0, 0x1473bf3)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0)
03:37:25 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0) (fail_nth: 8)
03:37:25 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x11, 0x3, 0x0, 0x3, 0xe, 0x0, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:25 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x4, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
[ 341.908771][T22470] FAULT_INJECTION: forcing a failure.
[ 341.908771][T22470] name failslab, interval 1, probability 0, space 0, times 0
[ 341.921656][T22470] CPU: 1 PID: 22470 Comm: syz-executor.4 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 341.931147][T22470] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 341.941331][T22470] Call Trace:
[ 341.944622][T22470]
[ 341.947532][T22470] dump_stack_lvl+0xd6/0x122
[ 341.952104][T22470] dump_stack+0x11/0x12
[ 341.956238][T22470] should_fail+0x230/0x240
[ 341.960640][T22470] ? pfkey_add+0x11da/0x1350
[ 341.965249][T22470] __should_failslab+0x81/0x90
[ 341.969999][T22470] should_failslab+0x5/0x20
[ 341.974497][T22470] __kmalloc+0x66/0x350
[ 341.978672][T22470] ? hrtimer_init+0xfc/0x1c0
[ 341.983259][T22470] ? init_timer_key+0x6f/0x130
[ 341.988089][T22470] pfkey_add+0x11da/0x1350
[ 341.992506][T22470] pfkey_sendmsg+0x6ba/0x890
[ 341.997097][T22470] ? pfkey_release+0x210/0x210
[ 342.001858][T22470] ____sys_sendmsg+0x38f/0x500
[ 342.006625][T22470] __sys_sendmsg+0x195/0x230
[ 342.011257][T22470] __x64_sys_sendmsg+0x42/0x50
[ 342.016072][T22470] do_syscall_64+0x2b/0x70
[ 342.020490][T22470] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 342.026411][T22470] RIP: 0033:0x7ffbb8652049
[ 342.030879][T22470] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 342.050484][T22470] RSP: 002b:00007ffbb7dc8168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[ 342.058913][T22470] RAX: ffffffffffffffda RBX: 00007ffbb8764f60 RCX: 00007ffbb8652049
[ 342.066885][T22470] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003
[ 342.074928][T22470] RBP: 00007ffbb7dc81d0 R08: 0000000000000000 R09: 0000000000000000
[ 342.082955][T22470] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 342.090949][T22470] R13: 00007ffed863bedf R14: 00007ffbb7dc8300 R15: 0000000000022000
[ 342.098924][T22470]
03:37:25 executing program 0:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x0, 0x0) (fail_nth: 5)
03:37:25 executing program 1:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) (fail_nth: 2)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x20000004})
ppoll(&(0x7f0000000000)=[{r2, 0x4b57, 0x64}], 0x1, 0x0, 0x0, 0x0)
03:37:25 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x12, 0x3, 0x0, 0x3, 0xe, 0x0, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:25 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x5, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:25 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0) (fail_nth: 9)
[ 342.299079][T22482] FAULT_INJECTION: forcing a failure.
[ 342.299079][T22482] name failslab, interval 1, probability 0, space 0, times 0
[ 342.311738][T22482] CPU: 1 PID: 22482 Comm: syz-executor.4 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 342.321019][T22482] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 342.331089][T22482] Call Trace:
[ 342.334365][T22482]
[ 342.337288][T22482] dump_stack_lvl+0xd6/0x122
[ 342.341881][T22482] dump_stack+0x11/0x12
[ 342.346041][T22482] should_fail+0x230/0x240
[ 342.350464][T22482] __should_failslab+0x81/0x90
[ 342.353856][T22486] FAULT_INJECTION: forcing a failure.
[ 342.353856][T22486] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 342.355229][T22482] should_failslab+0x5/0x20
[ 342.372735][T22482] kmem_cache_alloc_node_trace+0x58/0x300
[ 342.378516][T22482] ? crypto_create_tfm_node+0x4a/0x1f0
[ 342.383984][T22482] crypto_create_tfm_node+0x4a/0x1f0
[ 342.389343][T22482] ? crypto_alg_mod_lookup+0x397/0x4e0
[ 342.394797][T22482] crypto_alloc_tfm_node+0x100/0x290
[ 342.400109][T22482] crypto_alloc_aead+0x2b/0x30
[ 342.404881][T22482] esp_init_state+0x2f3/0x7a0
[ 342.409550][T22482] __xfrm_init_state+0x712/0x910
[ 342.414481][T22482] xfrm_init_state+0x19/0x50
[ 342.419059][T22482] pfkey_add+0xfa3/0x1350
[ 342.423379][T22482] pfkey_sendmsg+0x6ba/0x890
[ 342.427995][T22482] ? pfkey_release+0x210/0x210
[ 342.432742][T22482] ____sys_sendmsg+0x38f/0x500
[ 342.437502][T22482] __sys_sendmsg+0x195/0x230
[ 342.442104][T22482] __x64_sys_sendmsg+0x42/0x50
[ 342.446854][T22482] do_syscall_64+0x2b/0x70
[ 342.451356][T22482] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 342.457236][T22482] RIP: 0033:0x7ffbb8652049
[ 342.461672][T22482] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 342.481283][T22482] RSP: 002b:00007ffbb7dc8168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[ 342.489697][T22482] RAX: ffffffffffffffda RBX: 00007ffbb8764f60 RCX: 00007ffbb8652049
03:37:25 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x13, 0x3, 0x0, 0x3, 0xe, 0x0, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
[ 342.497652][T22482] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003
[ 342.505606][T22482] RBP: 00007ffbb7dc81d0 R08: 0000000000000000 R09: 0000000000000000
[ 342.513595][T22482] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 342.521571][T22482] R13: 00007ffed863bedf R14: 00007ffbb7dc8300 R15: 0000000000022000
[ 342.529591][T22482]
[ 342.532618][T22486] CPU: 0 PID: 22486 Comm: syz-executor.1 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 342.541901][T22486] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 342.551959][T22486] Call Trace:
[ 342.555226][T22486]
[ 342.558141][T22486] dump_stack_lvl+0xd6/0x122
[ 342.562783][T22486] dump_stack+0x11/0x12
[ 342.566993][T22486] should_fail+0x230/0x240
[ 342.571462][T22486] should_fail_usercopy+0x16/0x20
[ 342.576527][T22486] _copy_from_user+0x1a/0xc0
[ 342.581099][T22486] do_recvmmsg+0x27e/0xa20
[ 342.585551][T22486] __x64_sys_recvmmsg+0xde/0x160
[ 342.590469][T22486] do_syscall_64+0x2b/0x70
[ 342.594966][T22486] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 342.595227][T22491] FAULT_INJECTION: forcing a failure.
[ 342.595227][T22491] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 342.600859][T22486] RIP: 0033:0x7f2c4d882049
[ 342.600878][T22486] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 342.600895][T22486] RSP: 002b:00007f2c4cfd7168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 342.646242][T22486] RAX: ffffffffffffffda RBX: 00007f2c4d995030 RCX: 00007f2c4d882049
[ 342.654241][T22486] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003
[ 342.662195][T22486] RBP: 00007f2c4cfd71d0 R08: 0000000000000000 R09: 0000000000000000
[ 342.670210][T22486] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000001
[ 342.678172][T22486] R13: 00007fffa9548b0f R14: 00007f2c4cfd7300 R15: 0000000000022000
[ 342.686184][T22486]
[ 342.689198][T22491] CPU: 1 PID: 22491 Comm: syz-executor.0 Not tainted 5.18.0-rc2-syzkaller-dirty #0
03:37:26 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x6, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
[ 342.698528][T22491] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 342.708577][T22491] Call Trace:
[ 342.711839][T22491]
[ 342.714864][T22491] dump_stack_lvl+0xd6/0x122
[ 342.719446][T22491] dump_stack+0x11/0x12
[ 342.723587][T22491] should_fail+0x230/0x240
[ 342.728149][T22491] should_fail_usercopy+0x16/0x20
[ 342.733209][T22491] _copy_from_user+0x1a/0xc0
[ 342.738009][T22491] do_recvmmsg+0x27e/0xa20
[ 342.742411][T22491] __x64_sys_recvmmsg+0xde/0x160
03:37:26 executing program 5:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x20000004})
ppoll(&(0x7f0000000000)=[{r0, 0x0, 0xb00}, {r2, 0x0, 0x64}], 0x2, 0x0, 0x0, 0x1473bf3)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0)
[ 342.747350][T22491] do_syscall_64+0x2b/0x70
[ 342.751758][T22491] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 342.757659][T22491] RIP: 0033:0x7fa271cfb049
[ 342.762069][T22491] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 342.781860][T22491] RSP: 002b:00007fa271450168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 342.790280][T22491] RAX: ffffffffffffffda RBX: 00007fa271e0e030 RCX: 00007fa271cfb049
03:37:26 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x14, 0x3, 0x0, 0x3, 0xe, 0x0, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:26 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0) (fail_nth: 10)
03:37:26 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x7, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
[ 342.798249][T22491] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003
[ 342.806281][T22491] RBP: 00007fa2714501d0 R08: 0000000000000000 R09: 0000000000000000
[ 342.814315][T22491] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 342.822288][T22491] R13: 00007ffcd670d85f R14: 00007fa271450300 R15: 0000000000022000
[ 342.830283][T22491]
[ 342.855108][T22499] FAULT_INJECTION: forcing a failure.
[ 342.855108][T22499] name failslab, interval 1, probability 0, space 0, times 0
[ 342.867778][T22499] CPU: 1 PID: 22499 Comm: syz-executor.4 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 342.877146][T22499] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 342.887203][T22499] Call Trace:
[ 342.890547][T22499]
[ 342.893469][T22499] dump_stack_lvl+0xd6/0x122
[ 342.898061][T22499] dump_stack+0x11/0x12
[ 342.902252][T22499] should_fail+0x230/0x240
[ 342.906675][T22499] __should_failslab+0x81/0x90
[ 342.911460][T22499] should_failslab+0x5/0x20
[ 342.915963][T22499] kmem_cache_alloc_node_trace+0x58/0x300
[ 342.921681][T22499] ? crypto_create_tfm_node+0x4a/0x1f0
[ 342.927183][T22499] crypto_create_tfm_node+0x4a/0x1f0
[ 342.932478][T22499] crypto_spawn_tfm2+0x44/0x70
[ 342.937316][T22499] aead_init_geniv+0x100/0x160
[ 342.942130][T22499] ? aead_geniv_free+0x20/0x20
[ 342.946960][T22499] crypto_aead_init_tfm+0x8f/0xa0
[ 342.951989][T22499] crypto_create_tfm_node+0x93/0x1f0
[ 342.957323][T22499] crypto_alloc_tfm_node+0x100/0x290
[ 342.962634][T22499] crypto_alloc_aead+0x2b/0x30
[ 342.967476][T22499] esp_init_state+0x2f3/0x7a0
[ 342.972197][T22499] __xfrm_init_state+0x712/0x910
[ 342.977143][T22499] xfrm_init_state+0x19/0x50
[ 342.981732][T22499] pfkey_add+0xfa3/0x1350
[ 342.986065][T22499] pfkey_sendmsg+0x6ba/0x890
[ 342.990659][T22499] ? pfkey_release+0x210/0x210
[ 342.995417][T22499] ____sys_sendmsg+0x38f/0x500
[ 343.000208][T22499] __sys_sendmsg+0x195/0x230
[ 343.004799][T22499] __x64_sys_sendmsg+0x42/0x50
[ 343.009629][T22499] do_syscall_64+0x2b/0x70
[ 343.014055][T22499] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 343.020047][T22499] RIP: 0033:0x7ffbb8652049
[ 343.024484][T22499] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 343.044089][T22499] RSP: 002b:00007ffbb7dc8168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
03:37:26 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x8, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
[ 343.052656][T22499] RAX: ffffffffffffffda RBX: 00007ffbb8764f60 RCX: 00007ffbb8652049
[ 343.060630][T22499] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003
[ 343.068602][T22499] RBP: 00007ffbb7dc81d0 R08: 0000000000000000 R09: 0000000000000000
[ 343.076613][T22499] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 343.084630][T22499] R13: 00007ffed863bedf R14: 00007ffbb7dc8300 R15: 0000000000022000
[ 343.092600][T22499]
03:37:26 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0) (fail_nth: 11)
03:37:26 executing program 1:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) (fail_nth: 3)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x20000004})
ppoll(&(0x7f0000000000)=[{r2, 0x4b57, 0x64}], 0x1, 0x0, 0x0, 0x0)
03:37:26 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x15, 0x3, 0x0, 0x3, 0xe, 0x0, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:26 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x9, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:26 executing program 0:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x0, 0x0) (fail_nth: 6)
[ 343.197603][T22514] FAULT_INJECTION: forcing a failure.
[ 343.197603][T22514] name failslab, interval 1, probability 0, space 0, times 0
[ 343.210305][T22514] CPU: 0 PID: 22514 Comm: syz-executor.4 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 343.219588][T22514] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 343.229639][T22514] Call Trace:
[ 343.232909][T22514]
[ 343.235831][T22514] dump_stack_lvl+0xd6/0x122
[ 343.240429][T22514] dump_stack+0x11/0x12
[ 343.244657][T22514] should_fail+0x230/0x240
[ 343.247272][T22517] FAULT_INJECTION: forcing a failure.
[ 343.247272][T22517] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 343.249071][T22514] __should_failslab+0x81/0x90
[ 343.266824][T22514] should_failslab+0x5/0x20
[ 343.271410][T22514] kmem_cache_alloc_node_trace+0x58/0x300
[ 343.277178][T22514] ? crypto_create_tfm_node+0x4a/0x1f0
[ 343.282628][T22514] crypto_create_tfm_node+0x4a/0x1f0
[ 343.288016][T22514] crypto_spawn_tfm2+0x44/0x70
[ 343.292770][T22514] crypto_authenc_init_tfm+0x2b/0x140
[ 343.298128][T22514] ? crypto_authenc_create+0x410/0x410
[ 343.303715][T22514] crypto_aead_init_tfm+0x8f/0xa0
[ 343.308730][T22514] crypto_create_tfm_node+0x93/0x1f0
[ 343.314003][T22514] crypto_spawn_tfm2+0x44/0x70
[ 343.318783][T22514] aead_init_geniv+0x100/0x160
[ 343.323539][T22514] ? aead_geniv_free+0x20/0x20
[ 343.328427][T22514] crypto_aead_init_tfm+0x8f/0xa0
[ 343.333453][T22514] crypto_create_tfm_node+0x93/0x1f0
[ 343.338804][T22514] crypto_alloc_tfm_node+0x100/0x290
[ 343.344080][T22514] crypto_alloc_aead+0x2b/0x30
[ 343.348897][T22514] esp_init_state+0x2f3/0x7a0
[ 343.353605][T22514] __xfrm_init_state+0x712/0x910
[ 343.358535][T22514] xfrm_init_state+0x19/0x50
[ 343.363133][T22514] pfkey_add+0xfa3/0x1350
[ 343.367450][T22514] pfkey_sendmsg+0x6ba/0x890
[ 343.372030][T22514] ? pfkey_release+0x210/0x210
[ 343.376806][T22514] ____sys_sendmsg+0x38f/0x500
[ 343.381612][T22514] __sys_sendmsg+0x195/0x230
[ 343.386191][T22514] __x64_sys_sendmsg+0x42/0x50
[ 343.390945][T22514] do_syscall_64+0x2b/0x70
[ 343.395352][T22514] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 343.401274][T22514] RIP: 0033:0x7ffbb8652049
[ 343.405670][T22514] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 343.425262][T22514] RSP: 002b:00007ffbb7dc8168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[ 343.433661][T22514] RAX: ffffffffffffffda RBX: 00007ffbb8764f60 RCX: 00007ffbb8652049
03:37:26 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0xa, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
[ 343.441617][T22514] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003
[ 343.449571][T22514] RBP: 00007ffbb7dc81d0 R08: 0000000000000000 R09: 0000000000000000
[ 343.457596][T22514] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 343.465656][T22514] R13: 00007ffed863bedf R14: 00007ffbb7dc8300 R15: 0000000000022000
[ 343.473660][T22514]
[ 343.476671][T22517] CPU: 1 PID: 22517 Comm: syz-executor.1 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 343.485987][T22517] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 343.496045][T22517] Call Trace:
[ 343.499362][T22517]
[ 343.502284][T22517] dump_stack_lvl+0xd6/0x122
[ 343.506877][T22517] dump_stack+0x11/0x12
[ 343.511083][T22517] should_fail+0x230/0x240
[ 343.515500][T22517] should_fail_usercopy+0x16/0x20
[ 343.520536][T22517] _copy_from_user+0x1a/0xc0
[ 343.525141][T22517] do_recvmmsg+0x27e/0xa20
[ 343.529564][T22517] __x64_sys_recvmmsg+0xde/0x160
[ 343.534498][T22517] do_syscall_64+0x2b/0x70
[ 343.538916][T22517] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 343.544808][T22517] RIP: 0033:0x7f2c4d882049
[ 343.549238][T22517] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 343.568907][T22517] RSP: 002b:00007f2c4cfd7168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 343.577321][T22517] RAX: ffffffffffffffda RBX: 00007f2c4d995030 RCX: 00007f2c4d882049
[ 343.585288][T22517] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003
03:37:27 executing program 5:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x20000004})
ppoll(&(0x7f0000000000)=[{r2, 0x4b57, 0x64}], 0x1, 0x0, 0x0, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0)
[ 343.593261][T22517] RBP: 00007f2c4cfd71d0 R08: 0000000000000000 R09: 0000000000000000
[ 343.601227][T22517] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000001
[ 343.609186][T22517] R13: 00007fffa9548b0f R14: 00007f2c4cfd7300 R15: 0000000000022000
[ 343.617180][T22517]
[ 343.621492][T22521] FAULT_INJECTION: forcing a failure.
[ 343.621492][T22521] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 343.634581][T22521] CPU: 0 PID: 22521 Comm: syz-executor.0 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 343.643859][T22521] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 343.653890][T22521] Call Trace:
[ 343.657148][T22521]
[ 343.660056][T22521] dump_stack_lvl+0xd6/0x122
[ 343.664630][T22521] dump_stack+0x11/0x12
[ 343.668861][T22521] should_fail+0x230/0x240
[ 343.673286][T22521] should_fail_usercopy+0x16/0x20
[ 343.678316][T22521] _copy_from_user+0x1a/0xc0
[ 343.682892][T22521] do_recvmmsg+0x27e/0xa20
[ 343.687300][T22521] __x64_sys_recvmmsg+0xde/0x160
[ 343.692241][T22521] do_syscall_64+0x2b/0x70
[ 343.696723][T22521] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 343.702618][T22521] RIP: 0033:0x7fa271cfb049
[ 343.707106][T22521] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 343.726721][T22521] RSP: 002b:00007fa271450168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 343.735136][T22521] RAX: ffffffffffffffda RBX: 00007fa271e0e030 RCX: 00007fa271cfb049
03:37:27 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0xb, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:27 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x16, 0x3, 0x0, 0x3, 0xe, 0x0, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:27 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0) (fail_nth: 12)
[ 343.743119][T22521] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003
[ 343.751106][T22521] RBP: 00007fa2714501d0 R08: 0000000000000000 R09: 0000000000000000
[ 343.759073][T22521] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 343.767039][T22521] R13: 00007ffcd670d85f R14: 00007fa271450300 R15: 0000000000022000
[ 343.775007][T22521]
03:37:27 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x17, 0x3, 0x0, 0x3, 0xe, 0x0, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
[ 343.797972][T22530] FAULT_INJECTION: forcing a failure.
[ 343.797972][T22530] name failslab, interval 1, probability 0, space 0, times 0
[ 343.810722][T22530] CPU: 1 PID: 22530 Comm: syz-executor.4 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 343.820054][T22530] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 343.830161][T22530] Call Trace:
[ 343.833437][T22530]
[ 343.836360][T22530] dump_stack_lvl+0xd6/0x122
[ 343.840953][T22530] dump_stack+0x11/0x12
[ 343.845105][T22530] should_fail+0x230/0x240
[ 343.849565][T22530] __should_failslab+0x81/0x90
[ 343.854493][T22530] should_failslab+0x5/0x20
[ 343.859155][T22530] kmem_cache_alloc_node_trace+0x58/0x300
[ 343.864873][T22530] ? crypto_create_tfm_node+0x4a/0x1f0
[ 343.870455][T22530] crypto_create_tfm_node+0x4a/0x1f0
[ 343.875749][T22530] crypto_init_shash_ops_async+0x3e/0x180
[ 343.881470][T22530] crypto_ahash_init_tfm+0x5e/0x220
[ 343.886719][T22530] crypto_create_tfm_node+0x93/0x1f0
[ 343.892012][T22530] crypto_spawn_tfm2+0x44/0x70
[ 343.896778][T22530] crypto_authenc_init_tfm+0x2b/0x140
[ 343.902232][T22530] ? crypto_authenc_create+0x410/0x410
[ 343.907695][T22530] crypto_aead_init_tfm+0x8f/0xa0
[ 343.912774][T22530] crypto_create_tfm_node+0x93/0x1f0
[ 343.918221][T22530] crypto_spawn_tfm2+0x44/0x70
[ 343.922986][T22530] aead_init_geniv+0x100/0x160
[ 343.927806][T22530] ? aead_geniv_free+0x20/0x20
[ 343.932651][T22530] crypto_aead_init_tfm+0x8f/0xa0
[ 343.937738][T22530] crypto_create_tfm_node+0x93/0x1f0
[ 343.943054][T22530] crypto_alloc_tfm_node+0x100/0x290
[ 343.948428][T22530] crypto_alloc_aead+0x2b/0x30
[ 343.953324][T22530] esp_init_state+0x2f3/0x7a0
[ 343.958056][T22530] __xfrm_init_state+0x712/0x910
[ 343.962998][T22530] xfrm_init_state+0x19/0x50
[ 343.967629][T22530] pfkey_add+0xfa3/0x1350
[ 343.971958][T22530] pfkey_sendmsg+0x6ba/0x890
[ 343.976631][T22530] ? pfkey_release+0x210/0x210
[ 343.981451][T22530] ____sys_sendmsg+0x38f/0x500
[ 343.986217][T22530] __sys_sendmsg+0x195/0x230
[ 343.990815][T22530] __x64_sys_sendmsg+0x42/0x50
[ 343.995576][T22530] do_syscall_64+0x2b/0x70
03:37:27 executing program 1:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) (fail_nth: 4)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x20000004})
ppoll(&(0x7f0000000000)=[{r2, 0x4b57, 0x64}], 0x1, 0x0, 0x0, 0x0)
[ 344.000053][T22530] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 344.005945][T22530] RIP: 0033:0x7ffbb8652049
[ 344.010361][T22530] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 344.029966][T22530] RSP: 002b:00007ffbb7dc8168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[ 344.038377][T22530] RAX: ffffffffffffffda RBX: 00007ffbb8764f60 RCX: 00007ffbb8652049
03:37:27 executing program 0:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x0, 0x0) (fail_nth: 7)
03:37:27 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0xc, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:27 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0) (fail_nth: 13)
03:37:27 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x18, 0x3, 0x0, 0x3, 0xe, 0x0, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
[ 344.046487][T22530] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003
[ 344.054513][T22530] RBP: 00007ffbb7dc81d0 R08: 0000000000000000 R09: 0000000000000000
[ 344.062483][T22530] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 344.070456][T22530] R13: 00007ffed863bedf R14: 00007ffbb7dc8300 R15: 0000000000022000
[ 344.078424][T22530]
[ 344.097171][T22540] FAULT_INJECTION: forcing a failure.
[ 344.097171][T22540] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 344.110253][T22540] CPU: 1 PID: 22540 Comm: syz-executor.1 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 344.119536][T22540] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 344.129590][T22540] Call Trace:
[ 344.132865][T22540]
[ 344.135785][T22540] dump_stack_lvl+0xd6/0x122
[ 344.136445][T22545] FAULT_INJECTION: forcing a failure.
[ 344.136445][T22545] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 344.140428][T22540] dump_stack+0x11/0x12
[ 344.140456][T22540] should_fail+0x230/0x240
[ 344.161993][T22540] should_fail_usercopy+0x16/0x20
[ 344.167011][T22540] _copy_from_user+0x1a/0xc0
[ 344.171592][T22540] do_recvmmsg+0x27e/0xa20
[ 344.176017][T22540] __x64_sys_recvmmsg+0xde/0x160
[ 344.181024][T22540] do_syscall_64+0x2b/0x70
[ 344.185514][T22540] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 344.191425][T22540] RIP: 0033:0x7f2c4d882049
[ 344.195830][T22540] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 344.215421][T22540] RSP: 002b:00007f2c4cfd7168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 344.223816][T22540] RAX: ffffffffffffffda RBX: 00007f2c4d995030 RCX: 00007f2c4d882049
[ 344.231794][T22540] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003
[ 344.239747][T22540] RBP: 00007f2c4cfd71d0 R08: 0000000000000000 R09: 0000000000000000
[ 344.247704][T22540] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000001
[ 344.255660][T22540] R13: 00007fffa9548b0f R14: 00007f2c4cfd7300 R15: 0000000000022000
[ 344.263751][T22540]
[ 344.266753][T22545] CPU: 0 PID: 22545 Comm: syz-executor.0 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 344.276136][T22545] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 344.286199][T22545] Call Trace:
[ 344.289478][T22545]
[ 344.292401][T22545] dump_stack_lvl+0xd6/0x122
[ 344.296994][T22545] dump_stack+0x11/0x12
[ 344.301148][T22545] should_fail+0x230/0x240
[ 344.305565][T22545] should_fail_usercopy+0x16/0x20
[ 344.310611][T22545] _copy_from_user+0x1a/0xc0
[ 344.315232][T22545] do_recvmmsg+0x27e/0xa20
[ 344.319651][T22545] __x64_sys_recvmmsg+0xde/0x160
[ 344.324588][T22545] do_syscall_64+0x2b/0x70
[ 344.329048][T22545] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 344.334940][T22545] RIP: 0033:0x7fa271cfb049
[ 344.339351][T22545] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 344.358980][T22545] RSP: 002b:00007fa271450168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 344.367463][T22545] RAX: ffffffffffffffda RBX: 00007fa271e0e030 RCX: 00007fa271cfb049
[ 344.375432][T22545] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003
[ 344.383455][T22545] RBP: 00007fa2714501d0 R08: 0000000000000000 R09: 0000000000000000
[ 344.391427][T22545] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
03:37:27 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x19, 0x3, 0x0, 0x3, 0xe, 0x0, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:27 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
[ 344.399393][T22545] R13: 00007ffcd670d85f R14: 00007fa271450300 R15: 0000000000022000
[ 344.407413][T22545]
03:37:27 executing program 5:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x20000004})
ppoll(&(0x7f0000000000)=[{r2, 0x4b57, 0x64}], 0x1, 0x0, 0x0, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0)
03:37:27 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0xd, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:27 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x1a, 0x3, 0x0, 0x3, 0xe, 0x0, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:27 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x2, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:27 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x1b, 0x3, 0x0, 0x3, 0xe, 0x0, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:28 executing program 1:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) (fail_nth: 5)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x20000004})
ppoll(&(0x7f0000000000)=[{r2, 0x4b57, 0x64}], 0x1, 0x0, 0x0, 0x0)
03:37:28 executing program 0:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x0, 0x0) (fail_nth: 8)
03:37:28 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0xe, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:28 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x9, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:28 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x1c, 0x3, 0x0, 0x3, 0xe, 0x0, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:28 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x10, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:28 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x1d, 0x3, 0x0, 0x3, 0xe, 0x0, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
[ 344.945233][T22582] FAULT_INJECTION: forcing a failure.
[ 344.945233][T22582] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 344.958313][T22582] CPU: 0 PID: 22582 Comm: syz-executor.1 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 344.962364][T22583] FAULT_INJECTION: forcing a failure.
[ 344.962364][T22583] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 344.967651][T22582] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 344.967666][T22582] Call Trace:
[ 344.993962][T22582]
[ 344.996948][T22582] dump_stack_lvl+0xd6/0x122
[ 345.001593][T22582] dump_stack+0x11/0x12
[ 345.005776][T22582] should_fail+0x230/0x240
[ 345.010182][T22582] should_fail_usercopy+0x16/0x20
[ 345.015196][T22582] _copy_from_user+0x1a/0xc0
[ 345.019777][T22582] do_recvmmsg+0x27e/0xa20
[ 345.024229][T22582] __x64_sys_recvmmsg+0xde/0x160
[ 345.029152][T22582] do_syscall_64+0x2b/0x70
[ 345.033623][T22582] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 345.039541][T22582] RIP: 0033:0x7f2c4d882049
[ 345.044039][T22582] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 345.063695][T22582] RSP: 002b:00007f2c4cfd7168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 345.072172][T22582] RAX: ffffffffffffffda RBX: 00007f2c4d995030 RCX: 00007f2c4d882049
[ 345.080152][T22582] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003
[ 345.088107][T22582] RBP: 00007f2c4cfd71d0 R08: 0000000000000000 R09: 0000000000000000
[ 345.096064][T22582] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000001
[ 345.104050][T22582] R13: 00007fffa9548b0f R14: 00007f2c4cfd7300 R15: 0000000000022000
[ 345.112024][T22582]
[ 345.115033][T22583] CPU: 1 PID: 22583 Comm: syz-executor.0 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 345.124314][T22583] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 345.134363][T22583] Call Trace:
[ 345.137622][T22583]
[ 345.140533][T22583] dump_stack_lvl+0xd6/0x122
[ 345.145181][T22583] dump_stack+0x11/0x12
[ 345.149336][T22583] should_fail+0x230/0x240
[ 345.153733][T22583] should_fail_usercopy+0x16/0x20
[ 345.158743][T22583] _copy_from_user+0x1a/0xc0
[ 345.163369][T22583] do_recvmmsg+0x27e/0xa20
[ 345.167780][T22583] __x64_sys_recvmmsg+0xde/0x160
[ 345.172774][T22583] do_syscall_64+0x2b/0x70
[ 345.177175][T22583] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 345.183058][T22583] RIP: 0033:0x7fa271cfb049
[ 345.187676][T22583] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 345.207490][T22583] RSP: 002b:00007fa271450168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 345.215932][T22583] RAX: ffffffffffffffda RBX: 00007fa271e0e030 RCX: 00007fa271cfb049
[ 345.223996][T22583] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003
[ 345.231948][T22583] RBP: 00007fa2714501d0 R08: 0000000000000000 R09: 0000000000000000
[ 345.239941][T22583] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 345.247941][T22583] R13: 00007ffcd670d85f R14: 00007fa271450300 R15: 0000000000022000
[ 345.255914][T22583]
03:37:28 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0xd, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:28 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x1e, 0x3, 0x0, 0x3, 0xe, 0x0, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:28 executing program 5:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x20000004})
ppoll(&(0x7f0000000000)=[{r2, 0x4b57, 0x64}], 0x1, 0x0, 0x0, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0)
03:37:28 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x11, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:28 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:29 executing program 1:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) (fail_nth: 6)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x20000004})
ppoll(&(0x7f0000000000)=[{r2, 0x4b57, 0x64}], 0x1, 0x0, 0x0, 0x0)
03:37:29 executing program 0:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x0, 0x0) (fail_nth: 9)
03:37:29 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x12, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:29 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2d, 0x3, 0x0, 0x3, 0xe, 0x0, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:29 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x2, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:29 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x18, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:29 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x2, 0x0, 0x3, 0xe, 0x0, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:29 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x3, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:29 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x4, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
[ 345.791283][T22616] FAULT_INJECTION: forcing a failure.
[ 345.791283][T22616] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 345.804396][T22616] CPU: 0 PID: 22616 Comm: syz-executor.1 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 345.813681][T22616] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 345.823900][T22616] Call Trace:
[ 345.827174][T22616]
[ 345.830099][T22616] dump_stack_lvl+0xd6/0x122
[ 345.831145][T22617] FAULT_INJECTION: forcing a failure.
[ 345.831145][T22617] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 345.834689][T22616] dump_stack+0x11/0x12
[ 345.851836][T22616] should_fail+0x230/0x240
[ 345.856252][T22616] should_fail_usercopy+0x16/0x20
[ 345.861280][T22616] _copy_from_user+0x1a/0xc0
[ 345.865860][T22616] do_recvmmsg+0x27e/0xa20
[ 345.870283][T22616] __x64_sys_recvmmsg+0xde/0x160
[ 345.875226][T22616] do_syscall_64+0x2b/0x70
[ 345.879633][T22616] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 345.885515][T22616] RIP: 0033:0x7f2c4d882049
[ 345.889917][T22616] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 345.909510][T22616] RSP: 002b:00007f2c4cfd7168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 345.917918][T22616] RAX: ffffffffffffffda RBX: 00007f2c4d995030 RCX: 00007f2c4d882049
[ 345.925882][T22616] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003
[ 345.933911][T22616] RBP: 00007f2c4cfd71d0 R08: 0000000000000000 R09: 0000000000000000
[ 345.941895][T22616] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000001
[ 345.949852][T22616] R13: 00007fffa9548b0f R14: 00007f2c4cfd7300 R15: 0000000000022000
[ 345.957814][T22616]
[ 345.960821][T22617] CPU: 1 PID: 22617 Comm: syz-executor.0 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 345.970170][T22617] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 345.980218][T22617] Call Trace:
[ 345.983491][T22617]
[ 345.986497][T22617] dump_stack_lvl+0xd6/0x122
[ 345.991164][T22617] dump_stack+0x11/0x12
[ 345.995324][T22617] should_fail+0x230/0x240
[ 345.999859][T22617] should_fail_usercopy+0x16/0x20
[ 346.004888][T22617] _copy_from_user+0x1a/0xc0
[ 346.009457][T22617] do_recvmmsg+0x27e/0xa20
[ 346.013880][T22617] __x64_sys_recvmmsg+0xde/0x160
[ 346.018799][T22617] do_syscall_64+0x2b/0x70
[ 346.023291][T22617] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 346.029168][T22617] RIP: 0033:0x7fa271cfb049
[ 346.033559][T22617] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 346.053217][T22617] RSP: 002b:00007fa271450168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 346.061620][T22617] RAX: ffffffffffffffda RBX: 00007fa271e0e030 RCX: 00007fa271cfb049
[ 346.069568][T22617] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003
[ 346.077527][T22617] RBP: 00007fa2714501d0 R08: 0000000000000000 R09: 0000000000000000
[ 346.085478][T22617] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 346.093525][T22617] R13: 00007ffcd670d85f R14: 00007fa271450300 R15: 0000000000022000
[ 346.101496][T22617]
03:37:29 executing program 5:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x20000004})
ppoll(&(0x7f0000000000)=[{0xffffffffffffffff, 0x0, 0xb00}, {r2, 0x4b57, 0x64}], 0x2, 0x0, 0x0, 0x1473bf3)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0)
03:37:29 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x9, 0x0, 0x3, 0xe, 0x0, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:29 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x24, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:30 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x5, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:30 executing program 0:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x0, 0x0) (fail_nth: 10)
03:37:30 executing program 1:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) (fail_nth: 7)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x20000004})
ppoll(&(0x7f0000000000)=[{r2, 0x4b57, 0x64}], 0x1, 0x0, 0x0, 0x0)
03:37:30 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0xd, 0x0, 0x3, 0xe, 0x0, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:30 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x300, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:30 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x6, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:30 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x7, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:30 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:30 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x500, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
[ 346.672237][T22646] FAULT_INJECTION: forcing a failure.
[ 346.672237][T22646] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 346.685290][T22646] CPU: 0 PID: 22646 Comm: syz-executor.1 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 346.694641][T22646] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 346.704763][T22646] Call Trace:
[ 346.708033][T22646]
[ 346.710959][T22646] dump_stack_lvl+0xd6/0x122
[ 346.715610][T22646] dump_stack+0x11/0x12
[ 346.719764][T22646] should_fail+0x230/0x240
[ 346.724179][T22646] should_fail_usercopy+0x16/0x20
[ 346.729219][T22646] _copy_from_user+0x1a/0xc0
[ 346.733811][T22646] do_recvmmsg+0x27e/0xa20
[ 346.738235][T22646] __x64_sys_recvmmsg+0xde/0x160
[ 346.743219][T22646] do_syscall_64+0x2b/0x70
[ 346.747640][T22646] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 346.753540][T22646] RIP: 0033:0x7f2c4d882049
[ 346.757949][T22646] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 346.777585][T22646] RSP: 002b:00007f2c4cfd7168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 346.786004][T22646] RAX: ffffffffffffffda RBX: 00007f2c4d995030 RCX: 00007f2c4d882049
[ 346.794000][T22646] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003
[ 346.801964][T22646] RBP: 00007f2c4cfd71d0 R08: 0000000000000000 R09: 0000000000000000
[ 346.809967][T22646] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000001
[ 346.817927][T22646] R13: 00007fffa9548b0f R14: 00007f2c4cfd7300 R15: 0000000000022000
[ 346.825945][T22646]
[ 346.830725][T22648] FAULT_INJECTION: forcing a failure.
[ 346.830725][T22648] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 346.843793][T22648] CPU: 1 PID: 22648 Comm: syz-executor.0 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 346.853105][T22648] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 346.863155][T22648] Call Trace:
[ 346.866493][T22648]
[ 346.869419][T22648] dump_stack_lvl+0xd6/0x122
[ 346.874093][T22648] dump_stack+0x11/0x12
[ 346.878294][T22648] should_fail+0x230/0x240
[ 346.882701][T22648] should_fail_usercopy+0x16/0x20
[ 346.887707][T22648] _copy_from_user+0x1a/0xc0
[ 346.892280][T22648] do_recvmmsg+0x27e/0xa20
[ 346.896752][T22648] __x64_sys_recvmmsg+0xde/0x160
[ 346.901685][T22648] do_syscall_64+0x2b/0x70
[ 346.906086][T22648] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 346.912035][T22648] RIP: 0033:0x7fa271cfb049
[ 346.916445][T22648] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 346.936110][T22648] RSP: 002b:00007fa271450168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 346.944499][T22648] RAX: ffffffffffffffda RBX: 00007fa271e0e030 RCX: 00007fa271cfb049
[ 346.952516][T22648] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003
[ 346.960465][T22648] RBP: 00007fa2714501d0 R08: 0000000000000000 R09: 0000000000000000
[ 346.968458][T22648] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 346.976428][T22648] R13: 00007ffcd670d85f R14: 00007fa271450300 R15: 0000000000022000
[ 346.984397][T22648]
03:37:30 executing program 5:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x20000004})
ppoll(&(0x7f0000000000)=[{0xffffffffffffffff, 0x0, 0xb00}, {r2, 0x4b57, 0x64}], 0x2, 0x0, 0x0, 0x1473bf3)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0)
03:37:30 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x8, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:30 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x2, 0x3, 0xe, 0x0, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:30 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x600, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:30 executing program 0:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x0, 0x0) (fail_nth: 11)
03:37:30 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x700, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:30 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x3, 0x3, 0xe, 0x0, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:30 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x9, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:30 executing program 1:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) (fail_nth: 8)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x20000004})
ppoll(&(0x7f0000000000)=[{r2, 0x4b57, 0x64}], 0x1, 0x0, 0x0, 0x0)
03:37:30 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x900, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:30 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0xa, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:30 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x4, 0x3, 0xe, 0x0, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
[ 347.540466][T22676] FAULT_INJECTION: forcing a failure.
[ 347.540466][T22676] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 347.545237][T22677] FAULT_INJECTION: forcing a failure.
[ 347.545237][T22677] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 347.553561][T22676] CPU: 1 PID: 22676 Comm: syz-executor.0 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 347.575844][T22676] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 347.585927][T22676] Call Trace:
[ 347.589191][T22676]
[ 347.592107][T22676] dump_stack_lvl+0xd6/0x122
[ 347.596692][T22676] dump_stack+0x11/0x12
[ 347.600875][T22676] should_fail+0x230/0x240
[ 347.605280][T22676] should_fail_usercopy+0x16/0x20
[ 347.610292][T22676] _copy_from_user+0x1a/0xc0
[ 347.614871][T22676] do_recvmmsg+0x27e/0xa20
[ 347.619308][T22676] __x64_sys_recvmmsg+0xde/0x160
[ 347.624276][T22676] do_syscall_64+0x2b/0x70
[ 347.628706][T22676] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 347.634623][T22676] RIP: 0033:0x7fa271cfb049
[ 347.639022][T22676] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 347.658645][T22676] RSP: 002b:00007fa271450168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 347.667078][T22676] RAX: ffffffffffffffda RBX: 00007fa271e0e030 RCX: 00007fa271cfb049
[ 347.675106][T22676] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003
[ 347.683062][T22676] RBP: 00007fa2714501d0 R08: 0000000000000000 R09: 0000000000000000
[ 347.691019][T22676] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 347.699058][T22676] R13: 00007ffcd670d85f R14: 00007fa271450300 R15: 0000000000022000
[ 347.707018][T22676]
[ 347.710019][T22677] CPU: 0 PID: 22677 Comm: syz-executor.1 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 347.719346][T22677] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 347.729399][T22677] Call Trace:
[ 347.732659][T22677]
[ 347.735567][T22677] dump_stack_lvl+0xd6/0x122
[ 347.740144][T22677] dump_stack+0x11/0x12
[ 347.744290][T22677] should_fail+0x230/0x240
[ 347.748697][T22677] should_fail_usercopy+0x16/0x20
[ 347.753723][T22677] _copy_from_user+0x1a/0xc0
[ 347.758407][T22677] do_recvmmsg+0x27e/0xa20
[ 347.762807][T22677] __x64_sys_recvmmsg+0xde/0x160
[ 347.767781][T22677] do_syscall_64+0x2b/0x70
[ 347.772182][T22677] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 347.778109][T22677] RIP: 0033:0x7f2c4d882049
[ 347.782517][T22677] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 347.802161][T22677] RSP: 002b:00007f2c4cfd7168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 347.810578][T22677] RAX: ffffffffffffffda RBX: 00007f2c4d995030 RCX: 00007f2c4d882049
[ 347.818532][T22677] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003
[ 347.826489][T22677] RBP: 00007f2c4cfd71d0 R08: 0000000000000000 R09: 0000000000000000
[ 347.834438][T22677] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000001
[ 347.842479][T22677] R13: 00007fffa9548b0f R14: 00007f2c4cfd7300 R15: 0000000000022000
[ 347.850438][T22677]
03:37:31 executing program 5:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x20000004})
ppoll(&(0x7f0000000000)=[{0xffffffffffffffff, 0x0, 0xb00}, {r2, 0x4b57, 0x64}], 0x2, 0x0, 0x0, 0x1473bf3)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0)
03:37:31 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0xb, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:31 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0xa00, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:31 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x5, 0x3, 0xe, 0x0, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:31 executing program 0:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x0, 0x0) (fail_nth: 12)
03:37:31 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0xb00, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:31 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0xc, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:31 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x6, 0x3, 0xe, 0x0, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:31 executing program 1:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) (fail_nth: 9)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x20000004})
ppoll(&(0x7f0000000000)=[{r2, 0x4b57, 0x64}], 0x1, 0x0, 0x0, 0x0)
03:37:31 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0xd, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:31 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0xc00, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:31 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x7, 0x3, 0xe, 0x0, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
[ 348.396245][T22706] FAULT_INJECTION: forcing a failure.
[ 348.396245][T22706] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 348.398408][T22707] FAULT_INJECTION: forcing a failure.
[ 348.398408][T22707] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 348.409362][T22706] CPU: 1 PID: 22706 Comm: syz-executor.1 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 348.431778][T22706] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 348.441823][T22706] Call Trace:
[ 348.445098][T22706]
[ 348.448021][T22706] dump_stack_lvl+0xd6/0x122
[ 348.452692][T22706] dump_stack+0x11/0x12
[ 348.456849][T22706] should_fail+0x230/0x240
[ 348.461296][T22706] should_fail_usercopy+0x16/0x20
[ 348.466311][T22706] _copy_from_user+0x1a/0xc0
[ 348.470891][T22706] do_recvmmsg+0x27e/0xa20
[ 348.475301][T22706] __x64_sys_recvmmsg+0xde/0x160
[ 348.480226][T22706] do_syscall_64+0x2b/0x70
[ 348.484725][T22706] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 348.490616][T22706] RIP: 0033:0x7f2c4d882049
[ 348.495012][T22706] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 348.514640][T22706] RSP: 002b:00007f2c4cfd7168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 348.523110][T22706] RAX: ffffffffffffffda RBX: 00007f2c4d995030 RCX: 00007f2c4d882049
[ 348.531143][T22706] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003
[ 348.539191][T22706] RBP: 00007f2c4cfd71d0 R08: 0000000000000000 R09: 0000000000000000
[ 348.547185][T22706] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000001
[ 348.555140][T22706] R13: 00007fffa9548b0f R14: 00007f2c4cfd7300 R15: 0000000000022000
[ 348.563097][T22706]
[ 348.566159][T22707] CPU: 0 PID: 22707 Comm: syz-executor.0 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 348.575447][T22707] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 348.585590][T22707] Call Trace:
[ 348.588860][T22707]
[ 348.591783][T22707] dump_stack_lvl+0xd6/0x122
[ 348.596378][T22707] dump_stack+0x11/0x12
[ 348.600616][T22707] should_fail+0x230/0x240
[ 348.605084][T22707] should_fail_usercopy+0x16/0x20
[ 348.610178][T22707] _copy_from_user+0x1a/0xc0
[ 348.614800][T22707] do_recvmmsg+0x27e/0xa20
[ 348.619224][T22707] __x64_sys_recvmmsg+0xde/0x160
[ 348.624157][T22707] do_syscall_64+0x2b/0x70
[ 348.628561][T22707] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 348.634434][T22707] RIP: 0033:0x7fa271cfb049
[ 348.638932][T22707] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 348.658613][T22707] RSP: 002b:00007fa271450168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 348.667005][T22707] RAX: ffffffffffffffda RBX: 00007fa271e0e030 RCX: 00007fa271cfb049
[ 348.674978][T22707] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003
[ 348.682930][T22707] RBP: 00007fa2714501d0 R08: 0000000000000000 R09: 0000000000000000
[ 348.690889][T22707] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 348.698843][T22707] R13: 00007ffcd670d85f R14: 00007fa271450300 R15: 0000000000022000
[ 348.706876][T22707]
03:37:32 executing program 5:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x20000004})
ppoll(&(0x7f0000000000)=[{r0, 0x0, 0xb00}, {r2, 0x4b57, 0x64}], 0x2, 0x0, 0x0, 0x1473bf3)
openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0)
03:37:32 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0xd00, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:32 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x8, 0x3, 0xe, 0x0, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:32 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0xe, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:32 executing program 0:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x0, 0x0) (fail_nth: 13)
03:37:32 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x10, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:32 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0xe00, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:32 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x9, 0x3, 0xe, 0x0, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:32 executing program 1:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) (fail_nth: 10)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x20000004})
ppoll(&(0x7f0000000000)=[{r2, 0x4b57, 0x64}], 0x1, 0x0, 0x0, 0x0)
03:37:32 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0xa, 0x3, 0xe, 0x0, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:32 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x11, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:32 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x1100, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
[ 349.248494][T22735] FAULT_INJECTION: forcing a failure.
[ 349.248494][T22735] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 349.261593][T22735] CPU: 1 PID: 22735 Comm: syz-executor.1 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 349.270893][T22735] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 349.280944][T22735] Call Trace:
[ 349.284259][T22735]
[ 349.287186][T22735] dump_stack_lvl+0xd6/0x122
[ 349.291839][T22735] dump_stack+0x11/0x12
[ 349.295976][T22735] should_fail+0x230/0x240
[ 349.300377][T22735] should_fail_usercopy+0x16/0x20
[ 349.305397][T22735] _copy_from_user+0x1a/0xc0
[ 349.310005][T22735] do_recvmmsg+0x27e/0xa20
[ 349.314450][T22735] __x64_sys_recvmmsg+0xde/0x160
[ 349.319369][T22735] do_syscall_64+0x2b/0x70
[ 349.323767][T22735] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 349.329720][T22735] RIP: 0033:0x7f2c4d882049
[ 349.334111][T22735] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 349.353711][T22735] RSP: 002b:00007f2c4cfd7168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 349.362179][T22735] RAX: ffffffffffffffda RBX: 00007f2c4d995030 RCX: 00007f2c4d882049
[ 349.370281][T22735] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003
[ 349.378244][T22735] RBP: 00007f2c4cfd71d0 R08: 0000000000000000 R09: 0000000000000000
[ 349.386193][T22735] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000002
[ 349.394140][T22735] R13: 00007fffa9548b0f R14: 00007f2c4cfd7300 R15: 0000000000022000
[ 349.402170][T22735]
[ 349.407583][T22736] FAULT_INJECTION: forcing a failure.
[ 349.407583][T22736] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 349.420659][T22736] CPU: 1 PID: 22736 Comm: syz-executor.0 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 349.429941][T22736] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 349.439978][T22736] Call Trace:
[ 349.443236][T22736]
[ 349.446146][T22736] dump_stack_lvl+0xd6/0x122
[ 349.450729][T22736] dump_stack+0x11/0x12
[ 349.454882][T22736] should_fail+0x230/0x240
[ 349.459366][T22736] should_fail_usercopy+0x16/0x20
[ 349.464393][T22736] _copy_from_user+0x1a/0xc0
[ 349.468964][T22736] do_recvmmsg+0x27e/0xa20
[ 349.473440][T22736] __x64_sys_recvmmsg+0xde/0x160
[ 349.478501][T22736] do_syscall_64+0x2b/0x70
[ 349.482972][T22736] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 349.488855][T22736] RIP: 0033:0x7fa271cfb049
[ 349.493381][T22736] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 349.512975][T22736] RSP: 002b:00007fa271450168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 349.521365][T22736] RAX: ffffffffffffffda RBX: 00007fa271e0e030 RCX: 00007fa271cfb049
[ 349.529396][T22736] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003
[ 349.537357][T22736] RBP: 00007fa2714501d0 R08: 0000000000000000 R09: 0000000000000000
[ 349.545310][T22736] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 349.553263][T22736] R13: 00007ffcd670d85f R14: 00007fa271450300 R15: 0000000000022000
[ 349.561233][T22736]
03:37:33 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0xb, 0x3, 0xe, 0x0, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:33 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x12, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:33 executing program 5:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x20000004})
ppoll(&(0x7f0000000000)=[{r0, 0x0, 0xb00}, {r2, 0x4b57, 0x64}], 0x2, 0x0, 0x0, 0x1473bf3)
openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0)
03:37:33 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x1200, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:33 executing program 0:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x0, 0x0) (fail_nth: 14)
03:37:33 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0xc, 0x3, 0xe, 0x0, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:33 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x1800, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:33 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x18, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:33 executing program 1:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) (fail_nth: 11)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x20000004})
ppoll(&(0x7f0000000000)=[{r2, 0x4b57, 0x64}], 0x1, 0x0, 0x0, 0x0)
03:37:33 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x24, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:33 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x2000, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:33 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0xd, 0x3, 0xe, 0x0, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:33 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x300, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:33 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0xe, 0x3, 0xe, 0x0, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
[ 350.116195][T22768] FAULT_INJECTION: forcing a failure.
[ 350.116195][T22768] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 350.129299][T22768] CPU: 1 PID: 22768 Comm: syz-executor.1 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 350.138587][T22768] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 350.148751][T22768] Call Trace:
[ 350.152026][T22768]
[ 350.154955][T22768] dump_stack_lvl+0xd6/0x122
[ 350.159556][T22768] dump_stack+0x11/0x12
[ 350.163708][T22768] should_fail+0x230/0x240
[ 350.168129][T22768] should_fail_usercopy+0x16/0x20
[ 350.171479][T22769] FAULT_INJECTION: forcing a failure.
[ 350.171479][T22769] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 350.173213][T22768] _copy_from_user+0x1a/0xc0
[ 350.173239][T22768] do_recvmmsg+0x27e/0xa20
[ 350.195249][T22768] __x64_sys_recvmmsg+0xde/0x160
[ 350.200221][T22768] do_syscall_64+0x2b/0x70
[ 350.204652][T22768] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 350.210585][T22768] RIP: 0033:0x7f2c4d882049
[ 350.214982][T22768] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 350.234584][T22768] RSP: 002b:00007f2c4cfd7168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 350.242981][T22768] RAX: ffffffffffffffda RBX: 00007f2c4d995030 RCX: 00007f2c4d882049
[ 350.250936][T22768] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003
[ 350.258890][T22768] RBP: 00007f2c4cfd71d0 R08: 0000000000000000 R09: 0000000000000000
[ 350.266868][T22768] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000002
[ 350.274907][T22768] R13: 00007fffa9548b0f R14: 00007f2c4cfd7300 R15: 0000000000022000
[ 350.282864][T22768]
[ 350.285867][T22769] CPU: 0 PID: 22769 Comm: syz-executor.0 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 350.295168][T22769] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 350.305214][T22769] Call Trace:
[ 350.308482][T22769]
[ 350.311393][T22769] dump_stack_lvl+0xd6/0x122
[ 350.315988][T22769] dump_stack+0x11/0x12
[ 350.320138][T22769] should_fail+0x230/0x240
[ 350.324618][T22769] should_fail_usercopy+0x16/0x20
[ 350.329652][T22769] _copy_from_user+0x1a/0xc0
[ 350.334242][T22769] do_recvmmsg+0x27e/0xa20
[ 350.338698][T22769] __x64_sys_recvmmsg+0xde/0x160
[ 350.343616][T22769] do_syscall_64+0x2b/0x70
[ 350.348088][T22769] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 350.354032][T22769] RIP: 0033:0x7fa271cfb049
[ 350.358505][T22769] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 350.378087][T22769] RSP: 002b:00007fa271450168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 350.386536][T22769] RAX: ffffffffffffffda RBX: 00007fa271e0e030 RCX: 00007fa271cfb049
[ 350.394486][T22769] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003
[ 350.402434][T22769] RBP: 00007fa2714501d0 R08: 0000000000000000 R09: 0000000000000000
[ 350.410395][T22769] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 350.418451][T22769] R13: 00007ffcd670d85f R14: 00007fa271450300 R15: 0000000000022000
[ 350.426399][T22769]
03:37:33 executing program 5:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x20000004})
ppoll(&(0x7f0000000000)=[{r0, 0x0, 0xb00}, {r2, 0x4b57, 0x64}], 0x2, 0x0, 0x0, 0x1473bf3)
openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0)
03:37:33 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x2400, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:34 executing program 0:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x0, 0x0) (fail_nth: 15)
03:37:34 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x10, 0x3, 0xe, 0x0, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:34 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:34 executing program 1:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) (fail_nth: 12)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x20000004})
ppoll(&(0x7f0000000000)=[{r2, 0x4b57, 0x64}], 0x1, 0x0, 0x0, 0x0)
03:37:34 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x500, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:34 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x2, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:34 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x600, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:34 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x11, 0x3, 0xe, 0x0, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:34 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x3, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:34 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x700, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
[ 350.984206][T22798] FAULT_INJECTION: forcing a failure.
[ 350.984206][T22798] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 350.990635][T22799] FAULT_INJECTION: forcing a failure.
[ 350.990635][T22799] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 350.997456][T22798] CPU: 1 PID: 22798 Comm: syz-executor.1 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 351.019662][T22798] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 351.029705][T22798] Call Trace:
[ 351.032995][T22798]
[ 351.035911][T22798] dump_stack_lvl+0xd6/0x122
[ 351.040549][T22798] dump_stack+0x11/0x12
[ 351.044756][T22798] should_fail+0x230/0x240
[ 351.049160][T22798] should_fail_usercopy+0x16/0x20
[ 351.054176][T22798] _copy_from_user+0x1a/0xc0
[ 351.058875][T22798] do_recvmmsg+0x27e/0xa20
[ 351.063364][T22798] __x64_sys_recvmmsg+0xde/0x160
[ 351.068332][T22798] do_syscall_64+0x2b/0x70
[ 351.072735][T22798] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 351.078616][T22798] RIP: 0033:0x7f2c4d882049
[ 351.083054][T22798] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 351.102678][T22798] RSP: 002b:00007f2c4cfd7168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 351.111073][T22798] RAX: ffffffffffffffda RBX: 00007f2c4d995030 RCX: 00007f2c4d882049
[ 351.119025][T22798] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003
[ 351.126979][T22798] RBP: 00007f2c4cfd71d0 R08: 0000000000000000 R09: 0000000000000000
[ 351.134933][T22798] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000002
[ 351.142937][T22798] R13: 00007fffa9548b0f R14: 00007f2c4cfd7300 R15: 0000000000022000
[ 351.150938][T22798]
[ 351.154018][T22799] CPU: 0 PID: 22799 Comm: syz-executor.0 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 351.163333][T22799] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 351.173376][T22799] Call Trace:
[ 351.176645][T22799]
[ 351.179664][T22799] dump_stack_lvl+0xd6/0x122
[ 351.184335][T22799] dump_stack+0x11/0x12
[ 351.188510][T22799] should_fail+0x230/0x240
[ 351.192965][T22799] should_fail_usercopy+0x16/0x20
[ 351.197993][T22799] _copy_from_user+0x1a/0xc0
[ 351.202589][T22799] do_recvmmsg+0x27e/0xa20
[ 351.207013][T22799] __x64_sys_recvmmsg+0xde/0x160
[ 351.211958][T22799] do_syscall_64+0x2b/0x70
[ 351.216397][T22799] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 351.222297][T22799] RIP: 0033:0x7fa271cfb049
[ 351.226706][T22799] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 351.246310][T22799] RSP: 002b:00007fa271450168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 351.254721][T22799] RAX: ffffffffffffffda RBX: 00007fa271e0e030 RCX: 00007fa271cfb049
[ 351.262688][T22799] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003
[ 351.270636][T22799] RBP: 00007fa2714501d0 R08: 0000000000000000 R09: 0000000000000000
[ 351.278583][T22799] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 351.286528][T22799] R13: 00007ffcd670d85f R14: 00007fa271450300 R15: 0000000000022000
[ 351.294486][T22799]
03:37:34 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x900, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:34 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x4, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:35 executing program 0:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x0, 0x0) (fail_nth: 16)
03:37:35 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x12, 0x3, 0xe, 0x0, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:35 executing program 5:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x20000004})
ppoll(&(0x7f0000000000)=[{r0, 0x0, 0xb00}, {r2, 0x4b57, 0x64}], 0x2, 0x0, 0x0, 0x1473bf3) (fail_nth: 1)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0)
03:37:35 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0xa00, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:35 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x5, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:35 executing program 1:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) (fail_nth: 13)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x20000004})
ppoll(&(0x7f0000000000)=[{r2, 0x4b57, 0x64}], 0x1, 0x0, 0x0, 0x0)
03:37:35 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0xb00, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:35 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x18, 0x3, 0xe, 0x0, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:35 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x6, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:35 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x24, 0x3, 0xe, 0x0, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:35 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x7, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:35 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0xc00, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
[ 351.827271][T22829] FAULT_INJECTION: forcing a failure.
[ 351.827271][T22829] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 351.840366][T22829] CPU: 0 PID: 22829 Comm: syz-executor.0 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 351.849635][T22829] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 351.859709][T22829] Call Trace:
[ 351.862987][T22829]
[ 351.866044][T22829] dump_stack_lvl+0xd6/0x122
[ 351.870706][T22829] dump_stack+0x11/0x12
[ 351.874868][T22829] should_fail+0x230/0x240
[ 351.879324][T22829] should_fail_usercopy+0x16/0x20
[ 351.884384][T22829] _copy_from_user+0x1a/0xc0
[ 351.888978][T22829] do_recvmmsg+0x27e/0xa20
[ 351.893446][T22829] __x64_sys_recvmmsg+0xde/0x160
[ 351.898463][T22829] do_syscall_64+0x2b/0x70
[ 351.902889][T22829] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 351.908785][T22829] RIP: 0033:0x7fa271cfb049
[ 351.909486][T22832] FAULT_INJECTION: forcing a failure.
[ 351.909486][T22832] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 351.913225][T22829] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 351.913299][T22829] RSP: 002b:00007fa271450168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 351.954290][T22829] RAX: ffffffffffffffda RBX: 00007fa271e0e030 RCX: 00007fa271cfb049
[ 351.962247][T22829] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003
[ 351.970395][T22829] RBP: 00007fa2714501d0 R08: 0000000000000000 R09: 0000000000000000
[ 351.978350][T22829] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 351.986303][T22829] R13: 00007ffcd670d85f R14: 00007fa271450300 R15: 0000000000022000
[ 351.994263][T22829]
[ 351.997263][T22832] CPU: 1 PID: 22832 Comm: syz-executor.5 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 351.998037][T22831] FAULT_INJECTION: forcing a failure.
[ 351.998037][T22831] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 352.006544][T22832] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 352.006557][T22832] Call Trace:
[ 352.006564][T22832]
[ 352.006570][T22832] dump_stack_lvl+0xd6/0x122
[ 352.040320][T22832] dump_stack+0x11/0x12
[ 352.044466][T22832] should_fail+0x230/0x240
[ 352.048871][T22832] should_fail_usercopy+0x16/0x20
[ 352.053940][T22832] _copy_from_user+0x1a/0xc0
[ 352.058515][T22832] do_sys_poll+0x1ac/0xca0
[ 352.062959][T22832] ? rmqueue_pcplist+0x157/0x1e0
[ 352.067884][T22832] ? selinux_file_open+0x34a/0x3a0
[ 352.072990][T22832] ? __rcu_read_unlock+0x4a/0x70
[ 352.077931][T22832] ? set_user_sigmask+0x7a/0x120
[ 352.082858][T22832] __se_sys_ppoll+0x195/0x1d0
[ 352.087532][T22832] __x64_sys_ppoll+0x63/0x70
[ 352.092208][T22832] do_syscall_64+0x2b/0x70
[ 352.096636][T22832] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 352.102517][T22832] RIP: 0033:0x7f8dfdc79049
[ 352.106965][T22832] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 352.126584][T22832] RSP: 002b:00007f8dfd3ad168 EFLAGS: 00000246 ORIG_RAX: 000000000000010f
[ 352.134979][T22832] RAX: ffffffffffffffda RBX: 00007f8dfdd8c100 RCX: 00007f8dfdc79049
[ 352.142933][T22832] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000020000000
[ 352.150886][T22832] RBP: 00007f8dfd3ad1d0 R08: 0000000001473bf3 R09: 0000000000000000
[ 352.158861][T22832] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 352.166817][T22832] R13: 00007ffd97e2a39f R14: 00007f8dfd3ad300 R15: 0000000000022000
[ 352.174791][T22832]
[ 352.177792][T22831] CPU: 0 PID: 22831 Comm: syz-executor.1 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 352.187149][T22831] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 352.197198][T22831] Call Trace:
[ 352.200466][T22831]
[ 352.203388][T22831] dump_stack_lvl+0xd6/0x122
[ 352.208094][T22831] dump_stack+0x11/0x12
[ 352.212248][T22831] should_fail+0x230/0x240
[ 352.216681][T22831] should_fail_usercopy+0x16/0x20
[ 352.221732][T22831] _copy_from_user+0x1a/0xc0
[ 352.226340][T22831] do_recvmmsg+0x27e/0xa20
[ 352.230757][T22831] __x64_sys_recvmmsg+0xde/0x160
[ 352.235709][T22831] do_syscall_64+0x2b/0x70
[ 352.240134][T22831] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 352.246086][T22831] RIP: 0033:0x7f2c4d882049
[ 352.250492][T22831] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 352.270089][T22831] RSP: 002b:00007f2c4cfd7168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 352.278571][T22831] RAX: ffffffffffffffda RBX: 00007f2c4d995030 RCX: 00007f2c4d882049
[ 352.286546][T22831] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003
[ 352.294549][T22831] RBP: 00007f2c4cfd71d0 R08: 0000000000000000 R09: 0000000000000000
[ 352.302510][T22831] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000002
[ 352.310480][T22831] R13: 00007fffa9548b0f R14: 00007f2c4cfd7300 R15: 0000000000022000
[ 352.318529][T22831]
03:37:36 executing program 0:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x0, 0x0) (fail_nth: 17)
03:37:36 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x2, 0xe, 0x0, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:36 executing program 5:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x20000004})
ppoll(&(0x7f0000000000)=[{r0, 0x0, 0xb00}, {r2, 0x4b57, 0x64}], 0x2, 0x0, 0x0, 0x1473bf3) (fail_nth: 2)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0)
03:37:36 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x8, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:36 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0xd00, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:36 executing program 1:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) (fail_nth: 14)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x20000004})
ppoll(&(0x7f0000000000)=[{r2, 0x4b57, 0x64}], 0x1, 0x0, 0x0, 0x0)
03:37:36 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x9, 0xe, 0x0, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:36 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x9, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:36 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0xe00, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:36 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0xd, 0xe, 0x0, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:36 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x1100, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:36 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
[ 352.677833][T22859] FAULT_INJECTION: forcing a failure.
[ 352.677833][T22859] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 352.690947][T22859] CPU: 1 PID: 22859 Comm: syz-executor.0 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 352.700230][T22859] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 352.710291][T22859] Call Trace:
[ 352.713564][T22859]
[ 352.716495][T22859] dump_stack_lvl+0xd6/0x122
[ 352.721088][T22859] dump_stack+0x11/0x12
[ 352.725243][T22859] should_fail+0x230/0x240
[ 352.729673][T22859] should_fail_usercopy+0x16/0x20
[ 352.734702][T22859] _copy_from_user+0x1a/0xc0
[ 352.739293][T22859] do_recvmmsg+0x27e/0xa20
[ 352.743714][T22859] __x64_sys_recvmmsg+0xde/0x160
[ 352.748658][T22859] do_syscall_64+0x2b/0x70
[ 352.753133][T22859] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 352.759114][T22859] RIP: 0033:0x7fa271cfb049
[ 352.763618][T22859] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 352.783221][T22859] RSP: 002b:00007fa271450168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 352.791701][T22859] RAX: ffffffffffffffda RBX: 00007fa271e0e030 RCX: 00007fa271cfb049
[ 352.799676][T22859] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003
[ 352.807713][T22859] RBP: 00007fa2714501d0 R08: 0000000000000000 R09: 0000000000000000
[ 352.815737][T22859] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 352.823826][T22859] R13: 00007ffcd670d85f R14: 00007fa271450300 R15: 0000000000022000
[ 352.831866][T22859]
[ 352.835917][T22862] FAULT_INJECTION: forcing a failure.
[ 352.835917][T22862] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 352.849014][T22862] CPU: 0 PID: 22862 Comm: syz-executor.1 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 352.858378][T22862] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 352.868426][T22862] Call Trace:
[ 352.871694][T22862]
[ 352.874655][T22862] dump_stack_lvl+0xd6/0x122
[ 352.879307][T22862] dump_stack+0x11/0x12
[ 352.883530][T22862] should_fail+0x230/0x240
[ 352.887946][T22862] should_fail_usercopy+0x16/0x20
[ 352.892989][T22862] _copy_from_user+0x1a/0xc0
[ 352.897584][T22862] do_recvmmsg+0x27e/0xa20
[ 352.902005][T22862] __x64_sys_recvmmsg+0xde/0x160
[ 352.906941][T22862] do_syscall_64+0x2b/0x70
[ 352.911359][T22862] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 352.917249][T22862] RIP: 0033:0x7f2c4d882049
[ 352.921689][T22862] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 352.941402][T22862] RSP: 002b:00007f2c4cfd7168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 352.949834][T22862] RAX: ffffffffffffffda RBX: 00007f2c4d995030 RCX: 00007f2c4d882049
[ 352.957823][T22862] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003
[ 352.965862][T22862] RBP: 00007f2c4cfd71d0 R08: 0000000000000000 R09: 0000000000000000
[ 352.973835][T22862] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000002
[ 352.981821][T22862] R13: 00007fffa9548b0f R14: 00007f2c4cfd7300 R15: 0000000000022000
[ 352.989833][T22862]
03:37:36 executing program 0:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x0, 0x0) (fail_nth: 18)
03:37:36 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0xa, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
[ 353.493950][T22861] FAULT_INJECTION: forcing a failure.
[ 353.493950][T22861] name failslab, interval 1, probability 0, space 0, times 0
[ 353.506629][T22861] CPU: 1 PID: 22861 Comm: syz-executor.5 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 353.515915][T22861] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 353.525948][T22861] Call Trace:
[ 353.529203][T22861]
[ 353.532116][T22861] dump_stack_lvl+0xd6/0x122
[ 353.536726][T22861] dump_stack+0x11/0x12
[ 353.540860][T22861] should_fail+0x230/0x240
[ 353.545319][T22861] __should_failslab+0x81/0x90
[ 353.550137][T22861] ? kobject_uevent_env+0x19c/0x580
[ 353.555384][T22861] should_failslab+0x5/0x20
[ 353.559864][T22861] kmem_cache_alloc_trace+0x4d/0x320
[ 353.565147][T22861] ? up_write+0xb5/0xc0
[ 353.569285][T22861] kobject_uevent_env+0x19c/0x580
[ 353.574380][T22861] ? sysfs_remove_group+0x18e/0x1a0
[ 353.579572][T22861] kobject_uevent+0x18/0x20
[ 353.584060][T22861] device_del+0x82e/0x8c0
[ 353.588439][T22861] ? try_to_del_timer_sync+0x1e2/0x2a0
[ 353.593905][T22861] ? ep_eventpoll_poll+0x20/0x20
[ 353.598871][T22861] device_unregister+0x11/0x30
[ 353.603631][T22861] wakeup_source_sysfs_remove+0x21/0x30
[ 353.609153][T22861] wakeup_source_unregister+0xea/0x110
[ 353.614590][T22861] ep_free+0x1f8/0x210
[ 353.618641][T22861] ? ep_eventpoll_poll+0x20/0x20
[ 353.623563][T22861] ep_eventpoll_release+0x2e/0x40
[ 353.628628][T22861] __fput+0x292/0x510
[ 353.632587][T22861] ____fput+0x11/0x20
[ 353.636551][T22861] task_work_run+0x8e/0x110
[ 353.641036][T22861] get_signal+0xeca/0x1020
[ 353.645499][T22861] ? poll_select_finish+0x163/0x3e0
[ 353.650780][T22861] arch_do_signal_or_restart+0x87/0x2d0
[ 353.656353][T22861] exit_to_user_mode_loop+0x78/0x130
[ 353.661623][T22861] syscall_exit_to_user_mode+0x6a/0x90
[ 353.667068][T22861] do_syscall_64+0x37/0x70
[ 353.671496][T22861] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 353.677369][T22861] RIP: 0033:0x7f8dfdc79049
[ 353.681763][T22861] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 353.701375][T22861] RSP: 002b:00007f8dfd3ad168 EFLAGS: 00000246 ORIG_RAX: 000000000000010f
[ 353.709844][T22861] RAX: 0000000000000002 RBX: 00007f8dfdd8c100 RCX: 00007f8dfdc79049
[ 353.717793][T22861] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000020000000
[ 353.725771][T22861] RBP: 00007f8dfd3ad1d0 R08: 0000000001473bf3 R09: 0000000000000000
[ 353.733771][T22861] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
03:37:37 executing program 5:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x20000004})
ppoll(&(0x7f0000000000)=[{r0, 0x0, 0xb00}, {r2, 0x4b57, 0x64}], 0x2, 0x0, 0x0, 0x1473bf3)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0)
03:37:37 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x1200, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:37 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x2, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:37 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0xb, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:37 executing program 1:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) (fail_nth: 15)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x20000004})
ppoll(&(0x7f0000000000)=[{r2, 0x4b57, 0x64}], 0x1, 0x0, 0x0, 0x0)
[ 353.741719][T22861] R13: 00007ffd97e2a39f R14: 00007f8dfd3ad300 R15: 0000000000022000
[ 353.749668][T22861]
[ 353.754679][T22869] FAULT_INJECTION: forcing a failure.
[ 353.754679][T22869] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 353.767791][T22869] CPU: 0 PID: 22869 Comm: syz-executor.0 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 353.777074][T22869] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 353.787148][T22869] Call Trace:
[ 353.790425][T22869]
[ 353.793343][T22869] dump_stack_lvl+0xd6/0x122
[ 353.797970][T22869] dump_stack+0x11/0x12
[ 353.802114][T22869] should_fail+0x230/0x240
[ 353.806623][T22869] should_fail_usercopy+0x16/0x20
[ 353.811709][T22869] _copy_from_user+0x1a/0xc0
[ 353.816281][T22869] do_recvmmsg+0x27e/0xa20
[ 353.820687][T22869] __x64_sys_recvmmsg+0xde/0x160
[ 353.825603][T22869] do_syscall_64+0x2b/0x70
[ 353.830028][T22869] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 353.836018][T22869] RIP: 0033:0x7fa271cfb049
[ 353.840501][T22869] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 353.860155][T22869] RSP: 002b:00007fa271450168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 353.868574][T22869] RAX: ffffffffffffffda RBX: 00007fa271e0e030 RCX: 00007fa271cfb049
[ 353.876548][T22869] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003
[ 353.884513][T22869] RBP: 00007fa2714501d0 R08: 0000000000000000 R09: 0000000000000000
03:37:37 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0xc, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
[ 353.892480][T22869] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 353.900447][T22869] R13: 00007ffcd670d85f R14: 00007fa271450300 R15: 0000000000022000
[ 353.908424][T22869]
[ 353.912259][T22881] FAULT_INJECTION: forcing a failure.
[ 353.912259][T22881] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 353.925322][T22881] CPU: 0 PID: 22881 Comm: syz-executor.1 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 353.934669][T22881] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 353.944714][T22881] Call Trace:
[ 353.947996][T22881]
[ 353.950920][T22881] dump_stack_lvl+0xd6/0x122
[ 353.955559][T22881] dump_stack+0x11/0x12
[ 353.959715][T22881] should_fail+0x230/0x240
[ 353.964228][T22881] should_fail_usercopy+0x16/0x20
[ 353.969361][T22881] _copy_from_user+0x1a/0xc0
[ 353.973954][T22881] do_recvmmsg+0x27e/0xa20
[ 353.978376][T22881] __x64_sys_recvmmsg+0xde/0x160
[ 353.983404][T22881] do_syscall_64+0x2b/0x70
[ 353.987826][T22881] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 353.993774][T22881] RIP: 0033:0x7f2c4d882049
[ 353.998193][T22881] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 354.017805][T22881] RSP: 002b:00007f2c4cfd7168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 354.026245][T22881] RAX: ffffffffffffffda RBX: 00007f2c4d995030 RCX: 00007f2c4d882049
[ 354.034221][T22881] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003
03:37:37 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x3, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:37 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0xd, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:37 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x1800, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
[ 354.042186][T22881] RBP: 00007f2c4cfd71d0 R08: 0000000000000000 R09: 0000000000000000
[ 354.050147][T22881] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000002
[ 354.058109][T22881] R13: 00007fffa9548b0f R14: 00007f2c4cfd7300 R15: 0000000000022000
[ 354.066110][T22881]
03:37:37 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0xe, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:37 executing program 0:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x0, 0x0) (fail_nth: 19)
03:37:37 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x4, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
[ 354.369438][T22899] FAULT_INJECTION: forcing a failure.
[ 354.369438][T22899] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 354.382483][T22899] CPU: 1 PID: 22899 Comm: syz-executor.0 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 354.391781][T22899] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 354.401811][T22899] Call Trace:
[ 354.405068][T22899]
[ 354.408074][T22899] dump_stack_lvl+0xd6/0x122
[ 354.412722][T22899] dump_stack+0x11/0x12
[ 354.416910][T22899] should_fail+0x230/0x240
[ 354.421307][T22899] should_fail_usercopy+0x16/0x20
[ 354.426310][T22899] _copy_from_user+0x1a/0xc0
[ 354.430883][T22899] do_recvmmsg+0x27e/0xa20
[ 354.435398][T22899] __x64_sys_recvmmsg+0xde/0x160
[ 354.440326][T22899] do_syscall_64+0x2b/0x70
[ 354.444743][T22899] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 354.450685][T22899] RIP: 0033:0x7fa271cfb049
[ 354.455086][T22899] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 354.474723][T22899] RSP: 002b:00007fa271450168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 354.483111][T22899] RAX: ffffffffffffffda RBX: 00007fa271e0e030 RCX: 00007fa271cfb049
[ 354.491068][T22899] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003
[ 354.499028][T22899] RBP: 00007fa2714501d0 R08: 0000000000000000 R09: 0000000000000000
[ 354.506989][T22899] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 354.514962][T22899] R13: 00007ffcd670d85f R14: 00007fa271450300 R15: 0000000000022000
[ 354.522944][T22899]
03:37:38 executing program 5:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x20000004})
ppoll(&(0x7f0000000000)=[{r0, 0x0, 0xb00}, {r2, 0x4b57, 0x64}], 0x2, 0x0, 0x0, 0x1473bf3)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0)
03:37:38 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x2000, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:38 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x5, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:38 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:38 executing program 1:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) (fail_nth: 16)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x20000004})
ppoll(&(0x7f0000000000)=[{r2, 0x4b57, 0x64}], 0x1, 0x0, 0x0, 0x0)
03:37:38 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x11, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:38 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x6, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:38 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x2400, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:38 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x12, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:38 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x7, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
[ 354.702250][T22920] FAULT_INJECTION: forcing a failure.
[ 354.702250][T22920] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 354.715310][T22920] CPU: 0 PID: 22920 Comm: syz-executor.1 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 354.724579][T22920] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 354.734634][T22920] Call Trace:
[ 354.737907][T22920]
[ 354.740873][T22920] dump_stack_lvl+0xd6/0x122
[ 354.745468][T22920] dump_stack+0x11/0x12
[ 354.749629][T22920] should_fail+0x230/0x240
[ 354.754050][T22920] should_fail_usercopy+0x16/0x20
[ 354.759073][T22920] _copy_from_user+0x1a/0xc0
[ 354.763668][T22920] do_recvmmsg+0x27e/0xa20
[ 354.768088][T22920] __x64_sys_recvmmsg+0xde/0x160
[ 354.773033][T22920] do_syscall_64+0x2b/0x70
[ 354.777527][T22920] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 354.783520][T22920] RIP: 0033:0x7f2c4d882049
[ 354.788020][T22920] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 354.807630][T22920] RSP: 002b:00007f2c4cfd7168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 354.816049][T22920] RAX: ffffffffffffffda RBX: 00007f2c4d995030 RCX: 00007f2c4d882049
[ 354.824016][T22920] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003
[ 354.832102][T22920] RBP: 00007f2c4cfd71d0 R08: 0000000000000000 R09: 0000000000000000
[ 354.840097][T22920] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000002
[ 354.848068][T22920] R13: 00007fffa9548b0f R14: 00007f2c4cfd7300 R15: 0000000000022000
[ 354.856089][T22920]
03:37:38 executing program 0:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x0, 0x0) (fail_nth: 20)
03:37:38 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x34000, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
[ 355.219427][T22930] FAULT_INJECTION: forcing a failure.
[ 355.219427][T22930] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 355.232504][T22930] CPU: 0 PID: 22930 Comm: syz-executor.0 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 355.241765][T22930] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 355.251800][T22930] Call Trace:
[ 355.255059][T22930]
[ 355.257972][T22930] dump_stack_lvl+0xd6/0x122
[ 355.262567][T22930] dump_stack+0x11/0x12
[ 355.266746][T22930] should_fail+0x230/0x240
[ 355.271160][T22930] should_fail_usercopy+0x16/0x20
[ 355.276206][T22930] _copy_from_user+0x1a/0xc0
[ 355.280775][T22930] do_recvmmsg+0x27e/0xa20
[ 355.285266][T22930] __x64_sys_recvmmsg+0xde/0x160
[ 355.290204][T22930] do_syscall_64+0x2b/0x70
[ 355.294631][T22930] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 355.300568][T22930] RIP: 0033:0x7fa271cfb049
[ 355.305032][T22930] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 355.324761][T22930] RSP: 002b:00007fa271450168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 355.333155][T22930] RAX: ffffffffffffffda RBX: 00007fa271e0e030 RCX: 00007fa271cfb049
[ 355.341141][T22930] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003
[ 355.349105][T22930] RBP: 00007fa2714501d0 R08: 0000000000000000 R09: 0000000000000000
[ 355.357055][T22930] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 355.365002][T22930] R13: 00007ffcd670d85f R14: 00007fa271450300 R15: 0000000000022000
[ 355.372967][T22930]
03:37:38 executing program 5:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x20000004})
ppoll(&(0x7f0000000000)=[{r0, 0x3, 0xb00}, {r2, 0x4b57, 0x64}], 0x2, 0x0, 0x0, 0x1473bf3)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0)
03:37:38 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x18, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:38 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x8, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:38 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x400300, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:38 executing program 1:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) (fail_nth: 17)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x20000004})
ppoll(&(0x7f0000000000)=[{r2, 0x4b57, 0x64}], 0x1, 0x0, 0x0, 0x0)
03:37:38 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x9, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:39 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x24, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:39 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x1000000, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:39 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0xa, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:39 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x2000000, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
[ 355.560222][T22951] FAULT_INJECTION: forcing a failure.
[ 355.560222][T22951] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 355.573333][T22951] CPU: 1 PID: 22951 Comm: syz-executor.1 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 355.582669][T22951] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 355.592741][T22951] Call Trace:
[ 355.596021][T22951]
[ 355.598954][T22951] dump_stack_lvl+0xd6/0x122
[ 355.603587][T22951] dump_stack+0x11/0x12
[ 355.607881][T22951] should_fail+0x230/0x240
[ 355.612333][T22951] should_fail_usercopy+0x16/0x20
[ 355.617368][T22951] _copy_from_user+0x1a/0xc0
[ 355.621956][T22951] do_recvmmsg+0x27e/0xa20
[ 355.626388][T22951] __x64_sys_recvmmsg+0xde/0x160
[ 355.631387][T22951] do_syscall_64+0x2b/0x70
[ 355.635869][T22951] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 355.641762][T22951] RIP: 0033:0x7f2c4d882049
[ 355.646173][T22951] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 355.665862][T22951] RSP: 002b:00007f2c4cfd7168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 355.674336][T22951] RAX: ffffffffffffffda RBX: 00007f2c4d995030 RCX: 00007f2c4d882049
[ 355.682422][T22951] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003
[ 355.690391][T22951] RBP: 00007f2c4cfd71d0 R08: 0000000000000000 R09: 0000000000000000
[ 355.698354][T22951] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000002
[ 355.706473][T22951] R13: 00007fffa9548b0f R14: 00007f2c4cfd7300 R15: 0000000000022000
[ 355.714451][T22951]
03:37:39 executing program 0:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x0, 0x0) (fail_nth: 21)
03:37:39 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0xb, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
[ 356.062442][T22961] FAULT_INJECTION: forcing a failure.
[ 356.062442][T22961] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 356.075523][T22961] CPU: 0 PID: 22961 Comm: syz-executor.0 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 356.084800][T22961] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 356.094909][T22961] Call Trace:
[ 356.098168][T22961]
[ 356.101083][T22961] dump_stack_lvl+0xd6/0x122
[ 356.105725][T22961] dump_stack+0x11/0x12
[ 356.109858][T22961] should_fail+0x230/0x240
[ 356.114253][T22961] should_fail_usercopy+0x16/0x20
[ 356.119260][T22961] _copy_from_user+0x1a/0xc0
[ 356.123829][T22961] do_recvmmsg+0x27e/0xa20
[ 356.128252][T22961] __x64_sys_recvmmsg+0xde/0x160
[ 356.133253][T22961] do_syscall_64+0x2b/0x70
[ 356.137675][T22961] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 356.143561][T22961] RIP: 0033:0x7fa271cfb049
[ 356.147958][T22961] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 356.167541][T22961] RSP: 002b:00007fa271450168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 356.175963][T22961] RAX: ffffffffffffffda RBX: 00007fa271e0e030 RCX: 00007fa271cfb049
[ 356.183985][T22961] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003
[ 356.191936][T22961] RBP: 00007fa2714501d0 R08: 0000000000000000 R09: 0000000000000000
[ 356.199919][T22961] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 356.207868][T22961] R13: 00007ffcd670d85f R14: 00007fa271450300 R15: 0000000000022000
[ 356.215818][T22961]
03:37:39 executing program 5:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x20000004})
ppoll(&(0x7f0000000000)=[{r0, 0x8, 0xb00}, {r2, 0x4b57, 0x64}], 0x2, 0x0, 0x0, 0x1473bf3)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0)
03:37:39 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x300, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:39 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x3000000, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:39 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0xc, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:39 executing program 1:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) (fail_nth: 18)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x20000004})
ppoll(&(0x7f0000000000)=[{r2, 0x4b57, 0x64}], 0x1, 0x0, 0x0, 0x0)
03:37:39 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x4000000, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:39 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0xd, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:39 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x500, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:39 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x5000000, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:39 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0xe, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
[ 356.437464][T22983] FAULT_INJECTION: forcing a failure.
[ 356.437464][T22983] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 356.450568][T22983] CPU: 0 PID: 22983 Comm: syz-executor.1 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 356.459872][T22983] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 356.469943][T22983] Call Trace:
[ 356.473219][T22983]
[ 356.476142][T22983] dump_stack_lvl+0xd6/0x122
[ 356.480741][T22983] dump_stack+0x11/0x12
[ 356.484938][T22983] should_fail+0x230/0x240
[ 356.489365][T22983] should_fail_usercopy+0x16/0x20
[ 356.494433][T22983] _copy_from_user+0x1a/0xc0
[ 356.499018][T22983] do_recvmmsg+0x27e/0xa20
[ 356.503439][T22983] __x64_sys_recvmmsg+0xde/0x160
[ 356.508372][T22983] do_syscall_64+0x2b/0x70
[ 356.512787][T22983] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 356.518680][T22983] RIP: 0033:0x7f2c4d882049
[ 356.523095][T22983] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 356.542740][T22983] RSP: 002b:00007f2c4cfd7168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 356.551150][T22983] RAX: ffffffffffffffda RBX: 00007f2c4d995030 RCX: 00007f2c4d882049
[ 356.559116][T22983] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003
[ 356.567089][T22983] RBP: 00007f2c4cfd71d0 R08: 0000000000000000 R09: 0000000000000000
[ 356.575105][T22983] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000002
[ 356.583145][T22983] R13: 00007fffa9548b0f R14: 00007f2c4cfd7300 R15: 0000000000022000
[ 356.591114][T22983]
03:37:40 executing program 0:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x0, 0x0) (fail_nth: 22)
03:37:40 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x600, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
[ 356.909465][T22991] FAULT_INJECTION: forcing a failure.
[ 356.909465][T22991] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 356.922640][T22991] CPU: 1 PID: 22991 Comm: syz-executor.0 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 356.931950][T22991] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 356.941994][T22991] Call Trace:
[ 356.945255][T22991]
[ 356.948168][T22991] dump_stack_lvl+0xd6/0x122
[ 356.952739][T22991] dump_stack+0x11/0x12
[ 356.956909][T22991] should_fail+0x230/0x240
[ 356.961306][T22991] should_fail_usercopy+0x16/0x20
[ 356.966360][T22991] _copy_from_user+0x1a/0xc0
[ 356.970949][T22991] do_recvmmsg+0x27e/0xa20
[ 356.975413][T22991] __x64_sys_recvmmsg+0xde/0x160
[ 356.980331][T22991] do_syscall_64+0x2b/0x70
[ 356.984797][T22991] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 356.990674][T22991] RIP: 0033:0x7fa271cfb049
[ 356.995174][T22991] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 357.014779][T22991] RSP: 002b:00007fa271450168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 357.023238][T22991] RAX: ffffffffffffffda RBX: 00007fa271e0e030 RCX: 00007fa271cfb049
[ 357.031277][T22991] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003
[ 357.039282][T22991] RBP: 00007fa2714501d0 R08: 0000000000000000 R09: 0000000000000000
[ 357.047231][T22991] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 357.055323][T22991] R13: 00007ffcd670d85f R14: 00007fa271450300 R15: 0000000000022000
[ 357.063342][T22991]
03:37:40 executing program 5:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x20000004})
ppoll(&(0x7f0000000000)=[{r0, 0x300, 0xb00}, {r2, 0x4b57, 0x64}], 0x2, 0x0, 0x0, 0x1473bf3)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0)
03:37:40 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x6000000, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:40 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x10, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:40 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x700, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:40 executing program 1:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) (fail_nth: 19)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x20000004})
ppoll(&(0x7f0000000000)=[{r2, 0x4b57, 0x64}], 0x1, 0x0, 0x0, 0x0)
03:37:40 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x7000000, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:40 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x11, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:40 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x900, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:40 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x8000000, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:40 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x12, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:40 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0xa00, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
[ 357.294253][T23014] FAULT_INJECTION: forcing a failure.
[ 357.294253][T23014] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 357.307328][T23014] CPU: 1 PID: 23014 Comm: syz-executor.1 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 357.316650][T23014] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 357.326769][T23014] Call Trace:
[ 357.330095][T23014]
[ 357.333042][T23014] dump_stack_lvl+0xd6/0x122
[ 357.337652][T23014] dump_stack+0x11/0x12
[ 357.341866][T23014] should_fail+0x230/0x240
[ 357.346271][T23014] should_fail_usercopy+0x16/0x20
[ 357.351342][T23014] _copy_from_user+0x1a/0xc0
[ 357.355975][T23014] do_recvmmsg+0x27e/0xa20
[ 357.360446][T23014] __x64_sys_recvmmsg+0xde/0x160
[ 357.365386][T23014] do_syscall_64+0x2b/0x70
[ 357.369863][T23014] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 357.375793][T23014] RIP: 0033:0x7f2c4d882049
[ 357.380189][T23014] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 357.399864][T23014] RSP: 002b:00007f2c4cfd7168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 357.408253][T23014] RAX: ffffffffffffffda RBX: 00007f2c4d995030 RCX: 00007f2c4d882049
[ 357.416206][T23014] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003
[ 357.424182][T23014] RBP: 00007f2c4cfd71d0 R08: 0000000000000000 R09: 0000000000000000
[ 357.432129][T23014] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000002
[ 357.440077][T23014] R13: 00007fffa9548b0f R14: 00007f2c4cfd7300 R15: 0000000000022000
[ 357.448030][T23014]
03:37:41 executing program 0:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x0, 0x0) (fail_nth: 23)
[ 357.753268][T23020] FAULT_INJECTION: forcing a failure.
[ 357.753268][T23020] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 357.766329][T23020] CPU: 1 PID: 23020 Comm: syz-executor.0 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 357.775624][T23020] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 357.785688][T23020] Call Trace:
[ 357.788949][T23020]
[ 357.791887][T23020] dump_stack_lvl+0xd6/0x122
[ 357.796496][T23020] dump_stack+0x11/0x12
[ 357.800708][T23020] should_fail+0x230/0x240
[ 357.805115][T23020] should_fail_usercopy+0x16/0x20
[ 357.810124][T23020] _copy_from_user+0x1a/0xc0
[ 357.814735][T23020] do_recvmmsg+0x27e/0xa20
[ 357.819196][T23020] __x64_sys_recvmmsg+0xde/0x160
[ 357.824125][T23020] do_syscall_64+0x2b/0x70
[ 357.828574][T23020] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 357.834503][T23020] RIP: 0033:0x7fa271cfb049
[ 357.838896][T23020] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 357.858559][T23020] RSP: 002b:00007fa271450168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 357.867015][T23020] RAX: ffffffffffffffda RBX: 00007fa271e0e030 RCX: 00007fa271cfb049
[ 357.875045][T23020] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003
[ 357.883070][T23020] RBP: 00007fa2714501d0 R08: 0000000000000000 R09: 0000000000000000
[ 357.891101][T23020] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 357.899061][T23020] R13: 00007ffcd670d85f R14: 00007fa271450300 R15: 0000000000022000
[ 357.907053][T23020]
03:37:41 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x18, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:41 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x9000000, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:41 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0xb00, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:41 executing program 5:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x20000004})
ppoll(&(0x7f0000000000)=[{r0, 0x3eb9, 0xb00}, {r2, 0x4b57, 0x64}], 0x2, 0x0, 0x0, 0x1473bf3)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0)
03:37:41 executing program 1:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) (fail_nth: 20)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x20000004})
ppoll(&(0x7f0000000000)=[{r2, 0x4b57, 0x64}], 0x1, 0x0, 0x0, 0x0)
03:37:41 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0xc00, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:41 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x24, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:41 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0xa000000, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:41 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x300, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:41 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0xd00, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:41 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0xb000000, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
[ 358.160404][T23043] FAULT_INJECTION: forcing a failure.
[ 358.160404][T23043] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 358.173461][T23043] CPU: 0 PID: 23043 Comm: syz-executor.1 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 358.182725][T23043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 358.192765][T23043] Call Trace:
[ 358.196023][T23043]
[ 358.198979][T23043] dump_stack_lvl+0xd6/0x122
[ 358.203653][T23043] dump_stack+0x11/0x12
[ 358.207832][T23043] should_fail+0x230/0x240
[ 358.212244][T23043] should_fail_usercopy+0x16/0x20
[ 358.217330][T23043] _copy_from_user+0x1a/0xc0
[ 358.221905][T23043] do_recvmmsg+0x27e/0xa20
[ 358.226364][T23043] __x64_sys_recvmmsg+0xde/0x160
[ 358.231279][T23043] do_syscall_64+0x2b/0x70
[ 358.235706][T23043] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 358.241586][T23043] RIP: 0033:0x7f2c4d882049
[ 358.245997][T23043] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 358.265594][T23043] RSP: 002b:00007f2c4cfd7168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 358.273987][T23043] RAX: ffffffffffffffda RBX: 00007f2c4d995030 RCX: 00007f2c4d882049
[ 358.282075][T23043] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003
[ 358.290042][T23043] RBP: 00007f2c4cfd71d0 R08: 0000000000000000 R09: 0000000000000000
[ 358.298054][T23043] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000002
[ 358.306004][T23043] R13: 00007fffa9548b0f R14: 00007f2c4cfd7300 R15: 0000000000022000
[ 358.313986][T23043]
03:37:42 executing program 0:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x0, 0x0) (fail_nth: 24)
03:37:42 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x500, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:42 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0xe00, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:42 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0xc000000, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
[ 358.599411][T23055] FAULT_INJECTION: forcing a failure.
[ 358.599411][T23055] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 358.612496][T23055] CPU: 1 PID: 23055 Comm: syz-executor.0 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 358.621789][T23055] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 358.631824][T23055] Call Trace:
[ 358.635084][T23055]
[ 358.637994][T23055] dump_stack_lvl+0xd6/0x122
[ 358.642573][T23055] dump_stack+0x11/0x12
[ 358.646706][T23055] should_fail+0x230/0x240
[ 358.651123][T23055] should_fail_usercopy+0x16/0x20
[ 358.656142][T23055] _copy_from_user+0x1a/0xc0
[ 358.660730][T23055] do_recvmmsg+0x27e/0xa20
[ 358.665128][T23055] __x64_sys_recvmmsg+0xde/0x160
[ 358.670174][T23055] do_syscall_64+0x2b/0x70
[ 358.674655][T23055] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 358.680526][T23055] RIP: 0033:0x7fa271cfb049
[ 358.684920][T23055] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 358.704503][T23055] RSP: 002b:00007fa271450168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 358.712974][T23055] RAX: ffffffffffffffda RBX: 00007fa271e0e030 RCX: 00007fa271cfb049
[ 358.720929][T23055] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003
[ 358.728894][T23055] RBP: 00007fa2714501d0 R08: 0000000000000000 R09: 0000000000000000
[ 358.736877][T23055] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 358.744833][T23055] R13: 00007ffcd670d85f R14: 00007fa271450300 R15: 0000000000022000
[ 358.752808][T23055]
03:37:42 executing program 5:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x20000004})
ppoll(&(0x7f0000000000)=[{r0, 0xb93e, 0xb00}, {r2, 0x4b57, 0x64}], 0x2, 0x0, 0x0, 0x1473bf3)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0)
03:37:42 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x600, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:42 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x1100, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:42 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0xd000000, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:42 executing program 1:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) (fail_nth: 21)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x20000004})
ppoll(&(0x7f0000000000)=[{r2, 0x4b57, 0x64}], 0x1, 0x0, 0x0, 0x0)
03:37:42 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x700, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:42 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x1200, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:42 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0xe000000, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
[ 359.036743][T23073] FAULT_INJECTION: forcing a failure.
[ 359.036743][T23073] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 359.049874][T23073] CPU: 0 PID: 23073 Comm: syz-executor.1 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 359.059160][T23073] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 359.069284][T23073] Call Trace:
[ 359.072629][T23073]
[ 359.075550][T23073] dump_stack_lvl+0xd6/0x122
[ 359.080147][T23073] dump_stack+0x11/0x12
[ 359.084297][T23073] should_fail+0x230/0x240
[ 359.088716][T23073] should_fail_usercopy+0x16/0x20
[ 359.093741][T23073] _copy_from_user+0x1a/0xc0
[ 359.098404][T23073] do_recvmmsg+0x27e/0xa20
[ 359.102898][T23073] __x64_sys_recvmmsg+0xde/0x160
[ 359.107841][T23073] do_syscall_64+0x2b/0x70
[ 359.112270][T23073] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 359.118175][T23073] RIP: 0033:0x7f2c4d882049
[ 359.122579][T23073] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 359.142192][T23073] RSP: 002b:00007f2c4cfd7168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 359.150614][T23073] RAX: ffffffffffffffda RBX: 00007f2c4d995030 RCX: 00007f2c4d882049
[ 359.158577][T23073] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003
[ 359.166566][T23073] RBP: 00007f2c4cfd71d0 R08: 0000000000000000 R09: 0000000000000000
[ 359.174574][T23073] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000002
[ 359.182616][T23073] R13: 00007fffa9548b0f R14: 00007f2c4cfd7300 R15: 0000000000022000
[ 359.190658][T23073]
03:37:42 executing program 0:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x0, 0x0) (fail_nth: 25)
03:37:42 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x900, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:42 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x1800, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:42 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x10000000, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
[ 359.443539][T23084] FAULT_INJECTION: forcing a failure.
[ 359.443539][T23084] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 359.456783][T23084] CPU: 0 PID: 23084 Comm: syz-executor.0 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 359.466047][T23084] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 359.476083][T23084] Call Trace:
[ 359.479353][T23084]
[ 359.482264][T23084] dump_stack_lvl+0xd6/0x122
[ 359.486843][T23084] dump_stack+0x11/0x12
[ 359.490983][T23084] should_fail+0x230/0x240
[ 359.495437][T23084] should_fail_usercopy+0x16/0x20
[ 359.500440][T23084] _copy_from_user+0x1a/0xc0
[ 359.505010][T23084] do_recvmmsg+0x27e/0xa20
[ 359.509414][T23084] __x64_sys_recvmmsg+0xde/0x160
[ 359.514355][T23084] do_syscall_64+0x2b/0x70
[ 359.518790][T23084] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 359.524662][T23084] RIP: 0033:0x7fa271cfb049
[ 359.529081][T23084] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 359.548667][T23084] RSP: 002b:00007fa271450168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 359.557122][T23084] RAX: ffffffffffffffda RBX: 00007fa271e0e030 RCX: 00007fa271cfb049
[ 359.565080][T23084] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003
[ 359.573061][T23084] RBP: 00007fa2714501d0 R08: 0000000000000000 R09: 0000000000000000
[ 359.581011][T23084] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 359.588957][T23084] R13: 00007ffcd670d85f R14: 00007fa271450300 R15: 0000000000022000
[ 359.596908][T23084]
03:37:43 executing program 5:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x20000004})
ppoll(&(0x7f0000000000)=[{r0, 0x0, 0xa00}, {r2, 0x4b57, 0x64}], 0x2, 0x0, 0x0, 0x1473bf3)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0)
03:37:43 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0xa00, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:43 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x2000, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:43 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x11000000, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:43 executing program 1:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) (fail_nth: 22)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x20000004})
ppoll(&(0x7f0000000000)=[{r2, 0x4b57, 0x64}], 0x1, 0x0, 0x0, 0x0)
03:37:43 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x12000000, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:43 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x2400, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:43 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0xb00, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
[ 359.897396][T23102] FAULT_INJECTION: forcing a failure.
[ 359.897396][T23102] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 359.910502][T23102] CPU: 0 PID: 23102 Comm: syz-executor.1 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 359.919787][T23102] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 359.929835][T23102] Call Trace:
[ 359.933107][T23102]
[ 359.936069][T23102] dump_stack_lvl+0xd6/0x122
[ 359.940703][T23102] dump_stack+0x11/0x12
[ 359.944859][T23102] should_fail+0x230/0x240
[ 359.949394][T23102] should_fail_usercopy+0x16/0x20
[ 359.954486][T23102] _copy_from_user+0x1a/0xc0
[ 359.959121][T23102] do_recvmmsg+0x27e/0xa20
[ 359.963603][T23102] __x64_sys_recvmmsg+0xde/0x160
[ 359.968613][T23102] do_syscall_64+0x2b/0x70
[ 359.973079][T23102] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 359.979023][T23102] RIP: 0033:0x7f2c4d882049
[ 359.983479][T23102] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 360.003100][T23102] RSP: 002b:00007f2c4cfd7168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 360.011517][T23102] RAX: ffffffffffffffda RBX: 00007f2c4d995030 RCX: 00007f2c4d882049
[ 360.019487][T23102] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003
[ 360.027452][T23102] RBP: 00007f2c4cfd71d0 R08: 0000000000000000 R09: 0000000000000000
[ 360.035420][T23102] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000002
[ 360.043383][T23102] R13: 00007fffa9548b0f R14: 00007f2c4cfd7300 R15: 0000000000022000
[ 360.051433][T23102]
03:37:43 executing program 0:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x0, 0x0) (fail_nth: 26)
03:37:43 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x34000, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:43 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x18000000, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:43 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0xc00, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
[ 360.296602][T23114] FAULT_INJECTION: forcing a failure.
[ 360.296602][T23114] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 360.309668][T23114] CPU: 0 PID: 23114 Comm: syz-executor.0 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 360.319027][T23114] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 360.329141][T23114] Call Trace:
[ 360.332412][T23114]
[ 360.335331][T23114] dump_stack_lvl+0xd6/0x122
[ 360.339924][T23114] dump_stack+0x11/0x12
[ 360.344125][T23114] should_fail+0x230/0x240
[ 360.348548][T23114] should_fail_usercopy+0x16/0x20
[ 360.353585][T23114] _copy_from_user+0x1a/0xc0
[ 360.358228][T23114] do_recvmmsg+0x27e/0xa20
[ 360.362660][T23114] __x64_sys_recvmmsg+0xde/0x160
[ 360.367596][T23114] do_syscall_64+0x2b/0x70
[ 360.372098][T23114] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 360.378015][T23114] RIP: 0033:0x7fa271cfb049
[ 360.382423][T23114] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 360.402038][T23114] RSP: 002b:00007fa271450168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 360.410442][T23114] RAX: ffffffffffffffda RBX: 00007fa271e0e030 RCX: 00007fa271cfb049
[ 360.418477][T23114] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003
[ 360.426485][T23114] RBP: 00007fa2714501d0 R08: 0000000000000000 R09: 0000000000000000
[ 360.434522][T23114] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 360.442542][T23114] R13: 00007ffcd670d85f R14: 00007fa271450300 R15: 0000000000022000
[ 360.450499][T23114]
03:37:44 executing program 5:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x20000004})
ppoll(&(0x7f0000000000)=[{r0, 0x0, 0xb03}, {r2, 0x4b57, 0x64}], 0x2, 0x0, 0x0, 0x1473bf3)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0)
03:37:44 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x400300, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:44 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x20000000, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:44 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0xd00, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:44 executing program 1:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) (fail_nth: 23)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x20000004})
ppoll(&(0x7f0000000000)=[{r2, 0x4b57, 0x64}], 0x1, 0x0, 0x0, 0x0)
03:37:44 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x24000000, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:44 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x1000000, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:44 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0xe00, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
[ 360.751326][T23131] FAULT_INJECTION: forcing a failure.
[ 360.751326][T23131] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 360.764513][T23131] CPU: 1 PID: 23131 Comm: syz-executor.1 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 360.773809][T23131] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 360.783859][T23131] Call Trace:
[ 360.787130][T23131]
[ 360.790061][T23131] dump_stack_lvl+0xd6/0x122
[ 360.794662][T23131] dump_stack+0x11/0x12
[ 360.798907][T23131] should_fail+0x230/0x240
[ 360.803338][T23131] should_fail_usercopy+0x16/0x20
[ 360.808393][T23131] _copy_from_user+0x1a/0xc0
[ 360.813040][T23131] do_recvmmsg+0x27e/0xa20
[ 360.817523][T23131] __x64_sys_recvmmsg+0xde/0x160
[ 360.822513][T23131] do_syscall_64+0x2b/0x70
[ 360.826935][T23131] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 360.832889][T23131] RIP: 0033:0x7f2c4d882049
[ 360.837301][T23131] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 360.856902][T23131] RSP: 002b:00007f2c4cfd7168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 360.865406][T23131] RAX: ffffffffffffffda RBX: 00007f2c4d995030 RCX: 00007f2c4d882049
[ 360.873371][T23131] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003
[ 360.881344][T23131] RBP: 00007f2c4cfd71d0 R08: 0000000000000000 R09: 0000000000000000
[ 360.889318][T23131] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000002
[ 360.897296][T23131] R13: 00007fffa9548b0f R14: 00007f2c4cfd7300 R15: 0000000000022000
[ 360.905334][T23131]
03:37:44 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0xfbffffff, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:44 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x2000000, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:44 executing program 0:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x0, 0x0) (fail_nth: 27)
03:37:44 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x1100, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
[ 361.150630][T23145] FAULT_INJECTION: forcing a failure.
[ 361.150630][T23145] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 361.163687][T23145] CPU: 1 PID: 23145 Comm: syz-executor.0 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 361.172955][T23145] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 361.182994][T23145] Call Trace:
[ 361.186290][T23145]
[ 361.189275][T23145] dump_stack_lvl+0xd6/0x122
[ 361.193849][T23145] dump_stack+0x11/0x12
[ 361.198029][T23145] should_fail+0x230/0x240
[ 361.202432][T23145] should_fail_usercopy+0x16/0x20
[ 361.207584][T23145] _copy_from_user+0x1a/0xc0
[ 361.212157][T23145] do_recvmmsg+0x27e/0xa20
[ 361.216566][T23145] __x64_sys_recvmmsg+0xde/0x160
[ 361.221493][T23145] do_syscall_64+0x2b/0x70
[ 361.225913][T23145] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 361.231818][T23145] RIP: 0033:0x7fa271cfb049
[ 361.236224][T23145] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 361.255811][T23145] RSP: 002b:00007fa271450168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 361.264276][T23145] RAX: ffffffffffffffda RBX: 00007fa271e0e030 RCX: 00007fa271cfb049
[ 361.272384][T23145] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003
[ 361.280339][T23145] RBP: 00007fa2714501d0 R08: 0000000000000000 R09: 0000000000000000
[ 361.288306][T23145] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 361.296334][T23145] R13: 00007ffcd670d85f R14: 00007fa271450300 R15: 0000000000022000
[ 361.304284][T23145]
03:37:45 executing program 5:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x20000004})
ppoll(&(0x7f0000000000)=[{r0, 0x0, 0xb08}, {r2, 0x4b57, 0x64}], 0x2, 0x0, 0x0, 0x1473bf3)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0)
03:37:45 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x3000000, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:45 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0xffffff7f, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:45 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x1200, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:45 executing program 1:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) (fail_nth: 24)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x20000004})
ppoll(&(0x7f0000000000)=[{r2, 0x4b57, 0x64}], 0x1, 0x0, 0x0, 0x0)
03:37:45 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x1800, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:45 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x4000000, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:45 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0xfffffffb, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
[ 361.626242][T23163] FAULT_INJECTION: forcing a failure.
[ 361.626242][T23163] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 361.639330][T23163] CPU: 1 PID: 23163 Comm: syz-executor.1 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 361.648612][T23163] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 361.658734][T23163] Call Trace:
[ 361.662010][T23163]
[ 361.664937][T23163] dump_stack_lvl+0xd6/0x122
[ 361.669584][T23163] dump_stack+0x11/0x12
[ 361.673734][T23163] should_fail+0x230/0x240
[ 361.678277][T23163] should_fail_usercopy+0x16/0x20
[ 361.683306][T23163] _copy_from_user+0x1a/0xc0
[ 361.687918][T23163] do_recvmmsg+0x27e/0xa20
[ 361.692429][T23163] __x64_sys_recvmmsg+0xde/0x160
[ 361.697366][T23163] do_syscall_64+0x2b/0x70
[ 361.701787][T23163] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 361.707752][T23163] RIP: 0033:0x7f2c4d882049
[ 361.712210][T23163] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 361.731818][T23163] RSP: 002b:00007f2c4cfd7168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 361.740233][T23163] RAX: ffffffffffffffda RBX: 00007f2c4d995030 RCX: 00007f2c4d882049
[ 361.748199][T23163] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003
[ 361.756165][T23163] RBP: 00007f2c4cfd71d0 R08: 0000000000000000 R09: 0000000000000000
[ 361.764129][T23163] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000002
[ 361.772097][T23163] R13: 00007fffa9548b0f R14: 00007f2c4cfd7300 R15: 0000000000022000
[ 361.780068][T23163]
03:37:45 executing program 0:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x0, 0x0) (fail_nth: 28)
03:37:45 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x2000, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:45 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x5000000, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:45 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="030300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
[ 362.003571][T23175] FAULT_INJECTION: forcing a failure.
[ 362.003571][T23175] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 362.016662][T23175] CPU: 0 PID: 23175 Comm: syz-executor.0 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 362.025947][T23175] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 362.036038][T23175] Call Trace:
[ 362.039307][T23175]
[ 362.042234][T23175] dump_stack_lvl+0xd6/0x122
[ 362.046828][T23175] dump_stack+0x11/0x12
[ 362.051037][T23175] should_fail+0x230/0x240
[ 362.055530][T23175] should_fail_usercopy+0x16/0x20
[ 362.060628][T23175] _copy_from_user+0x1a/0xc0
[ 362.065229][T23175] do_recvmmsg+0x27e/0xa20
[ 362.069637][T23175] __x64_sys_recvmmsg+0xde/0x160
[ 362.074658][T23175] do_syscall_64+0x2b/0x70
[ 362.079103][T23175] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 362.084977][T23175] RIP: 0033:0x7fa271cfb049
[ 362.089368][T23175] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 362.108952][T23175] RSP: 002b:00007fa271450168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 362.117341][T23175] RAX: ffffffffffffffda RBX: 00007fa271e0e030 RCX: 00007fa271cfb049
[ 362.125307][T23175] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003
[ 362.133255][T23175] RBP: 00007fa2714501d0 R08: 0000000000000000 R09: 0000000000000000
[ 362.141204][T23175] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 362.149151][T23175] R13: 00007ffcd670d85f R14: 00007fa271450300 R15: 0000000000022000
[ 362.157188][T23175]
03:37:45 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x6000000, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:45 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x2400, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:45 executing program 1:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) (fail_nth: 25)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x20000004})
ppoll(&(0x7f0000000000)=[{r2, 0x4b57, 0x64}], 0x1, 0x0, 0x0, 0x0)
03:37:45 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="040300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:45 executing program 5:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x20000004})
ppoll(&(0x7f0000000000)=[{r0, 0x0, 0xb00}, {r2, 0x4b57, 0x64}], 0x5, 0x0, 0x0, 0x1473bf3)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0)
03:37:45 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:45 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x7000000, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:45 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="050300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
[ 362.495334][T23193] FAULT_INJECTION: forcing a failure.
[ 362.495334][T23193] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 362.508484][T23193] CPU: 1 PID: 23193 Comm: syz-executor.1 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 362.517833][T23193] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 362.527952][T23193] Call Trace:
[ 362.531283][T23193]
[ 362.534202][T23193] dump_stack_lvl+0xd6/0x122
[ 362.538796][T23193] dump_stack+0x11/0x12
[ 362.543008][T23193] should_fail+0x230/0x240
[ 362.547443][T23193] should_fail_usercopy+0x16/0x20
[ 362.552469][T23193] _copy_from_user+0x1a/0xc0
[ 362.557097][T23193] do_recvmmsg+0x27e/0xa20
[ 362.561522][T23193] __x64_sys_recvmmsg+0xde/0x160
[ 362.566550][T23193] do_syscall_64+0x2b/0x70
[ 362.571007][T23193] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 362.576904][T23193] RIP: 0033:0x7f2c4d882049
[ 362.581353][T23193] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 362.601063][T23193] RSP: 002b:00007f2c4cfd7168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 362.609477][T23193] RAX: ffffffffffffffda RBX: 00007f2c4d995030 RCX: 00007f2c4d882049
[ 362.617446][T23193] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003
[ 362.625431][T23193] RBP: 00007f2c4cfd71d0 R08: 0000000000000000 R09: 0000000000000000
[ 362.633549][T23193] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000002
[ 362.641518][T23193] R13: 00007fffa9548b0f R14: 00007f2c4cfd7300 R15: 0000000000022000
[ 362.649546][T23193]
03:37:46 executing program 0:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x0, 0x0) (fail_nth: 29)
03:37:46 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x2, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:46 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x8000000, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:46 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="060300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:46 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x3, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
[ 362.857470][T23207] FAULT_INJECTION: forcing a failure.
[ 362.857470][T23207] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 362.870680][T23207] CPU: 1 PID: 23207 Comm: syz-executor.0 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 362.880035][T23207] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 362.890088][T23207] Call Trace:
[ 362.893402][T23207]
[ 362.896327][T23207] dump_stack_lvl+0xd6/0x122
[ 362.900916][T23207] dump_stack+0x11/0x12
[ 362.905103][T23207] should_fail+0x230/0x240
[ 362.909522][T23207] should_fail_usercopy+0x16/0x20
[ 362.914547][T23207] _copy_from_user+0x1a/0xc0
[ 362.919174][T23207] do_recvmmsg+0x27e/0xa20
[ 362.923693][T23207] __x64_sys_recvmmsg+0xde/0x160
[ 362.928645][T23207] do_syscall_64+0x2b/0x70
[ 362.933070][T23207] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 362.938961][T23207] RIP: 0033:0x7fa271cfb049
[ 362.943366][T23207] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 362.962973][T23207] RSP: 002b:00007fa271450168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 362.971388][T23207] RAX: ffffffffffffffda RBX: 00007fa271e0e030 RCX: 00007fa271cfb049
[ 362.979352][T23207] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003
[ 362.987338][T23207] RBP: 00007fa2714501d0 R08: 0000000000000000 R09: 0000000000000000
[ 362.995304][T23207] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 363.003267][T23207] R13: 00007ffcd670d85f R14: 00007fa271450300 R15: 0000000000022000
[ 363.011290][T23207]
03:37:46 executing program 5:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x20000004})
ppoll(&(0x7f0000000000)=[{r0, 0x0, 0xb00}, {r2, 0x4b57, 0x64}], 0x1e, 0x0, 0x0, 0x1473bf3)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0)
03:37:46 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x9000000, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:46 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="070300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:46 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x4, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:46 executing program 1:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) (fail_nth: 26)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x20000004})
ppoll(&(0x7f0000000000)=[{r2, 0x4b57, 0x64}], 0x1, 0x0, 0x0, 0x0)
03:37:46 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="080300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:46 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x5, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
[ 363.347604][T23222] FAULT_INJECTION: forcing a failure.
[ 363.347604][T23222] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 363.360802][T23222] CPU: 0 PID: 23222 Comm: syz-executor.1 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 363.370092][T23222] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 363.380149][T23222] Call Trace:
[ 363.383529][T23222]
[ 363.386452][T23222] dump_stack_lvl+0xd6/0x122
[ 363.391098][T23222] dump_stack+0x11/0x12
[ 363.395270][T23222] should_fail+0x230/0x240
[ 363.399783][T23222] should_fail_usercopy+0x16/0x20
[ 363.404879][T23222] _copy_from_user+0x1a/0xc0
[ 363.409469][T23222] do_recvmmsg+0x27e/0xa20
[ 363.414019][T23222] __x64_sys_recvmmsg+0xde/0x160
[ 363.418978][T23222] do_syscall_64+0x2b/0x70
[ 363.423394][T23222] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 363.429412][T23222] RIP: 0033:0x7f2c4d882049
[ 363.433879][T23222] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 363.453540][T23222] RSP: 002b:00007f2c4cfd7168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 363.462028][T23222] RAX: ffffffffffffffda RBX: 00007f2c4d995030 RCX: 00007f2c4d882049
[ 363.469994][T23222] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003
[ 363.478036][T23222] RBP: 00007f2c4cfd71d0 R08: 0000000000000000 R09: 0000000000000000
[ 363.486000][T23222] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000002
[ 363.493963][T23222] R13: 00007fffa9548b0f R14: 00007f2c4cfd7300 R15: 0000000000022000
[ 363.501939][T23222]
03:37:47 executing program 0:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x0, 0x0) (fail_nth: 30)
03:37:47 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0xa000000, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:47 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="090300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:47 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x6, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:47 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="0a0300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
[ 363.713652][T23236] FAULT_INJECTION: forcing a failure.
[ 363.713652][T23236] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 363.726750][T23236] CPU: 0 PID: 23236 Comm: syz-executor.0 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 363.736105][T23236] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 363.746204][T23236] Call Trace:
[ 363.749467][T23236]
[ 363.752382][T23236] dump_stack_lvl+0xd6/0x122
[ 363.756982][T23236] dump_stack+0x11/0x12
[ 363.761115][T23236] should_fail+0x230/0x240
[ 363.765511][T23236] should_fail_usercopy+0x16/0x20
[ 363.770647][T23236] _copy_from_user+0x1a/0xc0
[ 363.775223][T23236] do_recvmmsg+0x27e/0xa20
[ 363.779670][T23236] __x64_sys_recvmmsg+0xde/0x160
[ 363.784619][T23236] do_syscall_64+0x2b/0x70
[ 363.789025][T23236] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 363.794899][T23236] RIP: 0033:0x7fa271cfb049
[ 363.799303][T23236] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 363.818956][T23236] RSP: 002b:00007fa271450168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 363.827372][T23236] RAX: ffffffffffffffda RBX: 00007fa271e0e030 RCX: 00007fa271cfb049
[ 363.835386][T23236] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003
[ 363.843343][T23236] RBP: 00007fa2714501d0 R08: 0000000000000000 R09: 0000000000000000
[ 363.851373][T23236] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 363.859394][T23236] R13: 00007ffcd670d85f R14: 00007fa271450300 R15: 0000000000022000
[ 363.867349][T23236]
03:37:47 executing program 5:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0)
sendmmsg$unix(r1, &(0x7f0000000900)=[{{&(0x7f00000000c0)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f00000006c0)=[{&(0x7f0000000140)="1f6087c5c5fb4c30e2fd42f252aec066ea7f9c4dbf00080ad239f1557fa9c1a4bbb060e5dfdf61cad8c217f0264a6fac181449349b1cd9f7da04811159094c5ee734fa113a", 0x45}, {&(0x7f0000000200)="bd5d5f4b43fa028879d3abaa72d05a58907c5400bb9bbebc5a07ae2f4b56f00247b44b6a04993522c16e1d7ab3267d7b715775bd7c93724cd1cf77925c4b43cc46bb976a2826b26054d3d108a3ffe693718153808d0cf8500bef0054b0b2648d69e17b7deee18e29de5fb2481940f0a441ca20", 0x73}, {&(0x7f0000000280)="66fa6f8129791395dd1bcba4ced5a1b999e43cc323207cd92713b7be7ba67236e9305eecd390a8ae3abf51c66e453429f234436e33447c560be7d05e0c1c35bfb8f38454003912fdafe440344e30dafb692f542a122e64802115a8fd6860776c52676189134e16162bd7b21b2a32d7004f8cf5ba6a8bd4103d90dff1291b95734482b3105635c07cdc39e3be92b0bfad04364a281ac5647a2e5b10f02c62a13839bb09f66a8450f5df", 0xa9}, {&(0x7f0000000340)}, {&(0x7f0000000380)="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", 0xfc}, {&(0x7f0000000480)="10629e233aa64329855900b23dceb0a10ebed00995efa05b2a89534dea1efebb2f11044e749f169755cd4e8f13aa41218a808f155cce300737a029874a62b7b81976f331fd05703f776503ead417e0903b1d2335a8e534de0fcb5e5d75fe4cd98ad49464903859149ef2ab39ac8d65e1df41f956912cf05de22406ae787e2b", 0x7f}, {&(0x7f0000000500)="0f56c4a4d3b01cb2ac3fa361555aafbd27bd484db71e59a10e084665660dfb1a578b4400815df18862ec9caf418b65cd40aec980a27ba9d572b79c6b65adee876ac56f9c7ebdf5030f865dd94f49f9b4ad5b33d68e532895b08fae1cb64980a8aeaaa74e898c8eb3d236c06d06ecc45a03fc4ae17cc4871d0caee0b124a0d57986474ea90152", 0x86}, {&(0x7f00000005c0)="530ec0b35aec63c900ad4ef45a3fb130b3ce680187a15d4bc5c3ff7a756c681a333e1339942f7493b75ecbd5d6133206324da65b01ce8eb6da3d7793948266fb397877c458f05331fd27678ac1355669e046f67bddbc8902b1f024315c6784f3656b0ae3ed30bf35ea468c714d6b5201d569740e98120d69cd745fbf2f13ac11091aed9e9e8af9b06a1c924adf5c760b6f207802b5c1895f5ec2dc06917b6f62c1ea1a56047f9f3b736aa478f68eb9dd7a9400fb1037ea8ff50cc91684b512925a789285385d", 0xc6}], 0x8, 0x0, 0x0, 0x4004000}}, {{&(0x7f0000000740)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)}, {&(0x7f0000000800)="fce4eb00214b398460c9d22a6d3203a25925b2f5731b7315a93eede612265f25fea58fc4dd4d2f8025fce5837fd6eaaaccfe58c84e4b7d98de24e3beb6010996660ad3372160d1ca7a1cf418dba3a76a74fa105543fe81de6a2514806b57c1b24dad2b5755452d77548c5bf7d5ba8f766ca36b90101a3509a7aef698899b8d9298a090805be6bbd1dd846ac5", 0x8c}], 0x2, 0x0, 0x0, 0x20000001}}], 0x2, 0x4000)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x20000004})
ppoll(&(0x7f0000000000)=[{r0, 0x0, 0xb00}, {r2, 0x4b57, 0x64}], 0x2, 0x0, 0x0, 0x1473bf3)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0)
03:37:47 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x7, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:47 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0xb000000, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:47 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="0b0300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:47 executing program 1:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) (fail_nth: 27)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x20000004})
ppoll(&(0x7f0000000000)=[{r2, 0x4b57, 0x64}], 0x1, 0x0, 0x0, 0x0)
03:37:47 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="0c0300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:47 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x8, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
[ 364.217464][T23252] FAULT_INJECTION: forcing a failure.
[ 364.217464][T23252] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 364.230555][T23252] CPU: 1 PID: 23252 Comm: syz-executor.1 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 364.239893][T23252] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 364.250034][T23252] Call Trace:
[ 364.253306][T23252]
[ 364.256227][T23252] dump_stack_lvl+0xd6/0x122
[ 364.260863][T23252] dump_stack+0x11/0x12
[ 364.265024][T23252] should_fail+0x230/0x240
[ 364.269484][T23252] should_fail_usercopy+0x16/0x20
[ 364.274527][T23252] _copy_from_user+0x1a/0xc0
[ 364.279179][T23252] do_recvmmsg+0x27e/0xa20
[ 364.283601][T23252] __x64_sys_recvmmsg+0xde/0x160
[ 364.288537][T23252] do_syscall_64+0x2b/0x70
[ 364.293063][T23252] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 364.299053][T23252] RIP: 0033:0x7f2c4d882049
[ 364.303458][T23252] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 364.323061][T23252] RSP: 002b:00007f2c4cfd7168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 364.331469][T23252] RAX: ffffffffffffffda RBX: 00007f2c4d995030 RCX: 00007f2c4d882049
[ 364.339487][T23252] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003
[ 364.347481][T23252] RBP: 00007f2c4cfd71d0 R08: 0000000000000000 R09: 0000000000000000
[ 364.355450][T23252] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000002
[ 364.363419][T23252] R13: 00007fffa9548b0f R14: 00007f2c4cfd7300 R15: 0000000000022000
[ 364.371389][T23252]
03:37:47 executing program 0:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x0, 0x0) (fail_nth: 31)
03:37:47 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0xc000000, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:47 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="0d0300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:47 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x9, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:47 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0xa, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
[ 364.568672][T23266] FAULT_INJECTION: forcing a failure.
[ 364.568672][T23266] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 364.581756][T23266] CPU: 1 PID: 23266 Comm: syz-executor.0 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 364.591090][T23266] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 364.601213][T23266] Call Trace:
[ 364.604485][T23266]
[ 364.607407][T23266] dump_stack_lvl+0xd6/0x122
[ 364.612086][T23266] dump_stack+0x11/0x12
[ 364.616235][T23266] should_fail+0x230/0x240
[ 364.620650][T23266] should_fail_usercopy+0x16/0x20
[ 364.625748][T23266] _copy_from_user+0x1a/0xc0
[ 364.630339][T23266] do_recvmmsg+0x27e/0xa20
[ 364.634776][T23266] __x64_sys_recvmmsg+0xde/0x160
[ 364.639736][T23266] do_syscall_64+0x2b/0x70
[ 364.644152][T23266] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 364.650065][T23266] RIP: 0033:0x7fa271cfb049
[ 364.654479][T23266] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 364.674245][T23266] RSP: 002b:00007fa271450168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 364.682702][T23266] RAX: ffffffffffffffda RBX: 00007fa271e0e030 RCX: 00007fa271cfb049
[ 364.690669][T23266] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003
[ 364.698670][T23266] RBP: 00007fa2714501d0 R08: 0000000000000000 R09: 0000000000000000
[ 364.706639][T23266] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 364.714607][T23266] R13: 00007ffcd670d85f R14: 00007fa271450300 R15: 0000000000022000
[ 364.722577][T23266]
03:37:48 executing program 5:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0)
sendmmsg$unix(r1, &(0x7f0000000900)=[{{&(0x7f00000000c0)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f00000006c0)=[{&(0x7f0000000140)="1f6087c5c5fb4c30e2fd42f252aec066ea7f9c4dbf00080ad239f1557fa9c1a4bbb060e5dfdf61cad8c217f0264a6fac181449349b1cd9f7da04811159094c5ee734fa113a", 0x45}, {&(0x7f0000000200)="bd5d5f4b43fa028879d3abaa72d05a58907c5400bb9bbebc5a07ae2f4b56f00247b44b6a04993522c16e1d7ab3267d7b715775bd7c93724cd1cf77925c4b43cc46bb976a2826b26054d3d108a3ffe693718153808d0cf8500bef0054b0b2648d69e17b7deee18e29de5fb2481940f0a441ca20", 0x73}, {&(0x7f0000000280)="66fa6f8129791395dd1bcba4ced5a1b999e43cc323207cd92713b7be7ba67236e9305eecd390a8ae3abf51c66e453429f234436e33447c560be7d05e0c1c35bfb8f38454003912fdafe440344e30dafb692f542a122e64802115a8fd6860776c52676189134e16162bd7b21b2a32d7004f8cf5ba6a8bd4103d90dff1291b95734482b3105635c07cdc39e3be92b0bfad04364a281ac5647a2e5b10f02c62a13839bb09f66a8450f5df", 0xa9}, {&(0x7f0000000340)}, {&(0x7f0000000380)="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", 0xfc}, {&(0x7f0000000480)="10629e233aa64329855900b23dceb0a10ebed00995efa05b2a89534dea1efebb2f11044e749f169755cd4e8f13aa41218a808f155cce300737a029874a62b7b81976f331fd05703f776503ead417e0903b1d2335a8e534de0fcb5e5d75fe4cd98ad49464903859149ef2ab39ac8d65e1df41f956912cf05de22406ae787e2b", 0x7f}, {&(0x7f0000000500)="0f56c4a4d3b01cb2ac3fa361555aafbd27bd484db71e59a10e084665660dfb1a578b4400815df18862ec9caf418b65cd40aec980a27ba9d572b79c6b65adee876ac56f9c7ebdf5030f865dd94f49f9b4ad5b33d68e532895b08fae1cb64980a8aeaaa74e898c8eb3d236c06d06ecc45a03fc4ae17cc4871d0caee0b124a0d57986474ea90152", 0x86}, {&(0x7f00000005c0)="530ec0b35aec63c900ad4ef45a3fb130b3ce680187a15d4bc5c3ff7a756c681a333e1339942f7493b75ecbd5d6133206324da65b01ce8eb6da3d7793948266fb397877c458f05331fd27678ac1355669e046f67bddbc8902b1f024315c6784f3656b0ae3ed30bf35ea468c714d6b5201d569740e98120d69cd745fbf2f13ac11091aed9e9e8af9b06a1c924adf5c760b6f207802b5c1895f5ec2dc06917b6f62c1ea1a56047f9f3b736aa478f68eb9dd7a9400fb1037ea8ff50cc91684b512925a789285385d", 0xc6}], 0x8, 0x0, 0x0, 0x4004000}}, {{&(0x7f0000000740)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)}, {&(0x7f0000000800)="fce4eb00214b398460c9d22a6d3203a25925b2f5731b7315a93eede612265f25fea58fc4dd4d2f8025fce5837fd6eaaaccfe58c84e4b7d98de24e3beb6010996660ad3372160d1ca7a1cf418dba3a76a74fa105543fe81de6a2514806b57c1b24dad2b5755452d77548c5bf7d5ba8f766ca36b90101a3509a7aef698899b8d9298a090805be6bbd1dd846ac5", 0x8c}], 0x2, 0x0, 0x0, 0x20000001}}], 0x2, 0x4000)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x20000004})
ppoll(&(0x7f0000000000)=[{r0, 0x0, 0xb00}, {r2, 0x4b57, 0x64}], 0x2, 0x0, 0x0, 0x1473bf3)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)) (async)
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) (async)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) (async)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) (async)
sendmmsg$unix(r1, &(0x7f0000000900)=[{{&(0x7f00000000c0)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f00000006c0)=[{&(0x7f0000000140)="1f6087c5c5fb4c30e2fd42f252aec066ea7f9c4dbf00080ad239f1557fa9c1a4bbb060e5dfdf61cad8c217f0264a6fac181449349b1cd9f7da04811159094c5ee734fa113a", 0x45}, {&(0x7f0000000200)="bd5d5f4b43fa028879d3abaa72d05a58907c5400bb9bbebc5a07ae2f4b56f00247b44b6a04993522c16e1d7ab3267d7b715775bd7c93724cd1cf77925c4b43cc46bb976a2826b26054d3d108a3ffe693718153808d0cf8500bef0054b0b2648d69e17b7deee18e29de5fb2481940f0a441ca20", 0x73}, {&(0x7f0000000280)="66fa6f8129791395dd1bcba4ced5a1b999e43cc323207cd92713b7be7ba67236e9305eecd390a8ae3abf51c66e453429f234436e33447c560be7d05e0c1c35bfb8f38454003912fdafe440344e30dafb692f542a122e64802115a8fd6860776c52676189134e16162bd7b21b2a32d7004f8cf5ba6a8bd4103d90dff1291b95734482b3105635c07cdc39e3be92b0bfad04364a281ac5647a2e5b10f02c62a13839bb09f66a8450f5df", 0xa9}, {&(0x7f0000000340)}, {&(0x7f0000000380)="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", 0xfc}, {&(0x7f0000000480)="10629e233aa64329855900b23dceb0a10ebed00995efa05b2a89534dea1efebb2f11044e749f169755cd4e8f13aa41218a808f155cce300737a029874a62b7b81976f331fd05703f776503ead417e0903b1d2335a8e534de0fcb5e5d75fe4cd98ad49464903859149ef2ab39ac8d65e1df41f956912cf05de22406ae787e2b", 0x7f}, {&(0x7f0000000500)="0f56c4a4d3b01cb2ac3fa361555aafbd27bd484db71e59a10e084665660dfb1a578b4400815df18862ec9caf418b65cd40aec980a27ba9d572b79c6b65adee876ac56f9c7ebdf5030f865dd94f49f9b4ad5b33d68e532895b08fae1cb64980a8aeaaa74e898c8eb3d236c06d06ecc45a03fc4ae17cc4871d0caee0b124a0d57986474ea90152", 0x86}, {&(0x7f00000005c0)="530ec0b35aec63c900ad4ef45a3fb130b3ce680187a15d4bc5c3ff7a756c681a333e1339942f7493b75ecbd5d6133206324da65b01ce8eb6da3d7793948266fb397877c458f05331fd27678ac1355669e046f67bddbc8902b1f024315c6784f3656b0ae3ed30bf35ea468c714d6b5201d569740e98120d69cd745fbf2f13ac11091aed9e9e8af9b06a1c924adf5c760b6f207802b5c1895f5ec2dc06917b6f62c1ea1a56047f9f3b736aa478f68eb9dd7a9400fb1037ea8ff50cc91684b512925a789285385d", 0xc6}], 0x8, 0x0, 0x0, 0x4004000}}, {{&(0x7f0000000740)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)}, {&(0x7f0000000800)="fce4eb00214b398460c9d22a6d3203a25925b2f5731b7315a93eede612265f25fea58fc4dd4d2f8025fce5837fd6eaaaccfe58c84e4b7d98de24e3beb6010996660ad3372160d1ca7a1cf418dba3a76a74fa105543fe81de6a2514806b57c1b24dad2b5755452d77548c5bf7d5ba8f766ca36b90101a3509a7aef698899b8d9298a090805be6bbd1dd846ac5", 0x8c}], 0x2, 0x0, 0x0, 0x20000001}}], 0x2, 0x4000) (async)
epoll_create1(0x0) (async)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x20000004}) (async)
ppoll(&(0x7f0000000000)=[{r0, 0x0, 0xb00}, {r2, 0x4b57, 0x64}], 0x2, 0x0, 0x0, 0x1473bf3) (async)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) (async)
03:37:48 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="0e0300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:48 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0xd000000, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:48 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0xb, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:48 executing program 1:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) (fail_nth: 28)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x20000004})
ppoll(&(0x7f0000000000)=[{r2, 0x4b57, 0x64}], 0x1, 0x0, 0x0, 0x0)
03:37:48 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0xe000000, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:48 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="0f0300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
[ 365.063324][T23281] FAULT_INJECTION: forcing a failure.
[ 365.063324][T23281] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 365.076410][T23281] CPU: 0 PID: 23281 Comm: syz-executor.1 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 365.085752][T23281] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 365.095836][T23281] Call Trace:
[ 365.099136][T23281]
[ 365.102055][T23281] dump_stack_lvl+0xd6/0x122
[ 365.106646][T23281] dump_stack+0x11/0x12
[ 365.110794][T23281] should_fail+0x230/0x240
[ 365.115225][T23281] should_fail_usercopy+0x16/0x20
[ 365.120260][T23281] _copy_from_user+0x1a/0xc0
[ 365.124887][T23281] do_recvmmsg+0x27e/0xa20
[ 365.129356][T23281] __x64_sys_recvmmsg+0xde/0x160
[ 365.134342][T23281] do_syscall_64+0x2b/0x70
[ 365.138757][T23281] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 365.144650][T23281] RIP: 0033:0x7f2c4d882049
[ 365.149055][T23281] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 365.168660][T23281] RSP: 002b:00007f2c4cfd7168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 365.177069][T23281] RAX: ffffffffffffffda RBX: 00007f2c4d995030 RCX: 00007f2c4d882049
[ 365.185036][T23281] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003
[ 365.193005][T23281] RBP: 00007f2c4cfd71d0 R08: 0000000000000000 R09: 0000000000000000
[ 365.200975][T23281] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000002
[ 365.208945][T23281] R13: 00007fffa9548b0f R14: 00007f2c4cfd7300 R15: 0000000000022000
[ 365.216915][T23281]
03:37:48 executing program 0:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x0, 0x0) (fail_nth: 32)
03:37:48 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0xc, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:48 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x10000000, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:48 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="100300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:48 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x11000000, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:48 executing program 5:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) (async, rerun: 32)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) (async, rerun: 32)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) (async)
sendmmsg$unix(r1, &(0x7f0000000900)=[{{&(0x7f00000000c0)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f00000006c0)=[{&(0x7f0000000140)="1f6087c5c5fb4c30e2fd42f252aec066ea7f9c4dbf00080ad239f1557fa9c1a4bbb060e5dfdf61cad8c217f0264a6fac181449349b1cd9f7da04811159094c5ee734fa113a", 0x45}, {&(0x7f0000000200)="bd5d5f4b43fa028879d3abaa72d05a58907c5400bb9bbebc5a07ae2f4b56f00247b44b6a04993522c16e1d7ab3267d7b715775bd7c93724cd1cf77925c4b43cc46bb976a2826b26054d3d108a3ffe693718153808d0cf8500bef0054b0b2648d69e17b7deee18e29de5fb2481940f0a441ca20", 0x73}, {&(0x7f0000000280)="66fa6f8129791395dd1bcba4ced5a1b999e43cc323207cd92713b7be7ba67236e9305eecd390a8ae3abf51c66e453429f234436e33447c560be7d05e0c1c35bfb8f38454003912fdafe440344e30dafb692f542a122e64802115a8fd6860776c52676189134e16162bd7b21b2a32d7004f8cf5ba6a8bd4103d90dff1291b95734482b3105635c07cdc39e3be92b0bfad04364a281ac5647a2e5b10f02c62a13839bb09f66a8450f5df", 0xa9}, {&(0x7f0000000340)}, {&(0x7f0000000380)="2c4de58eba7c4b28887427060e95e4a157356056e1fc38f457b40f292fc88133302d28d41ecd923eb5caec026b741f736bb8295ac6cda60bab5a58c3e0d4a05f66daa1370593b9da5c16c1b3e2d4f09e72a3211bde60787430c85417a8644ccfac84c1b55e0096e13a68bde7c0f61ad3af01f1d2cb0c1dcc19ce220ed5cda3c5d6b1594d626da63d819f64e9e81f1a8c2eade44e3944b198beaad18e9311bc67463f4856296714f757ebf89d8f0c34ee8589ab785e411bdcfbce9e5ea9d7c3cb7cfd4703feab7a5af13ee7ad701556b57967391b440f38a7ea656260e9b604a20f78f6e042b1896d276dab63f3c6d91056f22496d2eedfc1b0ab1058", 0xfc}, {&(0x7f0000000480)="10629e233aa64329855900b23dceb0a10ebed00995efa05b2a89534dea1efebb2f11044e749f169755cd4e8f13aa41218a808f155cce300737a029874a62b7b81976f331fd05703f776503ead417e0903b1d2335a8e534de0fcb5e5d75fe4cd98ad49464903859149ef2ab39ac8d65e1df41f956912cf05de22406ae787e2b", 0x7f}, {&(0x7f0000000500)="0f56c4a4d3b01cb2ac3fa361555aafbd27bd484db71e59a10e084665660dfb1a578b4400815df18862ec9caf418b65cd40aec980a27ba9d572b79c6b65adee876ac56f9c7ebdf5030f865dd94f49f9b4ad5b33d68e532895b08fae1cb64980a8aeaaa74e898c8eb3d236c06d06ecc45a03fc4ae17cc4871d0caee0b124a0d57986474ea90152", 0x86}, {&(0x7f00000005c0)="530ec0b35aec63c900ad4ef45a3fb130b3ce680187a15d4bc5c3ff7a756c681a333e1339942f7493b75ecbd5d6133206324da65b01ce8eb6da3d7793948266fb397877c458f05331fd27678ac1355669e046f67bddbc8902b1f024315c6784f3656b0ae3ed30bf35ea468c714d6b5201d569740e98120d69cd745fbf2f13ac11091aed9e9e8af9b06a1c924adf5c760b6f207802b5c1895f5ec2dc06917b6f62c1ea1a56047f9f3b736aa478f68eb9dd7a9400fb1037ea8ff50cc91684b512925a789285385d", 0xc6}], 0x8, 0x0, 0x0, 0x4004000}}, {{&(0x7f0000000740)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000008c0)=[{&(0x7f00000007c0)}, {&(0x7f0000000800)="fce4eb00214b398460c9d22a6d3203a25925b2f5731b7315a93eede612265f25fea58fc4dd4d2f8025fce5837fd6eaaaccfe58c84e4b7d98de24e3beb6010996660ad3372160d1ca7a1cf418dba3a76a74fa105543fe81de6a2514806b57c1b24dad2b5755452d77548c5bf7d5ba8f766ca36b90101a3509a7aef698899b8d9298a090805be6bbd1dd846ac5", 0x8c}], 0x2, 0x0, 0x0, 0x20000001}}], 0x2, 0x4000) (async)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x20000004}) (async)
ppoll(&(0x7f0000000000)=[{r0, 0x0, 0xb00}, {r2, 0x4b57, 0x64}], 0x2, 0x0, 0x0, 0x1473bf3) (async)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0)
03:37:48 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="110300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:48 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0xd, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:48 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0xe, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
[ 365.431600][T23309] FAULT_INJECTION: forcing a failure.
[ 365.431600][T23309] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 365.444705][T23309] CPU: 1 PID: 23309 Comm: syz-executor.0 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 365.453971][T23309] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 365.464005][T23309] Call Trace:
[ 365.467361][T23309]
[ 365.470271][T23309] dump_stack_lvl+0xd6/0x122
[ 365.474861][T23309] dump_stack+0x11/0x12
[ 365.479168][T23309] should_fail+0x230/0x240
[ 365.483635][T23309] should_fail_usercopy+0x16/0x20
[ 365.488721][T23309] _copy_from_user+0x1a/0xc0
[ 365.493292][T23309] do_recvmmsg+0x27e/0xa20
[ 365.497693][T23309] __x64_sys_recvmmsg+0xde/0x160
[ 365.502615][T23309] do_syscall_64+0x2b/0x70
[ 365.507012][T23309] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 365.512979][T23309] RIP: 0033:0x7fa271cfb049
[ 365.517402][T23309] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 365.536996][T23309] RSP: 002b:00007fa271450168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 365.545390][T23309] RAX: ffffffffffffffda RBX: 00007fa271e0e030 RCX: 00007fa271cfb049
[ 365.553356][T23309] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003
[ 365.561377][T23309] RBP: 00007fa2714501d0 R08: 0000000000000000 R09: 0000000000000000
[ 365.569347][T23309] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 365.577294][T23309] R13: 00007ffcd670d85f R14: 00007fa271450300 R15: 0000000000022000
[ 365.585303][T23309]
03:37:49 executing program 1:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) (fail_nth: 29)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x20000004})
ppoll(&(0x7f0000000000)=[{r2, 0x4b57, 0x64}], 0x1, 0x0, 0x0, 0x0)
03:37:49 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="120300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:49 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x12000000, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
[ 365.907261][T23316] FAULT_INJECTION: forcing a failure.
[ 365.907261][T23316] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 365.920329][T23316] CPU: 1 PID: 23316 Comm: syz-executor.1 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 365.929616][T23316] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 365.939652][T23316] Call Trace:
[ 365.942912][T23316]
[ 365.945823][T23316] dump_stack_lvl+0xd6/0x122
[ 365.950401][T23316] dump_stack+0x11/0x12
[ 365.954538][T23316] should_fail+0x230/0x240
[ 365.958943][T23316] should_fail_usercopy+0x16/0x20
[ 365.964044][T23316] _copy_from_user+0x1a/0xc0
[ 365.968642][T23316] do_recvmmsg+0x27e/0xa20
[ 365.973043][T23316] __x64_sys_recvmmsg+0xde/0x160
[ 365.978026][T23316] do_syscall_64+0x2b/0x70
[ 365.982430][T23316] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 365.988386][T23316] RIP: 0033:0x7f2c4d882049
[ 365.992778][T23316] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 366.012523][T23316] RSP: 002b:00007f2c4cfd7168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 366.020964][T23316] RAX: ffffffffffffffda RBX: 00007f2c4d995030 RCX: 00007f2c4d882049
[ 366.028936][T23316] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003
[ 366.036902][T23316] RBP: 00007f2c4cfd71d0 R08: 0000000000000000 R09: 0000000000000000
[ 366.044852][T23316] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000002
[ 366.052811][T23316] R13: 00007fffa9548b0f R14: 00007f2c4cfd7300 R15: 0000000000022000
[ 366.060822][T23316]
03:37:49 executing program 0:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x0, 0x0) (fail_nth: 33)
03:37:49 executing program 5:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r1, &(0x7f0000000140), 0x0, 0x102, 0x0)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x20000004})
ppoll(&(0x7f0000000000)=[{r0, 0x0, 0xb00}, {r2, 0x4b57, 0x64}], 0x2, 0x0, 0x0, 0x1473bf3)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0)
ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r3, 0xc018937e, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'})
write$P9_RREADLINK(r4, &(0x7f0000000100)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10)
03:37:49 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x10, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:49 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x18000000, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:49 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="130300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:49 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="140300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:49 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x11, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:49 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x20000000, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:49 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x12, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
[ 366.285778][T23337] FAULT_INJECTION: forcing a failure.
[ 366.285778][T23337] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 366.298892][T23337] CPU: 1 PID: 23337 Comm: syz-executor.0 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 366.308235][T23337] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 366.318303][T23337] Call Trace:
[ 366.321634][T23337]
[ 366.324546][T23337] dump_stack_lvl+0xd6/0x122
[ 366.329174][T23337] dump_stack+0x11/0x12
[ 366.333371][T23337] should_fail+0x230/0x240
[ 366.337771][T23337] should_fail_usercopy+0x16/0x20
[ 366.342890][T23337] _copy_from_user+0x1a/0xc0
[ 366.347539][T23337] do_recvmmsg+0x27e/0xa20
[ 366.351945][T23337] __x64_sys_recvmmsg+0xde/0x160
[ 366.356927][T23337] do_syscall_64+0x2b/0x70
[ 366.361323][T23337] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 366.367199][T23337] RIP: 0033:0x7fa271cfb049
[ 366.371597][T23337] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 366.391233][T23337] RSP: 002b:00007fa271450168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 366.399625][T23337] RAX: ffffffffffffffda RBX: 00007fa271e0e030 RCX: 00007fa271cfb049
[ 366.407588][T23337] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003
[ 366.415578][T23337] RBP: 00007fa2714501d0 R08: 0000000000000000 R09: 0000000000000000
[ 366.423525][T23337] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 366.431543][T23337] R13: 00007ffcd670d85f R14: 00007fa271450300 R15: 0000000000022000
[ 366.439531][T23337]
03:37:50 executing program 1:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) (fail_nth: 30)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x20000004})
ppoll(&(0x7f0000000000)=[{r2, 0x4b57, 0x64}], 0x1, 0x0, 0x0, 0x0)
03:37:50 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="150300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:50 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x24000000, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
[ 366.757487][T23345] FAULT_INJECTION: forcing a failure.
[ 366.757487][T23345] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 366.770593][T23345] CPU: 1 PID: 23345 Comm: syz-executor.1 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 366.779857][T23345] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 366.789911][T23345] Call Trace:
[ 366.793170][T23345]
[ 366.796112][T23345] dump_stack_lvl+0xd6/0x122
[ 366.800690][T23345] dump_stack+0x11/0x12
[ 366.804854][T23345] should_fail+0x230/0x240
[ 366.809264][T23345] should_fail_usercopy+0x16/0x20
[ 366.814293][T23345] _copy_from_user+0x1a/0xc0
[ 366.818882][T23345] do_recvmmsg+0x27e/0xa20
[ 366.823337][T23345] __x64_sys_recvmmsg+0xde/0x160
[ 366.828257][T23345] do_syscall_64+0x2b/0x70
[ 366.832655][T23345] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 366.838538][T23345] RIP: 0033:0x7f2c4d882049
[ 366.842929][T23345] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 366.862615][T23345] RSP: 002b:00007f2c4cfd7168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 366.871014][T23345] RAX: ffffffffffffffda RBX: 00007f2c4d995030 RCX: 00007f2c4d882049
[ 366.878991][T23345] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003
[ 366.887050][T23345] RBP: 00007f2c4cfd71d0 R08: 0000000000000000 R09: 0000000000000000
[ 366.895027][T23345] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000002
[ 366.903028][T23345] R13: 00007fffa9548b0f R14: 00007f2c4cfd7300 R15: 0000000000022000
[ 366.910984][T23345]
03:37:50 executing program 0:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x0, 0x0) (fail_nth: 34)
03:37:50 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x18, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:50 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="160300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:50 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0xaa1414ac, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:50 executing program 5:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r1, &(0x7f0000000140), 0x0, 0x102, 0x0)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x20000004})
ppoll(&(0x7f0000000000)=[{r0, 0x0, 0xb00}, {r2, 0x4b57, 0x64}], 0x2, 0x0, 0x0, 0x1473bf3) (async)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0)
ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r3, 0xc018937e, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'})
write$P9_RREADLINK(r4, &(0x7f0000000100)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10)
03:37:50 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0xac1414aa, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:50 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="170300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:50 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x24, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:50 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="180300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
[ 367.144704][T23365] FAULT_INJECTION: forcing a failure.
[ 367.144704][T23365] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 367.157806][T23365] CPU: 1 PID: 23365 Comm: syz-executor.0 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 367.167093][T23365] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 367.177181][T23365] Call Trace:
[ 367.180448][T23365]
[ 367.183367][T23365] dump_stack_lvl+0xd6/0x122
[ 367.187975][T23365] dump_stack+0x11/0x12
[ 367.192174][T23365] should_fail+0x230/0x240
[ 367.196591][T23365] should_fail_usercopy+0x16/0x20
[ 367.201622][T23365] _copy_from_user+0x1a/0xc0
[ 367.206195][T23365] do_recvmmsg+0x27e/0xa20
[ 367.210605][T23365] __x64_sys_recvmmsg+0xde/0x160
[ 367.215540][T23365] do_syscall_64+0x2b/0x70
[ 367.219938][T23365] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 367.225810][T23365] RIP: 0033:0x7fa271cfb049
[ 367.230207][T23365] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 367.249856][T23365] RSP: 002b:00007fa271450168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 367.258338][T23365] RAX: ffffffffffffffda RBX: 00007fa271e0e030 RCX: 00007fa271cfb049
[ 367.266385][T23365] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003
[ 367.274335][T23365] RBP: 00007fa2714501d0 R08: 0000000000000000 R09: 0000000000000000
[ 367.282343][T23365] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 367.290295][T23365] R13: 00007ffcd670d85f R14: 00007fa271450300 R15: 0000000000022000
[ 367.298341][T23365]
03:37:51 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x300, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:51 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="190300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:51 executing program 1:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) (fail_nth: 31)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x20000004})
ppoll(&(0x7f0000000000)=[{r2, 0x4b57, 0x64}], 0x1, 0x0, 0x0, 0x0)
[ 367.602322][T23374] FAULT_INJECTION: forcing a failure.
[ 367.602322][T23374] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 367.615460][T23374] CPU: 1 PID: 23374 Comm: syz-executor.1 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 367.624738][T23374] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 367.634830][T23374] Call Trace:
[ 367.638089][T23374]
[ 367.641004][T23374] dump_stack_lvl+0xd6/0x122
[ 367.645625][T23374] dump_stack+0x11/0x12
[ 367.649759][T23374] should_fail+0x230/0x240
[ 367.654168][T23374] should_fail_usercopy+0x16/0x20
[ 367.659205][T23374] _copy_from_user+0x1a/0xc0
[ 367.663790][T23374] do_recvmmsg+0x27e/0xa20
[ 367.668221][T23374] __x64_sys_recvmmsg+0xde/0x160
[ 367.673137][T23374] do_syscall_64+0x2b/0x70
[ 367.677594][T23374] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 367.683471][T23374] RIP: 0033:0x7f2c4d882049
[ 367.687868][T23374] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 367.707477][T23374] RSP: 002b:00007f2c4cfd7168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 367.715875][T23374] RAX: ffffffffffffffda RBX: 00007f2c4d995030 RCX: 00007f2c4d882049
[ 367.723825][T23374] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003
[ 367.731778][T23374] RBP: 00007f2c4cfd71d0 R08: 0000000000000000 R09: 0000000000000000
[ 367.739801][T23374] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000002
[ 367.747786][T23374] R13: 00007fffa9548b0f R14: 00007f2c4cfd7300 R15: 0000000000022000
[ 367.755869][T23374]
03:37:51 executing program 0:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x0, 0x0) (fail_nth: 35)
03:37:51 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0xfbffffff, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:51 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1a0300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:51 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x500, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:51 executing program 5:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r1, &(0x7f0000000140), 0x0, 0x102, 0x0)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x20000004})
ppoll(&(0x7f0000000000)=[{r0, 0x0, 0xb00}, {r2, 0x4b57, 0x64}], 0x2, 0x0, 0x0, 0x1473bf3)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0)
ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r3, 0xc018937e, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'})
write$P9_RREADLINK(r4, &(0x7f0000000100)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)) (async)
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) (async)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) (async)
recvmmsg(r1, &(0x7f0000000140), 0x0, 0x102, 0x0) (async)
epoll_create1(0x0) (async)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x20000004}) (async)
ppoll(&(0x7f0000000000)=[{r0, 0x0, 0xb00}, {r2, 0x4b57, 0x64}], 0x2, 0x0, 0x0, 0x1473bf3) (async)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) (async)
ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r3, 0xc018937e, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) (async)
write$P9_RREADLINK(r4, &(0x7f0000000100)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) (async)
03:37:51 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x600, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:51 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0xffffff7f, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:51 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1b0300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:51 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0xfffffffb, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:51 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x700, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
[ 367.990931][T23396] FAULT_INJECTION: forcing a failure.
[ 367.990931][T23396] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 368.004027][T23396] CPU: 0 PID: 23396 Comm: syz-executor.0 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 368.013313][T23396] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 368.023344][T23396] Call Trace:
[ 368.026602][T23396]
[ 368.029510][T23396] dump_stack_lvl+0xd6/0x122
[ 368.034106][T23396] dump_stack+0x11/0x12
[ 368.038257][T23396] should_fail+0x230/0x240
[ 368.042663][T23396] should_fail_usercopy+0x16/0x20
[ 368.047802][T23396] _copy_from_user+0x1a/0xc0
[ 368.052387][T23396] do_recvmmsg+0x27e/0xa20
[ 368.056885][T23396] __x64_sys_recvmmsg+0xde/0x160
[ 368.061825][T23396] do_syscall_64+0x2b/0x70
[ 368.066269][T23396] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 368.072158][T23396] RIP: 0033:0x7fa271cfb049
[ 368.076589][T23396] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 368.096206][T23396] RSP: 002b:00007fa271450168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 368.104626][T23396] RAX: ffffffffffffffda RBX: 00007fa271e0e030 RCX: 00007fa271cfb049
[ 368.112582][T23396] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003
[ 368.120546][T23396] RBP: 00007fa2714501d0 R08: 0000000000000000 R09: 0000000000000000
[ 368.128538][T23396] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 368.136514][T23396] R13: 00007ffcd670d85f R14: 00007fa271450300 R15: 0000000000022000
[ 368.144462][T23396]
03:37:51 executing program 1:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) (fail_nth: 32)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x20000004})
ppoll(&(0x7f0000000000)=[{r2, 0x4b57, 0x64}], 0x1, 0x0, 0x0, 0x0)
03:37:51 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1c0300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
[ 368.445168][T23412] FAULT_INJECTION: forcing a failure.
[ 368.445168][T23412] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 368.458219][T23412] CPU: 1 PID: 23412 Comm: syz-executor.1 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 368.467483][T23412] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 368.477515][T23412] Call Trace:
[ 368.480776][T23412]
[ 368.483734][T23412] dump_stack_lvl+0xd6/0x122
[ 368.488307][T23412] dump_stack+0x11/0x12
[ 368.492498][T23412] should_fail+0x230/0x240
[ 368.496905][T23412] should_fail_usercopy+0x16/0x20
[ 368.502006][T23412] _copy_from_user+0x1a/0xc0
[ 368.506611][T23412] do_recvmmsg+0x27e/0xa20
[ 368.511098][T23412] __x64_sys_recvmmsg+0xde/0x160
[ 368.516033][T23412] do_syscall_64+0x2b/0x70
[ 368.520505][T23412] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 368.526427][T23412] RIP: 0033:0x7f2c4d882049
[ 368.530820][T23412] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 368.550425][T23412] RSP: 002b:00007f2c4cfd7168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 368.558865][T23412] RAX: ffffffffffffffda RBX: 00007f2c4d995030 RCX: 00007f2c4d882049
[ 368.566823][T23412] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003
[ 368.574771][T23412] RBP: 00007f2c4cfd71d0 R08: 0000000000000000 R09: 0000000000000000
[ 368.582797][T23412] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000002
[ 368.590749][T23412] R13: 00007fffa9548b0f R14: 00007f2c4cfd7300 R15: 0000000000022000
[ 368.598718][T23412]
03:37:52 executing program 0:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x0, 0x0) (fail_nth: 36)
03:37:52 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x0, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:52 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x900, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:52 executing program 5:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
r2 = syz_open_dev$vcsa(&(0x7f0000000100), 0xb, 0x0)
read$char_usb(r2, &(0x7f0000002200)=""/4106, 0x100a)
r3 = dup3(r0, r2, 0x0)
connect$unix(r3, &(0x7f000057eff8)=@abs={0x1, 0x0, 0x4e20}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0)
r4 = epoll_create1(0x0)
r5 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_SAVE(r5, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000a40)={0x24, 0x8, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0)
ioctl$INCFS_IOC_PERMIT_FILL(r2, 0x40046721, &(0x7f00000000c0)={r5})
epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r1, &(0x7f0000000040)={0x20000004})
ppoll(&(0x7f0000000000)=[{r0, 0x0, 0xb00}, {r4, 0x4b57, 0x64}], 0x2, 0x0, 0x0, 0x1473bf3)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0)
03:37:52 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1d0300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:52 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0xa00, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:52 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x0, 0x2, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:52 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="1e0300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:52 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0xb00, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:52 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x0, 0x3, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
[ 368.842754][T23434] FAULT_INJECTION: forcing a failure.
[ 368.842754][T23434] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 368.855809][T23434] CPU: 1 PID: 23434 Comm: syz-executor.0 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 368.865090][T23434] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 368.875121][T23434] Call Trace:
[ 368.878380][T23434]
[ 368.881331][T23434] dump_stack_lvl+0xd6/0x122
[ 368.885946][T23434] dump_stack+0x11/0x12
[ 368.890117][T23434] should_fail+0x230/0x240
[ 368.894602][T23434] should_fail_usercopy+0x16/0x20
[ 368.899610][T23434] _copy_from_user+0x1a/0xc0
[ 368.904264][T23434] do_recvmmsg+0x27e/0xa20
[ 368.908697][T23434] __x64_sys_recvmmsg+0xde/0x160
[ 368.913676][T23434] do_syscall_64+0x2b/0x70
[ 368.918251][T23434] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 368.924160][T23434] RIP: 0033:0x7fa271cfb049
[ 368.928554][T23434] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 368.948147][T23434] RSP: 002b:00007fa271450168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 368.956541][T23434] RAX: ffffffffffffffda RBX: 00007fa271e0e030 RCX: 00007fa271cfb049
[ 368.964490][T23434] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003
[ 368.972435][T23434] RBP: 00007fa2714501d0 R08: 0000000000000000 R09: 0000000000000000
[ 368.980387][T23434] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 368.988394][T23434] R13: 00007ffcd670d85f R14: 00007fa271450300 R15: 0000000000022000
[ 368.996353][T23434]
03:37:52 executing program 1:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) (fail_nth: 33)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x20000004})
ppoll(&(0x7f0000000000)=[{r2, 0x4b57, 0x64}], 0x1, 0x0, 0x0, 0x0)
03:37:52 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="2d0300030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
[ 369.289503][T23440] FAULT_INJECTION: forcing a failure.
[ 369.289503][T23440] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 369.302619][T23440] CPU: 1 PID: 23440 Comm: syz-executor.1 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 369.311928][T23440] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 369.322050][T23440] Call Trace:
[ 369.325310][T23440]
[ 369.328217][T23440] dump_stack_lvl+0xd6/0x122
[ 369.332798][T23440] dump_stack+0x11/0x12
[ 369.337013][T23440] should_fail+0x230/0x240
[ 369.341493][T23440] should_fail_usercopy+0x16/0x20
[ 369.346513][T23440] _copy_from_user+0x1a/0xc0
[ 369.351198][T23440] do_recvmmsg+0x27e/0xa20
[ 369.355662][T23440] __x64_sys_recvmmsg+0xde/0x160
[ 369.360592][T23440] do_syscall_64+0x2b/0x70
[ 369.365045][T23440] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 369.370935][T23440] RIP: 0033:0x7f2c4d882049
[ 369.375328][T23440] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 369.394920][T23440] RSP: 002b:00007f2c4cfd7168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 369.403307][T23440] RAX: ffffffffffffffda RBX: 00007f2c4d995030 RCX: 00007f2c4d882049
[ 369.411341][T23440] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003
[ 369.419311][T23440] RBP: 00007f2c4cfd71d0 R08: 0000000000000000 R09: 0000000000000000
[ 369.427271][T23440] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000002
[ 369.435304][T23440] R13: 00007fffa9548b0f R14: 00007f2c4cfd7300 R15: 0000000000022000
[ 369.443251][T23440]
03:37:53 executing program 0:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x0, 0x0) (fail_nth: 37)
03:37:53 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0xc00, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:53 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x0, 0x4, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:53 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020200030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:53 executing program 5:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) (async)
r2 = syz_open_dev$vcsa(&(0x7f0000000100), 0xb, 0x0)
read$char_usb(r2, &(0x7f0000002200)=""/4106, 0x100a)
r3 = dup3(r0, r2, 0x0)
connect$unix(r3, &(0x7f000057eff8)=@abs={0x1, 0x0, 0x4e20}, 0x6e) (async)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) (async)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) (async)
r4 = epoll_create1(0x0) (async)
r5 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_SAVE(r5, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000a40)={0x24, 0x8, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) (async, rerun: 64)
ioctl$INCFS_IOC_PERMIT_FILL(r2, 0x40046721, &(0x7f00000000c0)={r5}) (async, rerun: 64)
epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r1, &(0x7f0000000040)={0x20000004}) (async, rerun: 64)
ppoll(&(0x7f0000000000)=[{r0, 0x0, 0xb00}, {r4, 0x4b57, 0x64}], 0x2, 0x0, 0x0, 0x1473bf3) (async, rerun: 64)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0)
03:37:53 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x0, 0x5, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:53 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020900030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:53 executing program 5:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) (async)
r2 = syz_open_dev$vcsa(&(0x7f0000000100), 0xb, 0x0)
read$char_usb(r2, &(0x7f0000002200)=""/4106, 0x100a) (async)
r3 = dup3(r0, r2, 0x0)
connect$unix(r3, &(0x7f000057eff8)=@abs={0x1, 0x0, 0x4e20}, 0x6e) (async)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) (async)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0)
r4 = epoll_create1(0x0)
r5 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_SAVE(r5, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000a40)={0x24, 0x8, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0)
ioctl$INCFS_IOC_PERMIT_FILL(r2, 0x40046721, &(0x7f00000000c0)={r5})
epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r1, &(0x7f0000000040)={0x20000004}) (async)
ppoll(&(0x7f0000000000)=[{r0, 0x0, 0xb00}, {r4, 0x4b57, 0x64}], 0x2, 0x0, 0x0, 0x1473bf3) (async)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0)
03:37:53 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0xd00, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:53 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020d00030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
[ 369.691095][T23469] FAULT_INJECTION: forcing a failure.
[ 369.691095][T23469] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 369.704151][T23469] CPU: 1 PID: 23469 Comm: syz-executor.0 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 369.713414][T23469] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 369.723462][T23469] Call Trace:
[ 369.726739][T23469]
[ 369.729677][T23469] dump_stack_lvl+0xd6/0x122
[ 369.734331][T23469] dump_stack+0x11/0x12
[ 369.738491][T23469] should_fail+0x230/0x240
[ 369.742886][T23469] should_fail_usercopy+0x16/0x20
[ 369.747890][T23469] _copy_from_user+0x1a/0xc0
[ 369.752526][T23469] do_recvmmsg+0x27e/0xa20
[ 369.756998][T23469] __x64_sys_recvmmsg+0xde/0x160
[ 369.761914][T23469] do_syscall_64+0x2b/0x70
[ 369.766340][T23469] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 369.772209][T23469] RIP: 0033:0x7fa271cfb049
[ 369.776678][T23469] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 369.796338][T23469] RSP: 002b:00007fa271450168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 369.804732][T23469] RAX: ffffffffffffffda RBX: 00007fa271e0e030 RCX: 00007fa271cfb049
[ 369.812702][T23469] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003
[ 369.820656][T23469] RBP: 00007fa2714501d0 R08: 0000000000000000 R09: 0000000000000000
[ 369.828664][T23469] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 369.836631][T23469] R13: 00007ffcd670d85f R14: 00007fa271450300 R15: 0000000000022000
[ 369.844586][T23469]
03:37:53 executing program 1:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) (fail_nth: 34)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x20000004})
ppoll(&(0x7f0000000000)=[{r2, 0x4b57, 0x64}], 0x1, 0x0, 0x0, 0x0)
03:37:53 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x0, 0x6, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
[ 370.133351][T23474] FAULT_INJECTION: forcing a failure.
[ 370.133351][T23474] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 370.146435][T23474] CPU: 0 PID: 23474 Comm: syz-executor.1 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 370.155694][T23474] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 370.165819][T23474] Call Trace:
[ 370.169079][T23474]
[ 370.172036][T23474] dump_stack_lvl+0xd6/0x122
[ 370.176607][T23474] dump_stack+0x11/0x12
[ 370.180821][T23474] should_fail+0x230/0x240
[ 370.185227][T23474] should_fail_usercopy+0x16/0x20
[ 370.190293][T23474] _copy_from_user+0x1a/0xc0
[ 370.194866][T23474] do_recvmmsg+0x27e/0xa20
[ 370.199302][T23474] __x64_sys_recvmmsg+0xde/0x160
[ 370.204233][T23474] do_syscall_64+0x2b/0x70
[ 370.208630][T23474] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 370.214512][T23474] RIP: 0033:0x7f2c4d882049
[ 370.218967][T23474] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 370.238554][T23474] RSP: 002b:00007f2c4cfd7168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 370.246974][T23474] RAX: ffffffffffffffda RBX: 00007f2c4d995030 RCX: 00007f2c4d882049
[ 370.255017][T23474] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003
[ 370.262967][T23474] RBP: 00007f2c4cfd71d0 R08: 0000000000000000 R09: 0000000000000000
[ 370.270915][T23474] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000002
[ 370.278861][T23474] R13: 00007fffa9548b0f R14: 00007f2c4cfd7300 R15: 0000000000022000
[ 370.286883][T23474]
03:37:53 executing program 0:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x0, 0x0) (fail_nth: 38)
03:37:53 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0xe00, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:53 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020302030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:53 executing program 5:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e21}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x0, 0x24018891)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0)
r2 = epoll_create1(0x0)
r3 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_SAVE(r3, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000a40)={0x24, 0x8, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000040))
ppoll(&(0x7f0000000000)=[{r0, 0x0, 0xb00}, {r2, 0x4b57, 0x64}], 0x2, 0x0, 0x0, 0x1473bf3)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0)
03:37:53 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x0, 0x7, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:53 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020303030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:53 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x0, 0x8, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:53 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x1100, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:53 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020304030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:53 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x1200, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
[ 370.536644][T23497] FAULT_INJECTION: forcing a failure.
[ 370.536644][T23497] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 370.549825][T23497] CPU: 1 PID: 23497 Comm: syz-executor.0 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 370.559089][T23497] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 370.569164][T23497] Call Trace:
[ 370.572436][T23497]
[ 370.575350][T23497] dump_stack_lvl+0xd6/0x122
[ 370.579932][T23497] dump_stack+0x11/0x12
[ 370.584094][T23497] should_fail+0x230/0x240
[ 370.588489][T23497] should_fail_usercopy+0x16/0x20
[ 370.593502][T23497] _copy_from_user+0x1a/0xc0
[ 370.598073][T23497] do_recvmmsg+0x27e/0xa20
[ 370.602470][T23497] __x64_sys_recvmmsg+0xde/0x160
[ 370.607402][T23497] do_syscall_64+0x2b/0x70
[ 370.611797][T23497] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 370.617726][T23497] RIP: 0033:0x7fa271cfb049
[ 370.622124][T23497] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 370.641719][T23497] RSP: 002b:00007fa271450168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 370.650160][T23497] RAX: ffffffffffffffda RBX: 00007fa271e0e030 RCX: 00007fa271cfb049
[ 370.658120][T23497] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003
[ 370.666077][T23497] RBP: 00007fa2714501d0 R08: 0000000000000000 R09: 0000000000000000
[ 370.674047][T23497] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 370.682077][T23497] R13: 00007ffcd670d85f R14: 00007fa271450300 R15: 0000000000022000
[ 370.690133][T23497]
03:37:54 executing program 1:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) (fail_nth: 35)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x20000004})
ppoll(&(0x7f0000000000)=[{r2, 0x4b57, 0x64}], 0x1, 0x0, 0x0, 0x0)
03:37:54 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x0, 0x9, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
[ 370.980478][T23503] FAULT_INJECTION: forcing a failure.
[ 370.980478][T23503] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 370.993638][T23503] CPU: 1 PID: 23503 Comm: syz-executor.1 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 371.002909][T23503] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 371.012938][T23503] Call Trace:
[ 371.016191][T23503]
[ 371.019099][T23503] dump_stack_lvl+0xd6/0x122
[ 371.023672][T23503] dump_stack+0x11/0x12
[ 371.027806][T23503] should_fail+0x230/0x240
[ 371.032249][T23503] should_fail_usercopy+0x16/0x20
[ 371.037272][T23503] _copy_from_user+0x1a/0xc0
[ 371.041845][T23503] do_recvmmsg+0x27e/0xa20
[ 371.046241][T23503] __x64_sys_recvmmsg+0xde/0x160
[ 371.051154][T23503] do_syscall_64+0x2b/0x70
[ 371.055552][T23503] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 371.061419][T23503] RIP: 0033:0x7f2c4d882049
[ 371.065895][T23503] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 371.085531][T23503] RSP: 002b:00007f2c4cfd7168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 371.093916][T23503] RAX: ffffffffffffffda RBX: 00007f2c4d995030 RCX: 00007f2c4d882049
[ 371.101865][T23503] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003
[ 371.109888][T23503] RBP: 00007f2c4cfd71d0 R08: 0000000000000000 R09: 0000000000000000
[ 371.117916][T23503] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000002
[ 371.125861][T23503] R13: 00007fffa9548b0f R14: 00007f2c4cfd7300 R15: 0000000000022000
[ 371.133851][T23503]
03:37:54 executing program 0:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x0, 0x0) (fail_nth: 39)
03:37:54 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020305030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:54 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x1800, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:54 executing program 5:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e21}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x0, 0x24018891)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0)
r2 = epoll_create1(0x0)
r3 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_SAVE(r3, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000a40)={0x24, 0x8, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000040))
ppoll(&(0x7f0000000000)=[{r0, 0x0, 0xb00}, {r2, 0x4b57, 0x64}], 0x2, 0x0, 0x0, 0x1473bf3)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)) (async)
connect$unix(r0, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e21}, 0x6e) (async)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x0, 0x24018891) (async)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) (async)
epoll_create1(0x0) (async)
socket$nl_netfilter(0x10, 0x3, 0xc) (async)
sendmsg$IPSET_CMD_SAVE(r3, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000a40)={0x24, 0x8, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) (async)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000040)) (async)
ppoll(&(0x7f0000000000)=[{r0, 0x0, 0xb00}, {r2, 0x4b57, 0x64}], 0x2, 0x0, 0x0, 0x1473bf3) (async)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) (async)
03:37:54 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x0, 0xa, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:54 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020306030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:54 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x2000, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:54 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x0, 0xb, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:54 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020307030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:54 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x2400, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
[ 371.382617][T23525] FAULT_INJECTION: forcing a failure.
[ 371.382617][T23525] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 371.395777][T23525] CPU: 0 PID: 23525 Comm: syz-executor.0 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 371.405085][T23525] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 371.415188][T23525] Call Trace:
[ 371.418443][T23525]
[ 371.421358][T23525] dump_stack_lvl+0xd6/0x122
[ 371.425984][T23525] dump_stack+0x11/0x12
[ 371.430155][T23525] should_fail+0x230/0x240
[ 371.434563][T23525] should_fail_usercopy+0x16/0x20
[ 371.439568][T23525] _copy_from_user+0x1a/0xc0
[ 371.444153][T23525] do_recvmmsg+0x27e/0xa20
[ 371.448556][T23525] __x64_sys_recvmmsg+0xde/0x160
[ 371.453535][T23525] do_syscall_64+0x2b/0x70
[ 371.457939][T23525] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 371.463830][T23525] RIP: 0033:0x7fa271cfb049
[ 371.468220][T23525] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 371.487803][T23525] RSP: 002b:00007fa271450168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 371.496219][T23525] RAX: ffffffffffffffda RBX: 00007fa271e0e030 RCX: 00007fa271cfb049
[ 371.504207][T23525] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003
[ 371.512220][T23525] RBP: 00007fa2714501d0 R08: 0000000000000000 R09: 0000000000000000
[ 371.520174][T23525] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 371.528132][T23525] R13: 00007ffcd670d85f R14: 00007fa271450300 R15: 0000000000022000
[ 371.536152][T23525]
03:37:55 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020308030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:55 executing program 1:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) (fail_nth: 36)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x20000004})
ppoll(&(0x7f0000000000)=[{r2, 0x4b57, 0x64}], 0x1, 0x0, 0x0, 0x0)
[ 371.828346][T23535] FAULT_INJECTION: forcing a failure.
[ 371.828346][T23535] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 371.841470][T23535] CPU: 0 PID: 23535 Comm: syz-executor.1 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 371.850755][T23535] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 371.860894][T23535] Call Trace:
[ 371.864214][T23535]
[ 371.867197][T23535] dump_stack_lvl+0xd6/0x122
[ 371.871839][T23535] dump_stack+0x11/0x12
[ 371.876022][T23535] should_fail+0x230/0x240
[ 371.880439][T23535] should_fail_usercopy+0x16/0x20
[ 371.885511][T23535] _copy_from_user+0x1a/0xc0
[ 371.890104][T23535] do_recvmmsg+0x27e/0xa20
[ 371.894535][T23535] __x64_sys_recvmmsg+0xde/0x160
[ 371.899525][T23535] do_syscall_64+0x2b/0x70
[ 371.903950][T23535] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 371.909849][T23535] RIP: 0033:0x7f2c4d882049
[ 371.914261][T23535] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 371.933864][T23535] RSP: 002b:00007f2c4cfd7168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 371.942321][T23535] RAX: ffffffffffffffda RBX: 00007f2c4d995030 RCX: 00007f2c4d882049
[ 371.950275][T23535] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003
[ 371.958243][T23535] RBP: 00007f2c4cfd71d0 R08: 0000000000000000 R09: 0000000000000000
[ 371.966220][T23535] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000002
[ 371.974269][T23535] R13: 00007fffa9548b0f R14: 00007f2c4cfd7300 R15: 0000000000022000
[ 371.982303][T23535]
03:37:55 executing program 0:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x0, 0x0) (fail_nth: 40)
03:37:55 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x34000, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:55 executing program 5:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e21}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x0, 0x24018891)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0)
r2 = epoll_create1(0x0)
r3 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_SAVE(r3, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000a40)={0x24, 0x8, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000040))
ppoll(&(0x7f0000000000)=[{r0, 0x0, 0xb00}, {r2, 0x4b57, 0x64}], 0x2, 0x0, 0x0, 0x1473bf3)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)) (async)
connect$unix(r0, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e21}, 0x6e) (async)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x0, 0x24018891) (async)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) (async)
epoll_create1(0x0) (async)
socket$nl_netfilter(0x10, 0x3, 0xc) (async)
sendmsg$IPSET_CMD_SAVE(r3, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000a40)={0x24, 0x8, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) (async)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000040)) (async)
ppoll(&(0x7f0000000000)=[{r0, 0x0, 0xb00}, {r2, 0x4b57, 0x64}], 0x2, 0x0, 0x0, 0x1473bf3) (async)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) (async)
03:37:55 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x0, 0xc, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:55 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020309030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:55 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x0, 0xd, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:55 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="02030a030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:55 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x400300, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:55 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x0, 0xe, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:55 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x1000000, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
[ 372.232780][T23557] FAULT_INJECTION: forcing a failure.
[ 372.232780][T23557] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 372.245970][T23557] CPU: 0 PID: 23557 Comm: syz-executor.0 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 372.255232][T23557] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 372.265272][T23557] Call Trace:
[ 372.268527][T23557]
[ 372.271517][T23557] dump_stack_lvl+0xd6/0x122
[ 372.276088][T23557] dump_stack+0x11/0x12
[ 372.280254][T23557] should_fail+0x230/0x240
[ 372.284701][T23557] should_fail_usercopy+0x16/0x20
[ 372.289704][T23557] _copy_from_user+0x1a/0xc0
[ 372.294426][T23557] do_recvmmsg+0x27e/0xa20
[ 372.298895][T23557] __x64_sys_recvmmsg+0xde/0x160
[ 372.303892][T23557] do_syscall_64+0x2b/0x70
[ 372.308402][T23557] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 372.314359][T23557] RIP: 0033:0x7fa271cfb049
[ 372.318772][T23557] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 372.338359][T23557] RSP: 002b:00007fa271450168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 372.346795][T23557] RAX: ffffffffffffffda RBX: 00007fa271e0e030 RCX: 00007fa271cfb049
[ 372.354745][T23557] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003
[ 372.362699][T23557] RBP: 00007fa2714501d0 R08: 0000000000000000 R09: 0000000000000000
[ 372.370728][T23557] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 372.378685][T23557] R13: 00007ffcd670d85f R14: 00007fa271450300 R15: 0000000000022000
[ 372.386855][T23557]
03:37:56 executing program 1:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) (fail_nth: 37)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x20000004})
ppoll(&(0x7f0000000000)=[{r2, 0x4b57, 0x64}], 0x1, 0x0, 0x0, 0x0)
03:37:56 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="02030b030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
[ 372.673353][T23573] FAULT_INJECTION: forcing a failure.
[ 372.673353][T23573] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 372.686434][T23573] CPU: 1 PID: 23573 Comm: syz-executor.1 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 372.695754][T23573] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 372.705882][T23573] Call Trace:
[ 372.709138][T23573]
[ 372.712048][T23573] dump_stack_lvl+0xd6/0x122
[ 372.716699][T23573] dump_stack+0x11/0x12
[ 372.720851][T23573] should_fail+0x230/0x240
[ 372.725288][T23573] should_fail_usercopy+0x16/0x20
[ 372.730348][T23573] _copy_from_user+0x1a/0xc0
[ 372.734919][T23573] do_recvmmsg+0x27e/0xa20
[ 372.739383][T23573] __x64_sys_recvmmsg+0xde/0x160
[ 372.744407][T23573] do_syscall_64+0x2b/0x70
[ 372.748876][T23573] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 372.754756][T23573] RIP: 0033:0x7f2c4d882049
[ 372.759169][T23573] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 372.778787][T23573] RSP: 002b:00007f2c4cfd7168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 372.787249][T23573] RAX: ffffffffffffffda RBX: 00007f2c4d995030 RCX: 00007f2c4d882049
[ 372.795259][T23573] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003
[ 372.803283][T23573] RBP: 00007f2c4cfd71d0 R08: 0000000000000000 R09: 0000000000000000
[ 372.811245][T23573] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000002
[ 372.819191][T23573] R13: 00007fffa9548b0f R14: 00007f2c4cfd7300 R15: 0000000000022000
[ 372.827178][T23573]
03:37:56 executing program 0:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x0, 0x0) (fail_nth: 41)
03:37:56 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x0, 0x10, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:56 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x2000000, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:56 executing program 5:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x0, 0x8000000)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x20000004})
ppoll(&(0x7f0000000000)=[{r0, 0x0, 0xb00}, {r2, 0x4b57, 0x64}], 0x2, 0x0, 0x0, 0x1473bf3)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0)
03:37:56 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="02030c030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:56 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x0, 0x11, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:56 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x3000000, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:56 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="02030d030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:56 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x0, 0x12, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:56 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="02030e030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
[ 373.083767][T23596] FAULT_INJECTION: forcing a failure.
[ 373.083767][T23596] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 373.096819][T23596] CPU: 1 PID: 23596 Comm: syz-executor.0 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 373.106079][T23596] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 373.116122][T23596] Call Trace:
[ 373.119382][T23596]
[ 373.122291][T23596] dump_stack_lvl+0xd6/0x122
[ 373.126928][T23596] dump_stack+0x11/0x12
[ 373.131071][T23596] should_fail+0x230/0x240
[ 373.135567][T23596] should_fail_usercopy+0x16/0x20
[ 373.140608][T23596] _copy_from_user+0x1a/0xc0
[ 373.145179][T23596] do_recvmmsg+0x27e/0xa20
[ 373.149597][T23596] __x64_sys_recvmmsg+0xde/0x160
[ 373.154519][T23596] do_syscall_64+0x2b/0x70
[ 373.158930][T23596] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 373.164803][T23596] RIP: 0033:0x7fa271cfb049
[ 373.169234][T23596] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 373.188825][T23596] RSP: 002b:00007fa271450168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 373.197243][T23596] RAX: ffffffffffffffda RBX: 00007fa271e0e030 RCX: 00007fa271cfb049
[ 373.205262][T23596] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003
[ 373.213214][T23596] RBP: 00007fa2714501d0 R08: 0000000000000000 R09: 0000000000000000
[ 373.221190][T23596] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 373.229167][T23596] R13: 00007ffcd670d85f R14: 00007fa271450300 R15: 0000000000022000
[ 373.237121][T23596]
03:37:56 executing program 1:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) (fail_nth: 38)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x20000004})
ppoll(&(0x7f0000000000)=[{r2, 0x4b57, 0x64}], 0x1, 0x0, 0x0, 0x0)
03:37:56 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x0, 0x18, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
[ 373.518630][T23601] FAULT_INJECTION: forcing a failure.
[ 373.518630][T23601] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 373.531846][T23601] CPU: 1 PID: 23601 Comm: syz-executor.1 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 373.541127][T23601] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 373.551175][T23601] Call Trace:
[ 373.554435][T23601]
[ 373.557349][T23601] dump_stack_lvl+0xd6/0x122
[ 373.561997][T23601] dump_stack+0x11/0x12
[ 373.566130][T23601] should_fail+0x230/0x240
[ 373.570611][T23601] should_fail_usercopy+0x16/0x20
[ 373.575617][T23601] _copy_from_user+0x1a/0xc0
[ 373.580186][T23601] do_recvmmsg+0x27e/0xa20
[ 373.584587][T23601] __x64_sys_recvmmsg+0xde/0x160
[ 373.589506][T23601] do_syscall_64+0x2b/0x70
[ 373.593921][T23601] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 373.599809][T23601] RIP: 0033:0x7f2c4d882049
[ 373.604280][T23601] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 373.623899][T23601] RSP: 002b:00007f2c4cfd7168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 373.632292][T23601] RAX: ffffffffffffffda RBX: 00007f2c4d995030 RCX: 00007f2c4d882049
[ 373.640257][T23601] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003
[ 373.648283][T23601] RBP: 00007f2c4cfd71d0 R08: 0000000000000000 R09: 0000000000000000
[ 373.656341][T23601] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000002
[ 373.664292][T23601] R13: 00007fffa9548b0f R14: 00007f2c4cfd7300 R15: 0000000000022000
[ 373.672241][T23601]
03:37:57 executing program 0:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x0, 0x0) (fail_nth: 42)
03:37:57 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x4000000, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:57 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020310030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:57 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x0, 0x24, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:57 executing program 5:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) (async)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x0, 0x8000000) (async)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) (async)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x20000004}) (async)
ppoll(&(0x7f0000000000)=[{r0, 0x0, 0xb00}, {r2, 0x4b57, 0x64}], 0x2, 0x0, 0x0, 0x1473bf3) (async)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0)
03:37:57 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x5000000, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:57 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020311030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:57 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x0, 0x300, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:57 executing program 5:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) (async)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x0, 0x8000000) (async)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) (async)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x20000004}) (async)
ppoll(&(0x7f0000000000)=[{r0, 0x0, 0xb00}, {r2, 0x4b57, 0x64}], 0x2, 0x0, 0x0, 0x1473bf3)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0)
03:37:57 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x6000000, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:57 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020312030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
[ 373.928232][T23630] FAULT_INJECTION: forcing a failure.
[ 373.928232][T23630] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 373.941345][T23630] CPU: 1 PID: 23630 Comm: syz-executor.0 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 373.950638][T23630] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 373.960692][T23630] Call Trace:
[ 373.963970][T23630]
[ 373.966900][T23630] dump_stack_lvl+0xd6/0x122
[ 373.971570][T23630] dump_stack+0x11/0x12
[ 373.975735][T23630] should_fail+0x230/0x240
[ 373.980235][T23630] should_fail_usercopy+0x16/0x20
[ 373.985412][T23630] _copy_from_user+0x1a/0xc0
[ 373.990083][T23630] do_recvmmsg+0x27e/0xa20
[ 373.994502][T23630] __x64_sys_recvmmsg+0xde/0x160
[ 373.999519][T23630] do_syscall_64+0x2b/0x70
[ 374.003958][T23630] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 374.009832][T23630] RIP: 0033:0x7fa271cfb049
[ 374.014275][T23630] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 374.033925][T23630] RSP: 002b:00007fa271450168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 374.042366][T23630] RAX: ffffffffffffffda RBX: 00007fa271e0e030 RCX: 00007fa271cfb049
[ 374.050318][T23630] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003
[ 374.058279][T23630] RBP: 00007fa2714501d0 R08: 0000000000000000 R09: 0000000000000000
[ 374.066281][T23630] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 374.074237][T23630] R13: 00007ffcd670d85f R14: 00007fa271450300 R15: 0000000000022000
[ 374.082237][T23630]
03:37:57 executing program 1:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) (fail_nth: 39)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x20000004})
ppoll(&(0x7f0000000000)=[{r2, 0x4b57, 0x64}], 0x1, 0x0, 0x0, 0x0)
[ 374.360465][T23633] FAULT_INJECTION: forcing a failure.
[ 374.360465][T23633] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 374.373533][T23633] CPU: 0 PID: 23633 Comm: syz-executor.1 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 374.382817][T23633] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 374.392854][T23633] Call Trace:
[ 374.396130][T23633]
[ 374.399039][T23633] dump_stack_lvl+0xd6/0x122
[ 374.403614][T23633] dump_stack+0x11/0x12
[ 374.407793][T23633] should_fail+0x230/0x240
[ 374.412195][T23633] should_fail_usercopy+0x16/0x20
[ 374.417277][T23633] _copy_from_user+0x1a/0xc0
[ 374.421904][T23633] do_recvmmsg+0x27e/0xa20
[ 374.426355][T23633] __x64_sys_recvmmsg+0xde/0x160
[ 374.431275][T23633] do_syscall_64+0x2b/0x70
[ 374.435761][T23633] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 374.441636][T23633] RIP: 0033:0x7f2c4d882049
[ 374.446029][T23633] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 374.465656][T23633] RSP: 002b:00007f2c4cfd7168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 374.474055][T23633] RAX: ffffffffffffffda RBX: 00007f2c4d995030 RCX: 00007f2c4d882049
[ 374.482004][T23633] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003
[ 374.489954][T23633] RBP: 00007f2c4cfd71d0 R08: 0000000000000000 R09: 0000000000000000
[ 374.497916][T23633] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000002
[ 374.505865][T23633] R13: 00007fffa9548b0f R14: 00007f2c4cfd7300 R15: 0000000000022000
[ 374.513892][T23633]
03:37:58 executing program 0:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x0, 0x0) (fail_nth: 43)
03:37:58 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x0, 0x500, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:58 executing program 5:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x0, 0x3, 0x0)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x20000004})
ioctl$BTRFS_IOC_FS_INFO(r1, 0x8400941f, &(0x7f0000000200))
sendmsg$IPSET_CMD_SAVE(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000a40)={0x24, 0x8, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0)
r3 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_SAVE(r3, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000a40)={0x24, 0x8, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0)
r4 = bpf$ITER_CREATE(0x21, &(0x7f00000021c0), 0x8)
r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
tkill(r5, 0x40)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002200)={{{@in6=@private2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@private}}, &(0x7f0000002300)=0xe8)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000002340)={0x0, 0x0, 0x0}, &(0x7f0000002380)=0xc)
ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f00000023c0)=0x0)
r9 = getegid()
sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002500)=[{{&(0x7f0000000100)=@file={0x1}, 0x6e, &(0x7f0000000180)=[{&(0x7f0000000600)="0a7a36a2b4aa2258efc54597c5e801aecc5c9fbd927747642a45e4a69ac76fd30cece59b3f12be09378790a22c200b60648e0e0f6120fba49f8dd77b67c1cd77f0732f55ca6871ded625f36d4d15772065b3e736763b508e81e8de541f4d038d3278024cdf55b12632255b399a3828bc465a49d6e7d27bfe18f78e361c51b2a87adac72d215bbf47959d783ddb68fa40d8e85747f11d", 0x96}, {&(0x7f00000006c0)="564f831cc3afdd23b8b4836f113ec87c3a8876f539d4f53e96562067d28e88df5d32039979be8c4e4706b59c7e0a14db1ba605e1a4f2a9d7db8bf499763efd96169553c1eaa1360d0fd64b84e9b5", 0x4e}, {&(0x7f0000000740)="97b1814969ad3a3d182b1bfef8b3f2580e3b45341f5b453b324a363f65cddaf4561e7a6183fd5f194f12b84fb5d7d8ff6a1ddb36a524a81260d5f085006c8c2358abc536d90289b3f36795386a1a25edaa0500bbfd6b9dfbb3fa509ba31031de82ecb6498d871167d1213ae5e357a8ea8516cd2ba6649646538789bd79b8df4dc8d660f7de51a6737de622224ea77edc46e39daebbdcecb73caf9835f0aa9d3ac2c3ef2f3530f012ee9a59", 0xab}, {&(0x7f0000000800)="a4491872e8ca80324808422cc22d6b21d8689fcb44fac927ca15042985b77e9b58f5bc118b67f57fb67716b943e6b35d7115c1ee1bc97654ddf252b8edbc8ae66d3cbdf617582648e5d1bc8848d9312d34351e4dfe9b4eda43eef44f5955a05c0e91d5cff90f6e506bd0e324c51ae559209e74e96d", 0x75}], 0x4, &(0x7f0000000a40)=[@rights={{0x14, 0x1, 0x1, [r2]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}], 0x38, 0x88810}}, {{&(0x7f0000000a80)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000e40)=[{&(0x7f0000000b00)="a9bea965356de178df9801480a85cb5c3ed31ded814bfecfd973c03604e6fed122a3fdc3f3629dd0caeb3d8b0fbcf9e12c862f0f7f7204a80f1f6afac79ecf93da903875b62a85bda626a32068b802cad00d9a98b6658860eae6e6303eb96812bced0ab7bdbe194787fca0cc61e37f37ddb1c0b32e564ab3243cdaff4dfd8bbfe5cc54ff4bdd40ce72f12ea41f7414ac04", 0x91}, {&(0x7f0000000bc0)="79985e1198fe303c19ada58ea2808484b93a10ad787292f7716460971d1d979607cb09cd05ade7c1f14af653a3c5b653a20d622c79d01020b70714b79244bbdf9f7865a5a7058d5b4f0340e816f3554d7a186a78f3aa865c9aa2e27101a8c6fa2e87dba53e5835b4cd505e54be04b13dd3a0f8298418492f29c854e95e84b3ff84afcf65753fb1515bc2d5803416d3880b5c82a4f38285210bf56cff3eaec7566eb99977d2549f30f3a5f464fc5273d914802e0114ac1b1df4173972a40b6eba616d731244b88e7541a29ee62279f820ae84912ec4812d3ab7c876e1cb9b3ad28d1db6f7982d", 0xe6}, {&(0x7f0000000cc0)="8406cdde5c8d0797cc05058f10f316afe6337c69820717c33b0d75fe63031d3e79664b21a9699c596263df44e1067369dcdb11b07be82350fd35dad543879721f71bdf33761253a89233ff4dbc24fd7b3531aab114da7741bed7d98057c362d8a4c49e9eff8078d6b6d08cee8cd74ae497dd71164b29749a79b3b95237987aabf4f783cd103a9bca27974af6a92919d8936a43aedfa22526418d7bf29f1ab4c5d645bd89971e4bc137adfe1746991b1b05dc32", 0xb3}, {&(0x7f0000000d80)="2a07e11a1f1b79d2a31ac7b2ff1aa02acde8aa4ab66f6ef5d3904fb006bd2aeace9d1fa9000f118bad3279a8e3314e71a32843e553ab460198fb0cffdcb9", 0x3e}, {&(0x7f0000000dc0)="6bac536aa185b73120b6999885c85e2e352bed80e3d6b87fdaad6632530d6b0c7a9b741425fa0bbab47e7a0e0ca1f8bd4148f8b39ca1836cd641443759bb412001e1c24ec62b11442cd1ee97feba33a6e26945bcd7750fe97aa02ef990f42941aaf246573b27bc72fb06f4167605142655828c49caaffce3d7", 0x79}], 0x5, &(0x7f0000000f80)=[@rights={{0x14, 0x1, 0x1, [r0]}}, @rights={{0x1c, 0x1, 0x1, [r0, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58, 0x10}}, {{&(0x7f0000001000)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000001280)=[{&(0x7f0000001080)="bb6f6dd1a733d1c47c43df2400555d3832a12330e6bca86364404fe20d0f73371b061dff56427625a87cf0ca8a6a896b68c76d69131570d18f4faef735ecc3c7313d73979d9d49ae3ab67a6d65401b2428ad099e2fcca5e8cd672ff561fd98239ff4b7eb222044081511071079bfa0332541c9552f80a402275d98a71c00b32aa9233b1f1fdd40407826bda2a19e3c8cde8bd05d0e8415de186db1901b45c9fb6fa4c3c0fb0e8d00f348dd0b1ddd503a0f28a626a2fdce9a", 0xb8}, {&(0x7f0000001140)="4e1b9d4aa0cbc6dba346cb1180850e8f92360421f67b52734cf4d77a6598", 0x1e}, {&(0x7f0000001180)="4c77768817d0aed3399ec36086485a0452cf8352aa095b6eb70365884af0d3da11e79553cc93f0867418251bd45212504ca9775ebc153f44b671ac2cbdaecc1fd091fd8b9c41ff8a72227284a3fa82b5f4598d370041b471d77a8281d4f12ac054fcc4eddfa597ce12d03ea158930663f6a7ff56e2db3ba1d3710142a100ab903f78bcf0c86ca72d7734ae205aefbd8f2b0ddf695a223cab0d1d03f0883bd42f2c8526a344d6a21442bdfc892a119b663b3808239adb052e24e7cd526a054ff08fde4c6dea569b815743645a5ccfa5f5229198a00a0223b4faabd88c4ce7716335f91478e25859dffe", 0xe9}], 0x3, &(0x7f00000012c0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee00}}}, @rights={{0x20, 0x1, 0x1, [r1, r2, 0xffffffffffffffff, r0]}}], 0x40, 0x24048080}}, {{&(0x7f0000001300)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000001600)=[{&(0x7f0000001380)="69a9a4b96401640b6c3eac1a24904f5e217b1a082d1ea8252ed712c6ea27a93bc5a87ad26b9f90e00031367c203b59f4658768916a38478dae4c807488e72f199b547bb654b07ebf5ed7596d35ba756fcc3318424556c5f24479af68d09e1fe559a8575ed54c88e5db8fb36cc1b2f713385fcac1f3509e3f2c8369371bf7d3e6798eafe711d45f2d9fd2cb503a2f97acb7321a571b4c6e812da17b43629c15617df146d73f983a33", 0xa8}, {&(0x7f0000001440)="01b07f812c87b8ff48eeb589f02bcbadf1b3e5f229728f074d8bbace720ea30671d0f7e3758d3db9929e62f2580700770c199c9fed393901fb3355482a0014adcb98849451b4c390b6317d41aa4a6cc5dd4f92887b70b7d52fb1a2ea5b31c3b41c1b596e0c407e7a5696d865ed877b8a56db54f3f4fcb6abd090eac9dc9fada0", 0x80}, {&(0x7f00000014c0)="43484fdc79fcabc3ee5e6a3607e4dc7858b6ace10eff333a5268bbb928ebda164327b9459bb58262e95ed1b250d9bf9b901068594d1c030a860026a5806651a447a3d3a9512b4ae4e9abf62f756449f116a0cc636b207e805a1a4682ea868f6694648a53779fb8270b10bcec5eed58c3ecc5fce19222565ae51c741b070d8b7cbc3d69dbe4c9db58da375f5041cb02c2a0b806139cf44c9dc7ad246cc1dc5e97ee516998a03bc8bccb23f9166bf821", 0xaf}, {&(0x7f0000001580)="317070a0c432eef3c9dec4421cb83deab35725cf43af2e6e6021995253ae", 0x1e}, {&(0x7f00000015c0)="6c43f3a99e168677b463c87a5bfab26d015be5d275b93b74a8e4c1232cb64669e6", 0x21}], 0x5, 0x0, 0x0, 0x80}}, {{&(0x7f0000001680)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001880)=[{&(0x7f0000001700)="b8065d654edc53bfadd15efeffb7e76d569c7ecd75690ffab28c82627b3bab30b4d8386b6a8dfbdf0c4c4e7cbdcadac5e9dd2dac95a0a3e57b2835f5d558c50e0967c7f7736ebe7f2fb8050acc5036e76ae7155a94a7ce33b9f81524d8781c4d2a952383d7abab6215e5c039ba15633db6c712bc027ef9d5d917d1d58f44eaddf3308ea4ddd3317d68e0187fb11028ea6bf5c567a628b9458e51", 0x9a}, {&(0x7f00000017c0)="ed33b31b94442226de321abbdcf92e65687de27c77e1224ad1d4db781420b431a8338f425225a516ad6c846c42744fe7a0a1e8c7de7a19b4b806a2438423782e875d2adcd647c771b7f9fef47b1c8e706e3d69543c7146eaa8c739be0ed8fa2a381851a8227d1373c98fc435c0bcc1c0522e98cc7bbb7a81a84b60002c4cb495d81dd5f4d126d4a9c95d04", 0x8b}], 0x2, &(0x7f0000001b80)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r2, r2, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}, @cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r1, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, r1]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r0, 0xffffffffffffffff]}}], 0x130, 0x8004}}, {{&(0x7f0000001cc0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001f80)=[{&(0x7f0000001d40)="22210e71654f735f86a5d43b", 0xc}, {&(0x7f0000001d80)="a90fda5b5013f9c8cf00df725eca8a88896cb9c77898fc5328e446ca569a54332ea22e1e4cbccf15449596c5edf92ba63ccd8916ba5a77472a24656411904f992a9fa7ab0cc1191fb0dc754ee41ce6cb51f0eb45ad890feed3bdbe6001320298595a805504140d046f7fc21d443b0aa62fe282f345d6372feaeb8609d7dc4efc911d72597c1bd1c2d13357b67977a5bd829383b6d9557537f8c51cb07b37535cb7f035565329c0396301d0db6ff7a44ad11c9dacac2d1ef93c2ec59eaee3258ad9ba02ee5e96c1dee7742b569ebdfe449a62a9f9573698a82d", 0xd9}, {&(0x7f0000001e80)="89f3b43d56ccd93e1aeda137a1911f4b68bbaa3b6c0fa7422aba4944b7e753e635f1e0fbe78351ab00ae74d4f200d81efe52c516f4e5f1acbe3a872c92", 0x3d}, {&(0x7f0000001ec0)="b9a647a968b8e97c49c8ddb8b22a234a2073f8a2dfd7891bad2b76e62976ca9068a01bb9936b4871d49d27eea6b8fd9e7e5fa3199633d21e969c3f22bdb482406b150dc456673fe327f576320618799624898a575a624470c2f2914fd3a352fb3d5cdb34c98137f7d06a0ad0e5c132b470088b308e876aa7b8ed90bd0192ebcf128c6c01c3fcd316efa9d7d8e6051485f033567d7b7b1e7944c5d17333c24324abcafc76d02970ce544fcc979b", 0xad}], 0x4, &(0x7f0000002400)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, r1, r3, r2, r4, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0xee00, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r6, r7}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xffffffffffffffff, r9}}}], 0xf0, 0x8000}}], 0x6, 0x4040000)
ppoll(&(0x7f0000000000)=[{r0, 0x0, 0xb00}, {r2, 0x4b57, 0x64}], 0x2, 0x0, 0x0, 0x1473bf3)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0)
03:37:58 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x7000000, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:58 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020318030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:58 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x8000000, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:58 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x0, 0x600, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:58 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020324030e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:58 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x9000000, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:58 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x0, 0x700, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:58 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020300090e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
[ 374.786888][T23659] FAULT_INJECTION: forcing a failure.
[ 374.786888][T23659] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 374.799989][T23659] CPU: 0 PID: 23659 Comm: syz-executor.0 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 374.809284][T23659] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 374.819370][T23659] Call Trace:
[ 374.822626][T23659]
[ 374.825536][T23659] dump_stack_lvl+0xd6/0x122
[ 374.830178][T23659] dump_stack+0x11/0x12
[ 374.834313][T23659] should_fail+0x230/0x240
[ 374.838739][T23659] should_fail_usercopy+0x16/0x20
[ 374.843762][T23659] _copy_from_user+0x1a/0xc0
[ 374.848358][T23659] do_recvmmsg+0x27e/0xa20
[ 374.852767][T23659] __x64_sys_recvmmsg+0xde/0x160
[ 374.857717][T23659] do_syscall_64+0x2b/0x70
[ 374.862117][T23659] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 374.868084][T23659] RIP: 0033:0x7fa271cfb049
[ 374.872517][T23659] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 374.892143][T23659] RSP: 002b:00007fa271450168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 374.900537][T23659] RAX: ffffffffffffffda RBX: 00007fa271e0e030 RCX: 00007fa271cfb049
[ 374.908528][T23659] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003
[ 374.916526][T23659] RBP: 00007fa2714501d0 R08: 0000000000000000 R09: 0000000000000000
[ 374.924481][T23659] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 374.932526][T23659] R13: 00007ffcd670d85f R14: 00007fa271450300 R15: 0000000000022000
[ 374.940488][T23659]
03:37:58 executing program 1:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) (fail_nth: 40)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x20000004})
ppoll(&(0x7f0000000000)=[{r2, 0x4b57, 0x64}], 0x1, 0x0, 0x0, 0x0)
[ 375.204549][T23663] FAULT_INJECTION: forcing a failure.
[ 375.204549][T23663] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 375.217598][T23663] CPU: 0 PID: 23663 Comm: syz-executor.1 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 375.226880][T23663] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 375.236912][T23663] Call Trace:
[ 375.240170][T23663]
[ 375.243078][T23663] dump_stack_lvl+0xd6/0x122
[ 375.247712][T23663] dump_stack+0x11/0x12
[ 375.251989][T23663] should_fail+0x230/0x240
[ 375.256401][T23663] should_fail_usercopy+0x16/0x20
[ 375.261435][T23663] _copy_from_user+0x1a/0xc0
[ 375.266104][T23663] do_recvmmsg+0x27e/0xa20
[ 375.270512][T23663] __x64_sys_recvmmsg+0xde/0x160
[ 375.275464][T23663] do_syscall_64+0x2b/0x70
[ 375.279862][T23663] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 375.285734][T23663] RIP: 0033:0x7f2c4d882049
[ 375.290152][T23663] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 375.309742][T23663] RSP: 002b:00007f2c4cfd7168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 375.318162][T23663] RAX: ffffffffffffffda RBX: 00007f2c4d995030 RCX: 00007f2c4d882049
[ 375.326142][T23663] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003
[ 375.334091][T23663] RBP: 00007f2c4cfd71d0 R08: 0000000000000000 R09: 0000000000000000
[ 375.342037][T23663] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000002
[ 375.349985][T23663] R13: 00007fffa9548b0f R14: 00007f2c4cfd7300 R15: 0000000000022000
[ 375.357984][T23663]
03:37:59 executing program 0:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x0, 0x0) (fail_nth: 44)
03:37:59 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x0, 0x900, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:59 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0xa000000, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:59 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="0203000d0e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:59 executing program 5:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x0, 0x3, 0x0)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x20000004})
ioctl$BTRFS_IOC_FS_INFO(r1, 0x8400941f, &(0x7f0000000200))
sendmsg$IPSET_CMD_SAVE(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000a40)={0x24, 0x8, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0)
r3 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_SAVE(r3, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000a40)={0x24, 0x8, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0)
r4 = bpf$ITER_CREATE(0x21, &(0x7f00000021c0), 0x8)
r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
tkill(r5, 0x40)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002200)={{{@in6=@private2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@private}}, &(0x7f0000002300)=0xe8)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000002340)={0x0, 0x0, 0x0}, &(0x7f0000002380)=0xc)
ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f00000023c0)=0x0)
r9 = getegid()
sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002500)=[{{&(0x7f0000000100)=@file={0x1}, 0x6e, &(0x7f0000000180)=[{&(0x7f0000000600)="0a7a36a2b4aa2258efc54597c5e801aecc5c9fbd927747642a45e4a69ac76fd30cece59b3f12be09378790a22c200b60648e0e0f6120fba49f8dd77b67c1cd77f0732f55ca6871ded625f36d4d15772065b3e736763b508e81e8de541f4d038d3278024cdf55b12632255b399a3828bc465a49d6e7d27bfe18f78e361c51b2a87adac72d215bbf47959d783ddb68fa40d8e85747f11d", 0x96}, {&(0x7f00000006c0)="564f831cc3afdd23b8b4836f113ec87c3a8876f539d4f53e96562067d28e88df5d32039979be8c4e4706b59c7e0a14db1ba605e1a4f2a9d7db8bf499763efd96169553c1eaa1360d0fd64b84e9b5", 0x4e}, {&(0x7f0000000740)="97b1814969ad3a3d182b1bfef8b3f2580e3b45341f5b453b324a363f65cddaf4561e7a6183fd5f194f12b84fb5d7d8ff6a1ddb36a524a81260d5f085006c8c2358abc536d90289b3f36795386a1a25edaa0500bbfd6b9dfbb3fa509ba31031de82ecb6498d871167d1213ae5e357a8ea8516cd2ba6649646538789bd79b8df4dc8d660f7de51a6737de622224ea77edc46e39daebbdcecb73caf9835f0aa9d3ac2c3ef2f3530f012ee9a59", 0xab}, {&(0x7f0000000800)="a4491872e8ca80324808422cc22d6b21d8689fcb44fac927ca15042985b77e9b58f5bc118b67f57fb67716b943e6b35d7115c1ee1bc97654ddf252b8edbc8ae66d3cbdf617582648e5d1bc8848d9312d34351e4dfe9b4eda43eef44f5955a05c0e91d5cff90f6e506bd0e324c51ae559209e74e96d", 0x75}], 0x4, &(0x7f0000000a40)=[@rights={{0x14, 0x1, 0x1, [r2]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}], 0x38, 0x88810}}, {{&(0x7f0000000a80)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000e40)=[{&(0x7f0000000b00)="a9bea965356de178df9801480a85cb5c3ed31ded814bfecfd973c03604e6fed122a3fdc3f3629dd0caeb3d8b0fbcf9e12c862f0f7f7204a80f1f6afac79ecf93da903875b62a85bda626a32068b802cad00d9a98b6658860eae6e6303eb96812bced0ab7bdbe194787fca0cc61e37f37ddb1c0b32e564ab3243cdaff4dfd8bbfe5cc54ff4bdd40ce72f12ea41f7414ac04", 0x91}, {&(0x7f0000000bc0)="79985e1198fe303c19ada58ea2808484b93a10ad787292f7716460971d1d979607cb09cd05ade7c1f14af653a3c5b653a20d622c79d01020b70714b79244bbdf9f7865a5a7058d5b4f0340e816f3554d7a186a78f3aa865c9aa2e27101a8c6fa2e87dba53e5835b4cd505e54be04b13dd3a0f8298418492f29c854e95e84b3ff84afcf65753fb1515bc2d5803416d3880b5c82a4f38285210bf56cff3eaec7566eb99977d2549f30f3a5f464fc5273d914802e0114ac1b1df4173972a40b6eba616d731244b88e7541a29ee62279f820ae84912ec4812d3ab7c876e1cb9b3ad28d1db6f7982d", 0xe6}, {&(0x7f0000000cc0)="8406cdde5c8d0797cc05058f10f316afe6337c69820717c33b0d75fe63031d3e79664b21a9699c596263df44e1067369dcdb11b07be82350fd35dad543879721f71bdf33761253a89233ff4dbc24fd7b3531aab114da7741bed7d98057c362d8a4c49e9eff8078d6b6d08cee8cd74ae497dd71164b29749a79b3b95237987aabf4f783cd103a9bca27974af6a92919d8936a43aedfa22526418d7bf29f1ab4c5d645bd89971e4bc137adfe1746991b1b05dc32", 0xb3}, {&(0x7f0000000d80)="2a07e11a1f1b79d2a31ac7b2ff1aa02acde8aa4ab66f6ef5d3904fb006bd2aeace9d1fa9000f118bad3279a8e3314e71a32843e553ab460198fb0cffdcb9", 0x3e}, {&(0x7f0000000dc0)="6bac536aa185b73120b6999885c85e2e352bed80e3d6b87fdaad6632530d6b0c7a9b741425fa0bbab47e7a0e0ca1f8bd4148f8b39ca1836cd641443759bb412001e1c24ec62b11442cd1ee97feba33a6e26945bcd7750fe97aa02ef990f42941aaf246573b27bc72fb06f4167605142655828c49caaffce3d7", 0x79}], 0x5, &(0x7f0000000f80)=[@rights={{0x14, 0x1, 0x1, [r0]}}, @rights={{0x1c, 0x1, 0x1, [r0, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58, 0x10}}, {{&(0x7f0000001000)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000001280)=[{&(0x7f0000001080)="bb6f6dd1a733d1c47c43df2400555d3832a12330e6bca86364404fe20d0f73371b061dff56427625a87cf0ca8a6a896b68c76d69131570d18f4faef735ecc3c7313d73979d9d49ae3ab67a6d65401b2428ad099e2fcca5e8cd672ff561fd98239ff4b7eb222044081511071079bfa0332541c9552f80a402275d98a71c00b32aa9233b1f1fdd40407826bda2a19e3c8cde8bd05d0e8415de186db1901b45c9fb6fa4c3c0fb0e8d00f348dd0b1ddd503a0f28a626a2fdce9a", 0xb8}, {&(0x7f0000001140)="4e1b9d4aa0cbc6dba346cb1180850e8f92360421f67b52734cf4d77a6598", 0x1e}, {&(0x7f0000001180)="4c77768817d0aed3399ec36086485a0452cf8352aa095b6eb70365884af0d3da11e79553cc93f0867418251bd45212504ca9775ebc153f44b671ac2cbdaecc1fd091fd8b9c41ff8a72227284a3fa82b5f4598d370041b471d77a8281d4f12ac054fcc4eddfa597ce12d03ea158930663f6a7ff56e2db3ba1d3710142a100ab903f78bcf0c86ca72d7734ae205aefbd8f2b0ddf695a223cab0d1d03f0883bd42f2c8526a344d6a21442bdfc892a119b663b3808239adb052e24e7cd526a054ff08fde4c6dea569b815743645a5ccfa5f5229198a00a0223b4faabd88c4ce7716335f91478e25859dffe", 0xe9}], 0x3, &(0x7f00000012c0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee00}}}, @rights={{0x20, 0x1, 0x1, [r1, r2, 0xffffffffffffffff, r0]}}], 0x40, 0x24048080}}, {{&(0x7f0000001300)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000001600)=[{&(0x7f0000001380)="69a9a4b96401640b6c3eac1a24904f5e217b1a082d1ea8252ed712c6ea27a93bc5a87ad26b9f90e00031367c203b59f4658768916a38478dae4c807488e72f199b547bb654b07ebf5ed7596d35ba756fcc3318424556c5f24479af68d09e1fe559a8575ed54c88e5db8fb36cc1b2f713385fcac1f3509e3f2c8369371bf7d3e6798eafe711d45f2d9fd2cb503a2f97acb7321a571b4c6e812da17b43629c15617df146d73f983a33", 0xa8}, {&(0x7f0000001440)="01b07f812c87b8ff48eeb589f02bcbadf1b3e5f229728f074d8bbace720ea30671d0f7e3758d3db9929e62f2580700770c199c9fed393901fb3355482a0014adcb98849451b4c390b6317d41aa4a6cc5dd4f92887b70b7d52fb1a2ea5b31c3b41c1b596e0c407e7a5696d865ed877b8a56db54f3f4fcb6abd090eac9dc9fada0", 0x80}, {&(0x7f00000014c0)="43484fdc79fcabc3ee5e6a3607e4dc7858b6ace10eff333a5268bbb928ebda164327b9459bb58262e95ed1b250d9bf9b901068594d1c030a860026a5806651a447a3d3a9512b4ae4e9abf62f756449f116a0cc636b207e805a1a4682ea868f6694648a53779fb8270b10bcec5eed58c3ecc5fce19222565ae51c741b070d8b7cbc3d69dbe4c9db58da375f5041cb02c2a0b806139cf44c9dc7ad246cc1dc5e97ee516998a03bc8bccb23f9166bf821", 0xaf}, {&(0x7f0000001580)="317070a0c432eef3c9dec4421cb83deab35725cf43af2e6e6021995253ae", 0x1e}, {&(0x7f00000015c0)="6c43f3a99e168677b463c87a5bfab26d015be5d275b93b74a8e4c1232cb64669e6", 0x21}], 0x5, 0x0, 0x0, 0x80}}, {{&(0x7f0000001680)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001880)=[{&(0x7f0000001700)="b8065d654edc53bfadd15efeffb7e76d569c7ecd75690ffab28c82627b3bab30b4d8386b6a8dfbdf0c4c4e7cbdcadac5e9dd2dac95a0a3e57b2835f5d558c50e0967c7f7736ebe7f2fb8050acc5036e76ae7155a94a7ce33b9f81524d8781c4d2a952383d7abab6215e5c039ba15633db6c712bc027ef9d5d917d1d58f44eaddf3308ea4ddd3317d68e0187fb11028ea6bf5c567a628b9458e51", 0x9a}, {&(0x7f00000017c0)="ed33b31b94442226de321abbdcf92e65687de27c77e1224ad1d4db781420b431a8338f425225a516ad6c846c42744fe7a0a1e8c7de7a19b4b806a2438423782e875d2adcd647c771b7f9fef47b1c8e706e3d69543c7146eaa8c739be0ed8fa2a381851a8227d1373c98fc435c0bcc1c0522e98cc7bbb7a81a84b60002c4cb495d81dd5f4d126d4a9c95d04", 0x8b}], 0x2, &(0x7f0000001b80)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r2, r2, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}, @cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r1, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, r1]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r0, 0xffffffffffffffff]}}], 0x130, 0x8004}}, {{&(0x7f0000001cc0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001f80)=[{&(0x7f0000001d40)="22210e71654f735f86a5d43b", 0xc}, {&(0x7f0000001d80)="a90fda5b5013f9c8cf00df725eca8a88896cb9c77898fc5328e446ca569a54332ea22e1e4cbccf15449596c5edf92ba63ccd8916ba5a77472a24656411904f992a9fa7ab0cc1191fb0dc754ee41ce6cb51f0eb45ad890feed3bdbe6001320298595a805504140d046f7fc21d443b0aa62fe282f345d6372feaeb8609d7dc4efc911d72597c1bd1c2d13357b67977a5bd829383b6d9557537f8c51cb07b37535cb7f035565329c0396301d0db6ff7a44ad11c9dacac2d1ef93c2ec59eaee3258ad9ba02ee5e96c1dee7742b569ebdfe449a62a9f9573698a82d", 0xd9}, {&(0x7f0000001e80)="89f3b43d56ccd93e1aeda137a1911f4b68bbaa3b6c0fa7422aba4944b7e753e635f1e0fbe78351ab00ae74d4f200d81efe52c516f4e5f1acbe3a872c92", 0x3d}, {&(0x7f0000001ec0)="b9a647a968b8e97c49c8ddb8b22a234a2073f8a2dfd7891bad2b76e62976ca9068a01bb9936b4871d49d27eea6b8fd9e7e5fa3199633d21e969c3f22bdb482406b150dc456673fe327f576320618799624898a575a624470c2f2914fd3a352fb3d5cdb34c98137f7d06a0ad0e5c132b470088b308e876aa7b8ed90bd0192ebcf128c6c01c3fcd316efa9d7d8e6051485f033567d7b7b1e7944c5d17333c24324abcafc76d02970ce544fcc979b", 0xad}], 0x4, &(0x7f0000002400)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, r1, r3, r2, r4, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0xee00, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r6, r7}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xffffffffffffffff, r9}}}], 0xf0, 0x8000}}], 0x6, 0x4040000)
ppoll(&(0x7f0000000000)=[{r0, 0x0, 0xb00}, {r2, 0x4b57, 0x64}], 0x2, 0x0, 0x0, 0x1473bf3)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)) (async)
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) (async)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) (async)
recvmmsg(r0, &(0x7f00000000c0), 0x0, 0x3, 0x0) (async)
epoll_create1(0x0) (async)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x20000004}) (async)
ioctl$BTRFS_IOC_FS_INFO(r1, 0x8400941f, &(0x7f0000000200)) (async)
sendmsg$IPSET_CMD_SAVE(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000a40)={0x24, 0x8, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) (async)
socket$nl_netfilter(0x10, 0x3, 0xc) (async)
sendmsg$IPSET_CMD_SAVE(r3, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000a40)={0x24, 0x8, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) (async)
bpf$ITER_CREATE(0x21, &(0x7f00000021c0), 0x8) (async)
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async)
tkill(r5, 0x40) (async)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002200)={{{@in6=@private2, @in6=@mcast1}}, {{@in6=@empty}, 0x0, @in=@private}}, &(0x7f0000002300)=0xe8) (async)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000002340), &(0x7f0000002380)=0xc) (async)
ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f00000023c0)) (async)
getegid() (async)
sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002500)=[{{&(0x7f0000000100)=@file={0x1}, 0x6e, &(0x7f0000000180)=[{&(0x7f0000000600)="0a7a36a2b4aa2258efc54597c5e801aecc5c9fbd927747642a45e4a69ac76fd30cece59b3f12be09378790a22c200b60648e0e0f6120fba49f8dd77b67c1cd77f0732f55ca6871ded625f36d4d15772065b3e736763b508e81e8de541f4d038d3278024cdf55b12632255b399a3828bc465a49d6e7d27bfe18f78e361c51b2a87adac72d215bbf47959d783ddb68fa40d8e85747f11d", 0x96}, {&(0x7f00000006c0)="564f831cc3afdd23b8b4836f113ec87c3a8876f539d4f53e96562067d28e88df5d32039979be8c4e4706b59c7e0a14db1ba605e1a4f2a9d7db8bf499763efd96169553c1eaa1360d0fd64b84e9b5", 0x4e}, {&(0x7f0000000740)="97b1814969ad3a3d182b1bfef8b3f2580e3b45341f5b453b324a363f65cddaf4561e7a6183fd5f194f12b84fb5d7d8ff6a1ddb36a524a81260d5f085006c8c2358abc536d90289b3f36795386a1a25edaa0500bbfd6b9dfbb3fa509ba31031de82ecb6498d871167d1213ae5e357a8ea8516cd2ba6649646538789bd79b8df4dc8d660f7de51a6737de622224ea77edc46e39daebbdcecb73caf9835f0aa9d3ac2c3ef2f3530f012ee9a59", 0xab}, {&(0x7f0000000800)="a4491872e8ca80324808422cc22d6b21d8689fcb44fac927ca15042985b77e9b58f5bc118b67f57fb67716b943e6b35d7115c1ee1bc97654ddf252b8edbc8ae66d3cbdf617582648e5d1bc8848d9312d34351e4dfe9b4eda43eef44f5955a05c0e91d5cff90f6e506bd0e324c51ae559209e74e96d", 0x75}], 0x4, &(0x7f0000000a40)=[@rights={{0x14, 0x1, 0x1, [r2]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}], 0x38, 0x88810}}, {{&(0x7f0000000a80)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000e40)=[{&(0x7f0000000b00)="a9bea965356de178df9801480a85cb5c3ed31ded814bfecfd973c03604e6fed122a3fdc3f3629dd0caeb3d8b0fbcf9e12c862f0f7f7204a80f1f6afac79ecf93da903875b62a85bda626a32068b802cad00d9a98b6658860eae6e6303eb96812bced0ab7bdbe194787fca0cc61e37f37ddb1c0b32e564ab3243cdaff4dfd8bbfe5cc54ff4bdd40ce72f12ea41f7414ac04", 0x91}, {&(0x7f0000000bc0)="79985e1198fe303c19ada58ea2808484b93a10ad787292f7716460971d1d979607cb09cd05ade7c1f14af653a3c5b653a20d622c79d01020b70714b79244bbdf9f7865a5a7058d5b4f0340e816f3554d7a186a78f3aa865c9aa2e27101a8c6fa2e87dba53e5835b4cd505e54be04b13dd3a0f8298418492f29c854e95e84b3ff84afcf65753fb1515bc2d5803416d3880b5c82a4f38285210bf56cff3eaec7566eb99977d2549f30f3a5f464fc5273d914802e0114ac1b1df4173972a40b6eba616d731244b88e7541a29ee62279f820ae84912ec4812d3ab7c876e1cb9b3ad28d1db6f7982d", 0xe6}, {&(0x7f0000000cc0)="8406cdde5c8d0797cc05058f10f316afe6337c69820717c33b0d75fe63031d3e79664b21a9699c596263df44e1067369dcdb11b07be82350fd35dad543879721f71bdf33761253a89233ff4dbc24fd7b3531aab114da7741bed7d98057c362d8a4c49e9eff8078d6b6d08cee8cd74ae497dd71164b29749a79b3b95237987aabf4f783cd103a9bca27974af6a92919d8936a43aedfa22526418d7bf29f1ab4c5d645bd89971e4bc137adfe1746991b1b05dc32", 0xb3}, {&(0x7f0000000d80)="2a07e11a1f1b79d2a31ac7b2ff1aa02acde8aa4ab66f6ef5d3904fb006bd2aeace9d1fa9000f118bad3279a8e3314e71a32843e553ab460198fb0cffdcb9", 0x3e}, {&(0x7f0000000dc0)="6bac536aa185b73120b6999885c85e2e352bed80e3d6b87fdaad6632530d6b0c7a9b741425fa0bbab47e7a0e0ca1f8bd4148f8b39ca1836cd641443759bb412001e1c24ec62b11442cd1ee97feba33a6e26945bcd7750fe97aa02ef990f42941aaf246573b27bc72fb06f4167605142655828c49caaffce3d7", 0x79}], 0x5, &(0x7f0000000f80)=[@rights={{0x14, 0x1, 0x1, [r0]}}, @rights={{0x1c, 0x1, 0x1, [r0, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58, 0x10}}, {{&(0x7f0000001000)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000001280)=[{&(0x7f0000001080)="bb6f6dd1a733d1c47c43df2400555d3832a12330e6bca86364404fe20d0f73371b061dff56427625a87cf0ca8a6a896b68c76d69131570d18f4faef735ecc3c7313d73979d9d49ae3ab67a6d65401b2428ad099e2fcca5e8cd672ff561fd98239ff4b7eb222044081511071079bfa0332541c9552f80a402275d98a71c00b32aa9233b1f1fdd40407826bda2a19e3c8cde8bd05d0e8415de186db1901b45c9fb6fa4c3c0fb0e8d00f348dd0b1ddd503a0f28a626a2fdce9a", 0xb8}, {&(0x7f0000001140)="4e1b9d4aa0cbc6dba346cb1180850e8f92360421f67b52734cf4d77a6598", 0x1e}, {&(0x7f0000001180)="4c77768817d0aed3399ec36086485a0452cf8352aa095b6eb70365884af0d3da11e79553cc93f0867418251bd45212504ca9775ebc153f44b671ac2cbdaecc1fd091fd8b9c41ff8a72227284a3fa82b5f4598d370041b471d77a8281d4f12ac054fcc4eddfa597ce12d03ea158930663f6a7ff56e2db3ba1d3710142a100ab903f78bcf0c86ca72d7734ae205aefbd8f2b0ddf695a223cab0d1d03f0883bd42f2c8526a344d6a21442bdfc892a119b663b3808239adb052e24e7cd526a054ff08fde4c6dea569b815743645a5ccfa5f5229198a00a0223b4faabd88c4ce7716335f91478e25859dffe", 0xe9}], 0x3, &(0x7f00000012c0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee00}}}, @rights={{0x20, 0x1, 0x1, [r1, r2, 0xffffffffffffffff, r0]}}], 0x40, 0x24048080}}, {{&(0x7f0000001300)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000001600)=[{&(0x7f0000001380)="69a9a4b96401640b6c3eac1a24904f5e217b1a082d1ea8252ed712c6ea27a93bc5a87ad26b9f90e00031367c203b59f4658768916a38478dae4c807488e72f199b547bb654b07ebf5ed7596d35ba756fcc3318424556c5f24479af68d09e1fe559a8575ed54c88e5db8fb36cc1b2f713385fcac1f3509e3f2c8369371bf7d3e6798eafe711d45f2d9fd2cb503a2f97acb7321a571b4c6e812da17b43629c15617df146d73f983a33", 0xa8}, {&(0x7f0000001440)="01b07f812c87b8ff48eeb589f02bcbadf1b3e5f229728f074d8bbace720ea30671d0f7e3758d3db9929e62f2580700770c199c9fed393901fb3355482a0014adcb98849451b4c390b6317d41aa4a6cc5dd4f92887b70b7d52fb1a2ea5b31c3b41c1b596e0c407e7a5696d865ed877b8a56db54f3f4fcb6abd090eac9dc9fada0", 0x80}, {&(0x7f00000014c0)="43484fdc79fcabc3ee5e6a3607e4dc7858b6ace10eff333a5268bbb928ebda164327b9459bb58262e95ed1b250d9bf9b901068594d1c030a860026a5806651a447a3d3a9512b4ae4e9abf62f756449f116a0cc636b207e805a1a4682ea868f6694648a53779fb8270b10bcec5eed58c3ecc5fce19222565ae51c741b070d8b7cbc3d69dbe4c9db58da375f5041cb02c2a0b806139cf44c9dc7ad246cc1dc5e97ee516998a03bc8bccb23f9166bf821", 0xaf}, {&(0x7f0000001580)="317070a0c432eef3c9dec4421cb83deab35725cf43af2e6e6021995253ae", 0x1e}, {&(0x7f00000015c0)="6c43f3a99e168677b463c87a5bfab26d015be5d275b93b74a8e4c1232cb64669e6", 0x21}], 0x5, 0x0, 0x0, 0x80}}, {{&(0x7f0000001680)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001880)=[{&(0x7f0000001700)="b8065d654edc53bfadd15efeffb7e76d569c7ecd75690ffab28c82627b3bab30b4d8386b6a8dfbdf0c4c4e7cbdcadac5e9dd2dac95a0a3e57b2835f5d558c50e0967c7f7736ebe7f2fb8050acc5036e76ae7155a94a7ce33b9f81524d8781c4d2a952383d7abab6215e5c039ba15633db6c712bc027ef9d5d917d1d58f44eaddf3308ea4ddd3317d68e0187fb11028ea6bf5c567a628b9458e51", 0x9a}, {&(0x7f00000017c0)="ed33b31b94442226de321abbdcf92e65687de27c77e1224ad1d4db781420b431a8338f425225a516ad6c846c42744fe7a0a1e8c7de7a19b4b806a2438423782e875d2adcd647c771b7f9fef47b1c8e706e3d69543c7146eaa8c739be0ed8fa2a381851a8227d1373c98fc435c0bcc1c0522e98cc7bbb7a81a84b60002c4cb495d81dd5f4d126d4a9c95d04", 0x8b}], 0x2, &(0x7f0000001b80)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r2, r2, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}, @cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r1, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, r1]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r0, 0xffffffffffffffff]}}], 0x130, 0x8004}}, {{&(0x7f0000001cc0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001f80)=[{&(0x7f0000001d40)="22210e71654f735f86a5d43b", 0xc}, {&(0x7f0000001d80)="a90fda5b5013f9c8cf00df725eca8a88896cb9c77898fc5328e446ca569a54332ea22e1e4cbccf15449596c5edf92ba63ccd8916ba5a77472a24656411904f992a9fa7ab0cc1191fb0dc754ee41ce6cb51f0eb45ad890feed3bdbe6001320298595a805504140d046f7fc21d443b0aa62fe282f345d6372feaeb8609d7dc4efc911d72597c1bd1c2d13357b67977a5bd829383b6d9557537f8c51cb07b37535cb7f035565329c0396301d0db6ff7a44ad11c9dacac2d1ef93c2ec59eaee3258ad9ba02ee5e96c1dee7742b569ebdfe449a62a9f9573698a82d", 0xd9}, {&(0x7f0000001e80)="89f3b43d56ccd93e1aeda137a1911f4b68bbaa3b6c0fa7422aba4944b7e753e635f1e0fbe78351ab00ae74d4f200d81efe52c516f4e5f1acbe3a872c92", 0x3d}, {&(0x7f0000001ec0)="b9a647a968b8e97c49c8ddb8b22a234a2073f8a2dfd7891bad2b76e62976ca9068a01bb9936b4871d49d27eea6b8fd9e7e5fa3199633d21e969c3f22bdb482406b150dc456673fe327f576320618799624898a575a624470c2f2914fd3a352fb3d5cdb34c98137f7d06a0ad0e5c132b470088b308e876aa7b8ed90bd0192ebcf128c6c01c3fcd316efa9d7d8e6051485f033567d7b7b1e7944c5d17333c24324abcafc76d02970ce544fcc979b", 0xad}], 0x4, &(0x7f0000002400)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, r1, r3, r2, r4, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0xee00, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r6, r7}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xffffffffffffffff, r9}}}], 0xf0, 0x8000}}], 0x6, 0x4040000) (async)
ppoll(&(0x7f0000000000)=[{r0, 0x0, 0xb00}, {r2, 0x4b57, 0x64}], 0x2, 0x0, 0x0, 0x1473bf3) (async)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) (async)
03:37:59 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x0, 0xa00, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:59 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0xb000000, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:59 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020300020e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:59 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x0, 0xb00, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:59 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0xc000000, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:59 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020300090e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
[ 375.622882][T23687] FAULT_INJECTION: forcing a failure.
[ 375.622882][T23687] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 375.635984][T23687] CPU: 1 PID: 23687 Comm: syz-executor.0 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 375.645361][T23687] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 375.655453][T23687] Call Trace:
[ 375.658711][T23687]
[ 375.661622][T23687] dump_stack_lvl+0xd6/0x122
[ 375.666245][T23687] dump_stack+0x11/0x12
[ 375.670379][T23687] should_fail+0x230/0x240
[ 375.674803][T23687] should_fail_usercopy+0x16/0x20
[ 375.679924][T23687] _copy_from_user+0x1a/0xc0
[ 375.684553][T23687] do_recvmmsg+0x27e/0xa20
[ 375.689292][T23687] __x64_sys_recvmmsg+0xde/0x160
[ 375.694335][T23687] do_syscall_64+0x2b/0x70
[ 375.698815][T23687] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 375.704713][T23687] RIP: 0033:0x7fa271cfb049
[ 375.709107][T23687] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 375.728694][T23687] RSP: 002b:00007fa271450168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 375.737100][T23687] RAX: ffffffffffffffda RBX: 00007fa271e0e030 RCX: 00007fa271cfb049
[ 375.745051][T23687] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003
[ 375.753047][T23687] RBP: 00007fa2714501d0 R08: 0000000000000000 R09: 0000000000000000
[ 375.761003][T23687] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 375.769018][T23687] R13: 00007ffcd670d85f R14: 00007fa271450300 R15: 0000000000022000
[ 375.776975][T23687]
03:37:59 executing program 1:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) (fail_nth: 41)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x20000004})
ppoll(&(0x7f0000000000)=[{r2, 0x4b57, 0x64}], 0x1, 0x0, 0x0, 0x0)
[ 376.049421][T23712] FAULT_INJECTION: forcing a failure.
[ 376.049421][T23712] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 376.062525][T23712] CPU: 1 PID: 23712 Comm: syz-executor.1 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 376.071807][T23712] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 376.081877][T23712] Call Trace:
[ 376.085155][T23712]
[ 376.088066][T23712] dump_stack_lvl+0xd6/0x122
[ 376.092699][T23712] dump_stack+0x11/0x12
[ 376.096865][T23712] should_fail+0x230/0x240
[ 376.101270][T23712] should_fail_usercopy+0x16/0x20
[ 376.106298][T23712] _copy_from_user+0x1a/0xc0
[ 376.110874][T23712] do_recvmmsg+0x27e/0xa20
[ 376.115295][T23712] __x64_sys_recvmmsg+0xde/0x160
[ 376.120301][T23712] do_syscall_64+0x2b/0x70
[ 376.124782][T23712] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 376.130657][T23712] RIP: 0033:0x7f2c4d882049
[ 376.135140][T23712] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 376.154720][T23712] RSP: 002b:00007f2c4cfd7168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 376.163110][T23712] RAX: ffffffffffffffda RBX: 00007f2c4d995030 RCX: 00007f2c4d882049
[ 376.171124][T23712] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003
[ 376.179089][T23712] RBP: 00007f2c4cfd71d0 R08: 0000000000000000 R09: 0000000000000000
[ 376.187048][T23712] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000002
[ 376.195089][T23712] R13: 00007fffa9548b0f R14: 00007f2c4cfd7300 R15: 0000000000022000
[ 376.203045][T23712]
03:37:59 executing program 0:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x0, 0x0) (fail_nth: 45)
03:37:59 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0xd000000, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:59 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x0, 0xc00, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:59 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="0203000d0e000000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:59 executing program 5:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) (async)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x0, 0x3, 0x0)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x20000004}) (async)
ioctl$BTRFS_IOC_FS_INFO(r1, 0x8400941f, &(0x7f0000000200))
sendmsg$IPSET_CMD_SAVE(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000a40)={0x24, 0x8, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0)
r3 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_SAVE(r3, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000a40)={0x24, 0x8, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0)
r4 = bpf$ITER_CREATE(0x21, &(0x7f00000021c0), 0x8)
r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
tkill(r5, 0x40)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002200)={{{@in6=@private2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@private}}, &(0x7f0000002300)=0xe8) (async)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000002340)={0x0, 0x0, 0x0}, &(0x7f0000002380)=0xc) (async)
ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f00000023c0)=0x0) (async)
r9 = getegid()
sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002500)=[{{&(0x7f0000000100)=@file={0x1}, 0x6e, &(0x7f0000000180)=[{&(0x7f0000000600)="0a7a36a2b4aa2258efc54597c5e801aecc5c9fbd927747642a45e4a69ac76fd30cece59b3f12be09378790a22c200b60648e0e0f6120fba49f8dd77b67c1cd77f0732f55ca6871ded625f36d4d15772065b3e736763b508e81e8de541f4d038d3278024cdf55b12632255b399a3828bc465a49d6e7d27bfe18f78e361c51b2a87adac72d215bbf47959d783ddb68fa40d8e85747f11d", 0x96}, {&(0x7f00000006c0)="564f831cc3afdd23b8b4836f113ec87c3a8876f539d4f53e96562067d28e88df5d32039979be8c4e4706b59c7e0a14db1ba605e1a4f2a9d7db8bf499763efd96169553c1eaa1360d0fd64b84e9b5", 0x4e}, {&(0x7f0000000740)="97b1814969ad3a3d182b1bfef8b3f2580e3b45341f5b453b324a363f65cddaf4561e7a6183fd5f194f12b84fb5d7d8ff6a1ddb36a524a81260d5f085006c8c2358abc536d90289b3f36795386a1a25edaa0500bbfd6b9dfbb3fa509ba31031de82ecb6498d871167d1213ae5e357a8ea8516cd2ba6649646538789bd79b8df4dc8d660f7de51a6737de622224ea77edc46e39daebbdcecb73caf9835f0aa9d3ac2c3ef2f3530f012ee9a59", 0xab}, {&(0x7f0000000800)="a4491872e8ca80324808422cc22d6b21d8689fcb44fac927ca15042985b77e9b58f5bc118b67f57fb67716b943e6b35d7115c1ee1bc97654ddf252b8edbc8ae66d3cbdf617582648e5d1bc8848d9312d34351e4dfe9b4eda43eef44f5955a05c0e91d5cff90f6e506bd0e324c51ae559209e74e96d", 0x75}], 0x4, &(0x7f0000000a40)=[@rights={{0x14, 0x1, 0x1, [r2]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}], 0x38, 0x88810}}, {{&(0x7f0000000a80)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000e40)=[{&(0x7f0000000b00)="a9bea965356de178df9801480a85cb5c3ed31ded814bfecfd973c03604e6fed122a3fdc3f3629dd0caeb3d8b0fbcf9e12c862f0f7f7204a80f1f6afac79ecf93da903875b62a85bda626a32068b802cad00d9a98b6658860eae6e6303eb96812bced0ab7bdbe194787fca0cc61e37f37ddb1c0b32e564ab3243cdaff4dfd8bbfe5cc54ff4bdd40ce72f12ea41f7414ac04", 0x91}, {&(0x7f0000000bc0)="79985e1198fe303c19ada58ea2808484b93a10ad787292f7716460971d1d979607cb09cd05ade7c1f14af653a3c5b653a20d622c79d01020b70714b79244bbdf9f7865a5a7058d5b4f0340e816f3554d7a186a78f3aa865c9aa2e27101a8c6fa2e87dba53e5835b4cd505e54be04b13dd3a0f8298418492f29c854e95e84b3ff84afcf65753fb1515bc2d5803416d3880b5c82a4f38285210bf56cff3eaec7566eb99977d2549f30f3a5f464fc5273d914802e0114ac1b1df4173972a40b6eba616d731244b88e7541a29ee62279f820ae84912ec4812d3ab7c876e1cb9b3ad28d1db6f7982d", 0xe6}, {&(0x7f0000000cc0)="8406cdde5c8d0797cc05058f10f316afe6337c69820717c33b0d75fe63031d3e79664b21a9699c596263df44e1067369dcdb11b07be82350fd35dad543879721f71bdf33761253a89233ff4dbc24fd7b3531aab114da7741bed7d98057c362d8a4c49e9eff8078d6b6d08cee8cd74ae497dd71164b29749a79b3b95237987aabf4f783cd103a9bca27974af6a92919d8936a43aedfa22526418d7bf29f1ab4c5d645bd89971e4bc137adfe1746991b1b05dc32", 0xb3}, {&(0x7f0000000d80)="2a07e11a1f1b79d2a31ac7b2ff1aa02acde8aa4ab66f6ef5d3904fb006bd2aeace9d1fa9000f118bad3279a8e3314e71a32843e553ab460198fb0cffdcb9", 0x3e}, {&(0x7f0000000dc0)="6bac536aa185b73120b6999885c85e2e352bed80e3d6b87fdaad6632530d6b0c7a9b741425fa0bbab47e7a0e0ca1f8bd4148f8b39ca1836cd641443759bb412001e1c24ec62b11442cd1ee97feba33a6e26945bcd7750fe97aa02ef990f42941aaf246573b27bc72fb06f4167605142655828c49caaffce3d7", 0x79}], 0x5, &(0x7f0000000f80)=[@rights={{0x14, 0x1, 0x1, [r0]}}, @rights={{0x1c, 0x1, 0x1, [r0, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58, 0x10}}, {{&(0x7f0000001000)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000001280)=[{&(0x7f0000001080)="bb6f6dd1a733d1c47c43df2400555d3832a12330e6bca86364404fe20d0f73371b061dff56427625a87cf0ca8a6a896b68c76d69131570d18f4faef735ecc3c7313d73979d9d49ae3ab67a6d65401b2428ad099e2fcca5e8cd672ff561fd98239ff4b7eb222044081511071079bfa0332541c9552f80a402275d98a71c00b32aa9233b1f1fdd40407826bda2a19e3c8cde8bd05d0e8415de186db1901b45c9fb6fa4c3c0fb0e8d00f348dd0b1ddd503a0f28a626a2fdce9a", 0xb8}, {&(0x7f0000001140)="4e1b9d4aa0cbc6dba346cb1180850e8f92360421f67b52734cf4d77a6598", 0x1e}, {&(0x7f0000001180)="4c77768817d0aed3399ec36086485a0452cf8352aa095b6eb70365884af0d3da11e79553cc93f0867418251bd45212504ca9775ebc153f44b671ac2cbdaecc1fd091fd8b9c41ff8a72227284a3fa82b5f4598d370041b471d77a8281d4f12ac054fcc4eddfa597ce12d03ea158930663f6a7ff56e2db3ba1d3710142a100ab903f78bcf0c86ca72d7734ae205aefbd8f2b0ddf695a223cab0d1d03f0883bd42f2c8526a344d6a21442bdfc892a119b663b3808239adb052e24e7cd526a054ff08fde4c6dea569b815743645a5ccfa5f5229198a00a0223b4faabd88c4ce7716335f91478e25859dffe", 0xe9}], 0x3, &(0x7f00000012c0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee00}}}, @rights={{0x20, 0x1, 0x1, [r1, r2, 0xffffffffffffffff, r0]}}], 0x40, 0x24048080}}, {{&(0x7f0000001300)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000001600)=[{&(0x7f0000001380)="69a9a4b96401640b6c3eac1a24904f5e217b1a082d1ea8252ed712c6ea27a93bc5a87ad26b9f90e00031367c203b59f4658768916a38478dae4c807488e72f199b547bb654b07ebf5ed7596d35ba756fcc3318424556c5f24479af68d09e1fe559a8575ed54c88e5db8fb36cc1b2f713385fcac1f3509e3f2c8369371bf7d3e6798eafe711d45f2d9fd2cb503a2f97acb7321a571b4c6e812da17b43629c15617df146d73f983a33", 0xa8}, {&(0x7f0000001440)="01b07f812c87b8ff48eeb589f02bcbadf1b3e5f229728f074d8bbace720ea30671d0f7e3758d3db9929e62f2580700770c199c9fed393901fb3355482a0014adcb98849451b4c390b6317d41aa4a6cc5dd4f92887b70b7d52fb1a2ea5b31c3b41c1b596e0c407e7a5696d865ed877b8a56db54f3f4fcb6abd090eac9dc9fada0", 0x80}, {&(0x7f00000014c0)="43484fdc79fcabc3ee5e6a3607e4dc7858b6ace10eff333a5268bbb928ebda164327b9459bb58262e95ed1b250d9bf9b901068594d1c030a860026a5806651a447a3d3a9512b4ae4e9abf62f756449f116a0cc636b207e805a1a4682ea868f6694648a53779fb8270b10bcec5eed58c3ecc5fce19222565ae51c741b070d8b7cbc3d69dbe4c9db58da375f5041cb02c2a0b806139cf44c9dc7ad246cc1dc5e97ee516998a03bc8bccb23f9166bf821", 0xaf}, {&(0x7f0000001580)="317070a0c432eef3c9dec4421cb83deab35725cf43af2e6e6021995253ae", 0x1e}, {&(0x7f00000015c0)="6c43f3a99e168677b463c87a5bfab26d015be5d275b93b74a8e4c1232cb64669e6", 0x21}], 0x5, 0x0, 0x0, 0x80}}, {{&(0x7f0000001680)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001880)=[{&(0x7f0000001700)="b8065d654edc53bfadd15efeffb7e76d569c7ecd75690ffab28c82627b3bab30b4d8386b6a8dfbdf0c4c4e7cbdcadac5e9dd2dac95a0a3e57b2835f5d558c50e0967c7f7736ebe7f2fb8050acc5036e76ae7155a94a7ce33b9f81524d8781c4d2a952383d7abab6215e5c039ba15633db6c712bc027ef9d5d917d1d58f44eaddf3308ea4ddd3317d68e0187fb11028ea6bf5c567a628b9458e51", 0x9a}, {&(0x7f00000017c0)="ed33b31b94442226de321abbdcf92e65687de27c77e1224ad1d4db781420b431a8338f425225a516ad6c846c42744fe7a0a1e8c7de7a19b4b806a2438423782e875d2adcd647c771b7f9fef47b1c8e706e3d69543c7146eaa8c739be0ed8fa2a381851a8227d1373c98fc435c0bcc1c0522e98cc7bbb7a81a84b60002c4cb495d81dd5f4d126d4a9c95d04", 0x8b}], 0x2, &(0x7f0000001b80)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r2, r2, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}, @cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r1, r0, r1, 0xffffffffffffffff, 0xffffffffffffffff, r1]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r0, 0xffffffffffffffff]}}], 0x130, 0x8004}}, {{&(0x7f0000001cc0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001f80)=[{&(0x7f0000001d40)="22210e71654f735f86a5d43b", 0xc}, {&(0x7f0000001d80)="a90fda5b5013f9c8cf00df725eca8a88896cb9c77898fc5328e446ca569a54332ea22e1e4cbccf15449596c5edf92ba63ccd8916ba5a77472a24656411904f992a9fa7ab0cc1191fb0dc754ee41ce6cb51f0eb45ad890feed3bdbe6001320298595a805504140d046f7fc21d443b0aa62fe282f345d6372feaeb8609d7dc4efc911d72597c1bd1c2d13357b67977a5bd829383b6d9557537f8c51cb07b37535cb7f035565329c0396301d0db6ff7a44ad11c9dacac2d1ef93c2ec59eaee3258ad9ba02ee5e96c1dee7742b569ebdfe449a62a9f9573698a82d", 0xd9}, {&(0x7f0000001e80)="89f3b43d56ccd93e1aeda137a1911f4b68bbaa3b6c0fa7422aba4944b7e753e635f1e0fbe78351ab00ae74d4f200d81efe52c516f4e5f1acbe3a872c92", 0x3d}, {&(0x7f0000001ec0)="b9a647a968b8e97c49c8ddb8b22a234a2073f8a2dfd7891bad2b76e62976ca9068a01bb9936b4871d49d27eea6b8fd9e7e5fa3199633d21e969c3f22bdb482406b150dc456673fe327f576320618799624898a575a624470c2f2914fd3a352fb3d5cdb34c98137f7d06a0ad0e5c132b470088b308e876aa7b8ed90bd0192ebcf128c6c01c3fcd316efa9d7d8e6051485f033567d7b7b1e7944c5d17333c24324abcafc76d02970ce544fcc979b", 0xad}], 0x4, &(0x7f0000002400)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, r1, r3, r2, r4, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0xee00, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r6, r7}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xffffffffffffffff, r9}}}], 0xf0, 0x8000}}], 0x6, 0x4040000) (async)
ppoll(&(0x7f0000000000)=[{r0, 0x0, 0xb00}, {r2, 0x4b57, 0x64}], 0x2, 0x0, 0x0, 0x1473bf3) (async)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0)
03:37:59 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x0, 0xd00, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:59 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0xe000000, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:59 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020300030e020000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:59 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x10000000, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:37:59 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020300030e030000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:37:59 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x0, 0xe00, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
[ 376.480851][T23741] FAULT_INJECTION: forcing a failure.
[ 376.480851][T23741] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 376.494045][T23741] CPU: 1 PID: 23741 Comm: syz-executor.0 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 376.503328][T23741] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 376.513358][T23741] Call Trace:
[ 376.516614][T23741]
[ 376.519525][T23741] dump_stack_lvl+0xd6/0x122
[ 376.524156][T23741] dump_stack+0x11/0x12
[ 376.528294][T23741] should_fail+0x230/0x240
[ 376.532736][T23741] should_fail_usercopy+0x16/0x20
[ 376.537769][T23741] _copy_from_user+0x1a/0xc0
[ 376.542353][T23741] do_recvmmsg+0x27e/0xa20
[ 376.546771][T23741] __x64_sys_recvmmsg+0xde/0x160
[ 376.551686][T23741] do_syscall_64+0x2b/0x70
[ 376.556098][T23741] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 376.562040][T23741] RIP: 0033:0x7fa271cfb049
[ 376.566431][T23741] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 376.586088][T23741] RSP: 002b:00007fa271450168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 376.594495][T23741] RAX: ffffffffffffffda RBX: 00007fa271e0e030 RCX: 00007fa271cfb049
[ 376.602442][T23741] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003
[ 376.610416][T23741] RBP: 00007fa2714501d0 R08: 0000000000000000 R09: 0000000000000000
[ 376.618458][T23741] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 376.626453][T23741] R13: 00007ffcd670d85f R14: 00007fa271450300 R15: 0000000000022000
[ 376.634412][T23741]
03:38:00 executing program 1:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) (fail_nth: 42)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x20000004})
ppoll(&(0x7f0000000000)=[{r2, 0x4b57, 0x64}], 0x1, 0x0, 0x0, 0x0)
[ 376.893668][T23744] FAULT_INJECTION: forcing a failure.
[ 376.893668][T23744] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 376.906811][T23744] CPU: 1 PID: 23744 Comm: syz-executor.1 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 376.916146][T23744] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 376.926248][T23744] Call Trace:
[ 376.929504][T23744]
[ 376.932432][T23744] dump_stack_lvl+0xd6/0x122
[ 376.937038][T23744] dump_stack+0x11/0x12
[ 376.941249][T23744] should_fail+0x230/0x240
[ 376.945751][T23744] should_fail_usercopy+0x16/0x20
[ 376.950785][T23744] _copy_from_user+0x1a/0xc0
[ 376.955412][T23744] do_recvmmsg+0x27e/0xa20
[ 376.959811][T23744] __x64_sys_recvmmsg+0xde/0x160
[ 376.964727][T23744] do_syscall_64+0x2b/0x70
[ 376.969218][T23744] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 376.975110][T23744] RIP: 0033:0x7f2c4d882049
[ 376.979574][T23744] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 376.999176][T23744] RSP: 002b:00007f2c4cfd7168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 377.007614][T23744] RAX: ffffffffffffffda RBX: 00007f2c4d995030 RCX: 00007f2c4d882049
[ 377.015565][T23744] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003
[ 377.023576][T23744] RBP: 00007f2c4cfd71d0 R08: 0000000000000000 R09: 0000000000000000
[ 377.031539][T23744] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000002
[ 377.039488][T23744] R13: 00007fffa9548b0f R14: 00007f2c4cfd7300 R15: 0000000000022000
[ 377.047443][T23744]
03:38:00 executing program 0:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x0, 0x0) (fail_nth: 46)
03:38:00 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020300030e040000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:38:00 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x11000000, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:38:00 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x0, 0x1100, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:38:00 executing program 5:
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x20000004})
ppoll(&(0x7f0000000000)=[{r0, 0x0, 0xb00}, {r2, 0x4b57, 0x64}], 0x2, 0x0, 0x0, 0x1473bf3)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0)
03:38:00 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x12000000, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:38:00 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x0, 0x1200, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:38:00 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020300030e050000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
03:38:00 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x18000000, 0x0, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:38:00 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x0, 0x1800, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "3ab1c94da5875acc198068ec8f9f7a3b1dabd93e"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x70}, 0x1, 0x7}, 0x0)
03:38:00 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000014c0)=ANY=[@ANYBLOB="020300030e060000004300000000000004000900a00000003ab1c94da5875acc198068ec8f9f7a3b1dabd93e0000000003000600000000000200000000000000000000000000000002000100000000000000000d00000000030005000000000002"], 0x70}, 0x1, 0x7}, 0x0)
[ 377.339849][T23769] FAULT_INJECTION: forcing a failure.
[ 377.339849][T23769] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 377.352943][T23769] CPU: 0 PID: 23769 Comm: syz-executor.0 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 377.362246][T23769] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 377.372282][T23769] Call Trace:
[ 377.375584][T23769]
[ 377.378497][T23769] dump_stack_lvl+0xd6/0x122
[ 377.383075][T23769] dump_stack+0x11/0x12
[ 377.387299][T23769] should_fail+0x230/0x240
[ 377.391700][T23769] should_fail_usercopy+0x16/0x20
[ 377.396767][T23769] _copy_from_user+0x1a/0xc0
[ 377.401372][T23769] do_recvmmsg+0x27e/0xa20
[ 377.405773][T23769] __x64_sys_recvmmsg+0xde/0x160
[ 377.410692][T23769] do_syscall_64+0x2b/0x70
[ 377.415200][T23769] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 377.421073][T23769] RIP: 0033:0x7fa271cfb049
[ 377.425464][T23769] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 377.445085][T23769] RSP: 002b:00007fa271450168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 377.453487][T23769] RAX: ffffffffffffffda RBX: 00007fa271e0e030 RCX: 00007fa271cfb049
[ 377.461439][T23769] RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003
[ 377.469437][T23769] RBP: 00007fa2714501d0 R08: 0000000000000000 R09: 0000000000000000
[ 377.477408][T23769] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 377.485399][T23769] R13: 00007ffcd670d85f R14: 00007fa271450300 R15: 0000000000022000
[ 377.493396][T23769]
03:38:01 executing program 1:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) (fail_nth: 43)
r2 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x20000004})
ppoll(&(0x7f0000000000)=[{r2, 0x4b57, 0x64}], 0x1, 0x0, 0x0, 0x0)
[ 377.736601][T23772] FAULT_INJECTION: forcing a failure.
[ 377.736601][T23772] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 377.749656][T23772] CPU: 0 PID: 23772 Comm: syz-executor.1 Not tainted 5.18.0-rc2-syzkaller-dirty #0
[ 377.758941][T23772] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 377.768973][T23772] Call Trace:
[ 377.772230][T23772]