_dec_bearer_dst_cnt+0x240/0x240 [ 202.833663][T15947] ? perf_trace_tipc_sk_class+0x46e/0x5e0 [ 202.839351][T15947] ? tipc_sk_filtering+0x149/0x500 [ 202.844429][T15947] ? trace_event_raw_event_tipc_sk_class+0x4b0/0x4b0 [ 202.851182][T15947] tipc_sendmcast+0xc00/0xeb0 [ 202.855827][T15947] ? tipc_send_group_unicast+0x7d0/0x7d0 [ 202.861434][T15947] ? memset+0x1f/0x40 [ 202.865386][T15947] ? unwind_next_frame+0x1c07/0x22b0 [ 202.870640][T15947] ? wait_woken+0x250/0x250 [ 202.875115][T15947] ? ext4_mpage_readpages+0x1e31/0x1eb0 [ 202.880635][T15947] __tipc_sendmsg+0x120d/0x2d30 [ 202.885478][T15947] ? local_bh_enable+0x20/0x20 [ 202.890210][T15947] ? blk_flush_plug_list+0x4b7/0x500 [ 202.895467][T15947] ? prep_new_page+0x11a/0x380 [ 202.900197][T15947] ? _raw_spin_lock_bh+0xa4/0x180 [ 202.905190][T15947] ? _local_bh_enable+0x30/0x30 [ 202.910024][T15947] ? memset+0x1f/0x40 [ 202.913973][T15947] ? selinux_socket_sendmsg+0x10b/0x320 [ 202.919482][T15947] ? lock_sock_nested+0x25a/0x320 [ 202.924470][T15947] ? xas_load+0x468/0x4c0 [ 202.928783][T15947] ? ktime_get_coarse_real_ts64+0xd9/0xf0 [ 202.934466][T15947] ? tipc_recvmsg+0x17c0/0x17c0 [ 202.939280][T15947] tipc_sendmsg+0x51/0x70 [ 202.943581][T15947] kernel_sendmsg+0xe2/0x120 [ 202.948135][T15947] sock_no_sendpage+0x13f/0x1b0 [ 202.952949][T15947] ? __receive_sock+0xb0/0xb0 [ 202.957592][T15947] ? ktime_get_coarse_real_ts64+0xd9/0xf0 [ 202.963279][T15947] ? __receive_sock+0xb0/0xb0 [ 202.967925][T15947] sock_sendpage+0xd0/0x120 [ 202.972395][T15947] pipe_to_sendpage+0x23b/0x300 [ 202.977219][T15947] ? sock_fasync+0xf0/0xf0 [ 202.981656][T15947] ? generic_splice_sendpage+0x200/0x200 [ 202.987252][T15947] ? atime_needs_update+0x2cf/0x570 [ 202.992420][T15947] ? page_cache_pipe_buf_confirm+0x113/0x210 [ 202.998369][T15947] __splice_from_pipe+0x2d3/0x870 [ 203.003360][T15947] ? generic_splice_sendpage+0x200/0x200 [ 203.008955][T15947] generic_splice_sendpage+0x172/0x200 [ 203.014385][T15947] ? iter_file_splice_write+0xf20/0xf20 [ 203.019897][T15947] ? direct_splice_actor+0x25/0x120 [ 203.025062][T15947] splice_direct_to_actor+0x496/0xb00 [ 203.030405][T15947] ? do_splice_direct+0x3d0/0x3d0 [ 203.035391][T15947] ? pipe_to_sendpage+0x300/0x300 [ 203.040394][T15947] ? security_file_permission+0x128/0x300 [ 203.046099][T15947] do_splice_direct+0x279/0x3d0 [ 203.050940][T15947] ? splice_direct_to_actor+0xb00/0xb00 [ 203.056452][T15947] ? security_file_permission+0x128/0x300 [ 203.062138][T15947] do_sendfile+0x89d/0x1110 [ 203.066607][T15947] ? compat_writev+0x390/0x390 [ 203.071383][T15947] ? security_file_permission+0x128/0x300 [ 203.077067][T15947] ? vfs_write+0x427/0x4f0 [ 203.081448][T15947] ? fput_many+0x42/0x1a0 [ 203.085745][T15947] __x64_sys_sendfile64+0x1ae/0x220 [ 203.090918][T15947] ? __ia32_sys_sendfile+0x240/0x240 [ 203.096184][T15947] do_syscall_64+0xcb/0x150 [ 203.100652][T15947] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 203.106538][T15947] RIP: 0033:0x45de29 [ 203.110398][T15947] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 203.129965][T15947] RSP: 002b:00007fa46e034c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 203.138340][T15947] RAX: ffffffffffffffda RBX: 0000000000027ec0 RCX: 000000000045de29 [ 203.146278][T15947] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 203.154220][T15947] RBP: 00007fa46e034ca0 R08: 0000000000000000 R09: 0000000000000000 [ 203.162157][T15947] R10: 0000000000200fc0 R11: 0000000000000246 R12: 0000000000000027 [ 203.170095][T15947] R13: 00007ffdeacd249f R14: 00007fa46e0359c0 R15: 000000000118bf2c [ 203.178033][T15947] [ 203.180347][T15947] Allocated by task 15947: [ 203.184749][T15947] __kasan_kmalloc+0x117/0x1b0 [ 203.189501][T15947] kmem_cache_alloc+0x1d5/0x250 [ 203.194315][T15947] __netdev_alloc_skb+0x1d8/0x710 [ 203.199314][T15947] __ieee80211_beacon_get+0x628/0x11b0 [ 203.204735][T15947] ieee80211_beacon_get_tim+0xb7/0x500 [ 203.210168][T15947] mac80211_hwsim_beacon_tx+0xd4/0x570 [ 203.215591][T15947] __iterate_interfaces+0x1fc/0x390 [ 203.220787][T15947] ieee80211_iterate_active_interfaces_atomic+0x2e/0x40 [ 203.227696][T15947] mac80211_hwsim_beacon+0xa1/0x180 [ 203.232855][T15947] __run_hrtimer+0x405/0x7a0 [ 203.237405][T15947] hrtimer_run_softirq+0x320/0x450 [ 203.242482][T15947] __do_softirq+0x22e/0x569 [ 203.246954][T15947] [ 203.249248][T15947] Freed by task 15947: [ 203.253284][T15947] __kasan_slab_free+0x168/0x220 [ 203.258186][T15947] slab_free_freelist_hook+0xd0/0x150 [ 203.263524][T15947] kmem_cache_free+0xac/0x5c0 [ 203.268161][T15947] mac80211_hwsim_beacon_tx+0x35e/0x570 [ 203.273668][T15947] __iterate_interfaces+0x1fc/0x390 [ 203.278938][T15947] ieee80211_iterate_active_interfaces_atomic+0x2e/0x40 [ 203.285836][T15947] mac80211_hwsim_beacon+0xa1/0x180 [ 203.291014][T15947] __run_hrtimer+0x405/0x7a0 [ 203.295575][T15947] hrtimer_run_softirq+0x320/0x450 [ 203.300669][T15947] __do_softirq+0x22e/0x569 [ 203.305132][T15947] [ 203.307429][T15947] The buggy address belongs to the object at ffff8881cda7f3c0 [ 203.307429][T15947] which belongs to the cache skbuff_head_cache of size 240 [ 203.321983][T15947] The buggy address is located 0 bytes inside of [ 203.321983][T15947] 240-byte region [ffff8881cda7f3c0, ffff8881cda7f4b0) [ 203.335049][T15947] The buggy address belongs to the page: [ 203.340650][T15947] page:ffffea0007369fc0 refcount:1 mapcount:0 mapping:ffff8881daa92f00 index:0x0 [ 203.349721][T15947] flags: 0x8000000000000200(slab) [ 203.354714][T15947] raw: 8000000000000200 ffffea00065e8880 0000000500000005 ffff8881daa92f00 [ 203.363262][T15947] raw: 0000000000000000 00000000000c000c 00000001ffffffff 0000000000000000 [ 203.371810][T15947] page dumped because: kasan: bad access detected [ 203.378187][T15947] [ 203.380485][T15947] Memory state around the buggy address: [ 203.386098][T15947] ffff8881cda7f280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 203.394124][T15947] ffff8881cda7f300: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fc fc [ 203.402158][T15947] >ffff8881cda7f380: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 203.410185][T15947] ^ [ 203.416304][T15947] ffff8881cda7f400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 203.424334][T15947] ffff8881cda7f480: fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc fc 08:50:24 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @empty}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0xfffffdef) [ 203.432359][T15947] ================================================================== [ 203.454198][T15947] ================================================================== [ 203.462277][T15947] BUG: KASAN: double-free or invalid-free in kmem_cache_free+0xac/0x5c0 [ 203.470576][T15947] [ 203.472919][T15947] CPU: 1 PID: 15947 Comm: syz-executor.1 Tainted: G B W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 203.484428][T15947] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 203.494449][T15947] Call Trace: [ 203.497717][T15947] dump_stack+0x1b0/0x21e [ 203.502015][T15947] ? show_regs_print_info+0x12/0x12 [ 203.507179][T15947] ? printk+0xc0/0x104 [ 203.511216][T15947] ? kmem_cache_free+0xac/0x5c0 [ 203.516043][T15947] ? kmem_cache_free+0xac/0x5c0 [ 203.520859][T15947] print_address_description+0x96/0x5d0 [ 203.526368][T15947] ? devkmsg_release+0x11c/0x11c [ 203.531271][T15947] ? kmem_cache_free+0xac/0x5c0 [ 203.536087][T15947] ? ___preempt_schedule+0x16/0x20 [ 203.541166][T15947] ? kmem_cache_free+0xac/0x5c0 [ 203.545982][T15947] ? kmem_cache_free+0xac/0x5c0 [ 203.550800][T15947] kasan_report_invalid_free+0x54/0xc0 [ 203.556222][T15947] __kasan_slab_free+0x102/0x220 [ 203.561124][T15947] ? cmp_ex_search+0x6d/0x90 [ 203.565684][T15947] ? __start___ex_table+0x717c/0xa620 [ 203.571022][T15947] ? bsearch+0x9b/0xc0 [ 203.575055][T15947] ? search_extable+0xf0/0xf0 [ 203.579699][T15947] ? csum_partial_copy_generic+0x1fce/0x3ef0 [ 203.585655][T15947] ? __stop_notes+0xc/0xc [ 203.589951][T15947] ? search_extable+0xaf/0xf0 [ 203.594597][T15947] ? __rcu_read_lock+0x50/0x50 [ 203.599331][T15947] ? trim_init_extable+0x3e0/0x3e0 [ 203.604409][T15947] ? csum_partial_copy_generic+0x1fce/0x3ef0 [ 203.610362][T15947] ? __start___ex_table+0x717c/0xa620 [ 203.615717][T15947] ? __start___ex_table+0x717c/0xa620 [ 203.621055][T15947] ? kasan_report+0x27/0x50 [ 203.625525][T15947] ? ex_handler_refcount+0x130/0x170 [ 203.630777][T15947] ? ex_handler_fault+0xa0/0xa0 [ 203.635593][T15947] ? __start___ex_table+0x7184/0xa620 [ 203.640928][T15947] ? fixup_exception+0x92/0xd0 [ 203.645661][T15947] ? do_trap+0x148/0x340 [ 203.649880][T15947] ? schedule_preempt_disabled+0x20/0x20 [ 203.655594][T15947] ? csum_partial_copy_generic+0x1fce/0x3ef0 [ 203.661596][T15947] ? csum_partial_copy_generic+0x1fce/0x3ef0 [ 203.667545][T15947] slab_free_freelist_hook+0xd0/0x150 [ 203.672887][T15947] ? tipc_mcast_xmit+0x10a8/0x16c0 [ 203.677977][T15947] kmem_cache_free+0xac/0x5c0 [ 203.682620][T15947] ? kasan_report+0x27/0x50 [ 203.687126][T15947] tipc_mcast_xmit+0x10a8/0x16c0 [ 203.692032][T15947] ? tipc_bcast_dec_bearer_dst_cnt+0x240/0x240 [ 203.698150][T15947] ? perf_trace_tipc_sk_class+0x46e/0x5e0 [ 203.703837][T15947] ? tipc_sk_filtering+0x149/0x500 [ 203.708917][T15947] ? trace_event_raw_event_tipc_sk_class+0x4b0/0x4b0 [ 203.715556][T15947] tipc_sendmcast+0xc00/0xeb0 [ 203.720221][T15947] ? tipc_send_group_unicast+0x7d0/0x7d0 [ 203.725817][T15947] ? memset+0x1f/0x40 [ 203.729880][T15947] ? unwind_next_frame+0x1c07/0x22b0 [ 203.735135][T15947] ? wait_woken+0x250/0x250 [ 203.739629][T15947] ? ext4_mpage_readpages+0x1e31/0x1eb0 [ 203.745143][T15947] __tipc_sendmsg+0x120d/0x2d30 [ 203.749961][T15947] ? local_bh_enable+0x20/0x20 [ 203.754690][T15947] ? blk_flush_plug_list+0x4b7/0x500 [ 203.759943][T15947] ? prep_new_page+0x11a/0x380 [ 203.764673][T15947] ? _raw_spin_lock_bh+0xa4/0x180 [ 203.769663][T15947] ? _local_bh_enable+0x30/0x30 [ 203.774479][T15947] ? memset+0x1f/0x40 [ 203.778425][T15947] ? selinux_socket_sendmsg+0x10b/0x320 [ 203.783941][T15947] ? lock_sock_nested+0x25a/0x320 [ 203.788932][T15947] ? xas_load+0x468/0x4c0 [ 203.793227][T15947] ? ktime_get_coarse_real_ts64+0xd9/0xf0 [ 203.798912][T15947] ? tipc_recvmsg+0x17c0/0x17c0 [ 203.803730][T15947] tipc_sendmsg+0x51/0x70 [ 203.808043][T15947] kernel_sendmsg+0xe2/0x120 [ 203.812609][T15947] sock_no_sendpage+0x13f/0x1b0 [ 203.817430][T15947] ? __receive_sock+0xb0/0xb0 [ 203.822077][T15947] ? ktime_get_coarse_real_ts64+0xd9/0xf0 [ 203.827848][T15947] ? __receive_sock+0xb0/0xb0 [ 203.832492][T15947] sock_sendpage+0xd0/0x120 [ 203.836962][T15947] pipe_to_sendpage+0x23b/0x300 [ 203.841780][T15947] ? sock_fasync+0xf0/0xf0 [ 203.846170][T15947] ? generic_splice_sendpage+0x200/0x200 [ 203.851902][T15947] ? atime_needs_update+0x2cf/0x570 [ 203.857066][T15947] ? page_cache_pipe_buf_confirm+0x113/0x210 [ 203.863011][T15947] __splice_from_pipe+0x2d3/0x870 [ 203.868020][T15947] ? generic_splice_sendpage+0x200/0x200 [ 203.873619][T15947] generic_splice_sendpage+0x172/0x200 [ 203.879041][T15947] ? iter_file_splice_write+0xf20/0xf20 [ 203.884574][T15947] ? direct_splice_actor+0x25/0x120 [ 203.889741][T15947] splice_direct_to_actor+0x496/0xb00 [ 203.895083][T15947] ? do_splice_direct+0x3d0/0x3d0 [ 203.900190][T15947] ? pipe_to_sendpage+0x300/0x300 [ 203.905183][T15947] ? security_file_permission+0x128/0x300 [ 203.910867][T15947] do_splice_direct+0x279/0x3d0 [ 203.915683][T15947] ? splice_direct_to_actor+0xb00/0xb00 [ 203.921195][T15947] ? security_file_permission+0x128/0x300 [ 203.926954][T15947] do_sendfile+0x89d/0x1110 [ 203.931439][T15947] ? compat_writev+0x390/0x390 [ 203.936166][T15947] ? security_file_permission+0x128/0x300 [ 203.941855][T15947] ? vfs_write+0x427/0x4f0 [ 203.946235][T15947] ? fput_many+0x42/0x1a0 [ 203.950533][T15947] __x64_sys_sendfile64+0x1ae/0x220 [ 203.955696][T15947] ? __ia32_sys_sendfile+0x240/0x240 [ 203.960947][T15947] do_syscall_64+0xcb/0x150 [ 203.965417][T15947] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 203.971276][T15947] RIP: 0033:0x45de29 [ 203.975138][T15947] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 203.994707][T15947] RSP: 002b:00007fa46e034c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 204.003081][T15947] RAX: ffffffffffffffda RBX: 0000000000027ec0 RCX: 000000000045de29 [ 204.011017][T15947] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 204.018957][T15947] RBP: 00007fa46e034ca0 R08: 0000000000000000 R09: 0000000000000000 [ 204.026902][T15947] R10: 0000000000200fc0 R11: 0000000000000246 R12: 0000000000000027 [ 204.034947][T15947] R13: 00007ffdeacd249f R14: 00007fa46e0359c0 R15: 000000000118bf2c [ 204.042884][T15947] [ 204.045188][T15947] Allocated by task 15947: [ 204.049582][T15947] __kasan_kmalloc+0x117/0x1b0 [ 204.054315][T15947] kmem_cache_alloc+0x1d5/0x250 [ 204.059130][T15947] __netdev_alloc_skb+0x1d8/0x710 [ 204.064120][T15947] __ieee80211_beacon_get+0x628/0x11b0 [ 204.069543][T15947] ieee80211_beacon_get_tim+0xb7/0x500 [ 204.074980][T15947] mac80211_hwsim_beacon_tx+0xd4/0x570 [ 204.080405][T15947] __iterate_interfaces+0x1fc/0x390 [ 204.085589][T15947] ieee80211_iterate_active_interfaces_atomic+0x2e/0x40 [ 204.092488][T15947] mac80211_hwsim_beacon+0xa1/0x180 [ 204.097651][T15947] __run_hrtimer+0x405/0x7a0 [ 204.102203][T15947] hrtimer_run_softirq+0x320/0x450 [ 204.107278][T15947] __do_softirq+0x22e/0x569 [ 204.111751][T15947] [ 204.114045][T15947] Freed by task 15947: [ 204.118101][T15947] __kasan_slab_free+0x168/0x220 [ 204.123003][T15947] slab_free_freelist_hook+0xd0/0x150 [ 204.128362][T15947] kmem_cache_free+0xac/0x5c0 [ 204.133003][T15947] mac80211_hwsim_beacon_tx+0x35e/0x570 [ 204.138537][T15947] __iterate_interfaces+0x1fc/0x390 [ 204.143701][T15947] ieee80211_iterate_active_interfaces_atomic+0x2e/0x40 [ 204.150610][T15947] mac80211_hwsim_beacon+0xa1/0x180 [ 204.155788][T15947] __run_hrtimer+0x405/0x7a0 [ 204.160343][T15947] hrtimer_run_softirq+0x320/0x450 [ 204.165420][T15947] __do_softirq+0x22e/0x569 [ 204.169888][T15947] [ 204.172188][T15947] The buggy address belongs to the object at ffff8881cda7f640 [ 204.172188][T15947] which belongs to the cache skbuff_head_cache of size 240 [ 204.186724][T15947] The buggy address is located 0 bytes inside of [ 204.186724][T15947] 240-byte region [ffff8881cda7f640, ffff8881cda7f730) [ 204.199805][T15947] The buggy address belongs to the page: [ 204.205404][T15947] page:ffffea0007369fc0 refcount:1 mapcount:0 mapping:ffff8881daa92f00 index:0x0 [ 204.214567][T15947] flags: 0x8000000000000200(slab) [ 204.219672][T15947] raw: 8000000000000200 ffffea00065e8880 0000000500000005 ffff8881daa92f00 [ 204.228221][T15947] raw: 0000000000000000 00000000000c000c 00000001ffffffff 0000000000000000 [ 204.236765][T15947] page dumped because: kasan: bad access detected [ 204.243139][T15947] [ 204.245441][T15947] Memory state around the buggy address: [ 204.251034][T15947] ffff8881cda7f500: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 204.259060][T15947] ffff8881cda7f580: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fc fc [ 204.267095][T15947] >ffff8881cda7f600: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 204.275119][T15947] ^ [ 204.281234][T15947] ffff8881cda7f680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb 08:50:25 executing program 3: openat$zero(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf1f0d7}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x60, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7d}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) sendmsg$SMC_PNETID_DEL(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x11) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="05024c660000000008001b"], 0x28}}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setpriority(0x1, 0x0, 0x0) [ 204.289261][T15947] ffff8881cda7f700: fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc fc [ 204.297287][T15947] ================================================================== [ 204.311579][ T365] BUG: unable to handle page fault for address: ffff8880c7a609e0 [ 204.319298][ T365] #PF: supervisor read access in kernel mode [ 204.325248][ T365] #PF: error_code(0x0000) - not-present page [ 204.331190][ T365] PGD 6001067 P4D 6001067 PUD 0 [ 204.336097][ T365] Oops: 0000 [#1] PREEMPT SMP KASAN [ 204.341372][ T365] CPU: 1 PID: 365 Comm: syz-executor.5 Tainted: G B W 5.4.69-syzkaller-00002-g489646b879ed #0 [ 204.352706][ T365] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 204.362731][ T365] RIP: 0010:kmem_cache_alloc+0x133/0x250 [ 204.368324][ T365] Code: 50 08 49 8b 07 65 48 03 05 4a 24 93 7e 48 3b 50 08 75 e7 4c 8b 28 4d 85 ed 0f 84 e4 00 00 00 41 8b 47 20 49 8b 8f b0 01 00 00 <49> 33 4c 05 00 49 8d 5c 05 00 48 0f cb 48 31 cb 48 89 d1 48 83 c1 [ 204.387893][ T365] RSP: 0018:ffff8881cd37fbb0 EFLAGS: 00010282 [ 204.393922][ T365] RAX: 0000000000000000 RBX: 0000000000000dc0 RCX: 8234001d46904bb7 [ 204.401864][ T365] RDX: 00000000001024c9 RSI: 0000000000000000 RDI: 0000000000000000 [ 204.409804][ T365] RBP: ffff8881da8ec500 R08: ffffffff820fbac9 R09: ffffed1039dd0421 [ 204.417748][ T365] R10: ffffed1039dd0421 R11: 0000000000000000 R12: 0000000000000dc0 [ 204.425696][ T365] R13: ffff8880c7a609e0 R14: ffffffff81d83262 R15: ffff8881da8ec500 [ 204.433666][ T365] FS: 0000000002cc4940(0000) GS:ffff8881db900000(0000) knlGS:0000000000000000 [ 204.442559][ T365] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 204.449107][ T365] CR2: ffff8880c7a609e0 CR3: 00000001cd170005 CR4: 00000000001606e0 [ 204.457048][ T365] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 204.464985][ T365] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 204.472932][ T365] Call Trace: [ 204.476188][ T365] security_file_alloc+0x32/0x200 [ 204.481181][ T365] __alloc_file+0xc6/0x390 [ 204.485569][ T365] alloc_empty_file+0xa9/0x1b0 [ 204.490310][ T365] alloc_file+0x58/0x4b0 [ 204.494520][ T365] alloc_file_pseudo+0x25b/0x310 [ 204.499440][ T365] ? alloc_empty_file_noaccount+0x70/0x70 [ 204.505129][ T365] ? find_next_zero_bit+0xfb/0x120 [ 204.510226][ T365] ? _raw_spin_unlock+0x5/0x20 [ 204.514965][ T365] ? __alloc_fd+0x4e8/0x590 [ 204.519432][ T365] sock_alloc_file+0xb4/0x230 [ 204.524075][ T365] __sys_socket+0x17c/0x350 [ 204.528544][ T365] ? sock_create_kern+0x40/0x40 [ 204.533359][ T365] ? unlock_page_memcg+0xf0/0xf0 [ 204.538276][ T365] __x64_sys_socket+0x76/0x80 [ 204.542935][ T365] do_syscall_64+0xcb/0x150 [ 204.547410][ T365] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 204.553270][ T365] RIP: 0033:0x460977 [ 204.557128][ T365] Code: 00 00 00 49 89 ca b8 36 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 aa 88 fb ff c3 66 0f 1f 84 00 00 00 00 00 b8 29 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8d 88 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 204.576695][ T365] RSP: 002b:00007ffebc6cb2d8 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 204.585066][ T365] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000460977 [ 204.593004][ T365] RDX: 0000000000000006 RSI: 0000000000000001 RDI: 0000000000000002 [ 204.600943][ T365] RBP: 0000000000000153 R08: 0000000000000000 R09: 000000000000000a [ 204.608881][ T365] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000000 [ 204.616819][ T365] R13: 00007ffebc6cb9f0 R14: 0000000000031650 R15: 00007ffebc6cba00 [ 204.624754][ T365] Modules linked in: [ 204.628621][ T365] CR2: ffff8880c7a609e0 [ 204.632742][ T365] ---[ end trace 84b9f4456a0e1d82 ]--- [ 204.638169][ T365] RIP: 0010:kmem_cache_alloc+0x133/0x250 [ 204.643764][ T365] Code: 50 08 49 8b 07 65 48 03 05 4a 24 93 7e 48 3b 50 08 75 e7 4c 8b 28 4d 85 ed 0f 84 e4 00 00 00 41 8b 47 20 49 8b 8f b0 01 00 00 <49> 33 4c 05 00 49 8d 5c 05 00 48 0f cb 48 31 cb 48 89 d1 48 83 c1 [ 204.663337][ T365] RSP: 0018:ffff8881cd37fbb0 EFLAGS: 00010282 [ 204.669373][ T365] RAX: 0000000000000000 RBX: 0000000000000dc0 RCX: 8234001d46904bb7 [ 204.677313][ T365] RDX: 00000000001024c9 RSI: 0000000000000000 RDI: 0000000000000000 [ 204.685259][ T365] RBP: ffff8881da8ec500 R08: ffffffff820fbac9 R09: ffffed1039dd0421 [ 204.693196][ T365] R10: ffffed1039dd0421 R11: 0000000000000000 R12: 0000000000000dc0 [ 204.701138][ T365] R13: ffff8880c7a609e0 R14: ffffffff81d83262 R15: ffff8881da8ec500 [ 204.709080][ T365] FS: 0000000002cc4940(0000) GS:ffff8881db900000(0000) knlGS:0000000000000000 [ 204.717972][ T365] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 204.724530][ T365] CR2: ffff8880c7a609e0 CR3: 00000001cd170005 CR4: 00000000001606e0 [ 204.732471][ T365] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 204.740411][ T365] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 204.748348][ T365] Kernel panic - not syncing: Fatal exception [ 204.754980][ T365] Kernel Offset: disabled [ 204.759283][ T365] Rebooting in 86400 seconds..