= socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x12000000, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x1, 0x0, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) [ 256.168882][ T3543] tipc: Own node identity , cluster identity 4711 [ 256.193070][ T3543] tipc: Failed to obtain node identity [ 256.206299][ T3543] tipc: Enabling of bearer rejected, failed to enable media [ 256.277826][ T3555] FAULT_INJECTION: forcing a failure. [ 256.277826][ T3555] name failslab, interval 1, probability 0, space 0, times 0 [ 256.279780][ T3560] tipc: Started in network mode [ 256.290518][ T3555] CPU: 0 PID: 3555 Comm: syz-executor.5 Not tainted 5.4.119-syzkaller-00545-gabedbe9da982 #0 [ 256.305592][ T3555] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 256.315633][ T3555] Call Trace: [ 256.318913][ T3555] dump_stack+0x1d8/0x24e [ 256.323218][ T3555] ? devkmsg_release+0x11c/0x11c [ 256.328126][ T3555] ? show_regs_print_info+0x12/0x12 [ 256.333296][ T3555] should_fail+0x6f6/0x860 [ 256.337707][ T3555] ? setup_fault_attr+0x3d0/0x3d0 [ 256.342703][ T3555] ? __copy_skb_header+0x421/0x550 [ 256.347815][ T3555] ? bpf_clone_redirect+0x10e/0x350 [ 256.352990][ T3555] should_failslab+0x5/0x20 [ 256.357467][ T3555] __kmalloc_track_caller+0x5d/0x2e0 [ 256.362811][ T3555] ? bpf_clone_redirect+0x10e/0x350 [ 256.367986][ T3555] pskb_expand_head+0x10d/0xfa0 [ 256.372813][ T3555] ? skb_ensure_writable+0x2ab/0x420 [ 256.378069][ T3555] bpf_clone_redirect+0x10e/0x350 [ 256.383184][ T3555] bpf_prog_9220d34f123440e6+0x482/0x1000 [ 256.388877][ T3555] ? __kasan_kmalloc+0x1a3/0x1e0 [ 256.393803][ T3555] ? __kasan_kmalloc+0x137/0x1e0 [ 256.398712][ T3555] ? kmem_cache_alloc+0x115/0x290 [ 256.403925][ T3555] ? build_skb+0x27/0x440 [ 256.408261][ T3555] ? bpf_prog_test_run_skb+0x419/0x1130 [ 256.413787][ T3555] ? __do_sys_bpf+0x2d28/0xbe70 [ 256.418619][ T3555] ? do_syscall_64+0xcb/0x1e0 [ 256.423272][ T3555] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 256.429358][ T3555] ? ktime_get+0xfd/0x130 [ 256.433660][ T3555] bpf_test_run+0x288/0x680 [ 256.438137][ T3555] ? kzalloc+0x20/0x20 [ 256.442185][ T3555] ? build_skb+0x24c/0x440 [ 256.446573][ T3555] bpf_prog_test_run_skb+0x84d/0x1130 [ 256.451919][ T3555] ? __bpf_trace_bpf_test_finish+0x20/0x20 [ 256.457694][ T3555] ? fput_many+0x42/0x1a0 [ 256.461996][ T3555] ? __bpf_prog_get+0x29f/0x310 [ 256.466833][ T3555] ? __bpf_trace_bpf_test_finish+0x20/0x20 [ 256.472611][ T3555] __do_sys_bpf+0x2d28/0xbe70 [ 256.477265][ T3555] ? _kstrtoull+0x390/0x490 [ 256.481738][ T3555] ? kstrtouint_from_user+0x20f/0x2a0 [ 256.487108][ T3555] ? refcount_sub_and_test_checked+0x1b6/0x290 [ 256.493231][ T3555] ? __bpf_prog_put_rcu+0x300/0x300 [ 256.498397][ T3555] ? refcount_inc_checked+0x50/0x50 [ 256.503565][ T3555] ? memcg_check_events+0x5c/0x5b0 [ 256.508648][ T3555] ? proc_fail_nth_write+0x1d5/0x240 [ 256.513902][ T3555] ? proc_fail_nth_read+0x1c0/0x1c0 [ 256.519073][ T3555] ? __lru_cache_add+0x1c4/0x210 [ 256.523979][ T3555] ? proc_fail_nth_read+0x1c0/0x1c0 [ 256.529148][ T3555] ? memset+0x1f/0x40 [ 256.533099][ T3555] ? fsnotify+0x1332/0x13f0 [ 256.537589][ T3555] ? __kernel_write+0x340/0x340 [ 256.542423][ T3555] ? check_preemption_disabled+0x9e/0x330 [ 256.548137][ T3555] ? debug_smp_processor_id+0x20/0x20 [ 256.553491][ T3555] ? __fsnotify_parent+0x310/0x310 [ 256.558713][ T3555] ? __sb_end_write+0xb5/0x100 [ 256.563446][ T3555] ? vfs_write+0x422/0x4e0 [ 256.567831][ T3555] ? fput_many+0x42/0x1a0 [ 256.572129][ T3555] ? check_preemption_disabled+0x154/0x330 [ 256.577905][ T3555] do_syscall_64+0xcb/0x1e0 [ 256.582411][ T3555] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 256.588366][ T3555] RIP: 0033:0x4665d9 [ 256.592234][ T3555] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 256.611822][ T3555] RSP: 002b:00007fa673a7f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 256.620214][ T3555] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 256.628154][ T3555] RDX: 0000000000000028 RSI: 0000000020000080 RDI: 000000000000000a [ 256.636095][ T3555] RBP: 00007fa673a7f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 256.644055][ T3555] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 256.651997][ T3555] R13: 00007ffd91883adf R14: 00007fa673a7f300 R15: 0000000000022000 11:50:24 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) 11:50:24 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3={0x3000000, [], 0xee00}, 0x18, 0x0) mount$overlay(0x400002, 0x0, &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) [ 256.678007][ T3560] tipc: Own node identity , cluster identity 4711 11:50:24 executing program 5 (fault-call:1 fault-nth:41): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) 11:50:24 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) [ 256.704632][ T3560] tipc: Failed to obtain node identity [ 256.719023][ T3560] tipc: Enabling of bearer rejected, failed to enable media [ 256.770680][ T3577] FAULT_INJECTION: forcing a failure. [ 256.770680][ T3577] name failslab, interval 1, probability 0, space 0, times 0 [ 256.783445][ T3577] CPU: 1 PID: 3577 Comm: syz-executor.5 Not tainted 5.4.119-syzkaller-00545-gabedbe9da982 #0 [ 256.793588][ T3577] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 256.803639][ T3577] Call Trace: [ 256.806931][ T3577] dump_stack+0x1d8/0x24e [ 256.811274][ T3577] ? devkmsg_release+0x11c/0x11c [ 256.816211][ T3577] ? show_regs_print_info+0x12/0x12 [ 256.821407][ T3577] ? dev_queue_xmit+0x20/0x20 [ 256.826082][ T3577] should_fail+0x6f6/0x860 [ 256.830491][ T3577] ? setup_fault_attr+0x3d0/0x3d0 [ 256.835507][ T3577] ? skb_release_data+0x346/0x6b0 [ 256.840527][ T3577] ? debug_smp_processor_id+0x20/0x20 [ 256.845885][ T3577] ? bpf_clone_redirect+0x10e/0x350 [ 256.851070][ T3577] ? skb_clone+0x1b2/0x360 [ 256.855489][ T3577] should_failslab+0x5/0x20 [ 256.859991][ T3577] kmem_cache_alloc+0x36/0x290 [ 256.864745][ T3577] ? __bpf_redirect+0x736/0xd00 [ 256.869594][ T3577] skb_clone+0x1b2/0x360 [ 256.873828][ T3577] bpf_clone_redirect+0xa2/0x350 [ 256.878768][ T3577] bpf_prog_9220d34f123440e6+0xfd8/0x1000 [ 256.884482][ T3577] ? __schedule+0x9b8/0x1170 [ 256.889065][ T3577] ? _raw_spin_unlock_irqrestore+0x57/0x80 [ 256.894963][ T3577] ? rcu_preempt_deferred_qs_irqrestore+0x701/0xae0 [ 256.900451][ T3585] tipc: Started in network mode [ 256.901558][ T3577] ? __rcu_read_unlock+0x1cd/0x6a0 [ 256.901567][ T3577] ? __rcu_read_lock+0x50/0x50 [ 256.901581][ T3577] ? ktime_get+0xfd/0x130 11:50:24 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:24 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3={0x3000000, [], 0xee00}, 0x18, 0x0) mount$overlay(0x400002, 0x0, &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:24 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x13060000, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x1, 0x0, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) 11:50:24 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4082, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000006, 0x800000000009031, 0xffffffffffffffff, 0x0) 11:50:24 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x14060000, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x1, 0x0, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) 11:50:24 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3={0x3000000, [], 0xee00}, 0x18, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) [ 256.906468][ T3585] tipc: Own node identity , cluster identity 4711 [ 256.911502][ T3577] bpf_test_run+0x288/0x680 [ 256.911517][ T3577] ? kzalloc+0x20/0x20 [ 256.911526][ T3577] ? build_skb+0x24c/0x440 [ 256.911533][ T3577] bpf_prog_test_run_skb+0x84d/0x1130 [ 256.911543][ T3577] ? __bpf_trace_bpf_test_finish+0x20/0x20 [ 256.911556][ T3577] ? fput_many+0x42/0x1a0 [ 256.922720][ T3585] tipc: Failed to obtain node identity [ 256.927002][ T3577] ? __bpf_prog_get+0x29f/0x310 [ 256.927012][ T3577] ? __bpf_trace_bpf_test_finish+0x20/0x20 [ 256.927019][ T3577] __do_sys_bpf+0x2d28/0xbe70 [ 256.927045][ T3577] ? _kstrtoull+0x390/0x490 [ 256.932595][ T3585] tipc: Enabling of bearer rejected, failed to enable media [ 256.935573][ T3577] ? kstrtouint_from_user+0x20f/0x2a0 [ 256.935583][ T3577] ? refcount_sub_and_test_checked+0x1b6/0x290 [ 256.935596][ T3577] ? __bpf_prog_put_rcu+0x300/0x300 [ 256.964283][ T3589] tipc: Started in network mode [ 256.965790][ T3577] ? refcount_inc_checked+0x50/0x50 [ 256.965799][ T3577] ? memcg_check_events+0x5c/0x5b0 11:50:24 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3={0x3000000, [], 0xee00}, 0x18, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:24 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x15060000, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x1, 0x0, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) [ 256.965816][ T3577] ? proc_fail_nth_write+0x1d5/0x240 [ 256.987168][ T3589] tipc: Own node identity , cluster identity 4711 [ 256.989307][ T3577] ? proc_fail_nth_read+0x1c0/0x1c0 [ 256.989315][ T3577] ? __lru_cache_add+0x1c4/0x210 [ 256.989323][ T3577] ? proc_fail_nth_read+0x1c0/0x1c0 [ 256.989330][ T3577] ? memset+0x1f/0x40 [ 256.989343][ T3577] ? fsnotify+0x1332/0x13f0 [ 256.996826][ T3589] tipc: Failed to obtain node identity [ 257.000845][ T3577] ? __kernel_write+0x340/0x340 11:50:24 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3={0x3000000, [], 0xee00}, 0x18, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) [ 257.000854][ T3577] ? check_preemption_disabled+0x9e/0x330 [ 257.000860][ T3577] ? debug_smp_processor_id+0x20/0x20 [ 257.000867][ T3577] ? __fsnotify_parent+0x310/0x310 [ 257.000877][ T3577] ? __sb_end_write+0xb5/0x100 [ 257.000889][ T3577] ? vfs_write+0x422/0x4e0 [ 257.022199][ T3589] tipc: Enabling of bearer rejected, failed to enable media [ 257.026468][ T3577] ? fput_many+0x42/0x1a0 [ 257.026477][ T3577] ? check_preemption_disabled+0x154/0x330 [ 257.026491][ T3577] do_syscall_64+0xcb/0x1e0 [ 257.098600][ T3599] tipc: Started in network mode [ 257.100739][ T3577] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 257.100753][ T3577] RIP: 0033:0x4665d9 [ 257.107664][ T3599] tipc: Own node identity , cluster identity 4711 [ 257.110847][ T3577] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 257.110851][ T3577] RSP: 002b:00007fa673a7f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 257.110859][ T3577] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 11:50:24 executing program 5 (fault-call:1 fault-nth:42): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) 11:50:24 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3={0x3000000, [], 0xee00}, 0x18, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, 0x0) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:24 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) [ 257.110864][ T3577] RDX: 0000000000000028 RSI: 0000000020000080 RDI: 000000000000000a [ 257.110868][ T3577] RBP: 00007fa673a7f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 257.110873][ T3577] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 257.110877][ T3577] R13: 00007ffd91883adf R14: 00007fa673a7f300 R15: 0000000000022000 [ 257.213537][ T3599] tipc: Failed to obtain node identity [ 257.220013][ T3605] FAULT_INJECTION: forcing a failure. [ 257.220013][ T3605] name failslab, interval 1, probability 0, space 0, times 0 [ 257.232629][ T3605] CPU: 0 PID: 3605 Comm: syz-executor.5 Not tainted 5.4.119-syzkaller-00545-gabedbe9da982 #0 [ 257.242775][ T3605] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 257.249329][ T3599] tipc: Enabling of bearer rejected, failed to enable media [ 257.253010][ T3605] Call Trace: [ 257.253032][ T3605] dump_stack+0x1d8/0x24e [ 257.253048][ T3605] ? devkmsg_release+0x11c/0x11c [ 257.270048][ T3606] overlayfs: missing 'lowerdir' [ 257.274122][ T3605] ? show_regs_print_info+0x12/0x12 [ 257.274137][ T3605] ? dev_queue_xmit+0x20/0x20 [ 257.288803][ T3605] should_fail+0x6f6/0x860 [ 257.293223][ T3605] ? setup_fault_attr+0x3d0/0x3d0 [ 257.298239][ T3605] ? skb_release_data+0x346/0x6b0 [ 257.303381][ T3605] ? debug_smp_processor_id+0x20/0x20 [ 257.308744][ T3605] ? bpf_clone_redirect+0x10e/0x350 [ 257.313918][ T3605] ? skb_clone+0x1b2/0x360 [ 257.318401][ T3605] should_failslab+0x5/0x20 [ 257.322888][ T3605] kmem_cache_alloc+0x36/0x290 [ 257.327628][ T3605] ? __bpf_redirect+0x736/0xd00 [ 257.332661][ T3605] skb_clone+0x1b2/0x360 [ 257.336880][ T3605] bpf_clone_redirect+0xa2/0x350 [ 257.341798][ T3605] bpf_prog_9220d34f123440e6+0xcd2/0x1000 [ 257.347496][ T3605] ? __kasan_kmalloc+0x1a3/0x1e0 [ 257.352707][ T3605] ? __kasan_kmalloc+0x137/0x1e0 [ 257.357633][ T3605] ? kmem_cache_alloc+0x115/0x290 [ 257.362677][ T3605] ? build_skb+0x27/0x440 [ 257.367142][ T3605] ? bpf_prog_test_run_skb+0x419/0x1130 [ 257.372922][ T3605] ? __do_sys_bpf+0x2d28/0xbe70 [ 257.377765][ T3605] ? do_syscall_64+0xcb/0x1e0 [ 257.382423][ T3605] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 257.388471][ T3605] ? ktime_get+0xfd/0x130 [ 257.392794][ T3605] bpf_test_run+0x288/0x680 [ 257.397387][ T3605] ? kzalloc+0x20/0x20 [ 257.401439][ T3605] ? build_skb+0x24c/0x440 [ 257.405849][ T3605] bpf_prog_test_run_skb+0x84d/0x1130 [ 257.411265][ T3605] ? __bpf_trace_bpf_test_finish+0x20/0x20 [ 257.417148][ T3605] ? fput_many+0x42/0x1a0 [ 257.421454][ T3605] ? __bpf_prog_get+0x29f/0x310 [ 257.426295][ T3605] ? __bpf_trace_bpf_test_finish+0x20/0x20 [ 257.432091][ T3605] __do_sys_bpf+0x2d28/0xbe70 [ 257.436745][ T3605] ? _kstrtoull+0x390/0x490 [ 257.441228][ T3605] ? kstrtouint_from_user+0x20f/0x2a0 [ 257.446573][ T3605] ? refcount_sub_and_test_checked+0x1b6/0x290 [ 257.452981][ T3605] ? __bpf_prog_put_rcu+0x300/0x300 [ 257.458153][ T3605] ? refcount_inc_checked+0x50/0x50 [ 257.463441][ T3605] ? memcg_check_events+0x5c/0x5b0 [ 257.468561][ T3605] ? proc_fail_nth_write+0x1d5/0x240 [ 257.473833][ T3605] ? proc_fail_nth_read+0x1c0/0x1c0 [ 257.479013][ T3605] ? __lru_cache_add+0x1c4/0x210 [ 257.483925][ T3605] ? proc_fail_nth_read+0x1c0/0x1c0 [ 257.489104][ T3605] ? memset+0x1f/0x40 [ 257.493143][ T3605] ? fsnotify+0x1332/0x13f0 [ 257.497634][ T3605] ? __kernel_write+0x340/0x340 [ 257.502826][ T3605] ? check_preemption_disabled+0x9e/0x330 [ 257.508517][ T3605] ? debug_smp_processor_id+0x20/0x20 [ 257.513869][ T3605] ? __fsnotify_parent+0x310/0x310 [ 257.518953][ T3605] ? __sb_end_write+0xb5/0x100 [ 257.523708][ T3605] ? vfs_write+0x422/0x4e0 [ 257.528110][ T3605] ? fput_many+0x42/0x1a0 [ 257.532410][ T3605] ? check_preemption_disabled+0x154/0x330 [ 257.538189][ T3605] do_syscall_64+0xcb/0x1e0 [ 257.542667][ T3605] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 257.548618][ T3605] RIP: 0033:0x4665d9 [ 257.552498][ T3605] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 257.572071][ T3605] RSP: 002b:00007fa673a7f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 257.580455][ T3605] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 257.588410][ T3605] RDX: 0000000000000028 RSI: 0000000020000080 RDI: 000000000000000a [ 257.596352][ T3605] RBP: 00007fa673a7f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 257.604296][ T3605] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 257.612255][ T3605] R13: 00007ffd91883adf R14: 00007fa673a7f300 R15: 0000000000022000 11:50:25 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3={0x3000000, [], 0xee00}, 0x18, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, 0x0) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:25 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4082, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000006, 0x800000000009031, 0xffffffffffffffff, 0x0) 11:50:25 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x16060000, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x1, 0x0, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) 11:50:25 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r2) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:25 executing program 5 (fault-call:1 fault-nth:43): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000029fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000006504040001000000040400001c007d60b7030000000000006a0a00fe20000000850000000d000000b700000000000000950000fe00000000c9be17044171e1d3d7b1d6d0ff03000000000000c668a4b63e069efb297975738f538e31ec24925095a163b9d4e76be266e31a80212240baa44e080addde6033170000007b3f912f6906a6e2313091df61258a1fda45991fbdce6793c8a4785ee8b60092659b941bbd750045404b04bf97c0fea679c032b3203c6cd8bac9626bcc85e961509735a046171f5bebfa80dbdc0200379e731d3a8d8fea894a4ee293001f6ce7d5b40bf2a7399c23f84c6fa5f9be8173d05afe002c0e7821d406c967379e7521392d24d6c8034e2dc7c053498a9f413af569575de3b5c85546945e9bce678ee9a09806474947310bae538450a676d71c011705060000000000000000a3d39322942df819eea101000000000000009fc8f4b9276e9dc330c9cbac5d708570a14546aa89e13c65896d24684ee25f853b0858122c3d1de564d84638c7f6ec477f9ffece0ff3d9f4cf21c119b95eba4c925c80c3c33c81a68055fc8b3af4f32d16cf290f90d80f1da0db08da80f7a88b63885551371ee1febf833a4103e2f68d1aa3a2138953c0c41ead2824f4ae3260007396d42e0168a85fc6448b3f2eaab716abe53aa6c1ba9ace891ef38f9a00000000000000000000000000000000000200481ac0f54b7a913f3465c333429c19f5d01166a1c4edc2abdeb54e25bf47085689e16b524053ac75f36b5b6e7ddf0aa170ec19aee6ccb06c4708e4ec97194d713a36d9bbed4e832541318a8c13c55c40d100e58fb845049af5b02f8ba8fc1345d6442b96c2d17bd048a2ed0841470c424324db952a44b515d47945babf404c35fd608046f1640f05007842f01d3428843635d4f3e98399b396ea30fc8f9a911a64798a4cf7b63b48349cd630881342c6533f5a9ac85b040000000000000000090000000000009380513278d4701e78251bbc45b73f8d5665d369df748c068b23e3fe886aee0668e58e7158040e0156e332b122288e40fecb03cf4880dc047af0c3a73bab43736a168c57df0f88c1d2dc8d27ad24dbfce44c6a9082b178a2c0527b143c2cb1cd9ed565d1ad68953e031c168ec6280c2eee3550d34d34f66c40252798606cfb2a6d424b78933a9191"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) 11:50:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) [ 257.724480][ T3617] tipc: Started in network mode [ 257.734420][ T3617] tipc: Own node identity , cluster identity 4711 [ 257.735106][ T3621] FAULT_INJECTION: forcing a failure. [ 257.735106][ T3621] name failslab, interval 1, probability 0, space 0, times 0 [ 257.741028][ T3617] tipc: Failed to obtain node identity [ 257.753513][ T3621] CPU: 1 PID: 3621 Comm: syz-executor.5 Not tainted 5.4.119-syzkaller-00545-gabedbe9da982 #0 11:50:25 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3={0x3000000, [], 0xee00}, 0x18, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, 0x0) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:25 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x17060000, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x1, 0x0, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) [ 257.758968][ T3617] tipc: Enabling of bearer rejected, failed to enable media [ 257.769060][ T3621] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 257.769063][ T3621] Call Trace: [ 257.769078][ T3621] dump_stack+0x1d8/0x24e [ 257.769093][ T3621] ? devkmsg_release+0x11c/0x11c [ 257.783870][ T3623] overlayfs: missing 'lowerdir' [ 257.787689][ T3621] ? show_regs_print_info+0x12/0x12 [ 257.810261][ T3621] should_fail+0x6f6/0x860 [ 257.814668][ T3621] ? setup_fault_attr+0x3d0/0x3d0 [ 257.819701][ T3621] ? __copy_skb_header+0x421/0x550 [ 257.824799][ T3621] ? bpf_clone_redirect+0x10e/0x350 [ 257.829981][ T3621] should_failslab+0x5/0x20 [ 257.834470][ T3621] __kmalloc_track_caller+0x5d/0x2e0 [ 257.839746][ T3621] ? bpf_clone_redirect+0x10e/0x350 [ 257.844930][ T3621] pskb_expand_head+0x10d/0xfa0 [ 257.849768][ T3621] ? skb_ensure_writable+0x2ab/0x420 [ 257.855039][ T3621] bpf_clone_redirect+0x10e/0x350 [ 257.860057][ T3621] bpf_prog_9220d34f123440e6+0xb7c/0x1000 [ 257.865767][ T3621] ? __schedule+0x9b8/0x1170 11:50:25 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4082, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000006, 0x800000000009031, 0xffffffffffffffff, 0x0) [ 257.870358][ T3621] ? _raw_spin_unlock_irqrestore+0x57/0x80 [ 257.876151][ T3621] ? rcu_preempt_deferred_qs_irqrestore+0x701/0xae0 [ 257.882749][ T3621] ? __rcu_read_unlock+0x1cd/0x6a0 [ 257.887841][ T3621] ? __rcu_read_lock+0x50/0x50 [ 257.892585][ T3621] ? ktime_get+0xfd/0x130 [ 257.896906][ T3621] bpf_test_run+0x288/0x680 [ 257.901399][ T3621] ? kzalloc+0x20/0x20 [ 257.905507][ T3621] ? build_skb+0x24c/0x440 [ 257.909895][ T3621] bpf_prog_test_run_skb+0x84d/0x1130 [ 257.915236][ T3621] ? __bpf_trace_bpf_test_finish+0x20/0x20 [ 257.921010][ T3621] ? fput_many+0x42/0x1a0 [ 257.925312][ T3621] ? __bpf_prog_get+0x29f/0x310 [ 257.930147][ T3621] ? __bpf_trace_bpf_test_finish+0x20/0x20 [ 257.936096][ T3621] __do_sys_bpf+0x2d28/0xbe70 [ 257.940745][ T3621] ? _kstrtoull+0x390/0x490 [ 257.945221][ T3621] ? kstrtouint_from_user+0x20f/0x2a0 [ 257.950585][ T3621] ? refcount_sub_and_test_checked+0x1b6/0x290 [ 257.956724][ T3621] ? __bpf_prog_put_rcu+0x300/0x300 [ 257.961897][ T3621] ? refcount_inc_checked+0x50/0x50 [ 257.967079][ T3621] ? lru_add_drain_per_cpu+0x60/0x60 [ 257.972334][ T3621] ? proc_fail_nth_write+0x1d5/0x240 [ 257.977586][ T3621] ? proc_fail_nth_read+0x1c0/0x1c0 [ 257.982755][ T3621] ? __lru_cache_add+0x1c4/0x210 [ 257.987665][ T3621] ? proc_fail_nth_read+0x1c0/0x1c0 [ 257.992833][ T3621] ? memset+0x1f/0x40 [ 257.996798][ T3621] ? fsnotify+0x1332/0x13f0 [ 258.001276][ T3621] ? __kernel_write+0x340/0x340 [ 258.006112][ T3621] ? check_preemption_disabled+0x9e/0x330 [ 258.011798][ T3621] ? debug_smp_processor_id+0x20/0x20 [ 258.017338][ T3621] ? __fsnotify_parent+0x310/0x310 [ 258.022431][ T3621] ? __sb_end_write+0xb5/0x100 [ 258.027187][ T3621] ? vfs_write+0x422/0x4e0 [ 258.031593][ T3621] ? fput_many+0x42/0x1a0 [ 258.035896][ T3621] ? check_preemption_disabled+0x154/0x330 [ 258.041682][ T3621] do_syscall_64+0xcb/0x1e0 [ 258.046162][ T3621] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 258.052028][ T3621] RIP: 0033:0x4665d9 [ 258.055893][ T3621] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 11:50:25 executing program 5 (fault-call:1 fault-nth:44): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 258.075578][ T3621] RSP: 002b:00007fa673a7f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 258.083960][ T3621] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 258.091902][ T3621] RDX: 0000000000000028 RSI: 0000000020000080 RDI: 000000000000000a [ 258.099855][ T3621] RBP: 00007fa673a7f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 258.107795][ T3621] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 258.115737][ T3621] R13: 00007ffd91883adf R14: 00007fa673a7f300 R15: 0000000000022000 [ 258.183670][ T3633] overlayfs: missing 'lowerdir' [ 258.185089][ T3636] tipc: Started in network mode [ 258.189712][ T3635] FAULT_INJECTION: forcing a failure. [ 258.189712][ T3635] name failslab, interval 1, probability 0, space 0, times 0 [ 258.198938][ T3636] tipc: Own node identity , cluster identity 4711 [ 258.206208][ T3635] CPU: 0 PID: 3635 Comm: syz-executor.5 Not tainted 5.4.119-syzkaller-00545-gabedbe9da982 #0 [ 258.222628][ T3635] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 258.232678][ T3635] Call Trace: [ 258.235970][ T3635] dump_stack+0x1d8/0x24e [ 258.240317][ T3635] ? devkmsg_release+0x11c/0x11c [ 258.245255][ T3635] ? show_regs_print_info+0x12/0x12 [ 258.250451][ T3635] should_fail+0x6f6/0x860 [ 258.251699][ T3636] tipc: Failed to obtain node identity [ 258.254854][ T3635] ? setup_fault_attr+0x3d0/0x3d0 [ 258.254869][ T3635] ? __copy_skb_header+0x421/0x550 [ 258.270435][ T3635] ? bpf_clone_redirect+0x10e/0x350 [ 258.275636][ T3635] should_failslab+0x5/0x20 [ 258.280139][ T3635] __kmalloc_track_caller+0x5d/0x2e0 [ 258.286028][ T3635] ? bpf_clone_redirect+0x10e/0x350 [ 258.287873][ T3636] tipc: Enabling of bearer rejected, failed to enable media [ 258.291219][ T3635] pskb_expand_head+0x10d/0xfa0 [ 258.291229][ T3635] ? skb_ensure_writable+0x2ab/0x420 [ 258.291241][ T3635] bpf_clone_redirect+0x10e/0x350 [ 258.314900][ T3635] bpf_prog_9220d34f123440e6+0xa55/0x1000 [ 258.320622][ T3635] ? __kasan_kmalloc+0x1a3/0x1e0 [ 258.325565][ T3635] ? __kasan_kmalloc+0x137/0x1e0 [ 258.330501][ T3635] ? kmem_cache_alloc+0x115/0x290 [ 258.335522][ T3635] ? build_skb+0x27/0x440 [ 258.339858][ T3635] ? bpf_prog_test_run_skb+0x419/0x1130 [ 258.345398][ T3635] ? __do_sys_bpf+0x2d28/0xbe70 [ 258.350294][ T3635] ? do_syscall_64+0xcb/0x1e0 [ 258.354974][ T3635] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 258.361147][ T3635] ? ktime_get+0xfd/0x130 [ 258.365483][ T3635] bpf_test_run+0x288/0x680 [ 258.369981][ T3635] ? kzalloc+0x20/0x20 [ 258.374045][ T3635] ? build_skb+0x24c/0x440 [ 258.374262][ T3646] overlayfs: missing 'lowerdir' 11:50:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) 11:50:25 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3={0x3000000, [], 0xee00}, 0x18, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[]) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:25 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x20000000, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x1, 0x0, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) [ 258.378456][ T3635] bpf_prog_test_run_skb+0x84d/0x1130 [ 258.378466][ T3635] ? __bpf_trace_bpf_test_finish+0x20/0x20 [ 258.378474][ T3635] ? fput_many+0x42/0x1a0 [ 258.378483][ T3635] ? __bpf_prog_get+0x29f/0x310 [ 258.378489][ T3635] ? __bpf_trace_bpf_test_finish+0x20/0x20 [ 258.378502][ T3635] __do_sys_bpf+0x2d28/0xbe70 [ 258.384276][ T3647] tipc: Started in network mode [ 258.388705][ T3635] ? _kstrtoull+0x390/0x490 [ 258.388729][ T3635] ? kstrtouint_from_user+0x20f/0x2a0 11:50:26 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3={0x3000000, [], 0xee00}, 0x18, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[]) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) [ 258.388737][ T3635] ? refcount_sub_and_test_checked+0x1b6/0x290 [ 258.388745][ T3635] ? __bpf_prog_put_rcu+0x300/0x300 [ 258.388751][ T3635] ? refcount_inc_checked+0x50/0x50 [ 258.388760][ T3635] ? memcg_check_events+0x5c/0x5b0 [ 258.388777][ T3635] ? proc_fail_nth_write+0x1d5/0x240 [ 258.396807][ T3647] tipc: Own node identity , cluster identity 4711 [ 258.398887][ T3635] ? proc_fail_nth_read+0x1c0/0x1c0 [ 258.398898][ T3635] ? __lru_cache_add+0x1c4/0x210 [ 258.398906][ T3635] ? proc_fail_nth_read+0x1c0/0x1c0 [ 258.398913][ T3635] ? memset+0x1f/0x40 11:50:26 executing program 5 (fault-call:1 fault-nth:45): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) 11:50:26 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r2) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:26 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x21000000, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x1, 0x0, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) [ 258.398920][ T3635] ? fsnotify+0x1332/0x13f0 [ 258.398930][ T3635] ? __kernel_write+0x340/0x340 [ 258.398938][ T3635] ? check_preemption_disabled+0x9e/0x330 [ 258.398945][ T3635] ? debug_smp_processor_id+0x20/0x20 [ 258.398951][ T3635] ? __fsnotify_parent+0x310/0x310 [ 258.398966][ T3635] ? __sb_end_write+0xb5/0x100 [ 258.416509][ T3647] tipc: Failed to obtain node identity [ 258.419175][ T3635] ? vfs_write+0x422/0x4e0 [ 258.419184][ T3635] ? fput_many+0x42/0x1a0 [ 258.419192][ T3635] ? check_preemption_disabled+0x154/0x330 11:50:26 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4082, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000006, 0x800000000009031, 0xffffffffffffffff, 0x0) [ 258.419205][ T3635] do_syscall_64+0xcb/0x1e0 [ 258.419214][ T3635] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 258.419228][ T3635] RIP: 0033:0x4665d9 [ 258.432702][ T3647] tipc: Enabling of bearer rejected, failed to enable media [ 258.435193][ T3635] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 258.435199][ T3635] RSP: 002b:00007fa673a7f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 11:50:26 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3={0x3000000, [], 0xee00}, 0x18, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[]) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:26 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) 11:50:26 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 258.435207][ T3635] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 258.435211][ T3635] RDX: 0000000000000028 RSI: 0000000020000080 RDI: 000000000000000a [ 258.435220][ T3635] RBP: 00007fa673a7f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 258.461442][ T3650] overlayfs: missing 'lowerdir' [ 258.462337][ T3635] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 258.462343][ T3635] R13: 00007ffd91883adf R14: 00007fa673a7f300 R15: 0000000000022000 [ 258.507932][ T3654] tipc: Started in network mode 11:50:26 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3={0x3000000, [], 0xee00}, 0x18, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB]) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:26 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) 11:50:26 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x24fa0100, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x1, 0x0, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) [ 258.649793][ T3664] overlayfs: missing 'lowerdir' [ 258.663842][ T3654] tipc: Own node identity , cluster identity 4711 [ 258.682498][ T3654] tipc: Failed to obtain node identity [ 258.689201][ T3654] tipc: Enabling of bearer rejected, failed to enable media 11:50:26 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x2, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) 11:50:26 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) 11:50:26 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3={0x3000000, [], 0xee00}, 0x18, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB]) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:26 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r2) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:26 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x3, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 258.760250][ T3674] overlayfs: missing 'lowerdir' [ 258.775495][ T3680] tipc: Started in network mode [ 258.796863][ T3680] tipc: Own node identity , cluster identity 4711 11:50:26 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4082, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000006, 0x800000000009031, 0xffffffffffffffff, 0x0) 11:50:26 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x4, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) 11:50:26 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x25000000, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x1, 0x0, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) 11:50:26 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) 11:50:26 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000029fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000006504040001000000040400001c007d60b7030000000000006a0a00fe20000000850000000d000000b700000000000000950000fe00000000c9be17044171e1d3d7b1d6d0ff03000000000000c668a4b63e069efb297975738f538e31ec24925095a163b9d4e76be266e31a80212240baa44e080addde6033170000007b3f912f6906a6e2313091df61258a1fda45991fbdce6793c8a4785ee8b60092659b941bbd750045404b04bf97c0fea679c032b3203c6cd8bac9626bcc85e961509735a046171f5bebfa80dbdc0200379e731d3a8d8fea894a4ee293001f6ce7d5b40bf2a7399c23f84c6fa5f9be8173d05afe002c0e7821d406c967379e7521392d24d6c8034e2dc7c053498a9f413af569575de3b5c85546945e9bce678ee9a09806474947310bae538450a676d71c011705060000000000000000a3d39322942df819eea101000000000000009fc8f4b9276e9dc330c9cbac5d708570a14546aa89e13c65896d24684ee25f853b0858122c3d1de564d84638c7f6ec477f9ffece0ff3d9f4cf21c119b95eba4c925c80c3c33c81a68055fc8b3af4f32d16cf290f90d80f1da0db08da80f7a88b63885551371ee1febf833a4103e2f68d1aa3a2138953c0c41ead2824f4ae3260007396d42e0168a85fc6448b3f2eaab716abe53aa6c1ba9ace891ef38f9a00000000000000000000000000000000000200481ac0f54b7a913f3465c333429c19f5d01166a1c4edc2abdeb54e25bf47085689e16b524053ac75f36b5b6e7ddf0aa170ec19aee6ccb06c4708e4ec97194d713a36d9bbed4e832541318a8c13c55c40d100e58fb845049af5b02f8ba8fc1345d6442b96c2d17bd048a2ed0841470c424324db952a44b515d47945babf404c35fd608046f1640f05007842f01d3428843635d4f3e98399b396ea30fc8f9a911a64798a4cf7b63b48349cd630881342c6533f5a9ac85b040000000000000000090000000000009380513278d4701e78251bbc45b73f8d5665d369df748c068b23e3fe886aee0668e58e7158040e0156e332b122288e40fecb03cf4880dc047af0c3a73bab43736a168c57df0f88c1d2dc8d27ad24dbfce44c6a9082b178a2c0527b143c2cb1cd9ed565d1ad68953e031c168ec6280c2eee3550d34d34f66c40252798606cfb2a6d424b78933a9191"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x5, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) 11:50:26 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r2) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 258.817556][ T3680] tipc: Failed to obtain node identity [ 258.831162][ T3680] tipc: Enabling of bearer rejected, failed to enable media [ 258.845282][ T3686] overlayfs: missing 'lowerdir' 11:50:26 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3={0x3000000, [], 0xee00}, 0x18, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB]) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:26 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) 11:50:26 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x6, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 258.920886][ T3703] tipc: Started in network mode [ 258.933299][ T3703] tipc: Own node identity , cluster identity 4711 [ 258.952955][ T3706] overlayfs: missing 'lowerdir' 11:50:26 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r2) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:26 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3={0x3000000, [], 0xee00}, 0x18, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bu']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:26 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x7, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 258.973093][ T3703] tipc: Failed to obtain node identity [ 258.985526][ T3703] tipc: Enabling of bearer rejected, failed to enable media [ 259.027858][ T3714] overlayfs: missing 'workdir' 11:50:26 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4082, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000006, 0x800000000009031, 0xffffffffffffffff, 0x0) 11:50:26 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, 0x0, 0x0, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) 11:50:26 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x2c050000, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x1, 0x0, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) 11:50:26 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000029fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000006504040001000000040400001c007d60b7030000000000006a0a00fe20000000850000000d000000b700000000000000950000fe00000000c9be17044171e1d3d7b1d6d0ff03000000000000c668a4b63e069efb297975738f538e31ec24925095a163b9d4e76be266e31a80212240baa44e080addde6033170000007b3f912f6906a6e2313091df61258a1fda45991fbdce6793c8a4785ee8b60092659b941bbd750045404b04bf97c0fea679c032b3203c6cd8bac9626bcc85e961509735a046171f5bebfa80dbdc0200379e731d3a8d8fea894a4ee293001f6ce7d5b40bf2a7399c23f84c6fa5f9be8173d05afe002c0e7821d406c967379e7521392d24d6c8034e2dc7c053498a9f413af569575de3b5c85546945e9bce678ee9a09806474947310bae538450a676d71c011705060000000000000000a3d39322942df819eea101000000000000009fc8f4b9276e9dc330c9cbac5d708570a14546aa89e13c65896d24684ee25f853b0858122c3d1de564d84638c7f6ec477f9ffece0ff3d9f4cf21c119b95eba4c925c80c3c33c81a68055fc8b3af4f32d16cf290f90d80f1da0db08da80f7a88b63885551371ee1febf833a4103e2f68d1aa3a2138953c0c41ead2824f4ae3260007396d42e0168a85fc6448b3f2eaab716abe53aa6c1ba9ace891ef38f9a00000000000000000000000000000000000200481ac0f54b7a913f3465c333429c19f5d01166a1c4edc2abdeb54e25bf47085689e16b524053ac75f36b5b6e7ddf0aa170ec19aee6ccb06c4708e4ec97194d713a36d9bbed4e832541318a8c13c55c40d100e58fb845049af5b02f8ba8fc1345d6442b96c2d17bd048a2ed0841470c424324db952a44b515d47945babf404c35fd608046f1640f05007842f01d3428843635d4f3e98399b396ea30fc8f9a911a64798a4cf7b63b48349cd630881342c6533f5a9ac85b040000000000000000090000000000009380513278d4701e78251bbc45b73f8d5665d369df748c068b23e3fe886aee0668e58e7158040e0156e332b122288e40fecb03cf4880dc047af0c3a73bab43736a168c57df0f88c1d2dc8d27ad24dbfce44c6a9082b178a2c0527b143c2cb1cd9ed565d1ad68953e031c168ec6280c2eee3550d34d34f66c40252798606cfb2a6d424b78933a9191"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x8, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) 11:50:26 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r2) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:26 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3={0x3000000, [], 0xee00}, 0x18, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bu']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:26 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, 0x0, 0x0, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) 11:50:26 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:26 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3={0x3000000, [], 0xee00}, 0x18, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bu']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:26 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x9, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 259.134998][ T3727] tipc: Started in network mode [ 259.152722][ T3732] overlayfs: missing 'workdir' [ 259.159902][ T3727] tipc: Own node identity , cluster identity 4711 11:50:26 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, 0x0, 0x0, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) 11:50:26 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x2d000000, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x1, 0x0, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) [ 259.182826][ T3727] tipc: Failed to obtain node identity [ 259.192628][ T3727] tipc: Enabling of bearer rejected, failed to enable media [ 259.255482][ T3750] tipc: Started in network mode [ 259.264136][ T3750] tipc: Own node identity , cluster identity 4711 [ 259.270700][ T3750] tipc: Failed to obtain node identity [ 259.271729][ T3749] overlayfs: missing 'workdir' [ 259.276246][ T3750] tipc: Enabling of bearer rejected, failed to enable media 11:50:26 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4082, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000006, 0x800000000009031, 0xffffffffffffffff, 0x0) 11:50:26 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) 11:50:26 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000029fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000006504040001000000040400001c007d60b7030000000000006a0a00fe20000000850000000d000000b700000000000000950000fe00000000c9be17044171e1d3d7b1d6d0ff03000000000000c668a4b63e069efb297975738f538e31ec24925095a163b9d4e76be266e31a80212240baa44e080addde6033170000007b3f912f6906a6e2313091df61258a1fda45991fbdce6793c8a4785ee8b60092659b941bbd750045404b04bf97c0fea679c032b3203c6cd8bac9626bcc85e961509735a046171f5bebfa80dbdc0200379e731d3a8d8fea894a4ee293001f6ce7d5b40bf2a7399c23f84c6fa5f9be8173d05afe002c0e7821d406c967379e7521392d24d6c8034e2dc7c053498a9f413af569575de3b5c85546945e9bce678ee9a09806474947310bae538450a676d71c011705060000000000000000a3d39322942df819eea101000000000000009fc8f4b9276e9dc330c9cbac5d708570a14546aa89e13c65896d24684ee25f853b0858122c3d1de564d84638c7f6ec477f9ffece0ff3d9f4cf21c119b95eba4c925c80c3c33c81a68055fc8b3af4f32d16cf290f90d80f1da0db08da80f7a88b63885551371ee1febf833a4103e2f68d1aa3a2138953c0c41ead2824f4ae3260007396d42e0168a85fc6448b3f2eaab716abe53aa6c1ba9ace891ef38f9a00000000000000000000000000000000000200481ac0f54b7a913f3465c333429c19f5d01166a1c4edc2abdeb54e25bf47085689e16b524053ac75f36b5b6e7ddf0aa170ec19aee6ccb06c4708e4ec97194d713a36d9bbed4e832541318a8c13c55c40d100e58fb845049af5b02f8ba8fc1345d6442b96c2d17bd048a2ed0841470c424324db952a44b515d47945babf404c35fd608046f1640f05007842f01d3428843635d4f3e98399b396ea30fc8f9a911a64798a4cf7b63b48349cd630881342c6533f5a9ac85b040000000000000000090000000000009380513278d4701e78251bbc45b73f8d5665d369df748c068b23e3fe886aee0668e58e7158040e0156e332b122288e40fecb03cf4880dc047af0c3a73bab43736a168c57df0f88c1d2dc8d27ad24dbfce44c6a9082b178a2c0527b143c2cb1cd9ed565d1ad68953e031c168ec6280c2eee3550d34d34f66c40252798606cfb2a6d424b78933a9191"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xb, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) 11:50:26 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:26 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x2e000000, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x1, 0x0, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) 11:50:26 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3={0x3000000, [], 0xee00}, 0x18, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./fil']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:26 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) 11:50:27 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xc, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) 11:50:27 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 259.376436][ T3763] tipc: Started in network mode [ 259.394575][ T3766] overlayfs: failed to resolve './fil': -2 [ 259.405516][ T3763] tipc: Own node identity , cluster identity 4711 11:50:27 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3={0x3000000, [], 0xee00}, 0x18, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./fil']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:27 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xd, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) 11:50:27 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) [ 259.437094][ T3763] tipc: Failed to obtain node identity [ 259.453630][ T3763] tipc: Enabling of bearer rejected, failed to enable media [ 259.500678][ T3780] overlayfs: failed to resolve './fil': -2 11:50:27 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4082, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000006, 0x800000000009031, 0xffffffffffffffff, 0x0) 11:50:27 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x3a000000, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x1, 0x0, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) 11:50:27 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r2) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:27 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3={0x3000000, [], 0xee00}, 0x18, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./fil']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:27 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xe, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) 11:50:27 executing program 0: socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r1, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) 11:50:27 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r2) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:27 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3={0x3000000, [], 0xee00}, 0x18, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,meta']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:27 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000029fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000006504040001000000040400001c007d60b7030000000000006a0a00fe20000000850000000d000000b700000000000000950000fe00000000c9be17044171e1d3d7b1d6d0ff03000000000000c668a4b63e069efb297975738f538e31ec24925095a163b9d4e76be266e31a80212240baa44e080addde6033170000007b3f912f6906a6e2313091df61258a1fda45991fbdce6793c8a4785ee8b60092659b941bbd750045404b04bf97c0fea679c032b3203c6cd8bac9626bcc85e961509735a046171f5bebfa80dbdc0200379e731d3a8d8fea894a4ee293001f6ce7d5b40bf2a7399c23f84c6fa5f9be8173d05afe002c0e7821d406c967379e7521392d24d6c8034e2dc7c053498a9f413af569575de3b5c85546945e9bce678ee9a09806474947310bae538450a676d71c011705060000000000000000a3d39322942df819eea101000000000000009fc8f4b9276e9dc330c9cbac5d708570a14546aa89e13c65896d24684ee25f853b0858122c3d1de564d84638c7f6ec477f9ffece0ff3d9f4cf21c119b95eba4c925c80c3c33c81a68055fc8b3af4f32d16cf290f90d80f1da0db08da80f7a88b63885551371ee1febf833a4103e2f68d1aa3a2138953c0c41ead2824f4ae3260007396d42e0168a85fc6448b3f2eaab716abe53aa6c1ba9ace891ef38f9a00000000000000000000000000000000000200481ac0f54b7a913f3465c333429c19f5d01166a1c4edc2abdeb54e25bf47085689e16b524053ac75f36b5b6e7ddf0aa170ec19aee6ccb06c4708e4ec97194d713a36d9bbed4e832541318a8c13c55c40d100e58fb845049af5b02f8ba8fc1345d6442b96c2d17bd048a2ed0841470c424324db952a44b515d47945babf404c35fd608046f1640f05007842f01d3428843635d4f3e98399b396ea30fc8f9a911a64798a4cf7b63b48349cd630881342c6533f5a9ac85b040000000000000000090000000000009380513278d4701e78251bbc45b73f8d5665d369df748c068b23e3fe886aee0668e58e7158040e0156e332b122288e40fecb03cf4880dc047af0c3a73bab43736a168c57df0f88c1d2dc8d27ad24dbfce44c6a9082b178a2c0527b143c2cb1cd9ed565d1ad68953e031c168ec6280c2eee3550d34d34f66c40252798606cfb2a6d424b78933a9191"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xf, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) 11:50:27 executing program 0: socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r1, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) [ 259.615761][ T3792] overlayfs: failed to resolve './fil': -2 [ 259.629313][ T3799] tipc: Started in network mode [ 259.644347][ T3799] tipc: Own node identity , cluster identity 4711 [ 259.651917][ T3799] tipc: Failed to obtain node identity [ 259.658082][ T3799] tipc: Enabling of bearer rejected, failed to enable media 11:50:27 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x40000000, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x1, 0x0, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) 11:50:27 executing program 0: socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r1, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) [ 259.691258][ T3806] overlayfs: unrecognized mount option "meta" or missing value [ 259.732734][ T3815] tipc: Started in network mode [ 259.739360][ T3815] tipc: Own node identity , cluster identity 4711 [ 259.745794][ T3815] tipc: Failed to obtain node identity [ 259.756598][ T3815] tipc: Enabling of bearer rejected, failed to enable media 11:50:27 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4082, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000006, 0x800000000009031, 0xffffffffffffffff, 0x0) 11:50:27 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r2) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:27 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x10, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) 11:50:27 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3={0x3000000, [], 0xee00}, 0x18, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,meta']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:27 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 11:50:27 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x48000000, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x1, 0x0, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) 11:50:27 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x11, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) 11:50:27 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 11:50:27 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r2) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 259.853286][ T3830] tipc: Started in network mode [ 259.866061][ T3833] overlayfs: unrecognized mount option "meta" or missing value [ 259.880571][ T3830] tipc: Own node identity , cluster identity 4711 11:50:27 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3={0x3000000, [], 0xee00}, 0x18, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,meta']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:27 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 11:50:27 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x12, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 259.902233][ T3830] tipc: Failed to obtain node identity [ 259.908186][ T3830] tipc: Enabling of bearer rejected, failed to enable media 11:50:27 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4082, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000006, 0x800000000009031, 0xffffffffffffffff, 0x0) 11:50:27 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x4c000000, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x1, 0x0, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) 11:50:27 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x13, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) 11:50:27 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 11:50:27 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3={0x3000000, [], 0xee00}, 0x18, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:27 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r2) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 259.983808][ T3848] overlayfs: unrecognized mount option "meta" or missing value 11:50:27 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 11:50:27 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x14, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) 11:50:27 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r2) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 260.062920][ T3859] tipc: Started in network mode [ 260.080196][ T3859] tipc: Own node identity , cluster identity 4711 [ 260.099263][ T3865] overlayfs: unrecognized mount option "metacopy" or missing value 11:50:27 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3={0x3000000, [], 0xee00}, 0x18, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:27 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 11:50:27 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x15, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 260.110234][ T3859] tipc: Failed to obtain node identity [ 260.120348][ T3859] tipc: Enabling of bearer rejected, failed to enable media [ 260.195382][ T3877] overlayfs: unrecognized mount option "metacopy" or missing value 11:50:27 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4082, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000006, 0x800000000009031, 0xffffffffffffffff, 0x0) 11:50:27 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x58fa0100, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x1, 0x0, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) 11:50:27 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x16, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) 11:50:27 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x40}}, 0x0) 11:50:27 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') ftruncate(0xffffffffffffffff, 0x800) lseek(0xffffffffffffffff, 0x0, 0x2) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:27 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3={0x3000000, [], 0xee00}, 0x18, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:27 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x40}}, 0x0) 11:50:27 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x17, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) 11:50:27 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') ftruncate(0xffffffffffffffff, 0x800) lseek(0xffffffffffffffff, 0x0, 0x2) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:27 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3={0x3000000, [], 0xee00}, 0x18, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=o']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) [ 260.299945][ T3893] tipc: Started in network mode [ 260.304619][ T3891] overlayfs: unrecognized mount option "metacopy" or missing value [ 260.311368][ T3893] tipc: Own node identity , cluster identity 4711 11:50:27 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x40}}, 0x0) 11:50:27 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 260.352460][ T3893] tipc: Failed to obtain node identity [ 260.373201][ T3893] tipc: Enabling of bearer rejected, failed to enable media [ 260.393578][ T3907] overlayfs: unrecognized mount option "metacopy=o" or missing value 11:50:28 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4082, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, 0x0, 0x0, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000006, 0x800000000009031, 0xffffffffffffffff, 0x0) 11:50:28 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3={0x3000000, [], 0xee00}, 0x18, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=o']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:28 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') ftruncate(0xffffffffffffffff, 0x800) lseek(0xffffffffffffffff, 0x0, 0x2) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:28 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2], 0x40}}, 0x0) 11:50:28 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x5f000000, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x1, 0x0, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) 11:50:28 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) 11:50:28 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r2) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 260.506687][ T3920] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. [ 260.529454][ T3921] tipc: Started in network mode [ 260.534402][ T3921] tipc: Own node identity , cluster identity 4711 [ 260.542814][ T3921] tipc: Failed to obtain node identity [ 260.542827][ T3925] overlayfs: unrecognized mount option "metacopy=o" or missing value 11:50:28 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2], 0x40}}, 0x0) 11:50:28 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x200003d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) 11:50:28 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x60000000, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x1, 0x0, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) 11:50:28 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3={0x3000000, [], 0xee00}, 0x18, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=o']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) [ 260.550520][ T3921] tipc: Enabling of bearer rejected, failed to enable media 11:50:28 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r2) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 260.622139][ T3936] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. [ 260.648187][ T3940] overlayfs: unrecognized mount option "metacopy=o" or missing value [ 260.655055][ T3937] tipc: Started in network mode [ 260.664342][ T3937] tipc: Own node identity , cluster identity 4711 [ 260.675117][ T3937] tipc: Failed to obtain node identity [ 260.687916][ T3937] tipc: Enabling of bearer rejected, failed to enable media 11:50:28 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4082, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, 0x0, 0x0, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000006, 0x800000000009031, 0xffffffffffffffff, 0x0) 11:50:28 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff1000008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) 11:50:28 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2], 0x40}}, 0x0) 11:50:28 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3={0x3000000, [], 0xee00}, 0x18, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) creat(0x0, 0x0) 11:50:28 executing program 1: r0 = creat(0x0, 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r2) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:28 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x64050000, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x1, 0x0, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) 11:50:28 executing program 1: r0 = creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x800) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r2) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:28 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3={0x3000000, [], 0xee00}, 0x18, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) creat(0x0, 0x0) [ 260.774063][ T3953] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. [ 260.812411][ T3950] tipc: Started in network mode 11:50:28 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB], 0x40}}, 0x0) 11:50:28 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0302008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 260.818113][ T3950] tipc: Own node identity , cluster identity 4711 11:50:28 executing program 1: r0 = creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r2) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 260.845586][ T3950] tipc: Failed to obtain node identity [ 260.870246][ T3950] tipc: Enabling of bearer rejected, failed to enable media 11:50:28 executing program 1: creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x2) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 260.900075][ T3968] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. 11:50:28 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4082, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, 0x0, 0x0, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000006, 0x800000000009031, 0xffffffffffffffff, 0x0) 11:50:28 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3={0x3000000, [], 0xee00}, 0x18, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) creat(0x0, 0x0) 11:50:28 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000029fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000006504040001000000040400001c007d60b7030000000000006a0a00fe20000000850000000d000000b700000000000000950000fe00000000c9be17044171e1d3d7b1d6d0ff03000000000000c668a4b63e069efb297975738f538e31ec24925095a163b9d4e76be266e31a80212240baa44e080addde6033170000007b3f912f6906a6e2313091df61258a1fda45991fbdce6793c8a4785ee8b60092659b941bbd750045404b04bf97c0fea679c032b3203c6cd8bac9626bcc85e961509735a046171f5bebfa80dbdc0200379e731d3a8d8fea894a4ee293001f6ce7d5b40bf2a7399c23f84c6fa5f9be8173d05afe002c0e7821d406c967379e7521392d24d6c8034e2dc7c053498a9f413af569575de3b5c85546945e9bce678ee9a09806474947310bae538450a676d71c011705060000000000000000a3d39322942df819eea101000000000000009fc8f4b9276e9dc330c9cbac5d708570a14546aa89e13c65896d24684ee25f853b0858122c3d1de564d84638c7f6ec477f9ffece0ff3d9f4cf21c119b95eba4c925c80c3c33c81a68055fc8b3af4f32d16cf290f90d80f1da0db08da80f7a88b63885551371ee1febf833a4103e2f68d1aa3a2138953c0c41ead2824f4ae3260007396d42e0168a85fc6448b3f2eaab716abe53aa6c1ba9ace891ef38f9a00000000000000000000000000000000000200481ac0f54b7a913f3465c333429c19f5d01166a1c4edc2abdeb54e25bf47085689e16b524053ac75f36b5b6e7ddf0aa170ec19aee6ccb06c4708e4ec97194d713a36d9bbed4e832541318a8c13c55c40d100e58fb845049af5b02f8ba8fc1345d6442b96c2d17bd048a2ed0841470c424324db952a44b515d47945babf404c35fd608046f1640f05007842f01d3428843635d4f3e98399b396ea30fc8f9a911a64798a4cf7b63b48349cd630881342c6533f5a9ac85b040000000000000000090000000000009380513278d4701e78251bbc45b73f8d5665d369df748c068b23e3fe886aee0668e58e7158040e0156e332b122288e40fecb03cf4880dc047af0c3a73bab43736a168c57df0f88c1d2dc8d27ad24dbfce44c6a9082b178a2c0527b143c2cb1cd9ed565d1ad68953e031c168ec6280c2eee3550d34d34f66c40252798606cfb2a6d424b78933a9191"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0304008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) 11:50:28 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x68000000, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x1, 0x0, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) 11:50:28 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB], 0x40}}, 0x0) 11:50:28 executing program 1: creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:28 executing program 1: creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:28 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0308008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 261.018927][ T3988] tipc: Started in network mode [ 261.031855][ T3988] tipc: Own node identity , cluster identity 4711 [ 261.051868][ T3988] tipc: Failed to obtain node identity 11:50:28 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4082, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, 0x0, 0x0, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000006, 0x800000000009031, 0xffffffffffffffff, 0x0) 11:50:28 executing program 1: creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 261.064301][ T3988] tipc: Enabling of bearer rejected, failed to enable media 11:50:28 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB], 0x40}}, 0x0) 11:50:28 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff030f008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 261.112652][ T3989] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. [ 261.180007][ T4005] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. 11:50:28 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4082, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000006, 0x800000000009031, 0xffffffffffffffff, 0x0) 11:50:28 executing program 1: creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:28 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x6c000000, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x1, 0x0, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) 11:50:28 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0310008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) 11:50:28 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff0000000000"], 0x40}}, 0x0) 11:50:28 executing program 1: creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:28 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0360008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 261.283102][ T4016] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 261.311019][ T4014] tipc: Started in network mode 11:50:28 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff0000000000"], 0x40}}, 0x0) 11:50:28 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000029fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000006504040001000000040400001c007d60b7030000000000006a0a00fe20000000850000000d000000b700000000000000950000fe00000000c9be17044171e1d3d7b1d6d0ff03000000000000c668a4b63e069efb297975738f538e31ec24925095a163b9d4e76be266e31a80212240baa44e080addde6033170000007b3f912f6906a6e2313091df61258a1fda45991fbdce6793c8a4785ee8b60092659b941bbd750045404b04bf97c0fea679c032b3203c6cd8bac9626bcc85e961509735a046171f5bebfa80dbdc0200379e731d3a8d8fea894a4ee293001f6ce7d5b40bf2a7399c23f84c6fa5f9be8173d05afe002c0e7821d406c967379e7521392d24d6c8034e2dc7c053498a9f413af569575de3b5c85546945e9bce678ee9a09806474947310bae538450a676d71c011705060000000000000000a3d39322942df819eea101000000000000009fc8f4b9276e9dc330c9cbac5d708570a14546aa89e13c65896d24684ee25f853b0858122c3d1de564d84638c7f6ec477f9ffece0ff3d9f4cf21c119b95eba4c925c80c3c33c81a68055fc8b3af4f32d16cf290f90d80f1da0db08da80f7a88b63885551371ee1febf833a4103e2f68d1aa3a2138953c0c41ead2824f4ae3260007396d42e0168a85fc6448b3f2eaab716abe53aa6c1ba9ace891ef38f9a00000000000000000000000000000000000200481ac0f54b7a913f3465c333429c19f5d01166a1c4edc2abdeb54e25bf47085689e16b524053ac75f36b5b6e7ddf0aa170ec19aee6ccb06c4708e4ec97194d713a36d9bbed4e832541318a8c13c55c40d100e58fb845049af5b02f8ba8fc1345d6442b96c2d17bd048a2ed0841470c424324db952a44b515d47945babf404c35fd608046f1640f05007842f01d3428843635d4f3e98399b396ea30fc8f9a911a64798a4cf7b63b48349cd630881342c6533f5a9ac85b040000000000000000090000000000009380513278d4701e78251bbc45b73f8d5665d369df748c068b23e3fe886aee0668e58e7158040e0156e332b122288e40fecb03cf4880dc047af0c3a73bab43736a168c57df0f88c1d2dc8d27ad24dbfce44c6a9082b178a2c0527b143c2cb1cd9ed565d1ad68953e031c168ec6280c2eee3550d34d34f66c40252798606cfb2a6d424b78933a9191"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff030f008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) 11:50:28 executing program 1: creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 261.334584][ T4014] tipc: Own node identity , cluster identity 4711 [ 261.355328][ T4014] tipc: Failed to obtain node identity 11:50:28 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff03c3028d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) 11:50:29 executing program 1: creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 261.385972][ T4014] tipc: Enabling of bearer rejected, failed to enable media [ 261.430538][ T4027] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 11:50:29 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4082, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000006, 0x800000000009031, 0xffffffffffffffff, 0x0) 11:50:29 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:29 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x74000000, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x1, 0x0, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) 11:50:29 executing program 1: creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:29 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff03000f8d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) 11:50:29 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff0000000000"], 0x40}}, 0x0) 11:50:29 executing program 1: creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:29 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) [ 261.541421][ T4047] tipc: Started in network mode [ 261.553067][ T4047] tipc: Own node identity , cluster identity 4711 [ 261.581457][ T4047] tipc: Failed to obtain node identity 11:50:29 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff03001f8d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) 11:50:29 executing program 1: creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:29 executing program 1: creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:29 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000"], 0x40}}, 0x0) [ 261.596433][ T4047] tipc: Enabling of bearer rejected, failed to enable media [ 261.632053][ T4053] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 11:50:29 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4082, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000006, 0x800000000009031, 0xffffffffffffffff, 0x0) 11:50:29 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x7a000000, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x1, 0x0, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) 11:50:29 executing program 1: creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:29 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000"], 0x40}}, 0x0) 11:50:29 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:29 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300408d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) 11:50:29 executing program 1: creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:29 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000"], 0x40}}, 0x0) [ 261.772367][ T4078] tipc: Started in network mode [ 261.787391][ T4078] tipc: Own node identity , cluster identity 4711 11:50:29 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000029fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000006504040001000000040400001c007d60b7030000000000006a0a00fe20000000850000000d000000b700000000000000950000fe00000000c9be17044171e1d3d7b1d6d0ff03000000000000c668a4b63e069efb297975738f538e31ec24925095a163b9d4e76be266e31a80212240baa44e080addde6033170000007b3f912f6906a6e2313091df61258a1fda45991fbdce6793c8a4785ee8b60092659b941bbd750045404b04bf97c0fea679c032b3203c6cd8bac9626bcc85e961509735a046171f5bebfa80dbdc0200379e731d3a8d8fea894a4ee293001f6ce7d5b40bf2a7399c23f84c6fa5f9be8173d05afe002c0e7821d406c967379e7521392d24d6c8034e2dc7c053498a9f413af569575de3b5c85546945e9bce678ee9a09806474947310bae538450a676d71c011705060000000000000000a3d39322942df819eea101000000000000009fc8f4b9276e9dc330c9cbac5d708570a14546aa89e13c65896d24684ee25f853b0858122c3d1de564d84638c7f6ec477f9ffece0ff3d9f4cf21c119b95eba4c925c80c3c33c81a68055fc8b3af4f32d16cf290f90d80f1da0db08da80f7a88b63885551371ee1febf833a4103e2f68d1aa3a2138953c0c41ead2824f4ae3260007396d42e0168a85fc6448b3f2eaab716abe53aa6c1ba9ace891ef38f9a00000000000000000000000000000000000200481ac0f54b7a913f3465c333429c19f5d01166a1c4edc2abdeb54e25bf47085689e16b524053ac75f36b5b6e7ddf0aa170ec19aee6ccb06c4708e4ec97194d713a36d9bbed4e832541318a8c13c55c40d100e58fb845049af5b02f8ba8fc1345d6442b96c2d17bd048a2ed0841470c424324db952a44b515d47945babf404c35fd608046f1640f05007842f01d3428843635d4f3e98399b396ea30fc8f9a911a64798a4cf7b63b48349cd630881342c6533f5a9ac85b040000000000000000090000000000009380513278d4701e78251bbc45b73f8d5665d369df748c068b23e3fe886aee0668e58e7158040e0156e332b122288e40fecb03cf4880dc047af0c3a73bab43736a168c57df0f88c1d2dc8d27ad24dbfce44c6a9082b178a2c0527b143c2cb1cd9ed565d1ad68953e031c168ec6280c2eee3550d34d34f66c40252798606cfb2a6d424b78933a9191"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300608d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) 11:50:29 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:29 executing program 1: creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:29 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff0000000000000000140002000000000000"], 0x40}}, 0x0) [ 261.815416][ T4078] tipc: Failed to obtain node identity [ 261.833036][ T4078] tipc: Enabling of bearer rejected, failed to enable media 11:50:29 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4082, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x800000000009031, 0xffffffffffffffff, 0x0) 11:50:29 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x9cfa0100, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x1, 0x0, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) 11:50:29 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0302c38d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) 11:50:29 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:29 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff0000000000000000140002000000000000"], 0x40}}, 0x0) 11:50:29 executing program 1: creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:29 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:29 executing program 1: creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:29 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4082, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x800000000009031, 0xffffffffffffffff, 0x0) [ 261.975400][ T4107] tipc: Started in network mode [ 261.989550][ T4107] tipc: Own node identity , cluster identity 4711 [ 262.004271][ T4107] tipc: Failed to obtain node identity 11:50:29 executing program 1: creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:29 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300028d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) 11:50:29 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff0000000000000000140002000000000000"], 0x40}}, 0x0) 11:50:29 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) [ 262.018409][ T4107] tipc: Enabling of bearer rejected, failed to enable media 11:50:29 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x9effffff, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x1, 0x0, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) 11:50:29 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4082, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x800000000009031, 0xffffffffffffffff, 0x0) 11:50:29 executing program 1: creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:29 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:29 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000"], 0x40}}, 0x0) 11:50:29 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4082, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000006, 0x10, 0xffffffffffffffff, 0x0) 11:50:29 executing program 1: creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 262.110073][ T4135] tipc: Started in network mode [ 262.123637][ T4135] tipc: Own node identity , cluster identity 4711 [ 262.132244][ T4135] tipc: Failed to obtain node identity 11:50:29 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300048d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) 11:50:29 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:29 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000"], 0x40}}, 0x0) 11:50:29 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4082, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000006, 0x10, 0xffffffffffffffff, 0x0) [ 262.153382][ T4135] tipc: Enabling of bearer rejected, failed to enable media 11:50:29 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0xa8050000, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x1, 0x0, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) 11:50:29 executing program 1: creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:29 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300088d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) 11:50:29 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4082, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000006, 0x10, 0xffffffffffffffff, 0x0) 11:50:29 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000"], 0x40}}, 0x0) [ 262.241928][ T4156] tipc: Started in network mode 11:50:29 executing program 1: creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:29 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:29 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', 0x0) setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3={0x3000000, [{0x3d6, 0x3ff}, {0x8, 0xbcce}], 0xee00}, 0x18, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:29 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff03000f8d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 262.263836][ T4156] tipc: Own node identity , cluster identity 4711 [ 262.302003][ T4156] tipc: Failed to obtain node identity 11:50:29 executing program 1: creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:29 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:29 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff0000000000000000140002000000000000000000"], 0x40}}, 0x0) [ 262.318970][ T4156] tipc: Enabling of bearer rejected, failed to enable media 11:50:29 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0xc5000000, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x1, 0x0, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) 11:50:29 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r2) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) socket$unix(0x1, 0x2, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:30 executing program 1: creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(0x0, 0x15a) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:30 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300108d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) 11:50:30 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff0000000000000000140002000000000000000000"], 0x40}}, 0x0) 11:50:30 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:30 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r2) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) r3 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r4, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:30 executing program 1: creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(0x0, 0x15a) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 262.426340][ T4186] tipc: Started in network mode [ 262.443604][ T4186] tipc: Own node identity , cluster identity 4711 11:50:30 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300608d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) 11:50:30 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:30 executing program 1: creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(0x0, 0x15a) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:30 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r2) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) r3 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r4, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 262.478771][ T4186] tipc: Failed to obtain node identity [ 262.493568][ T4186] tipc: Enabling of bearer rejected, failed to enable media 11:50:30 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0xd4fa0100, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x1, 0x0, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) 11:50:30 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff0000000000000000140002000000000000000000"], 0x40}}, 0x0) 11:50:30 executing program 1: creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:30 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e40cd518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) 11:50:30 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:30 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) 11:50:30 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r2) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) r3 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r4, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 262.552382][ T4213] overlayfs: failed to resolve './file0': -2 11:50:30 executing program 1: creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:30 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:30 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000029fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000006504040001000000040400001c007d60b7030000000000006a0a00fe20000000850000000d000000b700000000000000950000fe00000000c9be17044171e1d3d7b1d6d0ff03000000000000c668a4b63e069efb297975738f538e31ec24925095a163b9d4e76be266e31a80212240baa44e080addde6033170000007b3f912f6906a6e2313091df61258a1fda45991fbdce6793c8a4785ee8b60092659b941bbd750045404b04bf97c0fea679c032b3203c6cd8bac9626bcc85e961509735a046171f5bebfa80dbdc0200379e731d3a8d8fea894a4ee293001f6ce7d5b40bf2a7399c23f84c6fa5f9be8173d05afe002c0e7821d406c967379e7521392d24d6c8034e2dc7c053498a9f413af569575de3b5c85546945e9bce678ee9a09806474947310bae538450a676d71c011705060000000000000000a3d39322942df819eea101000000000000009fc8f4b9276e9dc330c9cbac5d708570a14546aa89e13c65896d24684ee25f853b0858122c3d1de564d84638c7f6ec477f9ffece0ff3d9f4cf21c119b95eba4c925c80c3c33c81a68055fc8b3af4f32d16cf290f90d80f1da0db08da80f7a88b63885551371ee1febf833a4103e2f68d1aa3a2138953c0c41ead2824f4ae3260007396d42e0168a85fc6448b3f2eaab716abe53aa6c1ba9ace891ef38f9a00000000000000000000000000000000000200481ac0f54b7a913f3465c333429c19f5d01166a1c4edc2abdeb54e25bf47085689e16b524053ac75f36b5b6e7ddf0aa170ec19aee6ccb06c4708e4ec97194d713a36d9bbed4e832541318a8c13c55c40d100e58fb845049af5b02f8ba8fc1345d6442b96c2d17bd048a2ed0841470c424324db952a44b515d47945babf404c35fd608046f1640f05007842f01d3428843635d4f3e98399b396ea30fc8f9a911a64798a4cf7b63b48349cd630881342c6533f5a9ac85b040000000000000000090000000000009380513278d4701e78251bbc45b73f8d5665d369df748c068b23e3fe886aee0668e58e7158040e0156e332b122288e40fecb03cf4880dc047af0c3a73bab43736a168c57df0f88c1d2dc8d27ad24dbfce44c6a9082b178a2c0527b143c2cb1cd9ed565d1ad68953e031c168ec6280c2eee3550d34d34f66c40252798606cfb2a6d424b78933a9191"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000500bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) 11:50:30 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0xdc050000, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x1, 0x0, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) [ 262.599405][ T4221] tipc: Started in network mode [ 262.610992][ T4226] overlayfs: failed to resolve './file0': -2 [ 262.617865][ T4221] tipc: Own node identity , cluster identity 4711 [ 262.624284][ T4221] tipc: Failed to obtain node identity [ 262.635789][ T4221] tipc: Enabling of bearer rejected, failed to enable media 11:50:30 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) [ 262.644819][ T4227] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. 11:50:30 executing program 1: creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:30 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r2) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) r3 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:30 executing program 1: creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(0xffffffffffffffff) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:30 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:30 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518020800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 262.693193][ T4237] tipc: Started in network mode [ 262.701892][ T4239] overlayfs: failed to resolve './file0': -2 [ 262.715547][ T4237] tipc: Own node identity , cluster identity 4711 [ 262.731510][ T4237] tipc: Failed to obtain node identity 11:50:30 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) 11:50:30 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0xefffffff, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x1, 0x0, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) [ 262.739739][ T4237] tipc: Enabling of bearer rejected, failed to enable media 11:50:30 executing program 1: creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(0xffffffffffffffff) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:30 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:30 executing program 1: creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(0xffffffffffffffff) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:30 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0xf0ffffff, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x1, 0x0, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) 11:50:30 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) [ 262.778708][ T4250] tipc: Started in network mode [ 262.791431][ T4250] tipc: Own node identity , cluster identity 4711 [ 262.801819][ T4250] tipc: Failed to obtain node identity [ 262.812646][ T4250] tipc: Enabling of bearer rejected, failed to enable media 11:50:30 executing program 1: creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) setxattr$security_capability(0x0, &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:30 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r2) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) socket$unix(0x1, 0x2, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:30 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518040800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) 11:50:30 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:30 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) 11:50:30 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0xffffff7f, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x1, 0x0, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) [ 262.878573][ T4266] tipc: Started in network mode [ 262.885359][ T4266] tipc: Own node identity , cluster identity 4711 [ 262.892317][ T4266] tipc: Failed to obtain node identity [ 262.898762][ T4266] tipc: Enabling of bearer rejected, failed to enable media 11:50:30 executing program 1: creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) setxattr$security_capability(0x0, &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:30 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r2) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:30 executing program 1: creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) setxattr$security_capability(0x0, &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 262.959622][ T4277] tipc: Started in network mode [ 262.974442][ T4277] tipc: Own node identity , cluster identity 4711 11:50:30 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518080800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) 11:50:30 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:30 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) 11:50:30 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0xffffff9e, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x1, 0x0, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) [ 263.006156][ T4277] tipc: Failed to obtain node identity [ 263.016514][ T4277] tipc: Enabling of bearer rejected, failed to enable media 11:50:30 executing program 1: creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', 0x0, &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:30 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r2) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:30 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:30 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d5180f0800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) 11:50:30 executing program 1: creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', 0x0, &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:30 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) 11:50:30 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0xffffffef, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x1, 0x0, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) 11:50:30 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) [ 263.084430][ T4298] tipc: Started in network mode [ 263.102322][ T4298] tipc: Own node identity , cluster identity 4711 [ 263.109370][ T4298] tipc: Failed to obtain node identity [ 263.114922][ T4298] tipc: Enabling of bearer rejected, failed to enable media 11:50:30 executing program 1: creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', 0x0, &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:30 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518100800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) 11:50:30 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) 11:50:30 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x15a) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:30 executing program 1: creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:30 executing program 2: mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) [ 263.191191][ T4315] tipc: Started in network mode [ 263.198884][ T4315] tipc: Own node identity , cluster identity 4711 [ 263.216793][ T4315] tipc: Failed to obtain node identity 11:50:30 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) [ 263.233145][ T4315] tipc: Enabling of bearer rejected, failed to enable media 11:50:30 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0xfffffff0, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x1, 0x0, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) 11:50:30 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518600800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) 11:50:30 executing program 1: creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:30 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) [ 263.264010][ T4327] Invalid argument reading file caps for ./file0 [ 263.276544][ T4329] overlayfs: failed to resolve './file1': -2 [ 263.303760][ T4334] tipc: Started in network mode 11:50:30 executing program 2: mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:30 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x15a) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:30 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518004000bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) 11:50:30 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) 11:50:30 executing program 1: creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 263.316524][ T4334] tipc: Own node identity , cluster identity 4711 [ 263.334644][ T4338] Invalid argument reading file caps for ./file0 [ 263.335985][ T4334] tipc: Failed to obtain node identity [ 263.353935][ T4342] overlayfs: failed to resolve './file1': -2 11:50:30 executing program 2: mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) [ 263.360741][ T4334] tipc: Enabling of bearer rejected, failed to enable media 11:50:31 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) 11:50:31 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x15a) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:31 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000001880)={0xf, r2, 0x1, 0x0, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) 11:50:31 executing program 1: creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(0x0, 0x0, 0x0) 11:50:31 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="40000000140021010000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) 11:50:31 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000001880)={0x10, r2, 0x1, 0x0, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) 11:50:31 executing program 2: mkdir(0x0, 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:31 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518586500bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 263.411643][ T4352] Invalid argument reading file caps for ./file0 [ 263.430597][ T4354] overlayfs: failed to resolve './file1': -2 11:50:31 executing program 1: creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(0x0, 0x0, 0x0) 11:50:31 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:31 executing program 1: creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(0x0, 0x0, 0x0) 11:50:31 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="40000000140021010000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) 11:50:31 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000001880)={0x1c, r2, 0x1, 0x0, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) 11:50:31 executing program 2: mkdir(0x0, 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:31 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000029fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000006504040001000000040400001c007d60b7030000000000006a0a00fe20000000850000000d000000b700000000000000950000fe00000000c9be17044171e1d3d7b1d6d0ff03000000000000c668a4b63e069efb297975738f538e31ec24925095a163b9d4e76be266e31a80212240baa44e080addde6033170000007b3f912f6906a6e2313091df61258a1fda45991fbdce6793c8a4785ee8b60092659b941bbd750045404b04bf97c0fea679c032b3203c6cd8bac9626bcc85e961509735a046171f5bebfa80dbdc0200379e731d3a8d8fea894a4ee293001f6ce7d5b40bf2a7399c23f84c6fa5f9be8173d05afe002c0e7821d406c967379e7521392d24d6c8034e2dc7c053498a9f413af569575de3b5c85546945e9bce678ee9a09806474947310bae538450a676d71c011705060000000000000000a3d39322942df819eea101000000000000009fc8f4b9276e9dc330c9cbac5d708570a14546aa89e13c65896d24684ee25f853b0858122c3d1de564d84638c7f6ec477f9ffece0ff3d9f4cf21c119b95eba4c925c80c3c33c81a68055fc8b3af4f32d16cf290f90d80f1da0db08da80f7a88b63885551371ee1febf833a4103e2f68d1aa3a2138953c0c41ead2824f4ae3260007396d42e0168a85fc6448b3f2eaab716abe53aa6c1ba9ace891ef38f9a00000000000000000000000000000000000200481ac0f54b7a913f3465c333429c19f5d01166a1c4edc2abdeb54e25bf47085689e16b524053ac75f36b5b6e7ddf0aa170ec19aee6ccb06c4708e4ec97194d713a36d9bbed4e832541318a8c13c55c40d100e58fb845049af5b02f8ba8fc1345d6442b96c2d17bd048a2ed0841470c424324db952a44b515d47945babf404c35fd608046f1640f05007842f01d3428843635d4f3e98399b396ea30fc8f9a911a64798a4cf7b63b48349cd630881342c6533f5a9ac85b040000000000000000090000000000009380513278d4701e78251bbc45b73f8d5665d369df748c068b23e3fe886aee0668e58e7158040e0156e332b122288e40fecb03cf4880dc047af0c3a73bab43736a168c57df0f88c1d2dc8d27ad24dbfce44c6a9082b178a2c0527b143c2cb1cd9ed565d1ad68953e031c168ec6280c2eee3550d34d34f66c40252798606cfb2a6d424b78933a9191"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518008100bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 263.511706][ T4371] overlayfs: failed to resolve './file1': -2 11:50:31 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="40000000140021010000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) 11:50:31 executing program 1 (fault-call:10 fault-nth:0): creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:31 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:31 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000001880)={0xc0, r2, 0x1, 0x0, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) 11:50:31 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) 11:50:31 executing program 2: mkdir(0x0, 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:31 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000500bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 263.573770][ T4384] overlayfs: failed to resolve './file1': -2 [ 263.634793][ T4393] FAULT_INJECTION: forcing a failure. [ 263.634793][ T4393] name failslab, interval 1, probability 0, space 0, times 0 [ 263.648517][ T4393] CPU: 1 PID: 4393 Comm: syz-executor.1 Not tainted 5.4.119-syzkaller-00545-gabedbe9da982 #0 [ 263.658665][ T4393] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 263.668795][ T4393] Call Trace: [ 263.672086][ T4393] dump_stack+0x1d8/0x24e [ 263.676415][ T4393] ? devkmsg_release+0x11c/0x11c [ 263.681359][ T4393] ? check_preemption_disabled+0x9e/0x330 [ 263.687061][ T4393] ? show_regs_print_info+0x12/0x12 [ 263.692250][ T4393] ? debug_smp_processor_id+0x20/0x20 [ 263.697597][ T4393] ? __fsnotify_parent+0x310/0x310 [ 263.702733][ T4393] should_fail+0x6f6/0x860 [ 263.707126][ T4393] ? setup_fault_attr+0x3d0/0x3d0 [ 263.712124][ T4393] ? vfs_write+0x422/0x4e0 [ 263.716514][ T4393] ? fput_many+0x42/0x1a0 [ 263.720820][ T4393] ? getname_flags+0xba/0x640 [ 263.725470][ T4393] should_failslab+0x5/0x20 [ 263.729945][ T4393] kmem_cache_alloc+0x36/0x290 [ 263.734678][ T4393] ? debug_smp_processor_id+0x20/0x20 [ 263.740017][ T4393] getname_flags+0xba/0x640 [ 263.744493][ T4393] __x64_sys_execve+0x74/0xa0 [ 263.749151][ T4393] do_syscall_64+0xcb/0x1e0 [ 263.753635][ T4393] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 263.759500][ T4393] RIP: 0033:0x4665d9 [ 263.763382][ T4393] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 263.782963][ T4393] RSP: 002b:00007ff216918188 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 263.791343][ T4393] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 263.799286][ T4393] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 263.807229][ T4393] RBP: 00007ff2169181d0 R08: 0000000000000000 R09: 0000000000000000 [ 263.815171][ T4393] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 263.823113][ T4393] R13: 00007ffd21f609df R14: 00007ff216918300 R15: 0000000000022000 11:50:31 executing program 1 (fault-call:10 fault-nth:1): creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:31 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:31 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) 11:50:31 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(0x0, 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:31 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000001880)={0xec0, r2, 0x1, 0x0, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) [ 263.848028][ T4401] overlayfs: failed to resolve './file1': -2 11:50:31 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) [ 263.906333][ T4410] FAULT_INJECTION: forcing a failure. [ 263.906333][ T4410] name failslab, interval 1, probability 0, space 0, times 0 [ 263.923978][ T4410] CPU: 0 PID: 4410 Comm: syz-executor.1 Not tainted 5.4.119-syzkaller-00545-gabedbe9da982 #0 [ 263.934255][ T4410] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 263.944289][ T4410] Call Trace: [ 263.947560][ T4410] dump_stack+0x1d8/0x24e [ 263.951904][ T4410] ? devkmsg_release+0x11c/0x11c [ 263.956818][ T4410] ? arch_stack_walk+0xf8/0x140 [ 263.961676][ T4410] ? show_regs_print_info+0x12/0x12 [ 263.966943][ T4410] should_fail+0x6f6/0x860 [ 263.971334][ T4410] ? setup_fault_attr+0x3d0/0x3d0 [ 263.976332][ T4410] ? dup_fd+0x6b/0xb60 [ 263.980375][ T4410] should_failslab+0x5/0x20 [ 263.984852][ T4410] kmem_cache_alloc+0x36/0x290 [ 263.989587][ T4410] ? __kasan_kmalloc+0x1a3/0x1e0 [ 263.994584][ T4410] dup_fd+0x6b/0xb60 [ 263.998458][ T4410] ? do_syscall_64+0xcb/0x1e0 [ 264.003136][ T4410] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 264.009176][ T4410] unshare_files+0x11b/0x2d0 [ 264.013748][ T4410] ? __ia32_sys_unshare+0x40/0x40 [ 264.018761][ T4410] __do_execve_file+0x24d/0x17e0 [ 264.023680][ T4410] ? __check_object_size+0x2d6/0x3a0 [ 264.028939][ T4410] ? do_execve_file+0x40/0x40 [ 264.033603][ T4410] ? getname_flags+0x1fe/0x640 [ 264.038341][ T4410] __x64_sys_execve+0x90/0xa0 [ 264.042990][ T4410] do_syscall_64+0xcb/0x1e0 [ 264.047479][ T4410] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 264.053337][ T4410] RIP: 0033:0x4665d9 [ 264.057219][ T4410] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 264.076917][ T4410] RSP: 002b:00007ff216918188 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 264.085305][ T4410] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 264.093251][ T4410] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 11:50:31 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518001000bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) 11:50:31 executing program 1 (fault-call:10 fault-nth:2): creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 264.101233][ T4410] RBP: 00007ff2169181d0 R08: 0000000000000000 R09: 0000000000000000 [ 264.109180][ T4410] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 264.117140][ T4410] R13: 00007ffd21f609df R14: 00007ff216918300 R15: 0000000000022000 11:50:31 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000001880)={0x33fe0, r2, 0x1, 0x0, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) 11:50:31 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(0x0, 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:31 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a00", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) 11:50:31 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r2) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:31 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(0x0, 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) [ 264.183923][ T4426] FAULT_INJECTION: forcing a failure. [ 264.183923][ T4426] name failslab, interval 1, probability 0, space 0, times 0 [ 264.223583][ T4426] CPU: 0 PID: 4426 Comm: syz-executor.1 Not tainted 5.4.119-syzkaller-00545-gabedbe9da982 #0 11:50:31 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000001880)={0x200018b8, r2, 0x1, 0x0, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) [ 264.233850][ T4426] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 264.243975][ T4426] Call Trace: [ 264.247245][ T4426] dump_stack+0x1d8/0x24e [ 264.251670][ T4426] ? devkmsg_release+0x11c/0x11c [ 264.256587][ T4426] ? show_regs_print_info+0x12/0x12 [ 264.261765][ T4426] should_fail+0x6f6/0x860 [ 264.266172][ T4426] ? setup_fault_attr+0x3d0/0x3d0 [ 264.271174][ T4426] ? alloc_fdtable+0x93/0x250 [ 264.275849][ T4426] should_failslab+0x5/0x20 [ 264.280331][ T4426] kmem_cache_alloc_trace+0x39/0x2b0 [ 264.285595][ T4426] ? _raw_spin_lock+0xa3/0x1b0 [ 264.290334][ T4426] ? _raw_spin_trylock_bh+0x1a0/0x1a0 [ 264.295766][ T4426] alloc_fdtable+0x93/0x250 [ 264.300240][ T4426] dup_fd+0x785/0xb60 [ 264.304191][ T4426] ? do_syscall_64+0xcb/0x1e0 [ 264.308846][ T4426] unshare_files+0x11b/0x2d0 [ 264.313405][ T4426] ? __ia32_sys_unshare+0x40/0x40 [ 264.318400][ T4426] __do_execve_file+0x24d/0x17e0 [ 264.323310][ T4426] ? __check_object_size+0x2d6/0x3a0 [ 264.328582][ T4426] ? do_execve_file+0x40/0x40 [ 264.333247][ T4426] ? getname_flags+0x1fe/0x640 [ 264.337979][ T4426] __x64_sys_execve+0x90/0xa0 [ 264.342629][ T4426] do_syscall_64+0xcb/0x1e0 [ 264.347138][ T4426] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 264.353005][ T4426] RIP: 0033:0x4665d9 [ 264.356876][ T4426] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 264.376450][ T4426] RSP: 002b:00007ff216918188 EFLAGS: 00000246 ORIG_RAX: 000000000000003b 11:50:32 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518006558bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) 11:50:32 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a00", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) 11:50:32 executing program 1 (fault-call:10 fault-nth:3): creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 264.384847][ T4426] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 264.392790][ T4426] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 264.400749][ T4426] RBP: 00007ff2169181d0 R08: 0000000000000000 R09: 0000000000000000 [ 264.408709][ T4426] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 264.416659][ T4426] R13: 00007ffd21f609df R14: 00007ff216918300 R15: 0000000000022000 11:50:32 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:32 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000802bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 264.465708][ T4444] FAULT_INJECTION: forcing a failure. [ 264.465708][ T4444] name failslab, interval 1, probability 0, space 0, times 0 [ 264.504386][ T4444] CPU: 0 PID: 4444 Comm: syz-executor.1 Not tainted 5.4.119-syzkaller-00545-gabedbe9da982 #0 [ 264.514568][ T4444] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 264.524616][ T4444] Call Trace: [ 264.527918][ T4444] dump_stack+0x1d8/0x24e [ 264.532348][ T4444] ? devkmsg_release+0x11c/0x11c [ 264.537280][ T4444] ? show_regs_print_info+0x12/0x12 [ 264.542460][ T4444] should_fail+0x6f6/0x860 [ 264.546861][ T4444] ? setup_fault_attr+0x3d0/0x3d0 [ 264.551869][ T4444] ? alloc_fdtable+0x93/0x250 [ 264.556523][ T4444] should_failslab+0x5/0x20 [ 264.561005][ T4444] kmem_cache_alloc_trace+0x39/0x2b0 [ 264.566269][ T4444] ? _raw_spin_lock+0xa3/0x1b0 [ 264.571023][ T4444] ? _raw_spin_trylock_bh+0x1a0/0x1a0 [ 264.576373][ T4444] alloc_fdtable+0x93/0x250 [ 264.580952][ T4444] ? __kasan_kmalloc+0x1a3/0x1e0 [ 264.586066][ T4444] dup_fd+0x785/0xb60 [ 264.590029][ T4444] ? do_syscall_64+0xcb/0x1e0 [ 264.594688][ T4444] unshare_files+0x11b/0x2d0 [ 264.599340][ T4444] ? __ia32_sys_unshare+0x40/0x40 [ 264.604347][ T4444] __do_execve_file+0x24d/0x17e0 [ 264.609266][ T4444] ? __check_object_size+0x2d6/0x3a0 [ 264.614524][ T4444] ? do_execve_file+0x40/0x40 [ 264.619173][ T4444] ? getname_flags+0x1fe/0x640 [ 264.623910][ T4444] __x64_sys_execve+0x90/0xa0 [ 264.628558][ T4444] do_syscall_64+0xcb/0x1e0 [ 264.633039][ T4444] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 264.638902][ T4444] RIP: 0033:0x4665d9 [ 264.642770][ T4444] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 11:50:32 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a00", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) 11:50:32 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r2) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:32 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000001880)={0x20001938, r2, 0x1, 0x0, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) 11:50:32 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:32 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a0000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) 11:50:32 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000029fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000006504040001000000040400001c007d60b7030000000000006a0a00fe20000000850000000d000000b700000000000000950000fe00000000c9be17044171e1d3d7b1d6d0ff03000000000000c668a4b63e069efb297975738f538e31ec24925095a163b9d4e76be266e31a80212240baa44e080addde6033170000007b3f912f6906a6e2313091df61258a1fda45991fbdce6793c8a4785ee8b60092659b941bbd750045404b04bf97c0fea679c032b3203c6cd8bac9626bcc85e961509735a046171f5bebfa80dbdc0200379e731d3a8d8fea894a4ee293001f6ce7d5b40bf2a7399c23f84c6fa5f9be8173d05afe002c0e7821d406c967379e7521392d24d6c8034e2dc7c053498a9f413af569575de3b5c85546945e9bce678ee9a09806474947310bae538450a676d71c011705060000000000000000a3d39322942df819eea101000000000000009fc8f4b9276e9dc330c9cbac5d708570a14546aa89e13c65896d24684ee25f853b0858122c3d1de564d84638c7f6ec477f9ffece0ff3d9f4cf21c119b95eba4c925c80c3c33c81a68055fc8b3af4f32d16cf290f90d80f1da0db08da80f7a88b63885551371ee1febf833a4103e2f68d1aa3a2138953c0c41ead2824f4ae3260007396d42e0168a85fc6448b3f2eaab716abe53aa6c1ba9ace891ef38f9a00000000000000000000000000000000000200481ac0f54b7a913f3465c333429c19f5d01166a1c4edc2abdeb54e25bf47085689e16b524053ac75f36b5b6e7ddf0aa170ec19aee6ccb06c4708e4ec97194d713a36d9bbed4e832541318a8c13c55c40d100e58fb845049af5b02f8ba8fc1345d6442b96c2d17bd048a2ed0841470c424324db952a44b515d47945babf404c35fd608046f1640f05007842f01d3428843635d4f3e98399b396ea30fc8f9a911a64798a4cf7b63b48349cd630881342c6533f5a9ac85b040000000000000000090000000000009380513278d4701e78251bbc45b73f8d5665d369df748c068b23e3fe886aee0668e58e7158040e0156e332b122288e40fecb03cf4880dc047af0c3a73bab43736a168c57df0f88c1d2dc8d27ad24dbfce44c6a9082b178a2c0527b143c2cb1cd9ed565d1ad68953e031c168ec6280c2eee3550d34d34f66c40252798606cfb2a6d424b78933a9191"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000804bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 264.662349][ T4444] RSP: 002b:00007ff216918188 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 264.670729][ T4444] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 264.678934][ T4444] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 264.686889][ T4444] RBP: 00007ff2169181d0 R08: 0000000000000000 R09: 0000000000000000 [ 264.694848][ T4444] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 264.702788][ T4444] R13: 00007ffd21f609df R14: 00007ff216918300 R15: 0000000000022000 11:50:32 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000001880)={0x7ffff000, r2, 0x1, 0x0, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) 11:50:32 executing program 1 (fault-call:10 fault-nth:4): creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:32 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a0000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) 11:50:32 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) [ 264.801931][ T4472] FAULT_INJECTION: forcing a failure. [ 264.801931][ T4472] name failslab, interval 1, probability 0, space 0, times 0 [ 264.857356][ T4472] CPU: 1 PID: 4472 Comm: syz-executor.1 Not tainted 5.4.119-syzkaller-00545-gabedbe9da982 #0 [ 264.867539][ T4472] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 264.877589][ T4472] Call Trace: [ 264.880878][ T4472] dump_stack+0x1d8/0x24e [ 264.885223][ T4472] ? devkmsg_release+0x11c/0x11c [ 264.890134][ T4472] ? show_regs_print_info+0x12/0x12 [ 264.895308][ T4472] should_fail+0x6f6/0x860 [ 264.899712][ T4472] ? setup_fault_attr+0x3d0/0x3d0 [ 264.904708][ T4472] ? kvmalloc_node+0x7e/0xf0 [ 264.909272][ T4472] should_failslab+0x5/0x20 [ 264.913749][ T4472] __kmalloc+0x5f/0x2f0 [ 264.917876][ T4472] ? kvmalloc_node+0x7e/0xf0 [ 264.922436][ T4472] kvmalloc_node+0x7e/0xf0 [ 264.926932][ T4472] alloc_fdtable+0x146/0x250 [ 264.931496][ T4472] dup_fd+0x785/0xb60 [ 264.935449][ T4472] ? do_syscall_64+0xcb/0x1e0 [ 264.940101][ T4472] unshare_files+0x11b/0x2d0 [ 264.944706][ T4472] ? __ia32_sys_unshare+0x40/0x40 [ 264.949702][ T4472] __do_execve_file+0x24d/0x17e0 [ 264.954611][ T4472] ? __check_object_size+0x2d6/0x3a0 [ 264.959954][ T4472] ? do_execve_file+0x40/0x40 [ 264.964605][ T4472] ? getname_flags+0x1fe/0x640 [ 264.969342][ T4472] __x64_sys_execve+0x90/0xa0 [ 264.973993][ T4472] do_syscall_64+0xcb/0x1e0 [ 264.978467][ T4472] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 264.984343][ T4472] RIP: 0033:0x4665d9 [ 264.988209][ T4472] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 11:50:32 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r2) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:32 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000001880)={0xfffffdef, r2, 0x1, 0x0, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) 11:50:32 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000808bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) 11:50:32 executing program 1 (fault-call:10 fault-nth:5): creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 265.007783][ T4472] RSP: 002b:00007ff216918188 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 265.016165][ T4472] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 265.024109][ T4472] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 265.032052][ T4472] RBP: 00007ff2169181d0 R08: 0000000000000000 R09: 0000000000000000 [ 265.040010][ T4472] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 265.047967][ T4472] R13: 00007ffd21f609df R14: 00007ff216918300 R15: 0000000000022000 11:50:32 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a0000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) 11:50:32 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x2, 0x0, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) 11:50:32 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d51800080fbb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) 11:50:32 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(0x0, 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:32 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r2) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:32 executing program 0 (fault-call:7 fault-nth:0): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) [ 265.121101][ T4495] FAULT_INJECTION: forcing a failure. [ 265.121101][ T4495] name failslab, interval 1, probability 0, space 0, times 0 [ 265.170051][ T4495] CPU: 1 PID: 4495 Comm: syz-executor.1 Not tainted 5.4.119-syzkaller-00545-gabedbe9da982 #0 [ 265.180228][ T4495] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 265.190298][ T4495] Call Trace: [ 265.193577][ T4495] dump_stack+0x1d8/0x24e [ 265.197926][ T4495] ? devkmsg_release+0x11c/0x11c [ 265.202864][ T4495] ? show_regs_print_info+0x12/0x12 [ 265.208038][ T4495] ? _raw_spin_lock+0xa3/0x1b0 [ 265.212796][ T4495] should_fail+0x6f6/0x860 [ 265.217200][ T4495] ? setup_fault_attr+0x3d0/0x3d0 [ 265.222195][ T4495] ? _raw_spin_unlock+0x49/0x60 [ 265.227043][ T4495] ? unshare_files+0x1c7/0x2d0 [ 265.231780][ T4495] ? __do_execve_file+0x29c/0x17e0 [ 265.236879][ T4495] should_failslab+0x5/0x20 [ 265.241368][ T4495] kmem_cache_alloc_trace+0x39/0x2b0 [ 265.246649][ T4495] __do_execve_file+0x29c/0x17e0 [ 265.251591][ T4495] ? __check_object_size+0x2d6/0x3a0 [ 265.256867][ T4495] ? do_execve_file+0x40/0x40 [ 265.261520][ T4495] ? getname_flags+0x1fe/0x640 [ 265.266264][ T4495] __x64_sys_execve+0x90/0xa0 [ 265.270912][ T4495] do_syscall_64+0xcb/0x1e0 [ 265.275401][ T4495] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 265.281288][ T4495] RIP: 0033:0x4665d9 [ 265.285172][ T4495] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 265.304771][ T4495] RSP: 002b:00007ff216918188 EFLAGS: 00000246 ORIG_RAX: 000000000000003b 11:50:32 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x3, 0x0, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) 11:50:32 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000810bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) 11:50:32 executing program 1 (fault-call:10 fault-nth:6): creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:32 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(0x0, 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) [ 265.313153][ T4495] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 265.321111][ T4495] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 265.329059][ T4495] RBP: 00007ff2169181d0 R08: 0000000000000000 R09: 0000000000000000 [ 265.337002][ T4495] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 265.344947][ T4495] R13: 00007ffd21f609df R14: 00007ff216918300 R15: 0000000000022000 [ 265.357065][ T4505] overlayfs: failed to resolve './file0': -2 11:50:33 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r2) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 265.401777][ T4514] FAULT_INJECTION: forcing a failure. [ 265.401777][ T4514] name failslab, interval 1, probability 0, space 0, times 0 [ 265.425666][ T4521] tipc: Started in network mode [ 265.431160][ T4521] tipc: Own node identity , cluster identity 4711 [ 265.435455][ T4519] overlayfs: failed to resolve './file0': -2 [ 265.437969][ T4514] CPU: 1 PID: 4514 Comm: syz-executor.0 Not tainted 5.4.119-syzkaller-00545-gabedbe9da982 #0 [ 265.453815][ T4514] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 265.455309][ T4521] tipc: Failed to obtain node identity [ 265.463861][ T4514] Call Trace: [ 265.463879][ T4514] dump_stack+0x1d8/0x24e [ 265.463890][ T4514] ? devkmsg_release+0x11c/0x11c [ 265.463898][ T4514] ? show_regs_print_info+0x12/0x12 [ 265.463905][ T4514] ? __local_bh_enable_ip+0x48/0x70 [ 265.463914][ T4514] ? netlink_insert+0xb5d/0x1030 [ 265.463929][ T4514] should_fail+0x6f6/0x860 [ 265.473821][ T4521] tipc: Enabling of bearer rejected, failed to enable media [ 265.477063][ T4514] ? setup_fault_attr+0x3d0/0x3d0 [ 265.477075][ T4514] ? netlink_data_ready+0x10/0x10 [ 265.477082][ T4514] ? rht_key_hashfn+0x1e0/0x1e0 [ 265.477089][ T4514] ? netlink_hash+0xd0/0xd0 [ 265.477097][ T4514] ? __alloc_skb+0x75/0x4d0 [ 265.477112][ T4514] should_failslab+0x5/0x20 [ 265.485790][ T4522] FAULT_INJECTION: forcing a failure. [ 265.485790][ T4522] name failslab, interval 1, probability 0, space 0, times 0 [ 265.487226][ T4514] kmem_cache_alloc+0x36/0x290 [ 265.487236][ T4514] ? refcount_add_checked+0x50/0x50 [ 265.487245][ T4514] __alloc_skb+0x75/0x4d0 [ 265.487256][ T4514] ? netlink_autobind+0x163/0x190 [ 265.487263][ T4514] netlink_sendmsg+0x748/0xd40 [ 265.487274][ T4514] ? netlink_getsockopt+0x8e0/0x8e0 [ 265.487289][ T4514] ? import_iovec+0x1bc/0x380 [ 265.585202][ T4514] ? security_socket_sendmsg+0x9d/0xb0 [ 265.590639][ T4514] ? netlink_getsockopt+0x8e0/0x8e0 [ 265.595819][ T4514] ____sys_sendmsg+0x583/0x8c0 [ 265.600560][ T4514] ? __sys_sendmsg_sock+0x2b0/0x2b0 [ 265.605729][ T4514] ? __lru_cache_add+0x1c4/0x210 [ 265.610639][ T4514] ? proc_fail_nth_read+0x1c0/0x1c0 [ 265.615808][ T4514] __sys_sendmsg+0x2c4/0x3b0 [ 265.620371][ T4514] ? ____sys_sendmsg+0x8c0/0x8c0 [ 265.625282][ T4514] ? check_preemption_disabled+0x9e/0x330 [ 265.630977][ T4514] ? fput_many+0x42/0x1a0 [ 265.635274][ T4514] ? check_preemption_disabled+0x154/0x330 [ 265.641054][ T4514] do_syscall_64+0xcb/0x1e0 [ 265.645532][ T4514] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 265.651395][ T4514] RIP: 0033:0x4665d9 [ 265.655297][ T4514] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 265.674872][ T4514] RSP: 002b:00007f8db7a7c188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 265.683253][ T4514] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 265.691197][ T4514] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 11:50:33 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(0x0, 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) [ 265.699144][ T4514] RBP: 00007f8db7a7c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 265.707114][ T4514] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 265.715054][ T4514] R13: 00007ffc40ce809f R14: 00007f8db7a7c300 R15: 0000000000022000 [ 265.735195][ T4522] CPU: 1 PID: 4522 Comm: syz-executor.1 Not tainted 5.4.119-syzkaller-00545-gabedbe9da982 #0 [ 265.745375][ T4522] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 265.755424][ T4522] Call Trace: [ 265.758714][ T4522] dump_stack+0x1d8/0x24e [ 265.763045][ T4522] ? devkmsg_release+0x11c/0x11c [ 265.767983][ T4522] ? show_regs_print_info+0x12/0x12 [ 265.773202][ T4522] should_fail+0x6f6/0x860 [ 265.777623][ T4522] ? setup_fault_attr+0x3d0/0x3d0 [ 265.782644][ T4522] ? prepare_creds+0x20/0x370 [ 265.784263][ T4526] overlayfs: failed to resolve './file0': -2 [ 265.787312][ T4522] should_failslab+0x5/0x20 [ 265.787321][ T4522] kmem_cache_alloc+0x36/0x290 [ 265.787331][ T4522] prepare_creds+0x20/0x370 [ 265.787339][ T4522] prepare_exec_creds+0x13/0xc0 [ 265.787352][ T4522] __do_execve_file+0x325/0x17e0 [ 265.816743][ T4522] ? __check_object_size+0x2d6/0x3a0 [ 265.822015][ T4522] ? do_execve_file+0x40/0x40 [ 265.826663][ T4522] ? getname_flags+0x1fe/0x640 [ 265.831396][ T4522] __x64_sys_execve+0x90/0xa0 [ 265.836073][ T4522] do_syscall_64+0xcb/0x1e0 [ 265.840554][ T4522] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 265.846418][ T4522] RIP: 0033:0x4665d9 [ 265.850324][ T4522] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 265.869898][ T4522] RSP: 002b:00007ff216918188 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 265.878305][ T4522] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 265.886248][ T4522] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 265.894193][ T4522] RBP: 00007ff2169181d0 R08: 0000000000000000 R09: 0000000000000000 11:50:33 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(0x0, &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:33 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x4, 0x0, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) 11:50:33 executing program 0 (fault-call:7 fault-nth:1): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) [ 265.902146][ T4522] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 265.910090][ T4522] R13: 00007ffd21f609df R14: 00007ff216918300 R15: 0000000000022000 11:50:33 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r2) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:33 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(0x0, &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:33 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000860bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 265.960064][ T4538] FAULT_INJECTION: forcing a failure. [ 265.960064][ T4538] name failslab, interval 1, probability 0, space 0, times 0 [ 265.985457][ T4538] CPU: 0 PID: 4538 Comm: syz-executor.0 Not tainted 5.4.119-syzkaller-00545-gabedbe9da982 #0 [ 265.995620][ T4538] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 266.005654][ T4538] Call Trace: [ 266.008925][ T4538] dump_stack+0x1d8/0x24e [ 266.013230][ T4538] ? devkmsg_release+0x11c/0x11c [ 266.018142][ T4538] ? show_regs_print_info+0x12/0x12 [ 266.023326][ T4538] should_fail+0x6f6/0x860 [ 266.027713][ T4538] ? setup_fault_attr+0x3d0/0x3d0 [ 266.032712][ T4538] ? netlink_sendmsg+0x748/0xd40 [ 266.037664][ T4538] should_failslab+0x5/0x20 [ 266.042147][ T4538] __kmalloc_track_caller+0x5d/0x2e0 [ 266.047404][ T4538] ? kmem_cache_alloc+0x115/0x290 [ 266.052418][ T4538] ? refcount_add_checked+0x50/0x50 [ 266.057586][ T4538] ? netlink_sendmsg+0x748/0xd40 [ 266.062505][ T4538] __alloc_skb+0xaf/0x4d0 [ 266.066832][ T4538] ? netlink_autobind+0x163/0x190 [ 266.071847][ T4538] netlink_sendmsg+0x748/0xd40 [ 266.076583][ T4538] ? netlink_getsockopt+0x8e0/0x8e0 [ 266.081752][ T4538] ? import_iovec+0x1bc/0x380 [ 266.086403][ T4538] ? security_socket_sendmsg+0x9d/0xb0 [ 266.091833][ T4538] ? netlink_getsockopt+0x8e0/0x8e0 [ 266.097000][ T4538] ____sys_sendmsg+0x583/0x8c0 [ 266.101758][ T4538] ? __sys_sendmsg_sock+0x2b0/0x2b0 [ 266.106942][ T4538] ? __lru_cache_add+0x1c4/0x210 [ 266.111868][ T4538] ? proc_fail_nth_read+0x1c0/0x1c0 [ 266.117051][ T4538] __sys_sendmsg+0x2c4/0x3b0 [ 266.121786][ T4538] ? ____sys_sendmsg+0x8c0/0x8c0 [ 266.126695][ T4538] ? check_preemption_disabled+0x9e/0x330 [ 266.132390][ T4538] ? fput_many+0x42/0x1a0 [ 266.136694][ T4538] ? check_preemption_disabled+0x154/0x330 [ 266.142487][ T4538] do_syscall_64+0xcb/0x1e0 [ 266.146964][ T4538] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 266.152827][ T4538] RIP: 0033:0x4665d9 [ 266.156798][ T4538] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 266.176375][ T4538] RSP: 002b:00007f8db7a7c188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 266.184800][ T4538] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 266.192851][ T4538] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 266.200804][ T4538] RBP: 00007f8db7a7c1d0 R08: 0000000000000000 R09: 0000000000000000 11:50:33 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x5, 0x0, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) 11:50:33 executing program 1 (fault-call:10 fault-nth:7): creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:33 executing program 0 (fault-call:7 fault-nth:2): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) [ 266.208752][ T4538] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 266.216699][ T4538] R13: 00007ffc40ce809f R14: 00007f8db7a7c300 R15: 0000000000022000 11:50:33 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(0x0, &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:33 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 266.266630][ T4546] tipc: Started in network mode [ 266.274194][ T4548] FAULT_INJECTION: forcing a failure. [ 266.274194][ T4548] name failslab, interval 1, probability 0, space 0, times 0 [ 266.300308][ T4546] tipc: Own node identity , cluster identity 4711 [ 266.312417][ T4546] tipc: Failed to obtain node identity [ 266.318468][ T4548] CPU: 1 PID: 4548 Comm: syz-executor.1 Not tainted 5.4.119-syzkaller-00545-gabedbe9da982 #0 [ 266.328630][ T4548] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 266.338671][ T4548] Call Trace: [ 266.341952][ T4548] dump_stack+0x1d8/0x24e [ 266.346274][ T4548] ? devkmsg_release+0x11c/0x11c [ 266.351204][ T4548] ? show_regs_print_info+0x12/0x12 [ 266.356392][ T4548] should_fail+0x6f6/0x860 [ 266.360798][ T4548] ? setup_fault_attr+0x3d0/0x3d0 [ 266.365797][ T4548] ? kzalloc+0x1d/0x30 [ 266.369836][ T4548] should_failslab+0x5/0x20 [ 266.374309][ T4548] __kmalloc+0x5f/0x2f0 [ 266.378437][ T4548] ? refcount_add_checked+0x50/0x50 [ 266.383606][ T4548] kzalloc+0x1d/0x30 [ 266.387632][ T4548] security_prepare_creds+0x46/0x210 [ 266.392929][ T4548] prepare_creds+0x27b/0x370 [ 266.397519][ T4548] prepare_exec_creds+0x13/0xc0 [ 266.402347][ T4548] __do_execve_file+0x325/0x17e0 [ 266.407258][ T4548] ? __check_object_size+0x2d6/0x3a0 [ 266.412515][ T4548] ? do_execve_file+0x40/0x40 [ 266.417170][ T4548] ? getname_flags+0x1fe/0x640 [ 266.421905][ T4548] __x64_sys_execve+0x90/0xa0 [ 266.426553][ T4548] do_syscall_64+0xcb/0x1e0 [ 266.431029][ T4548] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 266.436901][ T4548] RIP: 0033:0x4665d9 [ 266.440783][ T4548] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 266.460356][ T4548] RSP: 002b:00007ff216918188 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 266.468744][ T4548] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 266.476684][ T4548] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 266.484625][ T4548] RBP: 00007ff2169181d0 R08: 0000000000000000 R09: 0000000000000000 [ 266.492664][ T4548] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 266.500617][ T4548] R13: 00007ffd21f609df R14: 00007ff216918300 R15: 0000000000022000 11:50:34 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', 0x0) setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:34 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x6, 0x0, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) 11:50:34 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee00a001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) 11:50:34 executing program 1 (fault-call:10 fault-nth:8): creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 266.515878][ T4546] tipc: Enabling of bearer rejected, failed to enable media [ 266.526628][ T4552] FAULT_INJECTION: forcing a failure. [ 266.526628][ T4552] name failslab, interval 1, probability 0, space 0, times 0 [ 266.539294][ T4552] CPU: 0 PID: 4552 Comm: syz-executor.0 Not tainted 5.4.119-syzkaller-00545-gabedbe9da982 #0 [ 266.549435][ T4552] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 266.559484][ T4552] Call Trace: [ 266.562772][ T4552] dump_stack+0x1d8/0x24e [ 266.567088][ T4552] ? devkmsg_release+0x11c/0x11c [ 266.572187][ T4552] ? unwind_next_frame+0x1f0a/0x27b0 [ 266.577453][ T4552] ? show_regs_print_info+0x12/0x12 [ 266.582664][ T4552] should_fail+0x6f6/0x860 [ 266.587178][ T4552] ? setup_fault_attr+0x3d0/0x3d0 [ 266.592183][ T4552] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 266.598143][ T4552] ? __alloc_skb+0x75/0x4d0 [ 266.602630][ T4552] should_failslab+0x5/0x20 [ 266.607114][ T4552] kmem_cache_alloc+0x36/0x290 [ 266.611854][ T4552] ? preempt_count_add+0x66/0x130 [ 266.616957][ T4552] __alloc_skb+0x75/0x4d0 [ 266.621260][ T4552] ? memset+0x1f/0x40 [ 266.625215][ T4552] __ipv6_ifa_notify+0x2c3/0x1340 [ 266.630211][ T4552] ? snmp6_fill_stats+0x5a0/0x5a0 [ 266.635230][ T4552] ? _raw_spin_lock_bh+0xa3/0x1b0 [ 266.640230][ T4552] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 266.645412][ T4552] ? __nla_validate_parse+0x1993/0x20d0 [ 266.650930][ T4552] ? refcount_inc_not_zero_checked+0x1a1/0x280 [ 266.657074][ T4552] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 266.662243][ T4552] ? __rcu_read_lock+0x50/0x50 [ 266.666978][ T4552] ? mld_del_delrec+0x760/0x760 [ 266.671803][ T4552] ? check_preemption_disabled+0x9e/0x330 [ 266.677536][ T4552] ? debug_smp_processor_id+0x20/0x20 [ 266.682901][ T4552] inet6_rtm_newaddr+0x119a/0x2bc0 [ 266.688133][ T4552] ? inet6_dump_ifinfo+0x740/0x740 [ 266.693216][ T4552] ? __schedule+0x9b8/0x1170 [ 266.697777][ T4552] ? avc_has_perm_noaudit+0x37d/0x400 [ 266.703120][ T4552] ? _raw_spin_lock+0xa3/0x1b0 [ 266.707853][ T4552] ? _raw_spin_trylock_bh+0x1a0/0x1a0 [ 266.713192][ T4552] ? schedule+0x152/0x1d0 [ 266.717508][ T4552] ? __mutex_lock+0xa9b/0xf90 [ 266.722166][ T4552] ? __ww_mutex_lock_interruptible_slowpath+0x10/0x10 [ 266.728900][ T4552] ? mutex_trylock+0xb0/0xb0 [ 266.733457][ T4552] ? security_capable+0xb1/0xd0 [ 266.738292][ T4552] ? inet6_dump_ifinfo+0x740/0x740 [ 266.743467][ T4552] rtnetlink_rcv_msg+0xb74/0xd00 [ 266.748392][ T4552] ? unwind_get_return_address+0x48/0x80 [ 266.753993][ T4552] ? rtnetlink_bind+0x80/0x80 [ 266.758993][ T4552] ? arch_stack_walk+0xf8/0x140 [ 266.763851][ T4552] ? stack_trace_save+0x120/0x1f0 [ 266.768852][ T4552] ? stack_trace_snprint+0x150/0x150 [ 266.774121][ T4552] ? check_preemption_disabled+0x9e/0x330 [ 266.779818][ T4552] ? _raw_spin_lock_bh+0xa3/0x1b0 [ 266.784817][ T4552] ? rhashtable_jhash2+0x1bf/0x2e0 [ 266.789898][ T4552] ? jhash+0x740/0x740 [ 266.793936][ T4552] ? rht_key_hashfn+0x112/0x1e0 [ 266.798782][ T4552] ? rht_lock+0x100/0x100 [ 266.803083][ T4552] ? __sys_sendmsg+0x2c4/0x3b0 [ 266.807819][ T4552] ? rht_key_hashfn+0x1e0/0x1e0 [ 266.812655][ T4552] ? netlink_hash+0xd0/0xd0 [ 266.817133][ T4552] ? __rcu_read_lock+0x50/0x50 [ 266.821870][ T4552] netlink_rcv_skb+0x200/0x480 [ 266.826621][ T4552] ? rtnetlink_bind+0x80/0x80 [ 266.831267][ T4552] ? netlink_ack+0xab0/0xab0 [ 266.835828][ T4552] ? __rcu_read_lock+0x50/0x50 [ 266.840565][ T4552] ? selinux_vm_enough_memory+0x170/0x170 [ 266.846271][ T4552] netlink_unicast+0x865/0x9f0 [ 266.851008][ T4552] ? netlink_detachskb+0x40/0x40 [ 266.855914][ T4552] ? _copy_from_iter_full+0x29e/0x830 [ 266.861345][ T4552] ? __virt_addr_valid+0x1fd/0x290 [ 266.866548][ T4552] netlink_sendmsg+0x9ab/0xd40 [ 266.871297][ T4552] ? netlink_getsockopt+0x8e0/0x8e0 [ 266.876469][ T4552] ? import_iovec+0x1bc/0x380 [ 266.881120][ T4552] ? security_socket_sendmsg+0x9d/0xb0 [ 266.886549][ T4552] ? netlink_getsockopt+0x8e0/0x8e0 [ 266.891724][ T4552] ____sys_sendmsg+0x583/0x8c0 [ 266.896460][ T4552] ? __sys_sendmsg_sock+0x2b0/0x2b0 [ 266.901647][ T4552] ? __lru_cache_add+0x1c4/0x210 [ 266.906564][ T4552] ? proc_fail_nth_read+0x1c0/0x1c0 [ 266.911841][ T4552] __sys_sendmsg+0x2c4/0x3b0 [ 266.916438][ T4552] ? ____sys_sendmsg+0x8c0/0x8c0 [ 266.921350][ T4552] ? check_preemption_disabled+0x9e/0x330 [ 266.927326][ T4552] ? fput_many+0x42/0x1a0 [ 266.931650][ T4552] ? check_preemption_disabled+0x154/0x330 [ 266.937534][ T4552] do_syscall_64+0xcb/0x1e0 [ 266.942013][ T4552] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 266.947893][ T4552] RIP: 0033:0x4665d9 [ 266.951778][ T4552] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 266.971361][ T4552] RSP: 002b:00007f8db7a7c188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 266.979747][ T4552] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 266.987692][ T4552] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 266.995644][ T4552] RBP: 00007f8db7a7c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 267.003609][ T4552] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 267.011575][ T4552] R13: 00007ffc40ce809f R14: 00007f8db7a7c300 R15: 0000000000022000 11:50:34 executing program 0 (fault-call:7 fault-nth:3): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) [ 267.070005][ T4567] FAULT_INJECTION: forcing a failure. [ 267.070005][ T4567] name failslab, interval 1, probability 0, space 0, times 0 [ 267.102939][ T4567] CPU: 1 PID: 4567 Comm: syz-executor.1 Not tainted 5.4.119-syzkaller-00545-gabedbe9da982 #0 [ 267.113115][ T4567] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 267.123175][ T4567] Call Trace: [ 267.126454][ T4567] dump_stack+0x1d8/0x24e [ 267.130764][ T4567] ? devkmsg_release+0x11c/0x11c [ 267.135688][ T4567] ? show_regs_print_info+0x12/0x12 [ 267.140865][ T4567] should_fail+0x6f6/0x860 [ 267.145262][ T4567] ? setup_fault_attr+0x3d0/0x3d0 [ 267.150258][ T4567] ? stack_trace_save+0x120/0x1f0 [ 267.155256][ T4567] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 267.161207][ T4567] ? __alloc_file+0x26/0x380 [ 267.165771][ T4567] should_failslab+0x5/0x20 [ 267.170245][ T4567] kmem_cache_alloc+0x36/0x290 [ 267.174983][ T4567] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 267.181022][ T4567] __alloc_file+0x26/0x380 [ 267.185407][ T4567] ? alloc_empty_file+0x49/0x1b0 [ 267.190316][ T4567] alloc_empty_file+0xa9/0x1b0 [ 267.195053][ T4567] path_openat+0x125/0x3da0 [ 267.199529][ T4567] ? is_bpf_text_address+0x280/0x2a0 [ 267.204786][ T4567] ? stack_trace_save+0x1f0/0x1f0 [ 267.209781][ T4567] ? arch_stack_walk+0xf8/0x140 [ 267.214623][ T4567] ? stack_trace_save+0x120/0x1f0 [ 267.219643][ T4567] ? do_filp_open+0x450/0x450 [ 267.224307][ T4567] ? stack_trace_save+0x120/0x1f0 [ 267.229309][ T4567] ? stack_trace_snprint+0x150/0x150 [ 267.234582][ T4567] ? __kasan_kmalloc+0x1a3/0x1e0 [ 267.239494][ T4567] ? stack_trace_snprint+0x150/0x150 [ 267.244773][ T4567] ? __kasan_kmalloc+0x137/0x1e0 [ 267.249699][ T4567] ? __kmalloc+0x174/0x2f0 [ 267.254088][ T4567] ? security_prepare_creds+0x46/0x210 [ 267.259532][ T4567] do_filp_open+0x208/0x450 [ 267.264031][ T4567] ? vfs_tmpfile+0x210/0x210 [ 267.268608][ T4567] ? do_open_execat+0xab/0x860 [ 267.273343][ T4567] do_open_execat+0x175/0x860 [ 267.277992][ T4567] ? memcpy+0x38/0x50 [ 267.281965][ T4567] ? open_exec+0x50/0x50 [ 267.286193][ T4567] ? selinux_cred_prepare+0x72/0x80 [ 267.291365][ T4567] ? __rcu_read_lock+0x50/0x50 [ 267.296101][ T4567] ? prepare_creds+0x28f/0x370 [ 267.300836][ T4567] ? key_put+0x64/0x70 [ 267.305053][ T4567] __do_execve_file+0x64a/0x17e0 [ 267.309964][ T4567] ? __check_object_size+0x2d6/0x3a0 [ 267.315232][ T4567] ? do_execve_file+0x40/0x40 [ 267.319881][ T4567] ? getname_flags+0x1fe/0x640 [ 267.324617][ T4567] __x64_sys_execve+0x90/0xa0 [ 267.329285][ T4567] do_syscall_64+0xcb/0x1e0 [ 267.333760][ T4567] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 267.339645][ T4567] RIP: 0033:0x4665d9 [ 267.343513][ T4567] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 267.363108][ T4567] RSP: 002b:00007ff216918188 EFLAGS: 00000246 ORIG_RAX: 000000000000003b 11:50:35 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:35 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x8, 0x0, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) [ 267.371515][ T4567] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 267.379457][ T4567] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 267.387513][ T4567] RBP: 00007ff2169181d0 R08: 0000000000000000 R09: 0000000000000000 [ 267.395464][ T4567] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 267.403411][ T4567] R13: 00007ffd21f609df R14: 00007ff216918300 R15: 0000000000022000 [ 267.413624][ T4572] FAULT_INJECTION: forcing a failure. [ 267.413624][ T4572] name failslab, interval 1, probability 0, space 0, times 0 [ 267.426278][ T4572] CPU: 0 PID: 4572 Comm: syz-executor.0 Not tainted 5.4.119-syzkaller-00545-gabedbe9da982 #0 [ 267.436420][ T4572] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 267.446468][ T4572] Call Trace: [ 267.449747][ T4572] dump_stack+0x1d8/0x24e [ 267.454052][ T4572] ? devkmsg_release+0x11c/0x11c [ 267.458964][ T4572] ? show_regs_print_info+0x12/0x12 [ 267.464406][ T4572] should_fail+0x6f6/0x860 [ 267.468797][ T4572] ? setup_fault_attr+0x3d0/0x3d0 [ 267.473797][ T4572] ? __ipv6_ifa_notify+0x2c3/0x1340 [ 267.478976][ T4572] should_failslab+0x5/0x20 [ 267.483453][ T4572] __kmalloc_track_caller+0x5d/0x2e0 [ 267.488710][ T4572] ? kmem_cache_alloc+0x115/0x290 [ 267.493702][ T4572] ? preempt_count_add+0x66/0x130 [ 267.498693][ T4572] ? __ipv6_ifa_notify+0x2c3/0x1340 [ 267.503864][ T4572] __alloc_skb+0xaf/0x4d0 [ 267.508188][ T4572] ? memset+0x1f/0x40 [ 267.512142][ T4572] __ipv6_ifa_notify+0x2c3/0x1340 [ 267.517146][ T4572] ? snmp6_fill_stats+0x5a0/0x5a0 [ 267.522146][ T4572] ? _raw_spin_lock_bh+0xa3/0x1b0 [ 267.527158][ T4572] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 267.532329][ T4572] ? __nla_validate_parse+0x1993/0x20d0 [ 267.537844][ T4572] ? refcount_inc_not_zero_checked+0x1a1/0x280 [ 267.543963][ T4572] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 267.549133][ T4572] ? __rcu_read_lock+0x50/0x50 [ 267.553866][ T4572] ? mld_del_delrec+0x760/0x760 [ 267.558700][ T4572] ? check_preemption_disabled+0x9e/0x330 [ 267.564404][ T4572] ? debug_smp_processor_id+0x20/0x20 [ 267.569762][ T4572] inet6_rtm_newaddr+0x119a/0x2bc0 [ 267.574844][ T4572] ? inet6_dump_ifinfo+0x740/0x740 [ 267.579937][ T4572] ? avc_has_perm_noaudit+0x37d/0x400 [ 267.585276][ T4572] ? avc_has_perm_noaudit+0x37d/0x400 [ 267.590621][ T4572] ? avc_has_perm_noaudit+0x30c/0x400 [ 267.595979][ T4572] ? avc_denied+0x1c0/0x1c0 [ 267.600480][ T4572] ? cred_has_capability+0x1b5/0x420 [ 267.605733][ T4572] ? cred_has_capability+0x2ca/0x420 [ 267.610990][ T4572] ? selinux_perf_event_write+0x100/0x100 [ 267.616683][ T4572] ? cap_capable+0x23f/0x280 [ 267.621245][ T4572] ? mutex_trylock+0xb0/0xb0 [ 267.625803][ T4572] ? security_capable+0xb1/0xd0 [ 267.630635][ T4572] ? inet6_dump_ifinfo+0x740/0x740 [ 267.635718][ T4572] rtnetlink_rcv_msg+0xb74/0xd00 [ 267.640641][ T4572] ? unwind_get_return_address+0x48/0x80 [ 267.646266][ T4572] ? rtnetlink_bind+0x80/0x80 [ 267.650914][ T4572] ? arch_stack_walk+0xf8/0x140 [ 267.655754][ T4572] ? stack_trace_save+0x120/0x1f0 [ 267.660749][ T4572] ? stack_trace_snprint+0x150/0x150 [ 267.666006][ T4572] ? check_preemption_disabled+0x9e/0x330 [ 267.671697][ T4572] ? _raw_spin_lock_bh+0xa3/0x1b0 [ 267.676692][ T4572] ? rhashtable_jhash2+0x1bf/0x2e0 [ 267.681864][ T4572] ? jhash+0x740/0x740 [ 267.685922][ T4572] ? rht_key_hashfn+0x112/0x1e0 [ 267.690742][ T4572] ? rht_lock+0x100/0x100 [ 267.695061][ T4572] ? __sys_sendmsg+0x2c4/0x3b0 [ 267.699794][ T4572] ? rht_key_hashfn+0x1e0/0x1e0 [ 267.704612][ T4572] ? netlink_hash+0xd0/0xd0 [ 267.709100][ T4572] ? __rcu_read_lock+0x50/0x50 [ 267.713847][ T4572] netlink_rcv_skb+0x200/0x480 [ 267.718668][ T4572] ? rtnetlink_bind+0x80/0x80 [ 267.723403][ T4572] ? netlink_ack+0xab0/0xab0 [ 267.727964][ T4572] ? __rcu_read_lock+0x50/0x50 [ 267.732716][ T4572] ? selinux_vm_enough_memory+0x170/0x170 [ 267.738407][ T4572] netlink_unicast+0x865/0x9f0 [ 267.743164][ T4572] ? netlink_detachskb+0x40/0x40 [ 267.748976][ T4572] ? _copy_from_iter_full+0x29e/0x830 [ 267.754322][ T4572] ? __virt_addr_valid+0x1fd/0x290 [ 267.759491][ T4572] netlink_sendmsg+0x9ab/0xd40 [ 267.764230][ T4572] ? netlink_getsockopt+0x8e0/0x8e0 [ 267.769413][ T4572] ? import_iovec+0x1bc/0x380 [ 267.774068][ T4572] ? security_socket_sendmsg+0x9d/0xb0 [ 267.779498][ T4572] ? netlink_getsockopt+0x8e0/0x8e0 [ 267.784664][ T4572] ____sys_sendmsg+0x583/0x8c0 [ 267.789411][ T4572] ? __sys_sendmsg_sock+0x2b0/0x2b0 [ 267.794578][ T4572] ? __lru_cache_add+0x1c4/0x210 [ 267.799484][ T4572] ? proc_fail_nth_read+0x1c0/0x1c0 [ 267.804653][ T4572] __sys_sendmsg+0x2c4/0x3b0 [ 267.809254][ T4572] ? ____sys_sendmsg+0x8c0/0x8c0 [ 267.814162][ T4572] ? check_preemption_disabled+0x9e/0x330 [ 267.820213][ T4572] ? fput_many+0x42/0x1a0 [ 267.824510][ T4572] ? check_preemption_disabled+0x154/0x330 [ 267.830290][ T4572] do_syscall_64+0xcb/0x1e0 [ 267.834792][ T4572] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 267.840743][ T4572] RIP: 0033:0x4665d9 [ 267.844611][ T4572] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 267.864184][ T4572] RSP: 002b:00007f8db7a7c188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 11:50:35 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', 0x0) setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:35 executing program 1 (fault-call:10 fault-nth:9): creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:35 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee010001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) 11:50:35 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0xa, 0x0, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) 11:50:35 executing program 0 (fault-call:7 fault-nth:4): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) [ 267.872563][ T4572] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 267.880511][ T4572] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 267.888466][ T4572] RBP: 00007f8db7a7c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 267.896407][ T4572] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 267.904351][ T4572] R13: 00007ffc40ce809f R14: 00007f8db7a7c300 R15: 0000000000022000 [ 267.961757][ T4580] FAULT_INJECTION: forcing a failure. [ 267.961757][ T4580] name failslab, interval 1, probability 0, space 0, times 0 [ 268.011900][ T4580] CPU: 1 PID: 4580 Comm: syz-executor.1 Not tainted 5.4.119-syzkaller-00545-gabedbe9da982 #0 [ 268.022068][ T4580] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 268.032105][ T4580] Call Trace: [ 268.035383][ T4580] dump_stack+0x1d8/0x24e [ 268.039689][ T4580] ? devkmsg_release+0x11c/0x11c [ 268.044602][ T4580] ? show_regs_print_info+0x12/0x12 [ 268.049777][ T4580] should_fail+0x6f6/0x860 [ 268.054167][ T4580] ? setup_fault_attr+0x3d0/0x3d0 [ 268.059162][ T4580] ? security_file_alloc+0x32/0x1f0 [ 268.064358][ T4580] should_failslab+0x5/0x20 [ 268.068940][ T4580] kmem_cache_alloc+0x36/0x290 [ 268.073682][ T4580] security_file_alloc+0x32/0x1f0 [ 268.078676][ T4580] __alloc_file+0xba/0x380 [ 268.083060][ T4580] alloc_empty_file+0xa9/0x1b0 [ 268.087791][ T4580] path_openat+0x125/0x3da0 [ 268.092265][ T4580] ? is_bpf_text_address+0x280/0x2a0 [ 268.097540][ T4580] ? stack_trace_save+0x1f0/0x1f0 [ 268.102553][ T4580] ? arch_stack_walk+0xf8/0x140 [ 268.107387][ T4580] ? stack_trace_save+0x120/0x1f0 [ 268.112379][ T4580] ? do_filp_open+0x450/0x450 [ 268.117033][ T4580] ? stack_trace_save+0x120/0x1f0 [ 268.122036][ T4580] ? stack_trace_snprint+0x150/0x150 [ 268.127287][ T4580] ? __kasan_kmalloc+0x1a3/0x1e0 [ 268.132191][ T4580] ? stack_trace_snprint+0x150/0x150 [ 268.137442][ T4580] ? __kasan_kmalloc+0x137/0x1e0 [ 268.142392][ T4580] ? __kmalloc+0x174/0x2f0 [ 268.146781][ T4580] ? security_prepare_creds+0x46/0x210 [ 268.152210][ T4580] do_filp_open+0x208/0x450 [ 268.156686][ T4580] ? vfs_tmpfile+0x210/0x210 [ 268.161250][ T4580] ? do_open_execat+0xab/0x860 [ 268.165982][ T4580] do_open_execat+0x175/0x860 [ 268.170660][ T4580] ? memcpy+0x38/0x50 [ 268.174610][ T4580] ? open_exec+0x50/0x50 [ 268.178840][ T4580] ? selinux_cred_prepare+0x72/0x80 [ 268.184025][ T4580] ? __rcu_read_lock+0x50/0x50 [ 268.188760][ T4580] ? prepare_creds+0x28f/0x370 [ 268.193495][ T4580] ? key_put+0x64/0x70 [ 268.197536][ T4580] __do_execve_file+0x64a/0x17e0 [ 268.202449][ T4580] ? __check_object_size+0x2d6/0x3a0 [ 268.207705][ T4580] ? do_execve_file+0x40/0x40 [ 268.212362][ T4580] ? getname_flags+0x1fe/0x640 [ 268.217095][ T4580] __x64_sys_execve+0x90/0xa0 [ 268.221748][ T4580] do_syscall_64+0xcb/0x1e0 [ 268.226243][ T4580] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 268.232105][ T4580] RIP: 0033:0x4665d9 [ 268.235974][ T4580] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 11:50:35 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x25, 0x0, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) 11:50:35 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) 11:50:35 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:35 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009021affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 268.255705][ T4580] RSP: 002b:00007ff216918188 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 268.264097][ T4580] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 268.272047][ T4580] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 268.280020][ T4580] RBP: 00007ff2169181d0 R08: 0000000000000000 R09: 0000000000000000 [ 268.287971][ T4580] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 268.295925][ T4580] R13: 00007ffd21f609df R14: 00007ff216918300 R15: 0000000000022000 11:50:35 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', 0x0) setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:35 executing program 1 (fault-call:10 fault-nth:10): creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:35 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) 11:50:35 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x386, 0x0, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) 11:50:36 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009041affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 268.331463][ T4599] tipc: Started in network mode [ 268.339202][ T4599] tipc: Own node identity , cluster identity 4711 [ 268.345664][ T4599] tipc: Failed to obtain node identity [ 268.352017][ T4599] tipc: Enabling of bearer rejected, failed to enable media 11:50:36 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(0x0, &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:36 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x2, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) 11:50:36 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x39f, 0x0, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) [ 268.408702][ T4607] FAULT_INJECTION: forcing a failure. [ 268.408702][ T4607] name failslab, interval 1, probability 0, space 0, times 0 [ 268.440628][ T4607] CPU: 0 PID: 4607 Comm: syz-executor.1 Not tainted 5.4.119-syzkaller-00545-gabedbe9da982 #0 [ 268.450809][ T4607] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 268.460848][ T4607] Call Trace: [ 268.464128][ T4607] dump_stack+0x1d8/0x24e [ 268.468437][ T4607] ? devkmsg_release+0x11c/0x11c [ 268.473535][ T4607] ? show_regs_print_info+0x12/0x12 [ 268.478723][ T4607] should_fail+0x6f6/0x860 [ 268.483118][ T4607] ? setup_fault_attr+0x3d0/0x3d0 [ 268.488728][ T4607] ? _raw_spin_unlock_irqrestore+0x57/0x80 [ 268.494505][ T4607] ? mm_alloc+0x1f/0xb0 [ 268.498654][ T4607] should_failslab+0x5/0x20 [ 268.503129][ T4607] kmem_cache_alloc+0x36/0x290 [ 268.507865][ T4607] mm_alloc+0x1f/0xb0 [ 268.511834][ T4607] __do_execve_file+0x91f/0x17e0 [ 268.516844][ T4607] ? __check_object_size+0x2d6/0x3a0 [ 268.522100][ T4607] ? do_execve_file+0x40/0x40 [ 268.526750][ T4607] ? getname_flags+0x1fe/0x640 [ 268.531485][ T4607] __x64_sys_execve+0x90/0xa0 [ 268.536152][ T4607] do_syscall_64+0xcb/0x1e0 [ 268.540645][ T4607] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 268.546508][ T4607] RIP: 0033:0x4665d9 [ 268.550389][ T4607] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 268.569965][ T4607] RSP: 002b:00007ff216918188 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 268.578343][ T4607] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 268.586284][ T4607] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 268.594227][ T4607] RBP: 00007ff2169181d0 R08: 0000000000000000 R09: 0000000000000000 11:50:36 executing program 1 (fault-call:10 fault-nth:11): creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:36 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x1, 0x0, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) [ 268.602184][ T4607] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 268.610142][ T4607] R13: 00007ffd21f609df R14: 00007ff216918300 R15: 0000000000022000 [ 268.656086][ T4628] FAULT_INJECTION: forcing a failure. [ 268.656086][ T4628] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 268.672338][ T4631] tipc: Started in network mode [ 268.684809][ T4631] tipc: Own node identity , cluster identity 4711 [ 268.692203][ T4628] CPU: 1 PID: 4628 Comm: syz-executor.1 Not tainted 5.4.119-syzkaller-00545-gabedbe9da982 #0 [ 268.702351][ T4628] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 268.712553][ T4628] Call Trace: [ 268.715950][ T4628] dump_stack+0x1d8/0x24e [ 268.720257][ T4628] ? devkmsg_release+0x11c/0x11c [ 268.725169][ T4628] ? show_regs_print_info+0x12/0x12 [ 268.730356][ T4628] ? __kasan_kmalloc+0x1a3/0x1e0 [ 268.735275][ T4628] ? __kasan_kmalloc+0x137/0x1e0 [ 268.740198][ T4628] ? kmem_cache_alloc+0x115/0x290 [ 268.745193][ T4628] ? mm_alloc+0x1f/0xb0 [ 268.749319][ T4628] should_fail+0x6f6/0x860 [ 268.753706][ T4628] ? setup_fault_attr+0x3d0/0x3d0 [ 268.758703][ T4628] __alloc_pages_nodemask+0x1c4/0x880 [ 268.764047][ T4628] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 268.769563][ T4628] __get_free_pages+0xa/0x30 [ 268.774134][ T4628] pgd_alloc+0x1e/0x2b0 [ 268.778260][ T4628] mm_init+0x497/0x7a0 [ 268.782311][ T4628] __do_execve_file+0x91f/0x17e0 [ 268.787238][ T4628] ? __check_object_size+0x2d6/0x3a0 [ 268.792494][ T4628] ? do_execve_file+0x40/0x40 [ 268.797184][ T4628] ? getname_flags+0x1fe/0x640 [ 268.801931][ T4628] __x64_sys_execve+0x90/0xa0 [ 268.806589][ T4628] do_syscall_64+0xcb/0x1e0 [ 268.811066][ T4628] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 268.816944][ T4628] RIP: 0033:0x4665d9 [ 268.820828][ T4628] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 268.840489][ T4628] RSP: 002b:00007ff216918188 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 268.848868][ T4628] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 11:50:36 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009081affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) 11:50:36 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x3, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) 11:50:36 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(0x0, &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:36 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r2) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:36 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x1, 0x2, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) 11:50:36 executing program 1 (fault-call:10 fault-nth:12): creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 268.856819][ T4628] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 268.864845][ T4628] RBP: 00007ff2169181d0 R08: 0000000000000000 R09: 0000000000000000 [ 268.872788][ T4628] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 268.880729][ T4628] R13: 00007ffd21f609df R14: 00007ff216918300 R15: 0000000000022000 [ 268.889509][ T4631] tipc: Failed to obtain node identity [ 268.895060][ T4631] tipc: Enabling of bearer rejected, failed to enable media [ 268.956046][ T4641] tipc: Started in network mode [ 268.963848][ T4641] tipc: Own node identity , cluster identity 4711 [ 268.965850][ T4645] FAULT_INJECTION: forcing a failure. [ 268.965850][ T4645] name failslab, interval 1, probability 0, space 0, times 0 [ 268.971031][ T4641] tipc: Failed to obtain node identity [ 268.995437][ T4645] CPU: 1 PID: 4645 Comm: syz-executor.1 Not tainted 5.4.119-syzkaller-00545-gabedbe9da982 #0 [ 269.000416][ T4641] tipc: Enabling of bearer rejected, failed to enable media [ 269.005592][ T4645] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 269.005596][ T4645] Call Trace: [ 269.005613][ T4645] dump_stack+0x1d8/0x24e [ 269.005628][ T4645] ? devkmsg_release+0x11c/0x11c [ 269.036760][ T4645] ? show_regs_print_info+0x12/0x12 [ 269.041950][ T4645] ? __alloc_pages_nodemask+0x3a2/0x880 [ 269.047574][ T4645] should_fail+0x6f6/0x860 [ 269.051984][ T4645] ? setup_fault_attr+0x3d0/0x3d0 [ 269.057001][ T4645] ? vm_area_alloc+0x20/0xe0 [ 269.061591][ T4645] should_failslab+0x5/0x20 [ 269.066075][ T4645] kmem_cache_alloc+0x36/0x290 [ 269.070823][ T4645] vm_area_alloc+0x20/0xe0 [ 269.075212][ T4645] __do_execve_file+0xa25/0x17e0 [ 269.080132][ T4645] ? do_execve_file+0x40/0x40 [ 269.084780][ T4645] ? getname_flags+0x1fe/0x640 [ 269.089514][ T4645] __x64_sys_execve+0x90/0xa0 [ 269.094160][ T4645] do_syscall_64+0xcb/0x1e0 [ 269.098635][ T4645] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 269.104499][ T4645] RIP: 0033:0x4665d9 [ 269.108367][ T4645] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 269.127946][ T4645] RSP: 002b:00007ff216918188 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 269.136327][ T4645] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 269.144273][ T4645] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 11:50:36 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee0090f1affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) 11:50:36 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(0x0, &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) [ 269.152218][ T4645] RBP: 00007ff2169181d0 R08: 0000000000000000 R09: 0000000000000000 [ 269.160166][ T4645] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 269.168108][ T4645] R13: 00007ffd21f609df R14: 00007ff216918300 R15: 0000000000022000 11:50:36 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009101affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) 11:50:36 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x1, 0x3, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) 11:50:36 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) 11:50:36 executing program 1 (fault-call:10 fault-nth:13): creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:36 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r2) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:36 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', 0x0, 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:36 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000029fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000006504040001000000040400001c007d60b7030000000000006a0a00fe20000000850000000d000000b700000000000000950000fe00000000c9be17044171e1d3d7b1d6d0ff03000000000000c668a4b63e069efb297975738f538e31ec24925095a163b9d4e76be266e31a80212240baa44e080addde6033170000007b3f912f6906a6e2313091df61258a1fda45991fbdce6793c8a4785ee8b60092659b941bbd750045404b04bf97c0fea679c032b3203c6cd8bac9626bcc85e961509735a046171f5bebfa80dbdc0200379e731d3a8d8fea894a4ee293001f6ce7d5b40bf2a7399c23f84c6fa5f9be8173d05afe002c0e7821d406c967379e7521392d24d6c8034e2dc7c053498a9f413af569575de3b5c85546945e9bce678ee9a09806474947310bae538450a676d71c011705060000000000000000a3d39322942df819eea101000000000000009fc8f4b9276e9dc330c9cbac5d708570a14546aa89e13c65896d24684ee25f853b0858122c3d1de564d84638c7f6ec477f9ffece0ff3d9f4cf21c119b95eba4c925c80c3c33c81a68055fc8b3af4f32d16cf290f90d80f1da0db08da80f7a88b63885551371ee1febf833a4103e2f68d1aa3a2138953c0c41ead2824f4ae3260007396d42e0168a85fc6448b3f2eaab716abe53aa6c1ba9ace891ef38f9a00000000000000000000000000000000000200481ac0f54b7a913f3465c333429c19f5d01166a1c4edc2abdeb54e25bf47085689e16b524053ac75f36b5b6e7ddf0aa170ec19aee6ccb06c4708e4ec97194d713a36d9bbed4e832541318a8c13c55c40d100e58fb845049af5b02f8ba8fc1345d6442b96c2d17bd048a2ed0841470c424324db952a44b515d47945babf404c35fd608046f1640f05007842f01d3428843635d4f3e98399b396ea30fc8f9a911a64798a4cf7b63b48349cd630881342c6533f5a9ac85b040000000000000000090000000000009380513278d4701e78251bbc45b73f8d5665d369df748c068b23e3fe886aee0668e58e7158040e0156e332b122288e40fecb03cf4880dc047af0c3a73bab43736a168c57df0f88c1d2dc8d27ad24dbfce44c6a9082b178a2c0527b143c2cb1cd9ed565d1ad68953e031c168ec6280c2eee3550d34d34f66c40252798606cfb2a6d424b78933a9191"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009601affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 269.262469][ T4667] tipc: Started in network mode [ 269.267848][ T4665] FAULT_INJECTION: forcing a failure. [ 269.267848][ T4665] name failslab, interval 1, probability 0, space 0, times 0 [ 269.272987][ T4667] tipc: Own node identity , cluster identity 4711 [ 269.290952][ T4665] CPU: 0 PID: 4665 Comm: syz-executor.1 Not tainted 5.4.119-syzkaller-00545-gabedbe9da982 #0 [ 269.298327][ T4667] tipc: Failed to obtain node identity 11:50:36 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x1, 0x4, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) [ 269.301108][ T4665] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 269.301112][ T4665] Call Trace: [ 269.301130][ T4665] dump_stack+0x1d8/0x24e [ 269.301146][ T4665] ? devkmsg_release+0x11c/0x11c [ 269.310024][ T4667] tipc: Enabling of bearer rejected, failed to enable media [ 269.316632][ T4665] ? show_regs_print_info+0x12/0x12 [ 269.316641][ T4665] ? write_boundary_block+0x150/0x150 [ 269.316648][ T4665] ? check_preemption_disabled+0x9e/0x330 [ 269.316657][ T4665] ? ext4_get_inode_loc+0x60/0x60 [ 269.316663][ T4665] ? __unwind_start+0x72f/0x8e0 [ 269.316677][ T4665] should_fail+0x6f6/0x860 [ 269.368216][ T4665] ? setup_fault_attr+0x3d0/0x3d0 [ 269.373221][ T4665] ? ext4_xattr_ibody_get+0x60f/0xaf0 [ 269.378568][ T4665] ? mb_cache_entry_create+0x148/0x6c0 [ 269.383999][ T4665] should_failslab+0x5/0x20 [ 269.388508][ T4665] kmem_cache_alloc+0x36/0x290 [ 269.393359][ T4665] mb_cache_entry_create+0x148/0x6c0 [ 269.398624][ T4665] ext4_xattr_get+0x325/0x7f0 [ 269.403274][ T4665] ? stack_trace_save+0x1f0/0x1f0 [ 269.408277][ T4665] ? ext4_initxattrs+0x100/0x100 [ 269.413186][ T4665] __vfs_getxattr+0x5a4/0x6a0 [ 269.417834][ T4665] ? vfs_getxattr_alloc+0x560/0x560 [ 269.423003][ T4665] ? stack_trace_save+0x120/0x1f0 [ 269.428010][ T4665] ? do_syscall_64+0xcb/0x1e0 [ 269.432657][ T4665] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 269.438694][ T4665] get_vfs_caps_from_disk+0x130/0x760 [ 269.444036][ T4665] ? cap_convert_nscap+0x4f0/0x4f0 [ 269.449119][ T4665] ? __rcu_read_lock+0x50/0x50 [ 269.453853][ T4665] ? current_in_userns+0x10f/0x170 [ 269.458951][ T4665] cap_bprm_set_creds+0x420/0x1c80 [ 269.464035][ T4665] ? get_vfs_caps_from_disk+0x760/0x760 [ 269.469550][ T4665] ? check_preemption_disabled+0x9e/0x330 [ 269.475240][ T4665] ? debug_smp_processor_id+0x20/0x20 [ 269.480613][ T4665] security_bprm_set_creds+0x50/0xb0 [ 269.485870][ T4665] prepare_binprm+0x539/0x770 [ 269.490517][ T4665] ? up_write+0xa6/0x270 [ 269.494731][ T4665] ? install_exec_creds+0x130/0x130 [ 269.499901][ T4665] ? count+0x19a/0x200 [ 269.503941][ T4665] __do_execve_file+0x1042/0x17e0 [ 269.508959][ T4665] ? do_execve_file+0x40/0x40 [ 269.513607][ T4665] ? getname_flags+0x1fe/0x640 [ 269.518363][ T4665] __x64_sys_execve+0x90/0xa0 [ 269.523013][ T4665] do_syscall_64+0xcb/0x1e0 [ 269.527490][ T4665] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 269.533354][ T4665] RIP: 0033:0x4665d9 [ 269.537219][ T4665] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 11:50:37 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) [ 269.556794][ T4665] RSP: 002b:00007ff216918188 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 269.565173][ T4665] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 269.573118][ T4665] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 269.581059][ T4665] RBP: 00007ff2169181d0 R08: 0000000000000000 R09: 0000000000000000 [ 269.589014][ T4665] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 269.596958][ T4665] R13: 00007ffd21f609df R14: 00007ff216918300 R15: 0000000000022000 11:50:37 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x3, 0x6000000000000000}, 0x28) [ 269.624127][ T4680] tipc: Started in network mode [ 269.640251][ T4680] tipc: Own node identity , cluster identity 4711 11:50:37 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', 0x0, 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:37 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x102, 0x6000000000000000}, 0x28) 11:50:37 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', 0x0, 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:37 executing program 1 (fault-call:10 fault-nth:14): creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:37 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r2) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 269.666391][ T4680] tipc: Failed to obtain node identity [ 269.694009][ T4680] tipc: Enabling of bearer rejected, failed to enable media [ 269.743534][ T4698] FAULT_INJECTION: forcing a failure. [ 269.743534][ T4698] name failslab, interval 1, probability 0, space 0, times 0 [ 269.756211][ T4698] CPU: 1 PID: 4698 Comm: syz-executor.1 Not tainted 5.4.119-syzkaller-00545-gabedbe9da982 #0 [ 269.766353][ T4698] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 269.776416][ T4698] Call Trace: [ 269.779693][ T4698] dump_stack+0x1d8/0x24e [ 269.784001][ T4698] ? devkmsg_release+0x11c/0x11c [ 269.788912][ T4698] ? __kasan_slab_free+0x20c/0x240 [ 269.794005][ T4698] ? show_regs_print_info+0x12/0x12 [ 269.799181][ T4698] ? mb_cache_entry_create+0x464/0x6c0 [ 269.804617][ T4698] ? __vfs_getxattr+0x5a4/0x6a0 [ 269.809455][ T4698] ? get_vfs_caps_from_disk+0x130/0x760 [ 269.814967][ T4698] ? cap_bprm_set_creds+0x420/0x1c80 [ 269.820221][ T4698] ? prepare_binprm+0x539/0x770 [ 269.825042][ T4698] ? __do_execve_file+0x1042/0x17e0 [ 269.830210][ T4698] ? __x64_sys_execve+0x90/0xa0 [ 269.835032][ T4698] ? do_syscall_64+0xcb/0x1e0 [ 269.839684][ T4698] should_fail+0x6f6/0x860 [ 269.844095][ T4698] ? setup_fault_attr+0x3d0/0x3d0 [ 269.849104][ T4698] ? ebitmap_cmp+0x1b8/0x220 [ 269.853666][ T4698] ? mls_compute_context_len+0x7dd/0x810 [ 269.859280][ T4698] ? context_struct_to_string+0x43b/0x8b0 [ 269.864968][ T4698] should_failslab+0x5/0x20 [ 269.869439][ T4698] __kmalloc+0x5f/0x2f0 [ 269.873565][ T4698] context_struct_to_string+0x43b/0x8b0 [ 269.879082][ T4698] ? security_bounded_transition+0x560/0x560 [ 269.885029][ T4698] ? symhash+0xe0/0xe0 [ 269.889067][ T4698] ? hashtab_search+0x1bf/0x200 [ 269.893889][ T4698] context_add_hash+0x13f/0x270 [ 269.898707][ T4698] ? security_sid_to_context_inval+0x40/0x40 [ 269.904654][ T4698] ? mls_context_isvalid+0x272/0x380 [ 269.909926][ T4698] ? policydb_context_isvalid+0x1b6/0x400 [ 269.915634][ T4698] security_compute_sid+0x1142/0x1d00 [ 269.920978][ T4698] ? security_transition_sid+0x90/0x90 [ 269.926407][ T4698] ? from_kuid+0x208/0x350 [ 269.930792][ T4698] ? make_kuid+0x3b0/0x3b0 [ 269.935192][ T4698] ? stack_trace_save+0x120/0x1f0 [ 269.940185][ T4698] ? do_syscall_64+0xcb/0x1e0 [ 269.944832][ T4698] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 269.950872][ T4698] ? get_vfs_caps_from_disk+0x4e3/0x760 [ 269.956390][ T4698] ? __rcu_read_lock+0x50/0x50 [ 269.961128][ T4698] security_transition_sid+0x78/0x90 [ 269.966397][ T4698] selinux_bprm_set_creds+0x45c/0xeb0 [ 269.971745][ T4698] ? selinux_netlink_send+0x890/0x890 [ 269.977100][ T4698] ? check_preemption_disabled+0x9e/0x330 [ 269.982788][ T4698] ? debug_smp_processor_id+0x20/0x20 [ 269.988130][ T4698] security_bprm_set_creds+0x50/0xb0 [ 269.993385][ T4698] prepare_binprm+0x539/0x770 [ 269.998035][ T4698] ? up_write+0xa6/0x270 [ 270.002246][ T4698] ? install_exec_creds+0x130/0x130 [ 270.007418][ T4698] ? count+0x19a/0x200 [ 270.011457][ T4698] __do_execve_file+0x1042/0x17e0 [ 270.016454][ T4698] ? do_execve_file+0x40/0x40 [ 270.021123][ T4698] ? getname_flags+0x1fe/0x640 [ 270.025857][ T4698] __x64_sys_execve+0x90/0xa0 [ 270.030516][ T4698] do_syscall_64+0xcb/0x1e0 [ 270.034994][ T4698] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 270.040874][ T4698] RIP: 0033:0x4665d9 [ 270.044756][ T4698] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 270.064331][ T4698] RSP: 002b:00007ff216918188 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 270.072711][ T4698] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 270.080656][ T4698] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 11:50:37 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x1, 0x5, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) 11:50:37 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x6, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) 11:50:37 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, 0x0, &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:37 executing program 1 (fault-call:10 fault-nth:15): creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:37 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x104, 0x6000000000000000}, 0x28) [ 270.088599][ T4698] RBP: 00007ff2169181d0 R08: 0000000000000000 R09: 0000000000000000 [ 270.096539][ T4698] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 270.104499][ T4698] R13: 00007ffd21f609df R14: 00007ff216918300 R15: 0000000000022000 11:50:37 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, 0x0, &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:37 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') creat(&(0x7f0000000040)='./bus\x00', 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 270.169403][ T4710] tipc: Started in network mode [ 270.175121][ T4710] tipc: Own node identity , cluster identity 4711 [ 270.176148][ T4711] FAULT_INJECTION: forcing a failure. [ 270.176148][ T4711] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 270.203826][ T4710] tipc: Failed to obtain node identity [ 270.231916][ T4711] CPU: 0 PID: 4711 Comm: syz-executor.1 Not tainted 5.4.119-syzkaller-00545-gabedbe9da982 #0 [ 270.242090][ T4711] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 270.252129][ T4711] Call Trace: [ 270.255418][ T4711] dump_stack+0x1d8/0x24e [ 270.259723][ T4711] ? devkmsg_release+0x11c/0x11c [ 270.264634][ T4711] ? show_regs_print_info+0x12/0x12 [ 270.269808][ T4711] should_fail+0x6f6/0x860 [ 270.274192][ T4711] ? setup_fault_attr+0x3d0/0x3d0 [ 270.279184][ T4711] ? find_get_entry+0x5be/0x650 [ 270.284008][ T4711] __alloc_pages_nodemask+0x1c4/0x880 [ 270.289466][ T4711] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 270.295009][ T4711] ? pagecache_get_page+0x816/0x8c0 [ 270.300178][ T4711] ? page_cache_sync_readahead+0xa3/0x3b0 [ 270.305883][ T4711] generic_file_read_iter+0x126a/0x2120 [ 270.311414][ T4711] ? find_get_pages_range_tag+0xae0/0xae0 [ 270.317118][ T4711] __vfs_read+0x5e9/0x770 [ 270.321437][ T4711] ? rw_verify_area+0x360/0x360 [ 270.326261][ T4711] ? __fsnotify_update_child_dentry_flags+0x2d0/0x2d0 [ 270.332999][ T4711] ? security_file_permission+0x1e9/0x300 [ 270.338692][ T4711] vfs_read+0x161/0x370 [ 270.342855][ T4711] kernel_read+0xa3/0xf0 [ 270.347072][ T4711] prepare_binprm+0x5ab/0x770 [ 270.351722][ T4711] ? up_write+0xa6/0x270 [ 270.355950][ T4711] ? install_exec_creds+0x130/0x130 [ 270.361121][ T4711] ? count+0x19a/0x200 [ 270.365175][ T4711] __do_execve_file+0x1042/0x17e0 [ 270.370295][ T4711] ? do_execve_file+0x40/0x40 [ 270.374941][ T4711] ? getname_flags+0x1fe/0x640 [ 270.379683][ T4711] __x64_sys_execve+0x90/0xa0 [ 270.384345][ T4711] do_syscall_64+0xcb/0x1e0 [ 270.388823][ T4711] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 270.394683][ T4711] RIP: 0033:0x4665d9 [ 270.398552][ T4711] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 270.418132][ T4711] RSP: 002b:00007ff216918188 EFLAGS: 00000246 ORIG_RAX: 000000000000003b 11:50:38 executing program 1 (fault-call:10 fault-nth:16): creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:38 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, 0x0, &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) [ 270.426527][ T4711] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 270.434481][ T4711] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 270.442435][ T4711] RBP: 00007ff2169181d0 R08: 0000000000000000 R09: 0000000000000000 [ 270.450382][ T4711] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 270.458327][ T4711] R13: 00007ffd21f609df R14: 00007ff216918300 R15: 0000000000022000 [ 270.474508][ T4710] tipc: Enabling of bearer rejected, failed to enable media 11:50:38 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x108, 0x6000000000000000}, 0x28) 11:50:38 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x1, 0x6, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) 11:50:38 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) [ 270.523405][ T4723] FAULT_INJECTION: forcing a failure. [ 270.523405][ T4723] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 270.542507][ T4723] CPU: 0 PID: 4723 Comm: syz-executor.1 Not tainted 5.4.119-syzkaller-00545-gabedbe9da982 #0 [ 270.552671][ T4723] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 270.562709][ T4723] Call Trace: [ 270.566067][ T4723] dump_stack+0x1d8/0x24e [ 270.570374][ T4723] ? devkmsg_release+0x11c/0x11c [ 270.575392][ T4723] ? show_regs_print_info+0x12/0x12 [ 270.580589][ T4723] ? mem_cgroup_charge_statistics+0x165/0x1c0 [ 270.586646][ T4723] ? mem_cgroup_commit_charge+0x22d/0x300 [ 270.592340][ T4723] should_fail+0x6f6/0x860 [ 270.596734][ T4723] ? setup_fault_attr+0x3d0/0x3d0 [ 270.601752][ T4723] ? unlock_page+0x71/0x90 [ 270.606141][ T4723] ? ext4_mpage_readpages+0x1ea7/0x1f30 [ 270.611676][ T4723] __alloc_pages_nodemask+0x1c4/0x880 [ 270.617057][ T4723] ? current_time+0x1ae/0x2f0 [ 270.621732][ T4723] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 270.627257][ T4723] ? check_preemption_disabled+0x154/0x330 [ 270.633046][ T4723] ? debug_smp_processor_id+0x20/0x20 [ 270.638395][ T4723] ? __rcu_read_lock+0x50/0x50 [ 270.643134][ T4723] get_zeroed_page+0x15/0x40 [ 270.647714][ T4723] __pud_alloc+0x33/0x180 [ 270.652038][ T4723] handle_mm_fault+0x309d/0x42f0 [ 270.656948][ T4723] ? current_time+0x2f0/0x2f0 [ 270.661612][ T4723] ? finish_fault+0x230/0x230 [ 270.666264][ T4723] ? follow_page_mask+0x286/0x1040 [ 270.671359][ T4723] ? vmacache_update+0x6c/0xf0 [ 270.676111][ T4723] ? find_extend_vma+0xc7/0x290 [ 270.681368][ T4723] __get_user_pages+0xc01/0x1340 [ 270.686283][ T4723] ? populate_vma_page_range+0xf0/0xf0 [ 270.691726][ T4723] get_user_pages_remote+0xec/0x640 [ 270.696917][ T4723] ? security_file_permission+0x1e9/0x300 [ 270.702610][ T4723] ? vfs_read+0x272/0x370 [ 270.706917][ T4723] copy_strings+0x40f/0x8a0 [ 270.711397][ T4723] ? copy_strings_kernel+0xf0/0xf0 [ 270.716498][ T4723] ? count+0x19a/0x200 [ 270.720539][ T4723] __do_execve_file+0x10df/0x17e0 [ 270.725536][ T4723] ? do_execve_file+0x40/0x40 [ 270.730187][ T4723] ? getname_flags+0x1fe/0x640 [ 270.734924][ T4723] __x64_sys_execve+0x90/0xa0 [ 270.739573][ T4723] do_syscall_64+0xcb/0x1e0 [ 270.744063][ T4723] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 270.749938][ T4723] RIP: 0033:0x4665d9 [ 270.753805][ T4723] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 11:50:38 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x8, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) [ 270.773467][ T4723] RSP: 002b:00007ff216918188 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 270.781866][ T4723] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 270.789936][ T4723] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 270.797891][ T4723] RBP: 00007ff2169181d0 R08: 0000000000000000 R09: 0000000000000000 [ 270.805836][ T4723] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 270.813796][ T4723] R13: 00007ffd21f609df R14: 00007ff216918300 R15: 0000000000022000 11:50:38 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') creat(&(0x7f0000000040)='./bus\x00', 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:38 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:38 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x1, 0x7, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) 11:50:38 executing program 1 (fault-call:10 fault-nth:17): creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:38 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) [ 270.840473][ T4733] tipc: Started in network mode [ 270.845429][ T4733] tipc: Own node identity , cluster identity 4711 [ 270.866835][ T4733] tipc: Failed to obtain node identity [ 270.878213][ T4733] tipc: Enabling of bearer rejected, failed to enable media 11:50:38 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, 0x0) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:38 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x1, 0x8, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) [ 270.914495][ T4743] tipc: Started in network mode [ 270.919500][ T4743] tipc: Own node identity , cluster identity 4711 [ 270.926169][ T4743] tipc: Failed to obtain node identity [ 270.934819][ T4743] tipc: Enabling of bearer rejected, failed to enable media [ 270.947401][ T4748] FAULT_INJECTION: forcing a failure. [ 270.947401][ T4748] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 270.974465][ T4748] CPU: 1 PID: 4748 Comm: syz-executor.1 Not tainted 5.4.119-syzkaller-00545-gabedbe9da982 #0 [ 270.984633][ T4748] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 270.994678][ T4748] Call Trace: [ 270.997965][ T4748] dump_stack+0x1d8/0x24e [ 271.002269][ T4748] ? devkmsg_release+0x11c/0x11c [ 271.007180][ T4748] ? show_regs_print_info+0x12/0x12 [ 271.012366][ T4748] ? preempt_count_add+0x66/0x130 [ 271.017470][ T4748] ? prep_new_page+0x122/0x380 [ 271.022225][ T4748] should_fail+0x6f6/0x860 [ 271.026640][ T4748] ? setup_fault_attr+0x3d0/0x3d0 [ 271.031635][ T4748] __alloc_pages_nodemask+0x1c4/0x880 [ 271.036994][ T4748] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 271.042616][ T4748] ? _raw_spin_trylock_bh+0x1a0/0x1a0 [ 271.047978][ T4748] ? __rcu_read_lock+0x50/0x50 [ 271.052710][ T4748] __pmd_alloc+0x3a/0x1f0 [ 271.057027][ T4748] handle_mm_fault+0x3760/0x42f0 [ 271.061936][ T4748] ? current_time+0x2f0/0x2f0 [ 271.066702][ T4748] ? finish_fault+0x230/0x230 [ 271.071350][ T4748] ? follow_page_mask+0x286/0x1040 [ 271.076431][ T4748] ? vmacache_update+0x6c/0xf0 [ 271.081182][ T4748] ? find_extend_vma+0xc7/0x290 [ 271.086005][ T4748] __get_user_pages+0xc01/0x1340 [ 271.090914][ T4748] ? populate_vma_page_range+0xf0/0xf0 [ 271.096374][ T4748] get_user_pages_remote+0xec/0x640 [ 271.101642][ T4748] ? security_file_permission+0x1e9/0x300 [ 271.107336][ T4748] ? vfs_read+0x272/0x370 [ 271.111649][ T4748] copy_strings+0x40f/0x8a0 [ 271.116129][ T4748] ? copy_strings_kernel+0xf0/0xf0 [ 271.121213][ T4748] ? count+0x19a/0x200 [ 271.125277][ T4748] __do_execve_file+0x10df/0x17e0 [ 271.130310][ T4748] ? do_execve_file+0x40/0x40 [ 271.134956][ T4748] ? getname_flags+0x1fe/0x640 [ 271.139687][ T4748] __x64_sys_execve+0x90/0xa0 [ 271.144340][ T4748] do_syscall_64+0xcb/0x1e0 [ 271.148830][ T4748] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 271.154694][ T4748] RIP: 0033:0x4665d9 11:50:38 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x9, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) 11:50:38 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x10f, 0x6000000000000000}, 0x28) [ 271.158557][ T4748] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 271.178146][ T4748] RSP: 002b:00007ff216918188 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 271.186620][ T4748] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 271.194569][ T4748] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 271.202521][ T4748] RBP: 00007ff2169181d0 R08: 0000000000000000 R09: 0000000000000000 [ 271.210550][ T4748] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 11:50:38 executing program 1 (fault-call:10 fault-nth:18): creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 271.218528][ T4748] R13: 00007ffd21f609df R14: 00007ff216918300 R15: 0000000000022000 11:50:38 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0xa, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) 11:50:38 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:38 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, 0x0) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) [ 271.268890][ T4762] tipc: Started in network mode [ 271.270826][ T4763] overlayfs: missing 'lowerdir' [ 271.279565][ T4762] tipc: Own node identity , cluster identity 4711 [ 271.290809][ T4764] FAULT_INJECTION: forcing a failure. [ 271.290809][ T4764] name fail_page_alloc, interval 1, probability 0, space 0, times 0 11:50:38 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000029fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000006504040001000000040400001c007d60b7030000000000006a0a00fe20000000850000000d000000b700000000000000950000fe00000000c9be17044171e1d3d7b1d6d0ff03000000000000c668a4b63e069efb297975738f538e31ec24925095a163b9d4e76be266e31a80212240baa44e080addde6033170000007b3f912f6906a6e2313091df61258a1fda45991fbdce6793c8a4785ee8b60092659b941bbd750045404b04bf97c0fea679c032b3203c6cd8bac9626bcc85e961509735a046171f5bebfa80dbdc0200379e731d3a8d8fea894a4ee293001f6ce7d5b40bf2a7399c23f84c6fa5f9be8173d05afe002c0e7821d406c967379e7521392d24d6c8034e2dc7c053498a9f413af569575de3b5c85546945e9bce678ee9a09806474947310bae538450a676d71c011705060000000000000000a3d39322942df819eea101000000000000009fc8f4b9276e9dc330c9cbac5d708570a14546aa89e13c65896d24684ee25f853b0858122c3d1de564d84638c7f6ec477f9ffece0ff3d9f4cf21c119b95eba4c925c80c3c33c81a68055fc8b3af4f32d16cf290f90d80f1da0db08da80f7a88b63885551371ee1febf833a4103e2f68d1aa3a2138953c0c41ead2824f4ae3260007396d42e0168a85fc6448b3f2eaab716abe53aa6c1ba9ace891ef38f9a00000000000000000000000000000000000200481ac0f54b7a913f3465c333429c19f5d01166a1c4edc2abdeb54e25bf47085689e16b524053ac75f36b5b6e7ddf0aa170ec19aee6ccb06c4708e4ec97194d713a36d9bbed4e832541318a8c13c55c40d100e58fb845049af5b02f8ba8fc1345d6442b96c2d17bd048a2ed0841470c424324db952a44b515d47945babf404c35fd608046f1640f05007842f01d3428843635d4f3e98399b396ea30fc8f9a911a64798a4cf7b63b48349cd630881342c6533f5a9ac85b040000000000000000090000000000009380513278d4701e78251bbc45b73f8d5665d369df748c068b23e3fe886aee0668e58e7158040e0156e332b122288e40fecb03cf4880dc047af0c3a73bab43736a168c57df0f88c1d2dc8d27ad24dbfce44c6a9082b178a2c0527b143c2cb1cd9ed565d1ad68953e031c168ec6280c2eee3550d34d34f66c40252798606cfb2a6d424b78933a9191"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x110, 0x6000000000000000}, 0x28) [ 271.321861][ T4762] tipc: Failed to obtain node identity [ 271.331978][ T4762] tipc: Enabling of bearer rejected, failed to enable media [ 271.336300][ T4764] CPU: 0 PID: 4764 Comm: syz-executor.1 Not tainted 5.4.119-syzkaller-00545-gabedbe9da982 #0 [ 271.350785][ T4764] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 271.360818][ T4764] Call Trace: [ 271.364088][ T4764] dump_stack+0x1d8/0x24e [ 271.368506][ T4764] ? devkmsg_release+0x11c/0x11c [ 271.373425][ T4764] ? show_regs_print_info+0x12/0x12 [ 271.378728][ T4764] ? __set_page_owner+0x1e5/0x200 [ 271.383739][ T4764] ? preempt_count_add+0x66/0x130 [ 271.388752][ T4764] should_fail+0x6f6/0x860 [ 271.393169][ T4764] ? setup_fault_attr+0x3d0/0x3d0 [ 271.398180][ T4764] __alloc_pages_nodemask+0x1c4/0x880 [ 271.403529][ T4764] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 271.409049][ T4764] ? _raw_spin_lock+0xa3/0x1b0 [ 271.413784][ T4764] ? _raw_spin_trylock_bh+0x1a0/0x1a0 [ 271.419229][ T4764] ? __ext4_expand_extra_isize+0x3b0/0x3b0 [ 271.425026][ T4764] ? generic_update_time+0x46/0x210 [ 271.430219][ T4764] pte_alloc_one+0x1b/0xb0 [ 271.434708][ T4764] __pte_alloc+0x1d/0x1c0 [ 271.439021][ T4764] handle_mm_fault+0x39b9/0x42f0 [ 271.444056][ T4764] ? current_time+0x2f0/0x2f0 [ 271.448728][ T4764] ? finish_fault+0x230/0x230 [ 271.453380][ T4764] ? follow_page_mask+0x286/0x1040 [ 271.458468][ T4764] ? vmacache_update+0x6c/0xf0 [ 271.463900][ T4764] ? find_extend_vma+0xc7/0x290 [ 271.468900][ T4764] __get_user_pages+0xc01/0x1340 [ 271.473847][ T4764] ? populate_vma_page_range+0xf0/0xf0 [ 271.479277][ T4764] get_user_pages_remote+0xec/0x640 [ 271.484448][ T4764] ? security_file_permission+0x1e9/0x300 [ 271.490141][ T4764] ? vfs_read+0x272/0x370 [ 271.494438][ T4764] copy_strings+0x40f/0x8a0 [ 271.498919][ T4764] ? copy_strings_kernel+0xf0/0xf0 [ 271.504091][ T4764] ? count+0x19a/0x200 [ 271.508148][ T4764] __do_execve_file+0x10df/0x17e0 [ 271.513256][ T4764] ? do_execve_file+0x40/0x40 [ 271.517901][ T4764] ? getname_flags+0x1fe/0x640 [ 271.522633][ T4764] __x64_sys_execve+0x90/0xa0 [ 271.527293][ T4764] do_syscall_64+0xcb/0x1e0 [ 271.531787][ T4764] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 271.537660][ T4764] RIP: 0033:0x4665d9 [ 271.541525][ T4764] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 271.561314][ T4764] RSP: 002b:00007ff216918188 EFLAGS: 00000246 ORIG_RAX: 000000000000003b 11:50:39 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0xb, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) 11:50:39 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:39 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x1, 0x9, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) 11:50:39 executing program 1 (fault-call:10 fault-nth:19): creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 271.569897][ T4764] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 271.577856][ T4764] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 271.585799][ T4764] RBP: 00007ff2169181d0 R08: 0000000000000000 R09: 0000000000000000 [ 271.593744][ T4764] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 271.601714][ T4764] R13: 00007ffd21f609df R14: 00007ff216918300 R15: 0000000000022000 11:50:39 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, 0x0) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) [ 271.656742][ T4781] overlayfs: missing 'lowerdir' 11:50:39 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x10, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) [ 271.682734][ T4789] FAULT_INJECTION: forcing a failure. [ 271.682734][ T4789] name failslab, interval 1, probability 0, space 0, times 0 [ 271.697832][ T4788] tipc: Started in network mode [ 271.705725][ T4795] overlayfs: missing 'lowerdir' [ 271.715884][ T4788] tipc: Own node identity , cluster identity 4711 [ 271.718165][ T4789] CPU: 1 PID: 4789 Comm: syz-executor.1 Not tainted 5.4.119-syzkaller-00545-gabedbe9da982 #0 [ 271.732448][ T4789] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 271.742485][ T4789] Call Trace: [ 271.745758][ T4789] dump_stack+0x1d8/0x24e [ 271.750075][ T4789] ? devkmsg_release+0x11c/0x11c [ 271.755245][ T4789] ? show_regs_print_info+0x12/0x12 [ 271.760416][ T4789] should_fail+0x6f6/0x860 [ 271.764804][ T4789] ? setup_fault_attr+0x3d0/0x3d0 [ 271.769814][ T4789] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 271.775329][ T4789] ? __anon_vma_prepare+0x4e/0x440 [ 271.780410][ T4789] should_failslab+0x5/0x20 [ 271.784898][ T4789] kmem_cache_alloc+0x36/0x290 [ 271.789633][ T4789] __anon_vma_prepare+0x4e/0x440 [ 271.794543][ T4789] ? _raw_spin_unlock+0x49/0x60 [ 271.799364][ T4789] ? __pte_alloc+0x145/0x1c0 [ 271.803936][ T4789] handle_mm_fault+0x3be1/0x42f0 [ 271.808858][ T4789] ? current_time+0x2f0/0x2f0 [ 271.813515][ T4789] ? finish_fault+0x230/0x230 [ 271.818165][ T4789] ? follow_page_mask+0x286/0x1040 [ 271.823244][ T4789] ? vmacache_update+0x6c/0xf0 [ 271.827978][ T4789] ? find_extend_vma+0xc7/0x290 [ 271.832800][ T4789] __get_user_pages+0xc01/0x1340 [ 271.837713][ T4789] ? populate_vma_page_range+0xf0/0xf0 [ 271.843143][ T4789] get_user_pages_remote+0xec/0x640 [ 271.848315][ T4789] ? security_file_permission+0x1e9/0x300 [ 271.854018][ T4789] ? vfs_read+0x272/0x370 [ 271.858316][ T4789] copy_strings+0x40f/0x8a0 [ 271.863138][ T4789] ? copy_strings_kernel+0xf0/0xf0 [ 271.868218][ T4789] ? count+0x19a/0x200 [ 271.872258][ T4789] __do_execve_file+0x10df/0x17e0 [ 271.877252][ T4789] ? do_execve_file+0x40/0x40 [ 271.881905][ T4789] ? getname_flags+0x1fe/0x640 [ 271.886659][ T4789] __x64_sys_execve+0x90/0xa0 [ 271.891308][ T4789] do_syscall_64+0xcb/0x1e0 [ 271.895785][ T4789] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 271.901647][ T4789] RIP: 0033:0x4665d9 [ 271.905512][ T4789] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 271.925170][ T4789] RSP: 002b:00007ff216918188 EFLAGS: 00000246 ORIG_RAX: 000000000000003b 11:50:39 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:39 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[]) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:39 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x11, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) [ 271.933652][ T4789] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 271.941616][ T4789] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 271.949560][ T4789] RBP: 00007ff2169181d0 R08: 0000000000000000 R09: 0000000000000000 [ 271.957504][ T4789] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 271.965445][ T4789] R13: 00007ffd21f609df R14: 00007ff216918300 R15: 0000000000022000 11:50:39 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[]) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:39 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x160, 0x6000000000000000}, 0x28) 11:50:39 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:39 executing program 1 (fault-call:10 fault-nth:20): creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:39 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x1, 0xa, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) [ 272.009274][ T4788] tipc: Failed to obtain node identity [ 272.013768][ T4804] overlayfs: missing 'lowerdir' [ 272.017174][ T4788] tipc: Enabling of bearer rejected, failed to enable media 11:50:39 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x12, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) 11:50:39 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[]) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:39 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x600, 0x6000000000000000}, 0x28) [ 272.067658][ T4811] overlayfs: missing 'lowerdir' [ 272.093288][ T4815] FAULT_INJECTION: forcing a failure. [ 272.093288][ T4815] name failslab, interval 1, probability 0, space 0, times 0 [ 272.106591][ T4815] CPU: 1 PID: 4815 Comm: syz-executor.1 Not tainted 5.4.119-syzkaller-00545-gabedbe9da982 #0 [ 272.116740][ T4815] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 272.126798][ T4815] Call Trace: [ 272.130101][ T4815] dump_stack+0x1d8/0x24e [ 272.134430][ T4815] ? devkmsg_release+0x11c/0x11c [ 272.139371][ T4815] ? show_regs_print_info+0x12/0x12 [ 272.144564][ T4815] should_fail+0x6f6/0x860 [ 272.148973][ T4815] ? setup_fault_attr+0x3d0/0x3d0 [ 272.153988][ T4815] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 272.155947][ T4820] tipc: Started in network mode [ 272.159524][ T4815] ? __anon_vma_prepare+0x4e/0x440 [ 272.159534][ T4815] should_failslab+0x5/0x20 [ 272.159542][ T4815] kmem_cache_alloc+0x36/0x290 [ 272.159549][ T4815] __anon_vma_prepare+0x4e/0x440 [ 272.159557][ T4815] ? _raw_spin_unlock+0x49/0x60 [ 272.159564][ T4815] ? __pte_alloc+0x145/0x1c0 [ 272.159572][ T4815] handle_mm_fault+0x3be1/0x42f0 [ 272.159581][ T4815] ? current_time+0x2f0/0x2f0 [ 272.159591][ T4815] ? finish_fault+0x230/0x230 [ 272.159602][ T4815] ? follow_page_mask+0x286/0x1040 [ 272.159609][ T4815] ? vmacache_update+0x6c/0xf0 [ 272.159617][ T4815] ? find_extend_vma+0xc7/0x290 [ 272.159624][ T4815] __get_user_pages+0xc01/0x1340 [ 272.159636][ T4815] ? populate_vma_page_range+0xf0/0xf0 [ 272.159645][ T4815] get_user_pages_remote+0xec/0x640 [ 272.159654][ T4815] ? security_file_permission+0x1e9/0x300 [ 272.159663][ T4815] ? vfs_read+0x272/0x370 [ 272.159669][ T4815] copy_strings+0x40f/0x8a0 [ 272.159685][ T4815] ? copy_strings_kernel+0xf0/0xf0 [ 272.257000][ T4815] ? count+0x19a/0x200 [ 272.261039][ T4815] __do_execve_file+0x10df/0x17e0 [ 272.266058][ T4815] ? do_execve_file+0x40/0x40 [ 272.270707][ T4815] ? getname_flags+0x1fe/0x640 [ 272.275443][ T4815] __x64_sys_execve+0x90/0xa0 [ 272.280181][ T4815] do_syscall_64+0xcb/0x1e0 [ 272.284656][ T4815] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 272.290517][ T4815] RIP: 0033:0x4665d9 [ 272.294393][ T4815] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 272.314227][ T4815] RSP: 002b:00007ff216918188 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 272.322605][ T4815] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 272.330547][ T4815] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 11:50:39 executing program 4: chdir(&(0x7f0000000000)='./file1\x00') r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 272.338488][ T4815] RBP: 00007ff2169181d0 R08: 0000000000000000 R09: 0000000000000000 [ 272.346429][ T4815] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 272.354379][ T4815] R13: 00007ffd21f609df R14: 00007ff216918300 R15: 0000000000022000 [ 272.374563][ T4820] tipc: Own node identity , cluster identity 4711 11:50:40 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB]) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:40 executing program 4: chdir(&(0x7f0000000000)='./file1\x00') r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:40 executing program 1 (fault-call:10 fault-nth:21): creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 272.392060][ T4820] tipc: Failed to obtain node identity [ 272.400158][ T4828] overlayfs: missing 'lowerdir' [ 272.409068][ T4820] tipc: Enabling of bearer rejected, failed to enable media 11:50:40 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x1, 0xb, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) 11:50:40 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x13, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) 11:50:40 executing program 4: chdir(&(0x7f0000000000)='./file1\x00') r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:40 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB]) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:40 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x4000, 0x6000000000000000}, 0x28) [ 272.488053][ T4838] overlayfs: missing 'lowerdir' [ 272.493846][ T4841] FAULT_INJECTION: forcing a failure. [ 272.493846][ T4841] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 272.494881][ T4842] tipc: Started in network mode [ 272.522869][ T4841] CPU: 1 PID: 4841 Comm: syz-executor.1 Not tainted 5.4.119-syzkaller-00545-gabedbe9da982 #0 [ 272.533030][ T4841] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 272.543075][ T4841] Call Trace: [ 272.546359][ T4841] dump_stack+0x1d8/0x24e [ 272.550201][ T4842] tipc: Own node identity , cluster identity 4711 [ 272.550678][ T4841] ? devkmsg_release+0x11c/0x11c [ 272.550693][ T4841] ? show_regs_print_info+0x12/0x12 [ 272.562295][ T4848] overlayfs: missing 'lowerdir' [ 272.567186][ T4841] should_fail+0x6f6/0x860 [ 272.567196][ T4841] ? setup_fault_attr+0x3d0/0x3d0 [ 272.567206][ T4841] __alloc_pages_nodemask+0x1c4/0x880 [ 272.567221][ T4841] ? up_read+0x10/0x10 [ 272.590937][ T4841] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 272.596466][ T4841] ? __anon_vma_prepare+0x361/0x440 [ 272.601653][ T4841] handle_mm_fault+0x170e/0x42f0 [ 272.606563][ T4841] ? current_time+0x2f0/0x2f0 [ 272.611241][ T4841] ? finish_fault+0x230/0x230 [ 272.615886][ T4841] ? follow_page_mask+0x286/0x1040 [ 272.620965][ T4841] ? vmacache_update+0x6c/0xf0 [ 272.625698][ T4841] ? find_extend_vma+0xc7/0x290 [ 272.630529][ T4841] __get_user_pages+0xc01/0x1340 [ 272.635455][ T4841] ? populate_vma_page_range+0xf0/0xf0 [ 272.640889][ T4841] get_user_pages_remote+0xec/0x640 [ 272.646078][ T4841] ? security_file_permission+0x1e9/0x300 [ 272.651770][ T4841] ? vfs_read+0x272/0x370 [ 272.656068][ T4841] copy_strings+0x40f/0x8a0 [ 272.660632][ T4841] ? copy_strings_kernel+0xf0/0xf0 [ 272.665710][ T4841] ? count+0x19a/0x200 [ 272.669751][ T4841] __do_execve_file+0x10df/0x17e0 [ 272.674745][ T4841] ? do_execve_file+0x40/0x40 [ 272.679493][ T4841] ? getname_flags+0x1fe/0x640 [ 272.684229][ T4841] __x64_sys_execve+0x90/0xa0 [ 272.688875][ T4841] do_syscall_64+0xcb/0x1e0 [ 272.693351][ T4841] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 272.699301][ T4841] RIP: 0033:0x4665d9 [ 272.703172][ T4841] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 272.722749][ T4841] RSP: 002b:00007ff216918188 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 272.731129][ T4841] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 11:50:40 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000029fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000006504040001000000040400001c007d60b7030000000000006a0a00fe20000000850000000d000000b700000000000000950000fe00000000c9be17044171e1d3d7b1d6d0ff03000000000000c668a4b63e069efb297975738f538e31ec24925095a163b9d4e76be266e31a80212240baa44e080addde6033170000007b3f912f6906a6e2313091df61258a1fda45991fbdce6793c8a4785ee8b60092659b941bbd750045404b04bf97c0fea679c032b3203c6cd8bac9626bcc85e961509735a046171f5bebfa80dbdc0200379e731d3a8d8fea894a4ee293001f6ce7d5b40bf2a7399c23f84c6fa5f9be8173d05afe002c0e7821d406c967379e7521392d24d6c8034e2dc7c053498a9f413af569575de3b5c85546945e9bce678ee9a09806474947310bae538450a676d71c011705060000000000000000a3d39322942df819eea101000000000000009fc8f4b9276e9dc330c9cbac5d708570a14546aa89e13c65896d24684ee25f853b0858122c3d1de564d84638c7f6ec477f9ffece0ff3d9f4cf21c119b95eba4c925c80c3c33c81a68055fc8b3af4f32d16cf290f90d80f1da0db08da80f7a88b63885551371ee1febf833a4103e2f68d1aa3a2138953c0c41ead2824f4ae3260007396d42e0168a85fc6448b3f2eaab716abe53aa6c1ba9ace891ef38f9a00000000000000000000000000000000000200481ac0f54b7a913f3465c333429c19f5d01166a1c4edc2abdeb54e25bf47085689e16b524053ac75f36b5b6e7ddf0aa170ec19aee6ccb06c4708e4ec97194d713a36d9bbed4e832541318a8c13c55c40d100e58fb845049af5b02f8ba8fc1345d6442b96c2d17bd048a2ed0841470c424324db952a44b515d47945babf404c35fd608046f1640f05007842f01d3428843635d4f3e98399b396ea30fc8f9a911a64798a4cf7b63b48349cd630881342c6533f5a9ac85b040000000000000000090000000000009380513278d4701e78251bbc45b73f8d5665d369df748c068b23e3fe886aee0668e58e7158040e0156e332b122288e40fecb03cf4880dc047af0c3a73bab43736a168c57df0f88c1d2dc8d27ad24dbfce44c6a9082b178a2c0527b143c2cb1cd9ed565d1ad68953e031c168ec6280c2eee3550d34d34f66c40252798606cfb2a6d424b78933a9191"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100}, 0x28) [ 272.739068][ T4841] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 272.747022][ T4841] RBP: 00007ff2169181d0 R08: 0000000000000000 R09: 0000000000000000 [ 272.754963][ T4841] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 272.762902][ T4841] R13: 00007ffd21f609df R14: 00007ff216918300 R15: 0000000000022000 11:50:40 executing program 1 (fault-call:10 fault-nth:22): creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:40 executing program 4: syz_mount_image$msdos(0x0, &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:40 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB]) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) [ 272.787811][ T4842] tipc: Failed to obtain node identity [ 272.802569][ T4842] tipc: Enabling of bearer rejected, failed to enable media 11:50:40 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x2}, 0x28) 11:50:40 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x14, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) 11:50:40 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x1, 0xc, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) 11:50:40 executing program 4: syz_mount_image$msdos(0x0, &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 272.838649][ T4858] FAULT_INJECTION: forcing a failure. [ 272.838649][ T4858] name failslab, interval 1, probability 0, space 0, times 0 [ 272.891301][ T4869] overlayfs: missing 'lowerdir' [ 272.901401][ T4858] CPU: 0 PID: 4858 Comm: syz-executor.1 Not tainted 5.4.119-syzkaller-00545-gabedbe9da982 #0 [ 272.911564][ T4858] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 272.921602][ T4858] Call Trace: [ 272.924875][ T4858] dump_stack+0x1d8/0x24e [ 272.929196][ T4858] ? devkmsg_release+0x11c/0x11c [ 272.934119][ T4858] ? show_regs_print_info+0x12/0x12 [ 272.939289][ T4858] ? _raw_spin_lock+0xa3/0x1b0 [ 272.944023][ T4858] ? _raw_spin_trylock_bh+0x1a0/0x1a0 [ 272.949367][ T4858] should_fail+0x6f6/0x860 [ 272.953766][ T4858] ? setup_fault_attr+0x3d0/0x3d0 [ 272.958773][ T4858] ? load_elf_binary+0xad/0x3980 [ 272.963686][ T4858] should_failslab+0x5/0x20 [ 272.968173][ T4858] kmem_cache_alloc_trace+0x39/0x2b0 [ 272.973428][ T4858] load_elf_binary+0xad/0x3980 [ 272.978163][ T4858] ? populate_vma_page_range+0xf0/0xf0 [ 272.983590][ T4858] ? _raw_read_unlock+0x21/0x40 [ 272.988410][ T4858] ? load_misc_binary+0x624/0x10c0 [ 272.993491][ T4858] ? load_script+0x1da/0x980 [ 272.998051][ T4858] ? __virt_addr_valid+0x1fd/0x290 [ 273.003132][ T4858] ? asan.module_dtor+0x20/0x20 [ 273.007952][ T4858] ? asan.module_dtor+0x20/0x20 [ 273.012775][ T4858] ? copy_strings+0x71c/0x8a0 [ 273.017426][ T4858] search_binary_handler+0x17c/0x5b0 [ 273.022682][ T4858] exec_binprm+0x91/0x350 [ 273.026998][ T4858] ? count+0x19a/0x200 [ 273.031038][ T4858] __do_execve_file+0x1212/0x17e0 [ 273.036054][ T4858] ? do_execve_file+0x40/0x40 [ 273.040702][ T4858] ? getname_flags+0x1fe/0x640 [ 273.045448][ T4858] __x64_sys_execve+0x90/0xa0 [ 273.050095][ T4858] do_syscall_64+0xcb/0x1e0 [ 273.054569][ T4858] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 273.060430][ T4858] RIP: 0033:0x4665d9 [ 273.064305][ T4858] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 273.083877][ T4858] RSP: 002b:00007ff216918188 EFLAGS: 00000246 ORIG_RAX: 000000000000003b 11:50:40 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x15, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) 11:50:40 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x4}, 0x28) 11:50:40 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bu']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:40 executing program 1 (fault-call:10 fault-nth:23): creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 273.092267][ T4858] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 273.100227][ T4858] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 273.108181][ T4858] RBP: 00007ff2169181d0 R08: 0000000000000000 R09: 0000000000000000 [ 273.116123][ T4858] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 273.124065][ T4858] R13: 00007ffd21f609df R14: 00007ff216918300 R15: 0000000000022000 [ 273.194907][ T4880] tipc: Started in network mode [ 273.207080][ T4880] tipc: Own node identity , cluster identity 4711 [ 273.212193][ T4883] overlayfs: missing 'workdir' [ 273.219623][ T4882] FAULT_INJECTION: forcing a failure. [ 273.219623][ T4882] name failslab, interval 1, probability 0, space 0, times 0 [ 273.237930][ T4880] tipc: Failed to obtain node identity [ 273.244979][ T4882] CPU: 0 PID: 4882 Comm: syz-executor.1 Not tainted 5.4.119-syzkaller-00545-gabedbe9da982 #0 [ 273.245503][ T4880] tipc: Enabling of bearer rejected, failed to enable media [ 273.255134][ T4882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 273.255137][ T4882] Call Trace: [ 273.255157][ T4882] dump_stack+0x1d8/0x24e [ 273.255168][ T4882] ? devkmsg_release+0x11c/0x11c [ 273.255176][ T4882] ? show_regs_print_info+0x12/0x12 [ 273.255186][ T4882] should_fail+0x6f6/0x860 [ 273.255193][ T4882] ? setup_fault_attr+0x3d0/0x3d0 [ 273.255200][ T4882] ? load_elf_binary+0x2228/0x3980 [ 273.255208][ T4882] ? kfree+0xe0/0x660 [ 273.255214][ T4882] ? load_elf_binary+0xad/0x3ed0 [ 273.255224][ T4882] should_failslab+0x5/0x20 [ 273.255232][ T4882] kmem_cache_alloc_trace+0x39/0x2b0 [ 273.255239][ T4882] ? load_elf_binary+0xad/0x3980 [ 273.255247][ T4882] load_elf_binary+0xad/0x3ed0 [ 273.255257][ T4882] ? populate_vma_page_range+0xf0/0xf0 [ 273.255265][ T4882] ? _raw_read_unlock+0x21/0x40 [ 273.255272][ T4882] ? load_misc_binary+0x624/0x10c0 [ 273.255279][ T4882] ? load_script+0x1da/0x980 [ 273.255289][ T4882] ? __virt_addr_valid+0x1fd/0x290 [ 273.255295][ T4882] ? asan.module_dtor+0x20/0x20 [ 273.255301][ T4882] ? asan.module_dtor+0x20/0x20 [ 273.255314][ T4882] ? copy_strings+0x71c/0x8a0 [ 273.374168][ T4882] search_binary_handler+0x17c/0x5b0 [ 273.379574][ T4882] exec_binprm+0x91/0x350 [ 273.383888][ T4882] ? count+0x19a/0x200 [ 273.388045][ T4882] __do_execve_file+0x1212/0x17e0 [ 273.393043][ T4882] ? do_execve_file+0x40/0x40 [ 273.397705][ T4882] ? getname_flags+0x1fe/0x640 [ 273.402461][ T4882] __x64_sys_execve+0x90/0xa0 [ 273.407130][ T4882] do_syscall_64+0xcb/0x1e0 [ 273.411802][ T4882] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 273.417695][ T4882] RIP: 0033:0x4665d9 [ 273.421566][ T4882] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 11:50:41 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x8}, 0x28) 11:50:41 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bu']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:41 executing program 1 (fault-call:10 fault-nth:24): creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:41 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x1, 0xd, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) 11:50:41 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x21f, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) 11:50:41 executing program 4: syz_mount_image$msdos(0x0, &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 273.441235][ T4882] RSP: 002b:00007ff216918188 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 273.449618][ T4882] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 273.457565][ T4882] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 273.465514][ T4882] RBP: 00007ff2169181d0 R08: 0000000000000000 R09: 0000000000000000 [ 273.473473][ T4882] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 273.481438][ T4882] R13: 00007ffd21f609df R14: 00007ff216918300 R15: 0000000000022000 11:50:41 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bu']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) [ 273.516675][ T4889] overlayfs: missing 'workdir' 11:50:41 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0xf}, 0x28) [ 273.558424][ T4897] FAULT_INJECTION: forcing a failure. [ 273.558424][ T4897] name failslab, interval 1, probability 0, space 0, times 0 [ 273.559860][ T4898] overlayfs: missing 'workdir' [ 273.585881][ T4897] CPU: 1 PID: 4897 Comm: syz-executor.1 Not tainted 5.4.119-syzkaller-00545-gabedbe9da982 #0 [ 273.596174][ T4897] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 273.606240][ T4897] Call Trace: [ 273.609533][ T4897] dump_stack+0x1d8/0x24e [ 273.613842][ T4897] ? devkmsg_release+0x11c/0x11c [ 273.618759][ T4897] ? show_regs_print_info+0x12/0x12 [ 273.623935][ T4897] ? avc_has_perm_noaudit+0x400/0x400 [ 273.629311][ T4897] should_fail+0x6f6/0x860 [ 273.633710][ T4897] ? setup_fault_attr+0x3d0/0x3d0 [ 273.638705][ T4897] ? selinux_kernel_module_request+0x132/0x1b0 [ 273.644844][ T4897] ? selinux_kernel_create_files_as+0x2c0/0x2c0 [ 273.651072][ T4897] ? __request_module+0x2ff/0xb70 [ 273.656092][ T4897] should_failslab+0x5/0x20 [ 273.660583][ T4897] kmem_cache_alloc_trace+0x39/0x2b0 [ 273.665931][ T4897] ? search_binary_handler+0x47e/0x5b0 [ 273.671358][ T4897] __request_module+0x2ff/0xb70 [ 273.676196][ T4897] ? search_binary_handler+0x340/0x5b0 [ 273.681626][ T4897] ? asan.module_dtor+0x20/0x20 [ 273.686448][ T4897] ? _raw_read_unlock+0x21/0x40 [ 273.691270][ T4897] ? load_misc_binary+0x624/0x10c0 [ 273.696352][ T4897] ? __virt_addr_valid+0x1fd/0x290 [ 273.701437][ T4897] ? asan.module_dtor+0x20/0x20 [ 273.706260][ T4897] ? __module_put_and_exit+0x20/0x20 [ 273.711517][ T4897] ? copy_strings+0x71c/0x8a0 [ 273.716174][ T4897] search_binary_handler+0x47e/0x5b0 [ 273.721439][ T4897] exec_binprm+0x91/0x350 [ 273.725737][ T4897] ? count+0x19a/0x200 [ 273.729783][ T4897] __do_execve_file+0x1212/0x17e0 [ 273.734779][ T4897] ? do_execve_file+0x40/0x40 [ 273.739446][ T4897] ? getname_flags+0x1fe/0x640 [ 273.745221][ T4897] __x64_sys_execve+0x90/0xa0 [ 273.749869][ T4897] do_syscall_64+0xcb/0x1e0 [ 273.754449][ T4897] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 273.760341][ T4897] RIP: 0033:0x4665d9 [ 273.764210][ T4897] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 273.784058][ T4897] RSP: 002b:00007ff216918188 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 273.792441][ T4897] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 273.800563][ T4897] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 11:50:41 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./fil']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) [ 273.808507][ T4897] RBP: 00007ff2169181d0 R08: 0000000000000000 R09: 0000000000000000 [ 273.816451][ T4897] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 273.824408][ T4897] R13: 00007ffd21f609df R14: 00007ff216918300 R15: 0000000000022000 [ 273.836690][ T4901] tipc: Started in network mode [ 273.845180][ T4901] tipc: Own node identity , cluster identity 4711 11:50:41 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x300, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) 11:50:41 executing program 1 (fault-call:10 fault-nth:25): creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:41 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./fil']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:41 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), 0x0, 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:41 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x10}, 0x28) 11:50:41 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x1, 0xe, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) 11:50:41 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x500, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) [ 273.856269][ T4901] tipc: Failed to obtain node identity [ 273.866815][ T4912] overlayfs: failed to resolve './fil': -2 [ 273.872799][ T4901] tipc: Enabling of bearer rejected, failed to enable media 11:50:41 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./fil']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:41 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000029fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000006504040001000000040400001c007d60b7030000000000006a0a00fe20000000850000000d000000b700000000000000950000fe00000000c9be17044171e1d3d7b1d6d0ff03000000000000c668a4b63e069efb297975738f538e31ec24925095a163b9d4e76be266e31a80212240baa44e080addde6033170000007b3f912f6906a6e2313091df61258a1fda45991fbdce6793c8a4785ee8b60092659b941bbd750045404b04bf97c0fea679c032b3203c6cd8bac9626bcc85e961509735a046171f5bebfa80dbdc0200379e731d3a8d8fea894a4ee293001f6ce7d5b40bf2a7399c23f84c6fa5f9be8173d05afe002c0e7821d406c967379e7521392d24d6c8034e2dc7c053498a9f413af569575de3b5c85546945e9bce678ee9a09806474947310bae538450a676d71c011705060000000000000000a3d39322942df819eea101000000000000009fc8f4b9276e9dc330c9cbac5d708570a14546aa89e13c65896d24684ee25f853b0858122c3d1de564d84638c7f6ec477f9ffece0ff3d9f4cf21c119b95eba4c925c80c3c33c81a68055fc8b3af4f32d16cf290f90d80f1da0db08da80f7a88b63885551371ee1febf833a4103e2f68d1aa3a2138953c0c41ead2824f4ae3260007396d42e0168a85fc6448b3f2eaab716abe53aa6c1ba9ace891ef38f9a00000000000000000000000000000000000200481ac0f54b7a913f3465c333429c19f5d01166a1c4edc2abdeb54e25bf47085689e16b524053ac75f36b5b6e7ddf0aa170ec19aee6ccb06c4708e4ec97194d713a36d9bbed4e832541318a8c13c55c40d100e58fb845049af5b02f8ba8fc1345d6442b96c2d17bd048a2ed0841470c424324db952a44b515d47945babf404c35fd608046f1640f05007842f01d3428843635d4f3e98399b396ea30fc8f9a911a64798a4cf7b63b48349cd630881342c6533f5a9ac85b040000000000000000090000000000009380513278d4701e78251bbc45b73f8d5665d369df748c068b23e3fe886aee0668e58e7158040e0156e332b122288e40fecb03cf4880dc047af0c3a73bab43736a168c57df0f88c1d2dc8d27ad24dbfce44c6a9082b178a2c0527b143c2cb1cd9ed565d1ad68953e031c168ec6280c2eee3550d34d34f66c40252798606cfb2a6d424b78933a9191"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x60}, 0x28) [ 273.924110][ T4917] overlayfs: failed to resolve './fil': -2 [ 273.947244][ T4922] FAULT_INJECTION: forcing a failure. [ 273.947244][ T4922] name failslab, interval 1, probability 0, space 0, times 0 11:50:41 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x600, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) [ 273.972055][ T4930] tipc: Started in network mode [ 273.973685][ T4922] CPU: 0 PID: 4922 Comm: syz-executor.1 Not tainted 5.4.119-syzkaller-00545-gabedbe9da982 #0 [ 273.978112][ T4930] tipc: Own node identity , cluster identity 4711 [ 273.987064][ T4922] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 273.987067][ T4922] Call Trace: [ 273.987085][ T4922] dump_stack+0x1d8/0x24e [ 273.987095][ T4922] ? devkmsg_release+0x11c/0x11c [ 273.987114][ T4922] ? show_regs_print_info+0x12/0x12 [ 273.987124][ T4922] should_fail+0x6f6/0x860 [ 273.987138][ T4922] ? setup_fault_attr+0x3d0/0x3d0 [ 273.993601][ T4930] tipc: Failed to obtain node identity [ 274.003623][ T4922] ? __request_module+0x320/0xb70 [ 274.003632][ T4922] should_failslab+0x5/0x20 [ 274.003642][ T4922] __kmalloc_track_caller+0x5d/0x2e0 [ 274.003649][ T4922] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 274.003663][ T4922] kstrdup+0x31/0x70 [ 274.006994][ T4930] tipc: Enabling of bearer rejected, failed to enable media [ 274.011241][ T4922] __request_module+0x320/0xb70 [ 274.011255][ T4922] ? search_binary_handler+0x340/0x5b0 [ 274.079192][ T4922] ? asan.module_dtor+0x20/0x20 [ 274.084131][ T4922] ? _raw_read_unlock+0x21/0x40 [ 274.088975][ T4922] ? load_misc_binary+0x624/0x10c0 [ 274.094062][ T4922] ? __virt_addr_valid+0x1fd/0x290 [ 274.099145][ T4922] ? asan.module_dtor+0x20/0x20 [ 274.103974][ T4922] ? __module_put_and_exit+0x20/0x20 [ 274.109229][ T4922] ? copy_strings+0x71c/0x8a0 [ 274.113892][ T4922] search_binary_handler+0x47e/0x5b0 [ 274.119153][ T4922] exec_binprm+0x91/0x350 [ 274.123456][ T4922] ? count+0x19a/0x200 [ 274.127602][ T4922] __do_execve_file+0x1212/0x17e0 [ 274.132609][ T4922] ? do_execve_file+0x40/0x40 [ 274.137257][ T4922] ? getname_flags+0x1fe/0x640 [ 274.143689][ T4922] __x64_sys_execve+0x90/0xa0 [ 274.148359][ T4922] do_syscall_64+0xcb/0x1e0 [ 274.153201][ T4922] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 274.159064][ T4922] RIP: 0033:0x4665d9 11:50:41 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x1, 0x10, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) [ 274.162955][ T4922] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 274.183178][ T4922] RSP: 002b:00007ff216918188 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 274.191560][ T4922] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 274.199503][ T4922] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 274.207451][ T4922] RBP: 00007ff2169181d0 R08: 0000000000000000 R09: 0000000000000000 [ 274.215414][ T4922] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 11:50:41 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), 0x0, 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 274.223362][ T4922] R13: 00007ffd21f609df R14: 00007ff216918300 R15: 0000000000022000 [ 274.265099][ T4936] overlayfs: failed to resolve './fil': -2 11:50:41 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,meta']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:41 executing program 1 (fault-call:10 fault-nth:26): creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:41 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x900, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) 11:50:41 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), 0x0, 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:41 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x2c3}, 0x28) [ 274.284604][ T4943] tipc: Started in network mode [ 274.292088][ T4943] tipc: Own node identity , cluster identity 4711 [ 274.299266][ T4943] tipc: Failed to obtain node identity [ 274.305089][ T4943] tipc: Enabling of bearer rejected, failed to enable media 11:50:41 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x1, 0x11, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) 11:50:41 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0xa00, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) [ 274.359864][ T4953] FAULT_INJECTION: forcing a failure. [ 274.359864][ T4953] name failslab, interval 1, probability 0, space 0, times 0 [ 274.388191][ T4951] overlayfs: unrecognized mount option "meta" or missing value [ 274.392882][ T4960] tipc: Started in network mode 11:50:42 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,meta']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:42 executing program 1 (fault-call:10 fault-nth:27): creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 274.402001][ T4953] CPU: 1 PID: 4953 Comm: syz-executor.1 Not tainted 5.4.119-syzkaller-00545-gabedbe9da982 #0 [ 274.412160][ T4953] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 274.413195][ T4960] tipc: Own node identity , cluster identity 4711 [ 274.422207][ T4953] Call Trace: [ 274.422228][ T4953] dump_stack+0x1d8/0x24e [ 274.422238][ T4953] ? devkmsg_release+0x11c/0x11c [ 274.422246][ T4953] ? show_regs_print_info+0x12/0x12 [ 274.422257][ T4953] should_fail+0x6f6/0x860 [ 274.422267][ T4953] ? setup_fault_attr+0x3d0/0x3d0 11:50:42 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0xf00}, 0x28) [ 274.422278][ T4953] ? call_usermodehelper_setup+0x91/0x200 [ 274.422294][ T4953] should_failslab+0x5/0x20 [ 274.432437][ T4960] tipc: Failed to obtain node identity [ 274.436360][ T4953] kmem_cache_alloc_trace+0x39/0x2b0 [ 274.436373][ T4953] call_usermodehelper_setup+0x91/0x200 [ 274.436382][ T4953] ? __request_module+0xb70/0xb70 [ 274.436391][ T4953] __request_module+0x418/0xb70 [ 274.436404][ T4953] ? search_binary_handler+0x340/0x5b0 [ 274.442510][ T4960] tipc: Enabling of bearer rejected, failed to enable media [ 274.446505][ T4953] ? asan.module_dtor+0x20/0x20 [ 274.446515][ T4953] ? _raw_read_unlock+0x21/0x40 [ 274.446523][ T4953] ? load_misc_binary+0x624/0x10c0 [ 274.446533][ T4953] ? __virt_addr_valid+0x1fd/0x290 [ 274.446539][ T4953] ? asan.module_dtor+0x20/0x20 [ 274.446548][ T4953] ? __module_put_and_exit+0x20/0x20 [ 274.446555][ T4953] ? copy_strings+0x71c/0x8a0 [ 274.446564][ T4953] search_binary_handler+0x47e/0x5b0 [ 274.446572][ T4953] exec_binprm+0x91/0x350 [ 274.446579][ T4953] ? count+0x19a/0x200 [ 274.446586][ T4953] __do_execve_file+0x1212/0x17e0 [ 274.446598][ T4953] ? do_execve_file+0x40/0x40 [ 274.446605][ T4953] ? getname_flags+0x1fe/0x640 [ 274.446611][ T4953] __x64_sys_execve+0x90/0xa0 [ 274.446631][ T4953] do_syscall_64+0xcb/0x1e0 [ 274.446638][ T4953] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 274.446645][ T4953] RIP: 0033:0x4665d9 [ 274.446652][ T4953] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 11:50:42 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0xb00, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) 11:50:42 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x1, 0x12, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) [ 274.446656][ T4953] RSP: 002b:00007ff216918188 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 274.446663][ T4953] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 274.446668][ T4953] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 274.446672][ T4953] RBP: 00007ff2169181d0 R08: 0000000000000000 R09: 0000000000000000 [ 274.446677][ T4953] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 274.446681][ T4953] R13: 00007ffd21f609df R14: 00007ff216918300 R15: 0000000000022000 11:50:42 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 274.723306][ T4972] overlayfs: unrecognized mount option "meta" or missing value [ 274.738970][ T4979] tipc: Started in network mode [ 274.746698][ T4978] FAT-fs (loop4): bogus number of reserved sectors [ 274.754310][ T4979] tipc: Own node identity , cluster identity 4711 [ 274.754547][ T4980] FAULT_INJECTION: forcing a failure. [ 274.754547][ T4980] name failslab, interval 1, probability 0, space 0, times 0 11:50:42 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x1f00}, 0x28) 11:50:42 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,meta']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:42 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x1100, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) [ 274.762506][ T4978] FAT-fs (loop4): Can't find a valid FAT filesystem [ 274.781150][ T4979] tipc: Failed to obtain node identity [ 274.813403][ T4979] tipc: Enabling of bearer rejected, failed to enable media [ 274.823616][ T4980] CPU: 0 PID: 4980 Comm: syz-executor.1 Not tainted 5.4.119-syzkaller-00545-gabedbe9da982 #0 [ 274.833771][ T4980] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 274.843812][ T4980] Call Trace: [ 274.847082][ T4980] dump_stack+0x1d8/0x24e [ 274.851405][ T4980] ? devkmsg_release+0x11c/0x11c [ 274.856321][ T4980] ? show_regs_print_info+0x12/0x12 [ 274.861490][ T4980] ? __request_module+0xb70/0xb70 [ 274.866487][ T4980] should_fail+0x6f6/0x860 [ 274.870876][ T4980] ? setup_fault_attr+0x3d0/0x3d0 [ 274.875877][ T4980] ? remove_wait_queue+0x120/0x120 [ 274.880963][ T4980] ? load_elf_binary+0xad/0x3980 [ 274.885868][ T4980] should_failslab+0x5/0x20 [ 274.890346][ T4980] kmem_cache_alloc_trace+0x39/0x2b0 [ 274.895599][ T4980] ? __request_module+0xb70/0xb70 [ 274.900622][ T4980] load_elf_binary+0xad/0x3980 [ 274.905385][ T4980] ? search_binary_handler+0x340/0x5b0 [ 274.910815][ T4980] ? asan.module_dtor+0x20/0x20 [ 274.915634][ T4980] ? _raw_read_unlock+0x21/0x40 [ 274.920540][ T4980] ? load_misc_binary+0x624/0x10c0 [ 274.925618][ T4980] ? load_script+0x1da/0x980 [ 274.930179][ T4980] ? __virt_addr_valid+0x1fd/0x290 [ 274.935259][ T4980] ? asan.module_dtor+0x20/0x20 [ 274.940089][ T4980] ? asan.module_dtor+0x20/0x20 [ 274.944909][ T4980] ? copy_strings+0x71c/0x8a0 [ 274.949558][ T4980] search_binary_handler+0x17c/0x5b0 [ 274.954815][ T4980] exec_binprm+0x91/0x350 [ 274.959115][ T4980] ? count+0x19a/0x200 [ 274.963153][ T4980] __do_execve_file+0x1212/0x17e0 [ 274.968149][ T4980] ? do_execve_file+0x40/0x40 [ 274.972793][ T4980] ? getname_flags+0x1fe/0x640 [ 274.977558][ T4980] __x64_sys_execve+0x90/0xa0 [ 274.982204][ T4980] do_syscall_64+0xcb/0x1e0 [ 274.986677][ T4980] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 274.992538][ T4980] RIP: 0033:0x4665d9 [ 274.996405][ T4980] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 275.016026][ T4980] RSP: 002b:00007ff216918188 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 275.024423][ T4980] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 275.032364][ T4980] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 275.040307][ T4980] RBP: 00007ff2169181d0 R08: 0000000000000000 R09: 0000000000000000 [ 275.048263][ T4980] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 275.056208][ T4980] R13: 00007ffd21f609df R14: 00007ff216918300 R15: 0000000000022000 11:50:42 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x1200, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) 11:50:42 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x1, 0x21, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) 11:50:42 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:42 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000029fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000006504040001000000040400001c007d60b7030000000000006a0a00fe20000000850000000d000000b700000000000000950000fe00000000c9be17044171e1d3d7b1d6d0ff03000000000000c668a4b63e069efb297975738f538e31ec24925095a163b9d4e76be266e31a80212240baa44e080addde6033170000007b3f912f6906a6e2313091df61258a1fda45991fbdce6793c8a4785ee8b60092659b941bbd750045404b04bf97c0fea679c032b3203c6cd8bac9626bcc85e961509735a046171f5bebfa80dbdc0200379e731d3a8d8fea894a4ee293001f6ce7d5b40bf2a7399c23f84c6fa5f9be8173d05afe002c0e7821d406c967379e7521392d24d6c8034e2dc7c053498a9f413af569575de3b5c85546945e9bce678ee9a09806474947310bae538450a676d71c011705060000000000000000a3d39322942df819eea101000000000000009fc8f4b9276e9dc330c9cbac5d708570a14546aa89e13c65896d24684ee25f853b0858122c3d1de564d84638c7f6ec477f9ffece0ff3d9f4cf21c119b95eba4c925c80c3c33c81a68055fc8b3af4f32d16cf290f90d80f1da0db08da80f7a88b63885551371ee1febf833a4103e2f68d1aa3a2138953c0c41ead2824f4ae3260007396d42e0168a85fc6448b3f2eaab716abe53aa6c1ba9ace891ef38f9a00000000000000000000000000000000000200481ac0f54b7a913f3465c333429c19f5d01166a1c4edc2abdeb54e25bf47085689e16b524053ac75f36b5b6e7ddf0aa170ec19aee6ccb06c4708e4ec97194d713a36d9bbed4e832541318a8c13c55c40d100e58fb845049af5b02f8ba8fc1345d6442b96c2d17bd048a2ed0841470c424324db952a44b515d47945babf404c35fd608046f1640f05007842f01d3428843635d4f3e98399b396ea30fc8f9a911a64798a4cf7b63b48349cd630881342c6533f5a9ac85b040000000000000000090000000000009380513278d4701e78251bbc45b73f8d5665d369df748c068b23e3fe886aee0668e58e7158040e0156e332b122288e40fecb03cf4880dc047af0c3a73bab43736a168c57df0f88c1d2dc8d27ad24dbfce44c6a9082b178a2c0527b143c2cb1cd9ed565d1ad68953e031c168ec6280c2eee3550d34d34f66c40252798606cfb2a6d424b78933a9191"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x4000}, 0x28) 11:50:42 executing program 1 (fault-call:10 fault-nth:28): creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:42 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) [ 275.073311][ T4992] overlayfs: unrecognized mount option "meta" or missing value 11:50:42 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x1300, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) [ 275.146519][ T5007] tipc: Started in network mode [ 275.152526][ T5013] FAULT_INJECTION: forcing a failure. [ 275.152526][ T5013] name failslab, interval 1, probability 0, space 0, times 0 [ 275.166284][ T5007] tipc: Own node identity , cluster identity 4711 [ 275.172161][ T5012] FAT-fs (loop4): bogus number of reserved sectors [ 275.179446][ T5012] FAT-fs (loop4): Can't find a valid FAT filesystem [ 275.186629][ T5013] CPU: 0 PID: 5013 Comm: syz-executor.1 Not tainted 5.4.119-syzkaller-00545-gabedbe9da982 #0 [ 275.196867][ T5013] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 275.206902][ T5013] Call Trace: [ 275.210172][ T5013] dump_stack+0x1d8/0x24e [ 275.214473][ T5013] ? devkmsg_release+0x11c/0x11c [ 275.219393][ T5013] ? show_regs_print_info+0x12/0x12 [ 275.224574][ T5013] should_fail+0x6f6/0x860 [ 275.228965][ T5013] ? setup_fault_attr+0x3d0/0x3d0 [ 275.233959][ T5013] ? load_elf_binary+0x2228/0x3980 [ 275.239036][ T5013] ? kfree+0xe0/0x660 [ 275.242989][ T5013] ? load_elf_binary+0xad/0x3ed0 [ 275.247897][ T5013] should_failslab+0x5/0x20 [ 275.252457][ T5013] kmem_cache_alloc_trace+0x39/0x2b0 [ 275.257725][ T5013] ? load_elf_binary+0xad/0x3980 [ 275.262633][ T5013] load_elf_binary+0xad/0x3ed0 [ 275.267453][ T5013] ? search_binary_handler+0x340/0x5b0 [ 275.272882][ T5013] ? asan.module_dtor+0x20/0x20 [ 275.277712][ T5013] ? _raw_read_unlock+0x21/0x40 [ 275.282541][ T5013] ? load_misc_binary+0x624/0x10c0 [ 275.287621][ T5013] ? load_script+0x1da/0x980 [ 275.292180][ T5013] ? __virt_addr_valid+0x1fd/0x290 [ 275.297260][ T5013] ? asan.module_dtor+0x20/0x20 [ 275.302095][ T5013] ? asan.module_dtor+0x20/0x20 [ 275.306932][ T5013] ? copy_strings+0x71c/0x8a0 [ 275.311587][ T5013] search_binary_handler+0x17c/0x5b0 [ 275.316844][ T5013] exec_binprm+0x91/0x350 [ 275.321146][ T5013] ? count+0x19a/0x200 [ 275.325185][ T5013] __do_execve_file+0x1212/0x17e0 [ 275.330196][ T5013] ? do_execve_file+0x40/0x40 [ 275.334941][ T5013] ? getname_flags+0x1fe/0x640 [ 275.339676][ T5013] __x64_sys_execve+0x90/0xa0 [ 275.344339][ T5013] do_syscall_64+0xcb/0x1e0 [ 275.348913][ T5013] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 275.354870][ T5013] RIP: 0033:0x4665d9 [ 275.358746][ T5013] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 275.378424][ T5013] RSP: 002b:00007ff216918188 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 275.386845][ T5013] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 11:50:43 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000}, 0x28) 11:50:43 executing program 1 (fault-call:10 fault-nth:29): creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 275.394796][ T5013] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 275.402760][ T5013] RBP: 00007ff2169181d0 R08: 0000000000000000 R09: 0000000000000000 [ 275.410790][ T5013] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 275.418734][ T5013] R13: 00007ffd21f609df R14: 00007ff216918300 R15: 0000000000022000 [ 275.441682][ T5007] tipc: Failed to obtain node identity 11:50:43 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:43 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:43 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x1, 0x25, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) 11:50:43 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x1400, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) [ 275.450307][ T5007] tipc: Enabling of bearer rejected, failed to enable media 11:50:43 executing program 1: creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:43 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0xc302}, 0x28) 11:50:43 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x1500, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) [ 275.513619][ T5030] FAT-fs (loop4): bogus number of reserved sectors [ 275.537133][ T5035] overlayfs: unrecognized mount option "metacopy" or missing value [ 275.538033][ T5038] tipc: Started in network mode [ 275.553488][ T5030] FAT-fs (loop4): Can't find a valid FAT filesystem 11:50:43 executing program 1: creat(0x0, 0x70) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:43 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:43 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x1000000}, 0x28) 11:50:43 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x1, 0x2d, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) 11:50:43 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 275.567199][ T5038] tipc: Own node identity , cluster identity 4711 [ 275.575599][ T5038] tipc: Failed to obtain node identity [ 275.586140][ T5038] tipc: Enabling of bearer rejected, failed to enable media 11:50:43 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x2000000}, 0x28) 11:50:43 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:43 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x1f02, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) [ 275.642270][ T5054] tipc: Started in network mode [ 275.657588][ T5054] tipc: Own node identity , cluster identity 4711 [ 275.674290][ T5054] tipc: Failed to obtain node identity [ 275.684106][ T5054] tipc: Enabling of bearer rejected, failed to enable media 11:50:43 executing program 1: creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x11a) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:43 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000029fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000006504040001000000040400001c007d60b7030000000000006a0a00fe20000000850000000d000000b700000000000000950000fe00000000c9be17044171e1d3d7b1d6d0ff03000000000000c668a4b63e069efb297975738f538e31ec24925095a163b9d4e76be266e31a80212240baa44e080addde6033170000007b3f912f6906a6e2313091df61258a1fda45991fbdce6793c8a4785ee8b60092659b941bbd750045404b04bf97c0fea679c032b3203c6cd8bac9626bcc85e961509735a046171f5bebfa80dbdc0200379e731d3a8d8fea894a4ee293001f6ce7d5b40bf2a7399c23f84c6fa5f9be8173d05afe002c0e7821d406c967379e7521392d24d6c8034e2dc7c053498a9f413af569575de3b5c85546945e9bce678ee9a09806474947310bae538450a676d71c011705060000000000000000a3d39322942df819eea101000000000000009fc8f4b9276e9dc330c9cbac5d708570a14546aa89e13c65896d24684ee25f853b0858122c3d1de564d84638c7f6ec477f9ffece0ff3d9f4cf21c119b95eba4c925c80c3c33c81a68055fc8b3af4f32d16cf290f90d80f1da0db08da80f7a88b63885551371ee1febf833a4103e2f68d1aa3a2138953c0c41ead2824f4ae3260007396d42e0168a85fc6448b3f2eaab716abe53aa6c1ba9ace891ef38f9a00000000000000000000000000000000000200481ac0f54b7a913f3465c333429c19f5d01166a1c4edc2abdeb54e25bf47085689e16b524053ac75f36b5b6e7ddf0aa170ec19aee6ccb06c4708e4ec97194d713a36d9bbed4e832541318a8c13c55c40d100e58fb845049af5b02f8ba8fc1345d6442b96c2d17bd048a2ed0841470c424324db952a44b515d47945babf404c35fd608046f1640f05007842f01d3428843635d4f3e98399b396ea30fc8f9a911a64798a4cf7b63b48349cd630881342c6533f5a9ac85b040000000000000000090000000000009380513278d4701e78251bbc45b73f8d5665d369df748c068b23e3fe886aee0668e58e7158040e0156e332b122288e40fecb03cf4880dc047af0c3a73bab43736a168c57df0f88c1d2dc8d27ad24dbfce44c6a9082b178a2c0527b143c2cb1cd9ed565d1ad68953e031c168ec6280c2eee3550d34d34f66c40252798606cfb2a6d424b78933a9191"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x4000000}, 0x28) 11:50:43 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:43 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x1, 0x2e, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) 11:50:43 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x3f00, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) 11:50:43 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=o']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:43 executing program 1: creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000080)=0x510, 0x4) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 275.700041][ T5058] overlayfs: unrecognized mount option "metacopy" or missing value 11:50:43 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000029fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000006504040001000000040400001c007d60b7030000000000006a0a00fe20000000850000000d000000b700000000000000950000fe00000000c9be17044171e1d3d7b1d6d0ff03000000000000c668a4b63e069efb297975738f538e31ec24925095a163b9d4e76be266e31a80212240baa44e080addde6033170000007b3f912f6906a6e2313091df61258a1fda45991fbdce6793c8a4785ee8b60092659b941bbd750045404b04bf97c0fea679c032b3203c6cd8bac9626bcc85e961509735a046171f5bebfa80dbdc0200379e731d3a8d8fea894a4ee293001f6ce7d5b40bf2a7399c23f84c6fa5f9be8173d05afe002c0e7821d406c967379e7521392d24d6c8034e2dc7c053498a9f413af569575de3b5c85546945e9bce678ee9a09806474947310bae538450a676d71c011705060000000000000000a3d39322942df819eea101000000000000009fc8f4b9276e9dc330c9cbac5d708570a14546aa89e13c65896d24684ee25f853b0858122c3d1de564d84638c7f6ec477f9ffece0ff3d9f4cf21c119b95eba4c925c80c3c33c81a68055fc8b3af4f32d16cf290f90d80f1da0db08da80f7a88b63885551371ee1febf833a4103e2f68d1aa3a2138953c0c41ead2824f4ae3260007396d42e0168a85fc6448b3f2eaab716abe53aa6c1ba9ace891ef38f9a00000000000000000000000000000000000200481ac0f54b7a913f3465c333429c19f5d01166a1c4edc2abdeb54e25bf47085689e16b524053ac75f36b5b6e7ddf0aa170ec19aee6ccb06c4708e4ec97194d713a36d9bbed4e832541318a8c13c55c40d100e58fb845049af5b02f8ba8fc1345d6442b96c2d17bd048a2ed0841470c424324db952a44b515d47945babf404c35fd608046f1640f05007842f01d3428843635d4f3e98399b396ea30fc8f9a911a64798a4cf7b63b48349cd630881342c6533f5a9ac85b040000000000000000090000000000009380513278d4701e78251bbc45b73f8d5665d369df748c068b23e3fe886aee0668e58e7158040e0156e332b122288e40fecb03cf4880dc047af0c3a73bab43736a168c57df0f88c1d2dc8d27ad24dbfce44c6a9082b178a2c0527b143c2cb1cd9ed565d1ad68953e031c168ec6280c2eee3550d34d34f66c40252798606cfb2a6d424b78933a9191"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x8000000}, 0x28) 11:50:43 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:43 executing program 1: creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000300)="46311da735152aa30d07425155eca4263b0ac5a2281b50be48b8875cb672507fec7797ae359b6019caab5fd6ffc11ec90f7977e676b02547c5d083107c51d0290593c81b754a2f8ceffe0f47041d6d01f04facdb680c3c938859e1c2eae5b05beecde3c218a5860a28c75f45d4ec13aa06ebdfd5799a8b5fc4903a9f693ac1901905852303ceb549451f1f2a2b9d11724bf72315cc1290e7ccf911b183b768b188d03c05491cc8dba8ffef9c3feaf1b11f501675415900fe7af6e932afecb6600e83d2a01384eb2e89445fe5346181ad", 0xd0) [ 275.771177][ T5077] tipc: Started in network mode [ 275.787134][ T5077] tipc: Own node identity , cluster identity 4711 11:50:43 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=o']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) [ 275.814258][ T5077] tipc: Failed to obtain node identity [ 275.820526][ T5085] overlayfs: unrecognized mount option "metacopy=o" or missing value [ 275.835530][ T5077] tipc: Enabling of bearer rejected, failed to enable media [ 275.852495][ T5094] FAT-fs (loop4): bogus number of reserved sectors 11:50:43 executing program 1: creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x1c) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:43 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:43 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x4000, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) 11:50:43 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000029fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000006504040001000000040400001c007d60b7030000000000006a0a00fe20000000850000000d000000b700000000000000950000fe00000000c9be17044171e1d3d7b1d6d0ff03000000000000c668a4b63e069efb297975738f538e31ec24925095a163b9d4e76be266e31a80212240baa44e080addde6033170000007b3f912f6906a6e2313091df61258a1fda45991fbdce6793c8a4785ee8b60092659b941bbd750045404b04bf97c0fea679c032b3203c6cd8bac9626bcc85e961509735a046171f5bebfa80dbdc0200379e731d3a8d8fea894a4ee293001f6ce7d5b40bf2a7399c23f84c6fa5f9be8173d05afe002c0e7821d406c967379e7521392d24d6c8034e2dc7c053498a9f413af569575de3b5c85546945e9bce678ee9a09806474947310bae538450a676d71c011705060000000000000000a3d39322942df819eea101000000000000009fc8f4b9276e9dc330c9cbac5d708570a14546aa89e13c65896d24684ee25f853b0858122c3d1de564d84638c7f6ec477f9ffece0ff3d9f4cf21c119b95eba4c925c80c3c33c81a68055fc8b3af4f32d16cf290f90d80f1da0db08da80f7a88b63885551371ee1febf833a4103e2f68d1aa3a2138953c0c41ead2824f4ae3260007396d42e0168a85fc6448b3f2eaab716abe53aa6c1ba9ace891ef38f9a00000000000000000000000000000000000200481ac0f54b7a913f3465c333429c19f5d01166a1c4edc2abdeb54e25bf47085689e16b524053ac75f36b5b6e7ddf0aa170ec19aee6ccb06c4708e4ec97194d713a36d9bbed4e832541318a8c13c55c40d100e58fb845049af5b02f8ba8fc1345d6442b96c2d17bd048a2ed0841470c424324db952a44b515d47945babf404c35fd608046f1640f05007842f01d3428843635d4f3e98399b396ea30fc8f9a911a64798a4cf7b63b48349cd630881342c6533f5a9ac85b040000000000000000090000000000009380513278d4701e78251bbc45b73f8d5665d369df748c068b23e3fe886aee0668e58e7158040e0156e332b122288e40fecb03cf4880dc047af0c3a73bab43736a168c57df0f88c1d2dc8d27ad24dbfce44c6a9082b178a2c0527b143c2cb1cd9ed565d1ad68953e031c168ec6280c2eee3550d34d34f66c40252798606cfb2a6d424b78933a9191"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0xf000000}, 0x28) 11:50:43 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x1, 0x3a, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) [ 275.860246][ T5094] FAT-fs (loop4): Can't find a valid FAT filesystem 11:50:43 executing program 1: creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r1, &(0x7f0000000080), r2, &(0x7f00000000c0)=0x5, 0x8, 0x1) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:43 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=o']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:43 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x1000000, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) [ 275.914453][ T5104] overlayfs: unrecognized mount option "metacopy=o" or missing value [ 275.939576][ T5109] FAT-fs (loop4): bogus number of reserved sectors [ 275.942296][ T5110] tipc: Started in network mode [ 275.951482][ T5109] FAT-fs (loop4): Can't find a valid FAT filesystem 11:50:43 executing program 1: r0 = creat(0x0, 0x42) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) io_setup(0x4168, &(0x7f0000000300)=0x0) io_destroy(r1) r2 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) r4 = syz_open_dev$usbfs(&(0x7f0000000080), 0x7, 0x402542) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x18, 0x6, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, [@ldst={0x3, 0x1, 0x3, 0x8, 0xb, 0x30, 0x8}, @alu={0x7, 0x1, 0xd, 0x5, 0x0, 0x4}, @alu={0x7, 0x0, 0x9, 0x2, 0x2, 0xfffffffffffffff0, 0x8}]}, &(0x7f0000000280)='syzkaller\x00', 0xfffffffd, 0x0, 0x0, 0x41100, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000380)={0x3, 0x10, 0x54f4, 0x5}, 0x10}, 0x78) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) io_submit(r1, 0x3, &(0x7f00000006c0)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x6, 0xffff, r4, &(0x7f00000000c0)="b286860a8522d35b5c01588dd934a5fb24a80c98e03a4579ec02b071875e3f9df8ea9c24d47044978398f66331e566ac04da3a737eda3824d867e2b912cd8f1f4c82", 0x42, 0x10000000, 0x0, 0x1, r0}, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x7, 0x0, r5, &(0x7f0000000440)="e65f4f02a5876b612d14bd012940e9442a8f0661d17e0ca8d695faf4b5b64567cb0aa3f1d0578efa712f88859eec1c92c3ce80edf342b139e6257f91676726f4a39079ea81fbfdad7500d21bf7c80805ab3d02b3e4aab0030c5b7d5f55032901bc85982f34a3e9738f97c6b685e96ad8c3f1449ad926b74a43e6b197586ed2dac0306ad95358c3f1290c7e7b9bc55380c092a075d93103d7be5517386c5ccdb19444cd8df55d26dc17aff22a3a7c0c6393160e38f6e0f39c5538be169ea9c5ca78b769fbff25da4fcf98f7f6089c2718136ca5b49ca674dc456e68588fb4c8310ba44a47a2c6", 0xe6, 0xa6, 0x0, 0x1, r3}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x5, 0x4, r6, &(0x7f0000000580)="cbc2b8fe2df30a69b3ba71a33a980c222472ec269d7e7f79c1b3ef345854d7970a33881a5190ad77f22ae9577287155ed39218b76bdb18cd2e872a26e8d6f118c6a6c4ed8d2c9dbff13f95300df6364ddc2fb40986787531bfe2d4db743e36712392494e3e633d9d11d506e7df363a97a63b7667d3ca3e55df7e8b642b88389ee8b099e1e0c6f03dffca88654a2b3784598b711fbb825eab969eb70be975d1fdf5eb611e24a7b3990ed43a4bc32aa2e8eeb1cff6220d0ba693b57b443418733d8790edf057782f95b589f37e4adc581ccac366e429502c9ee86f08c6218bdc33e64d5001eb2aa4ae0f882f01d5d914c5", 0xf0, 0x7fffffff, 0x0, 0x3}]) close(r3) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:43 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x10000000}, 0x28) 11:50:43 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:43 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) creat(0x0, 0x0) [ 275.968943][ T5110] tipc: Own node identity , cluster identity 4711 [ 275.982233][ T5119] overlayfs: unrecognized mount option "metacopy=o" or missing value [ 275.991566][ T5110] tipc: Failed to obtain node identity [ 276.003465][ T5110] tipc: Enabling of bearer rejected, failed to enable media 11:50:43 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x1, 0x48, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) 11:50:43 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:43 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000029fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000006504040001000000040400001c007d60b7030000000000006a0a00fe20000000850000000d000000b700000000000000950000fe00000000c9be17044171e1d3d7b1d6d0ff03000000000000c668a4b63e069efb297975738f538e31ec24925095a163b9d4e76be266e31a80212240baa44e080addde6033170000007b3f912f6906a6e2313091df61258a1fda45991fbdce6793c8a4785ee8b60092659b941bbd750045404b04bf97c0fea679c032b3203c6cd8bac9626bcc85e961509735a046171f5bebfa80dbdc0200379e731d3a8d8fea894a4ee293001f6ce7d5b40bf2a7399c23f84c6fa5f9be8173d05afe002c0e7821d406c967379e7521392d24d6c8034e2dc7c053498a9f413af569575de3b5c85546945e9bce678ee9a09806474947310bae538450a676d71c011705060000000000000000a3d39322942df819eea101000000000000009fc8f4b9276e9dc330c9cbac5d708570a14546aa89e13c65896d24684ee25f853b0858122c3d1de564d84638c7f6ec477f9ffece0ff3d9f4cf21c119b95eba4c925c80c3c33c81a68055fc8b3af4f32d16cf290f90d80f1da0db08da80f7a88b63885551371ee1febf833a4103e2f68d1aa3a2138953c0c41ead2824f4ae3260007396d42e0168a85fc6448b3f2eaab716abe53aa6c1ba9ace891ef38f9a00000000000000000000000000000000000200481ac0f54b7a913f3465c333429c19f5d01166a1c4edc2abdeb54e25bf47085689e16b524053ac75f36b5b6e7ddf0aa170ec19aee6ccb06c4708e4ec97194d713a36d9bbed4e832541318a8c13c55c40d100e58fb845049af5b02f8ba8fc1345d6442b96c2d17bd048a2ed0841470c424324db952a44b515d47945babf404c35fd608046f1640f05007842f01d3428843635d4f3e98399b396ea30fc8f9a911a64798a4cf7b63b48349cd630881342c6533f5a9ac85b040000000000000000090000000000009380513278d4701e78251bbc45b73f8d5665d369df748c068b23e3fe886aee0668e58e7158040e0156e332b122288e40fecb03cf4880dc047af0c3a73bab43736a168c57df0f88c1d2dc8d27ad24dbfce44c6a9082b178a2c0527b143c2cb1cd9ed565d1ad68953e031c168ec6280c2eee3550d34d34f66c40252798606cfb2a6d424b78933a9191"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x1f000000}, 0x28) 11:50:43 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x2000000, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) 11:50:43 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) creat(0x0, 0x0) [ 276.034904][ T5125] FAT-fs (loop4): bogus number of reserved sectors [ 276.041833][ T5125] FAT-fs (loop4): Can't find a valid FAT filesystem 11:50:43 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x40000000}, 0x28) [ 276.096223][ T5134] tipc: Started in network mode [ 276.105314][ T5134] tipc: Own node identity , cluster identity 4711 [ 276.119087][ T5134] tipc: Failed to obtain node identity [ 276.133983][ T5134] tipc: Enabling of bearer rejected, failed to enable media 11:50:43 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) creat(0x0, 0x0) 11:50:43 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x60000000}, 0x28) [ 276.143939][ T5142] FAT-fs (loop4): bogus number of reserved sectors 11:50:43 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x3000000, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) 11:50:43 executing program 1: r0 = creat(0x0, 0x0) fallocate(r0, 0x24, 0x2, 0x78) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1800003, 0x110, r1, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = openat(r2, &(0x7f00000002c0)='./file0\x00', 0x2001, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r4) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:43 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x1, 0x4c, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) 11:50:43 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000029fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000006504040001000000040400001c007d60b7030000000000006a0a00fe20000000850000000d000000b700000000000000950000fe00000000c9be17044171e1d3d7b1d6d0ff03000000000000c668a4b63e069efb297975738f538e31ec24925095a163b9d4e76be266e31a80212240baa44e080addde6033170000007b3f912f6906a6e2313091df61258a1fda45991fbdce6793c8a4785ee8b60092659b941bbd750045404b04bf97c0fea679c032b3203c6cd8bac9626bcc85e961509735a046171f5bebfa80dbdc0200379e731d3a8d8fea894a4ee293001f6ce7d5b40bf2a7399c23f84c6fa5f9be8173d05afe002c0e7821d406c967379e7521392d24d6c8034e2dc7c053498a9f413af569575de3b5c85546945e9bce678ee9a09806474947310bae538450a676d71c011705060000000000000000a3d39322942df819eea101000000000000009fc8f4b9276e9dc330c9cbac5d708570a14546aa89e13c65896d24684ee25f853b0858122c3d1de564d84638c7f6ec477f9ffece0ff3d9f4cf21c119b95eba4c925c80c3c33c81a68055fc8b3af4f32d16cf290f90d80f1da0db08da80f7a88b63885551371ee1febf833a4103e2f68d1aa3a2138953c0c41ead2824f4ae3260007396d42e0168a85fc6448b3f2eaab716abe53aa6c1ba9ace891ef38f9a00000000000000000000000000000000000200481ac0f54b7a913f3465c333429c19f5d01166a1c4edc2abdeb54e25bf47085689e16b524053ac75f36b5b6e7ddf0aa170ec19aee6ccb06c4708e4ec97194d713a36d9bbed4e832541318a8c13c55c40d100e58fb845049af5b02f8ba8fc1345d6442b96c2d17bd048a2ed0841470c424324db952a44b515d47945babf404c35fd608046f1640f05007842f01d3428843635d4f3e98399b396ea30fc8f9a911a64798a4cf7b63b48349cd630881342c6533f5a9ac85b040000000000000000090000000000009380513278d4701e78251bbc45b73f8d5665d369df748c068b23e3fe886aee0668e58e7158040e0156e332b122288e40fecb03cf4880dc047af0c3a73bab43736a168c57df0f88c1d2dc8d27ad24dbfce44c6a9082b178a2c0527b143c2cb1cd9ed565d1ad68953e031c168ec6280c2eee3550d34d34f66c40252798606cfb2a6d424b78933a9191"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0xc3020000}, 0x28) 11:50:43 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x4000000, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) [ 276.193858][ T5142] FAT-fs (loop4): Can't find a valid FAT filesystem 11:50:43 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:43 executing program 2 (fault-call:7 fault-nth:0): mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:43 executing program 1: creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f00006fc000/0x6000)=nil, 0x6000, 0x4, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3={0x3000000, [{0x0, 0xfffffffc}, {0xc5d0}]}, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 276.244220][ T5161] tipc: Started in network mode [ 276.263171][ T5161] tipc: Own node identity , cluster identity 4711 11:50:43 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000029fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000006504040001000000040400001c007d60b7030000000000006a0a00fe20000000850000000d000000b700000000000000950000fe00000000c9be17044171e1d3d7b1d6d0ff03000000000000c668a4b63e069efb297975738f538e31ec24925095a163b9d4e76be266e31a80212240baa44e080addde6033170000007b3f912f6906a6e2313091df61258a1fda45991fbdce6793c8a4785ee8b60092659b941bbd750045404b04bf97c0fea679c032b3203c6cd8bac9626bcc85e961509735a046171f5bebfa80dbdc0200379e731d3a8d8fea894a4ee293001f6ce7d5b40bf2a7399c23f84c6fa5f9be8173d05afe002c0e7821d406c967379e7521392d24d6c8034e2dc7c053498a9f413af569575de3b5c85546945e9bce678ee9a09806474947310bae538450a676d71c011705060000000000000000a3d39322942df819eea101000000000000009fc8f4b9276e9dc330c9cbac5d708570a14546aa89e13c65896d24684ee25f853b0858122c3d1de564d84638c7f6ec477f9ffece0ff3d9f4cf21c119b95eba4c925c80c3c33c81a68055fc8b3af4f32d16cf290f90d80f1da0db08da80f7a88b63885551371ee1febf833a4103e2f68d1aa3a2138953c0c41ead2824f4ae3260007396d42e0168a85fc6448b3f2eaab716abe53aa6c1ba9ace891ef38f9a00000000000000000000000000000000000200481ac0f54b7a913f3465c333429c19f5d01166a1c4edc2abdeb54e25bf47085689e16b524053ac75f36b5b6e7ddf0aa170ec19aee6ccb06c4708e4ec97194d713a36d9bbed4e832541318a8c13c55c40d100e58fb845049af5b02f8ba8fc1345d6442b96c2d17bd048a2ed0841470c424324db952a44b515d47945babf404c35fd608046f1640f05007842f01d3428843635d4f3e98399b396ea30fc8f9a911a64798a4cf7b63b48349cd630881342c6533f5a9ac85b040000000000000000090000000000009380513278d4701e78251bbc45b73f8d5665d369df748c068b23e3fe886aee0668e58e7158040e0156e332b122288e40fecb03cf4880dc047af0c3a73bab43736a168c57df0f88c1d2dc8d27ad24dbfce44c6a9082b178a2c0527b143c2cb1cd9ed565d1ad68953e031c168ec6280c2eee3550d34d34f66c40252798606cfb2a6d424b78933a9191"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0xfeffffff}, 0x28) 11:50:43 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{0x0}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 276.298674][ T5170] FAT-fs (loop4): bogus number of reserved sectors [ 276.299267][ T5161] tipc: Failed to obtain node identity [ 276.314019][ T5170] FAT-fs (loop4): Can't find a valid FAT filesystem [ 276.330082][ T5161] tipc: Enabling of bearer rejected, failed to enable media [ 276.338440][ T5173] FAULT_INJECTION: forcing a failure. [ 276.338440][ T5173] name failslab, interval 1, probability 0, space 0, times 0 [ 276.353613][ T5173] CPU: 0 PID: 5173 Comm: syz-executor.2 Not tainted 5.4.119-syzkaller-00545-gabedbe9da982 #0 [ 276.363771][ T5173] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 276.373921][ T5173] Call Trace: [ 276.377211][ T5173] dump_stack+0x1d8/0x24e [ 276.381531][ T5173] ? devkmsg_release+0x11c/0x11c [ 276.386465][ T5173] ? show_regs_print_info+0x12/0x12 [ 276.391675][ T5173] ? __lru_cache_add+0x1c4/0x210 [ 276.396608][ T5173] ? proc_fail_nth_read+0x1c0/0x1c0 [ 276.401843][ T5173] should_fail+0x6f6/0x860 [ 276.406275][ T5173] ? setup_fault_attr+0x3d0/0x3d0 [ 276.411288][ T5173] ? check_preemption_disabled+0x9e/0x330 [ 276.416995][ T5173] ? debug_smp_processor_id+0x20/0x20 [ 276.422376][ T5173] ? getname_flags+0xba/0x640 [ 276.427073][ T5173] should_failslab+0x5/0x20 [ 276.431578][ T5173] kmem_cache_alloc+0x36/0x290 [ 276.436335][ T5173] getname_flags+0xba/0x640 [ 276.440843][ T5173] do_sys_open+0x33e/0x7c0 [ 276.445249][ T5173] ? check_preemption_disabled+0x154/0x330 [ 276.451040][ T5173] ? file_open_root+0x450/0x450 [ 276.455881][ T5173] do_syscall_64+0xcb/0x1e0 [ 276.460394][ T5173] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 276.466299][ T5173] RIP: 0033:0x4665d9 [ 276.470181][ T5173] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 276.489946][ T5173] RSP: 002b:00007f4d08ca6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 11:50:44 executing program 2 (fault-call:7 fault-nth:1): mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:44 executing program 1: creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002b40)={0x0, 0x0, {0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000500)={r2, 0x9ca, 0x6, 0x1}) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @remote}, 0x10) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, &(0x7f0000000300)={r2, 0x2, 0x1c, 0x1}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r3) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:44 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x5000000, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) 11:50:44 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x1, 0x5f, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) [ 276.498437][ T5173] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 276.506609][ T5173] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000300 [ 276.514575][ T5173] RBP: 00007f4d08ca61d0 R08: 0000000000000000 R09: 0000000000000000 [ 276.522541][ T5173] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 276.530505][ T5173] R13: 00007ffdef579b6f R14: 00007f4d08ca6300 R15: 0000000000022000 11:50:44 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x6000000, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) 11:50:44 executing program 1: r0 = creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x90) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_EPOLL_CTL=@mod={0x1d, 0x3, 0x0, r1, &(0x7f00000000c0)={0xa0002006}, r0, 0x3, 0x0, 0x1}, 0x80) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r2) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) dup2(r2, r3) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)=@flushsa={0x11c, 0x1c, 0x24, 0x70bd25, 0x25dfdbff, {0x32}, [@lastused={0xc, 0xf, 0x7}, @algo_crypt={0xf2, 0x2, {{'ctr-des3_ede-asm\x00'}, 0x550, "c2fb46823a2b91776b545f1c581b03a35b037095e0b29fa9534942b31803f5e6c128e29bb07c8f95059a6af4de4282a8b6b56300839055dc7f4be122d55fefee58d56181f96ed74198f311213841e5ccfd1d7497c17e11829a3acf4d8b5ed417cacbe5e4ec8734be78da5befe1850f0df94d8aed53fba8161cfa5128c960d96da4804af94ee9672c03bed091366ed16240ca9d6dbac1a107c0d75c359c47652ac4fbcb8f2c9bc7459f0f"}}, @XFRMA_IF_ID={0x8}]}, 0x11c}, 0x1, 0x0, 0x0, 0x4c8c0}, 0x80) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 276.593345][ T5186] FAULT_INJECTION: forcing a failure. [ 276.593345][ T5186] name failslab, interval 1, probability 0, space 0, times 0 [ 276.621752][ T5195] tipc: Started in network mode [ 276.625964][ T5190] FAT-fs (loop4): bogus number of reserved sectors 11:50:44 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x1, 0x60, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) [ 276.643282][ T5190] FAT-fs (loop4): Can't find a valid FAT filesystem [ 276.651165][ T5195] tipc: Own node identity , cluster identity 4711 [ 276.661034][ T5186] CPU: 1 PID: 5186 Comm: syz-executor.2 Not tainted 5.4.119-syzkaller-00545-gabedbe9da982 #0 [ 276.668621][ T5195] tipc: Failed to obtain node identity [ 276.671299][ T5186] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 276.671303][ T5186] Call Trace: [ 276.671321][ T5186] dump_stack+0x1d8/0x24e [ 276.671347][ T5186] ? devkmsg_release+0x11c/0x11c [ 276.677958][ T5195] tipc: Enabling of bearer rejected, failed to enable media [ 276.686964][ T5186] ? arch_stack_walk+0xf8/0x140 [ 276.686976][ T5186] ? show_regs_print_info+0x12/0x12 [ 276.686987][ T5186] should_fail+0x6f6/0x860 [ 276.687000][ T5186] ? setup_fault_attr+0x3d0/0x3d0 [ 276.727539][ T5186] ? mntput_no_expire+0x114/0xbd0 [ 276.732577][ T5186] ? stack_trace_save+0x1f0/0x1f0 [ 276.737672][ T5186] ? __alloc_file+0x26/0x380 [ 276.742236][ T5186] should_failslab+0x5/0x20 [ 276.746722][ T5186] kmem_cache_alloc+0x36/0x290 [ 276.751453][ T5186] __alloc_file+0x26/0x380 [ 276.755923][ T5186] ? alloc_empty_file+0x49/0x1b0 [ 276.760827][ T5186] alloc_empty_file+0xa9/0x1b0 [ 276.765559][ T5186] path_openat+0x125/0x3da0 [ 276.770196][ T5186] ? arch_stack_walk+0xf8/0x140 [ 276.775048][ T5186] ? stack_trace_snprint+0x150/0x150 [ 276.780307][ T5186] ? kstrtouint_from_user+0x20f/0x2a0 [ 276.785654][ T5186] ? do_filp_open+0x450/0x450 [ 276.790302][ T5186] ? __kasan_kmalloc+0x137/0x1e0 [ 276.795216][ T5186] ? kmem_cache_alloc+0x115/0x290 [ 276.800227][ T5186] ? getname_flags+0xba/0x640 [ 276.804876][ T5186] ? do_sys_open+0x33e/0x7c0 [ 276.809437][ T5186] ? do_syscall_64+0xcb/0x1e0 [ 276.814083][ T5186] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 276.820119][ T5186] do_filp_open+0x208/0x450 [ 276.824598][ T5186] ? vfs_tmpfile+0x210/0x210 [ 276.829158][ T5186] ? _raw_spin_unlock+0x49/0x60 [ 276.833978][ T5186] ? __alloc_fd+0x4f1/0x590 [ 276.838451][ T5186] do_sys_open+0x383/0x7c0 [ 276.842838][ T5186] ? check_preemption_disabled+0x154/0x330 [ 276.848611][ T5186] ? file_open_root+0x450/0x450 [ 276.853430][ T5186] do_syscall_64+0xcb/0x1e0 [ 276.857905][ T5186] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 276.863765][ T5186] RIP: 0033:0x4665d9 [ 276.867627][ T5186] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 11:50:44 executing program 1: creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x17a) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:44 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0xfffffffe}, 0x28) 11:50:44 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x8000000, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) 11:50:44 executing program 2 (fault-call:7 fault-nth:2): mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:44 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 276.887218][ T5186] RSP: 002b:00007f4d08ca6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 276.895596][ T5186] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 276.903551][ T5186] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000300 [ 276.911491][ T5186] RBP: 00007f4d08ca61d0 R08: 0000000000000000 R09: 0000000000000000 [ 276.919431][ T5186] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 276.927374][ T5186] R13: 00007ffdef579b6f R14: 00007f4d08ca6300 R15: 0000000000022000 11:50:44 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) 11:50:44 executing program 1: creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) mmap(&(0x7f000014f000/0x3000)=nil, 0x3000, 0x2000009, 0x80010, r1, 0x893fc000) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 276.995980][ T5213] tipc: Started in network mode [ 277.009196][ T5216] FAT-fs (loop4): bogus number of reserved sectors [ 277.016433][ T5215] FAULT_INJECTION: forcing a failure. [ 277.016433][ T5215] name failslab, interval 1, probability 0, space 0, times 0 [ 277.029446][ T5213] tipc: Own node identity , cluster identity 4711 [ 277.036416][ T5216] FAT-fs (loop4): Can't find a valid FAT filesystem [ 277.043293][ T5213] tipc: Failed to obtain node identity [ 277.049328][ T5213] tipc: Enabling of bearer rejected, failed to enable media [ 277.058683][ T5215] CPU: 0 PID: 5215 Comm: syz-executor.2 Not tainted 5.4.119-syzkaller-00545-gabedbe9da982 #0 [ 277.068913][ T5215] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 277.078944][ T5215] Call Trace: [ 277.082213][ T5215] dump_stack+0x1d8/0x24e [ 277.086514][ T5215] ? devkmsg_release+0x11c/0x11c [ 277.091424][ T5215] ? show_regs_print_info+0x12/0x12 [ 277.096596][ T5215] should_fail+0x6f6/0x860 [ 277.100983][ T5215] ? setup_fault_attr+0x3d0/0x3d0 [ 277.105977][ T5215] ? security_file_alloc+0x32/0x1f0 [ 277.111160][ T5215] should_failslab+0x5/0x20 [ 277.115629][ T5215] kmem_cache_alloc+0x36/0x290 [ 277.120364][ T5215] security_file_alloc+0x32/0x1f0 [ 277.125358][ T5215] __alloc_file+0xba/0x380 [ 277.129745][ T5215] alloc_empty_file+0xa9/0x1b0 [ 277.134478][ T5215] path_openat+0x125/0x3da0 [ 277.138946][ T5215] ? arch_stack_walk+0xf8/0x140 [ 277.143768][ T5215] ? stack_trace_snprint+0x150/0x150 [ 277.149019][ T5215] ? kstrtouint_from_user+0x20f/0x2a0 [ 277.154357][ T5215] ? do_filp_open+0x450/0x450 [ 277.159001][ T5215] ? __kasan_kmalloc+0x137/0x1e0 [ 277.163907][ T5215] ? kmem_cache_alloc+0x115/0x290 [ 277.168912][ T5215] ? getname_flags+0xba/0x640 [ 277.173555][ T5215] ? do_sys_open+0x33e/0x7c0 [ 277.178115][ T5215] ? do_syscall_64+0xcb/0x1e0 [ 277.182760][ T5215] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 277.188798][ T5215] do_filp_open+0x208/0x450 [ 277.193277][ T5215] ? vfs_tmpfile+0x210/0x210 [ 277.197837][ T5215] ? _raw_spin_unlock+0x49/0x60 [ 277.202664][ T5215] ? __alloc_fd+0x4f1/0x590 [ 277.207144][ T5215] do_sys_open+0x383/0x7c0 [ 277.211529][ T5215] ? check_preemption_disabled+0x154/0x330 [ 277.217302][ T5215] ? file_open_root+0x450/0x450 [ 277.222121][ T5215] do_syscall_64+0xcb/0x1e0 [ 277.226594][ T5215] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 277.232468][ T5215] RIP: 0033:0x4665d9 [ 277.236334][ T5215] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 277.255906][ T5215] RSP: 002b:00007f4d08ca6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 277.264285][ T5215] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 277.272227][ T5215] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000300 [ 277.280170][ T5215] RBP: 00007f4d08ca61d0 R08: 0000000000000000 R09: 0000000000000000 [ 277.288125][ T5215] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 11:50:44 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000, 0x2}, 0x28) 11:50:44 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x1, 0x68, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) 11:50:44 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:44 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x9000000, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) [ 277.296085][ T5215] R13: 00007ffdef579b6f R14: 00007f4d08ca6300 R15: 0000000000022000 11:50:44 executing program 2 (fault-call:7 fault-nth:3): mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:44 executing program 1: getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)=ANY=[@ANYBLOB="400000001400210100000000000000000a00000077c117993ef50cc24c5cbb759f262aa64bab69f5432a08205faa061dc7815245c9cf6850cf885a0340734047d1ab805293be56423e7f6bb888f3e8db6ae7a6d15102026667a71c13bc6d3d80c1a8ebe747f32d0e97a48d4b28a0e8e98ae3df066f56184b5b74f03a0b26ff3239d6a7fb", @ANYRES32=r0, @ANYBLOB="1400060000000001ffffed1ae194bd5788ff00000000000000001400020000000000000000002e61140573dce8bd8e7dcd58a25bc02db0fd"], 0x40}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r3, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000d80)={&(0x7f0000000bc0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000d40)={&(0x7f0000000cc0)=@RTM_NEWMDB={0x58, 0x54, 0x200, 0x70bd25, 0x25dfdbff, {}, [@MDBA_SET_ENTRY={0x20, 0x1, {r0, 0x0, 0x2, 0x3, {@in6_addr=@local, 0x86dd}}}, @MDBA_SET_ENTRY={0x20, 0x1, {0x0, 0x1, 0x2, 0x3, {@ip4=@rand_addr=0x64010101}}}]}, 0x58}}, 0x1) r4 = creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) preadv(r4, &(0x7f0000000240)=[{&(0x7f0000000080)=""/9, 0x9}, {&(0x7f0000000300)=""/210, 0xd2}, {&(0x7f0000000400)=""/162, 0xa2}, {&(0x7f00000004c0)=""/141, 0x8d}, {&(0x7f00000000c0)=""/59, 0x3b}, {&(0x7f0000000580)=""/228, 0xe4}], 0x6, 0x8, 0x5) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r5, 0x0) preadv(r5, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r6 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r6) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:45 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000, 0x4}, 0x28) [ 277.362271][ T5236] tipc: Started in network mode [ 277.372396][ T5236] tipc: Own node identity , cluster identity 4711 [ 277.393374][ T5236] tipc: Failed to obtain node identity [ 277.402238][ T5236] tipc: Enabling of bearer rejected, failed to enable media 11:50:45 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x1, 0x6c, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) 11:50:45 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0xa000000, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) 11:50:45 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000, 0x8}, 0x28) [ 277.436340][ T5244] FAT-fs (loop4): bogus number of reserved sectors [ 277.453844][ T5244] FAT-fs (loop4): Can't find a valid FAT filesystem 11:50:45 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:45 executing program 1: r0 = creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r2) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3={0x3000000, [{0x0, 0xfffffffc}, {0x1}]}, 0x18, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000), 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000002000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r3, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r3, &(0x7f0000004340)={0x50, 0x0, r4}, 0x50) syz_fuse_handle_req(r3, &(0x7f0000000000)="9eda438838743bd4e9720bee57093515dc189a5ea685e9556c1c2c3cfc4df50d66d31a48aa312663b68d18c5826b5b55fb738208863dac0f10f423aee7a5d8ddc45ebdfeb7424bae859d7c37ecfc4b63914d5a56d91017dd22bc84f759a15969951aef9d5c88c96560896988fa18cd946cfcc3a0f1c993348377904eac32c980bdf7976ebca2b499cab63c4e841514277fc71d4620e29a92523402485de0e82896484c0ae497a4d686df23ca7b68c3fd5e624d3510d7f94838e54af877ca58a00c5a672bba11f5aa1ed1980dfef47b9973d0bf456ded5e72f1702b3dc5197fce39cba53a038d8dc0ec783ce70577107dc5e8b299e64a0b7f1191f0926bd25762370191710bab2f44e9069f55f8a3f87e4cb488a2fb3348c0bf3b3874291f83e4776b160ea73aafa3919c7c069c73c0052173a63158db8b65541d161f9c964926ad7f06bdd6cb6a32135b04e35701c2e13c49c1f75dc7a25d623378860692d172ec3f1e1f2d9dc77c015c13721efcb101c2390abb847e871132f472a37cc0163b39b1d575a5444e246a08a1afb1a696cabab29498a314429a3b9f44c43ba29f71fac1fbe0d01c3c16d22730932704bcfb0c1b7a432bc51dd3f5dd5afc3b342cbe6a6ff899039e28f9a51881b1d46fdcf31767cb6f5c5c69ab3c80615d77c4d1664fc4ec831b8cea2e752bbb7a9ce79df875b29f1e232751daf32a1a0c4ff8bd0688e2b8e2d668b8a77e20a9eb6ec2e2c23b94e507baeacbcfa31fb6e1ca3343668f43e3aa6d85e7c29bf0bb4dbdabddc92be7f4a6f5d21b19e6da17bfb6cc926e3847532fae29c7b62fb909130ec372d3c16cfe6aaf3ce2af0fe7610fde7aad61bc80d2f96b999c8ccf6d22cf903ca8ae8b879ec4a416f334982e9810c0140a18d4dc81b5edaae23e9f4abaf40ed71512aebbba5bb251545e188db789558a845a2877b14bdaeec3c738b7d730c0860531bf5517d4f0e8f95ed3571f8a35816d5116fcb8d7cbf42b7d5d5e65541508c898bb2e0fe96297d2ab7135662de39df099ebaed5871111f5346278cee5728cec512e6c0a0d65b51e3d627873195b84103341c2bc83b6c8fdd8ba17f5957413f61c69d618c9b9d0b1f08dc81921b6c662ee1da3bfa019b095e9a03c2db4d645ccb7364e895098cbf7d932c72d80663c7a1694d122f7348393079223c11d36c64a5856eae0397ab9a9d948204b74e56525a9d552dd0916de81cbb5af3c59b3d7f8f9154423ce2cb45a5bc808e24bef13212019a19545fe54ba84d01534358380192b8c7b0eda907810375bb66a578a58fec392b47991271c8367b91d710e8a176bc1a4e96f0e137d4c25fbb03eddc392f9f170dd744472b864fbbae7c93d86e682308b21b73c5652065d72cf02e1152b44024a90a3b52eb0bb3cb412e518d37a68aa4c7f46789c54ab30d3a73d0a8712fde612294cda2aa1ccf164930b9b1d17801d4fbb06e849d39bf2b5141330caa0d2618b616f1c67e1ca57080e79ed9092ba7a55e8121cfc825cd26a0199a479a7ab1b7b23d2a4dd82fa6d04ee41ca680435efc934f0451e865e8632ac2f1115f4cdd33b0fccb7a2326127faf20cba37c828613dba5a98f4e1ad25eb6b91078cf73d873df9ef91531476f64b83559ff7ccdc4c070d478b18196ea05fe8d4ea0216ee5273dfabbd04582f40f064c9781afd2cbf30901f28cd09cc934f1b2d50883778274177e3dba8af0a1b931d80ce1a6c4085780ea2195b65ecfd2953f78a5290fe560d0cd6a5e73890a5a82dc410b92a3ef2be05ec5607820fd4ca6b9c3aa258d59022fdcb21665f1ce4e8aad8fd918c43bd3c2afe3dc223ff9f48831d401c8b6996190793d1dd7551f8511b69283992398d8f9b4bd2b3398d3b8c6f3c5d8b802ca5282b70242df2b7be4b38e70c3065f8da888631375afcc05ce578089c4f783776b286b7a60d1b5e189e2742a3240c1036a953d886885422eef01413c38099b64505fd5a73488acb4e611820674c58ae74d6c64a885d4beda9bd7903bcdc71e3711e2a057c0eab2100c321050ab14c6e453c53182577ad3178603cd9afde40a701120e9a36074fd582428c74e02781318e6c65450f8f020bd22475696fe13b8c59260e53a06d16eabd135e887a0a6bbc8ad21be7661df76fec5b13844f68b8eed1a7379713738beac9f23c7a26520e19797a910cde9fb285179526889b908b7eb49bb06f70f6271fba8712c1a4269ebcf4b7d043e924e3d2c4c753fd7e547d95841e335179836f76424e728810d7f32b78256ea30c79d9238a6588426e1f2d4c0b03d5605bd826ed24f0f11326b4cf958632b86e017aa80e142db1580c44f76d9c98196f3f6852ab2bfc6a01a3553a130c2d171957f5a45c3550fbbc990ef8742a98a86b280a57b9f198ff436bc01161ada50e6f23026c3254adf2321bff7e20aa54080bbb57d8d52c6a6df6107706a2e5bc6da68f17b474c0edd39401d765086e885cf7992405f856557915603cbe8894676e996bbadbb649a5e7498b91f9bd2f697dd9ebbe4d386050258b9f4c94781e61c660651c3f1e3ae51f8c035eca365bf15d6db48ea9ce183515f4a208d010f7c23dcacbd6e225490d7e9c133525f5c9018d752b21b4897bf18b64b6a9936f538a0a8958fc934440aeeaad2b68ac844d76f0900a6c95bd0b353d85d4fb62eb88360112237fd8c636a80e3130b21d66ae8ec58a4b76cba0602f96da919f7e84fd37e3ec2379f58e389a39c78d2482e03c379e3c4649ad63a76e3707ecff07d2fcb0c9dfc524cab49e69a09c92e4f88714335cb57d3f6184d07bef9657280fb5c9fd2d8f940f7ac6c5407e3077aa2e4ba8e217e0ee19e302d6d90e3be05a86dade35d2e454e511afb5cf5936f1d11f2fa6be6ceaa817dbdc7a6aabf2fad8ff3efa8382a25099f0c5989d2ad56ae0f4968b2cfcfc67b4f1c161c75900b4848f59a3c0376dfcb7997bf28e9e85d6dd942a360516de38e1c1a038a796f9a77ff2b0c7e5e8f4932391a0e58e76dacc6f9764178a211dfde3e75d367d2911ff398126ffdf83cf2fbdf1ad5232bed9155f7a168638a572094a9e934d4969b358cf6e121d7fd2aeae2f499068b42c152f0e3403a230885d6f92f038ddaa23499f804ffb06abdbabb51f6c38c92fb1a6271a4b13d6d11125b8ec12efa5907dc65062797fb9cca15e2f254e76b182d3fcdb4e96ac4de36d6df7e7bba5c32f422286b1be3b79bffb6fd693761952d195a84ad9ceb07287a0fbefab9e0347b513c5f60233ccd4b52d90ec144a2f896d9dc7f279f8aa93038f3efa286e1c3006933a4d7183d952f8d28b141b28b2af355b5bd8198dfde1ffb8d09202aff0d16ca3fec194662892a49f829813970a4520f1228aa03d211a45bed3b2e05bf1f10b1a152761e7b6c6ddea863a3c02224256092c70ca70dc185c4c385dd98b09e2682661e1e66f71d9c4037048eb70e8a1cbe57de87ec43713abf5fdcf63b9c482f318e3bec37e878dadbae15a02d731e6c8574eb14c059d72f73be5174add786d06b585a28a06d349d8e434a491b34897b3c1ad786ec8280d7f57edd4fbc6aea5485d659b59d393e331cf91e6ed76f340fcf7cf460892fa7318fc42b883f61d888ad982a751accb613c66661fba5f3d6de751a6a9ef8a4700316aaad04e991aab7903f4ef012ec2a8c092234e74ef335daf360ae47bbd2bbc6ad8c1a4f81efe8bbd703cb55ef36b32b4e30cb5a3b165c02ba295d0e1c40ce6ff8f479a74f01275f113ebfa8ade37a59ce70e6ca2a6f48f1be085f61bf772e2c2da523a2cfe63e99c57bdb1ff23139d4fca49eff7547e9880eefd3f7511a677efa23b52098ba89037c48dfcda2e8c1cfb9f892161049e53f8cee55256279512aecab8c441600dae0fd957883273047cf5c66ba209f830aa2ce0cbe41ca08c0cef4aed7f4324009200661a7ce680e5a8df2d051c1d8b2f63d25d8d74d05c75c46c8f3f24d625539e63459650960498a54ec3b16225bbbf4d3930009df265839d72611f5332a904cdebada108236e4414a2909ad01ec44b9d7f75de4385ad7ca5152e890a0919b3639fd1bcbca3b737ebb8d9ae541b1271cf2166ba15830e66f3d3afd3b754a7f81ad4f0999704ae99c114907c5be4a4797f13b80564f234723a34dbe137dabfd7fa23562df679f54a6ab54def6d63deae9844f72fd73efd0413551f5c4b9ee826eb3b7faf92a59ea34a16723b4fea14d1c8815a4e2d39fc48d1dbce526a7c53f5a96d0ef6463a0cee73fd3505f5c764a264b83c4a21f80e8b61c82d24442d13da99d18dc1b2538e7a510f6093d9ef2bc5cc777d4f98411e93919eddfd69d6e20d227cb61c50f358ea227f4de941fb080c1cf6b1f6e25533768fe133dbfc3f9d29c603bed38aa3c5af5b81a706b0067b40b88f992610d04c7cc36b8f649697cd6a93fae51138161891ae75a7147780fc59af5a6e18c54f9d2a4fe7fa92314b399afba9a40d0ec24f70a2593acf8d179215e06b7a9a88224bafcb2cbf60caf5fe4ff38208a70793b5dc33cd572956260e1c86312d3ba9b3a4b2b44376f2e78c616a6c0880ac8dcbaa30b9f761d500fd03a8518dd0509157b184a2d95e0caf3ffc8ac2db6c54d80c71a1e5b9ea3bf51071e2118af204123daceeb04e4f6f31f32a4d3fbb76ee49440cabda2c121c1b99acab5b87cecc37c3f9066af34ab29d6598bbfd91047a2ac7ce3a8f3027ff5e6d743506f161087278896a98ed37122ba208b61cf54d3929555ab06b564cd5e4f46f4755a6cfa2ef2b30d29ea66f2749d4060d411fa9160c91b6f55cf071ac8222c6313df18759e2958cddfe3db4cbeb9cd39abcf5f0beaecae8437813995cb7ed0b87d42ca942ff7245ece204798d01361c5f008e0d82bdf76660515bc78f7f8f409ccf68614b2cb50f5af2615661326fd971bc57eeeade60ea906b8df1cb0dfafd318cd2c396309c329d0469ca192aa8f51d7c4227685440f073983255baf054b97b9d7be1d1470d7eabd5c09b2116b4e86b0567b7e97e088717a4fe3dbdd310a1c39136ea4d2c47492001f9885dba03bf97e7da376171d666441cdc2f999db137603d57df32b4260fa0165e82917bb1631ea314e7a7437e66fc68cef22cda8f456d6e583f6e3237e0bc79987a9103f7cf0918e26881f67ea582e1ff3a49177599d385bf6e42572a2547933aeddb826530e9adf30dd84c3a7fae5c4c26f6c6f3a9f0906decd314e2407825abef959c5416d18a92ff34e6c521a16e8a0a29937c77d4ee99b41d530a732acbe0bf5d274df9d496b47a9a624546bdcf9976cde12ec989cb2a70b33a7c8a3a77652023164695f9db30dfcf587f0cd4f73e385730bcbdd688f6dcb08ba0efbb9f579220afefa4acfea522e864fce9b1782ce9f14824d16e9d33a2609c23ba3c5a1af02549357a0dcc12e37819d778021762cf895abeac1125b744c8b8225a091e7be9ded9993cfa3ca9abb83e25c8f559009977a2ed9374a89619fae5ef6d164bb73d242004dc8428e44689b33ee3bbe88bb4962ab0a32a90e7aea044f08410752cb2d7aeaf3196648a3a99092665b478bb394b48f79b36db0efc7f50d6a5179c945f5298cfaac5e5dea715296f92abce7281d48a0c9c6b785a35ef5f1697c047ddb254fe9a8ab9f498b0c1ae09ffd01a3d8d427fee7e36c51e0e5c2fee2245fb8464626ab5c9857ebce91f7d22bf024d10c2d71021cd69268496799aa7f100411766e712aff08b731460f14f9d7356db12cf8e1c6121968dc68b1d81c086b325ca4ce6fe1f476707e08fa913144b757c6be17cf93150db29544d207f09a896f33b7335d9339215da751e7af2c6bdd19db6f521af2c8a5998dc607f97026d07111488741134c1c86eba123273d1fd5ee4b471e86f9ae9478a04c7482076ab34a1eca5c64f89e5106eed44bceec019c67c12fb4db4fdac153f4ac3b63ffeb6d30de58ec039e2dd3c181e254cd94d0a2b0b44490384cc5915b54ee1db2b6d059879bf8126c9ca976d0f7862da07ecd350930a081810a7afd72b2ad3f65b96ae9c7f91227a2b5513a559f36b90fe01be9ae5ad3ca65e2c26f358fc26b858a3633fda7ae49a5fb705220a5819b3cca41b1ccc21d7c40f5fa9c422288efa5394e4312675899d704a2aab62b8363f58fd4bc12a8bea6ffc45b4414237bf5f019321206dbba439acb5ef26641f30fdac20f964354bce94e4c9d73e137f9806deefaf6f4acaa0e76ad4fef9f6cb7fc01bbabda9612c05adbe46afcf94819e8a4b4b49ff764784fa432d47fb6d4230900043d1b4521cd6839fe8c5df4d1899fdfb13880e207cac73f0a29020bdd563bd9c2f6bcd1ec523b3e03ebf6164fc65af001830c51396f9df2d346f83a59cfc82201cf1150ea57259d579fc2ed199b3fbe42d5188c84e4354610743e5b23a265246313cc63913f17412fa00d98b379b80b96d936969572e11316bc8926cb23115186f3b2387b82c3898fa41bf16a308da62d5a3eb3609af1943fddde08a4036eb2a41b7292caad9eb082614b02a1fa255bc7abd4d0e3b4ec1801e131e68c7aa9da1a0ff10f9de87dec8fad1ad8bfa99caa49e203a7b9c33e044d4544a537471e7a452468b821959bc488c6b8cbf81e90081a26de273ad1203cc06adb6af242ab19f96c1c66b58c37e2c9309704fba63af99a8d9c5efc651afb631fe9f546b938cc3b8e526c4159e5c9f7afb29fd1d55fabf09367ce2a63a35e7a2062d1c772ed981fd77157a847f687a177cf9886ce41df8cc509302b46bc1e2ba896b1c1656a1bbfdf4cd9ac39cf8510d1c823075f16550fd044aacc8d42a56f03718f7b18475cdc3999faeb25ab3dd8a807ee04d8e5d831d08b4e309dff50330685138797e10c6362636f53f22bfc1f3d5090a5d369282d9de36bb4e2505411ccc6ea395afa1567b15a2fb4be2adeea7126b1a8e80034105e0d98bdd78e796ce1cdc06a4ae666fc0baec5c52614340ed997673e26ec47c88846c000bb7c9077337cd44f5c041fdcc64986e5e1c0f488148f0ee6f842c44c0b72e82109270341bba6e9080b70fcf930d0f10be5a36798e70111fed72727b72282ff164fc08319d74f1f57cde71b57cb397a9e753f87b97729bafba017a24cbfdee5dfe7fc296c112e93bb8fce560ca80a3afd8370baaa79ad783b51352b5440b144a47378c9ae22eda5794328e95bcca220fd07bb56915529b155c61858efe89ad36a79288e74c0e251addcfaf797432175a5562b46eff5e3aebeb74623e18beef85389383c604d8884431b07dc4bea0174aadc337ff41f558a63f16690feae47efa2a5d1318b7397e1e4ba398727d286791b71610e1d78d32800e7e113c12abf0f60b6ca4401ecd23b7aacd990633b2b017daf6bfef1b2361ece74b7dbcbb1a73d4bc1f9d2e5c9fb0b7980d25cc44d1b10c09ef5a6a05c84669294a5cadf0cd88ab449f9f0bcdd8c48590d416c5c1feaa494a2145949c2a3373df7c6014225f2745bbeb20ff294d22c0d96ca111e6926946207cab56a03162a49e68968e398f70690188ee3ca847ef421742d60b9a6ad029e8a3d607950b2bf8ad8ff297cb39acc94905635770436e134435e28205140331b5100d9f64469792fffac87bca0835cbc617446ff86a7b50418c305f32e658b32130e491e38709fd3697017ac8084cdf1ed81a28375aed092ab4e32ca88a933154dd3a9e99351acbada926b67b310c7070ac1a414a28c5abfe1f45476249a12f18ca2d981528d881ed3c5072e46a6eff3cdf37dcbc89c7f79c88a1f8d15d15beb66a0e4440c7b93e379c4e2bac1d5c8e85f1852887e2cfeb178fba1c67dc2adb0c87df8ca4444ca7f455509f492effb5001328b8cc696e2933207a2d78bbce8562ca34a248193c914406b161c8141479d891b0c6110ec1e25cad38299b489f2ec437017cadba67dcb58abd4933c95b3526f1d4747b8701a7d71e446e4b62e2941d4281faca0cf22914be5aad80f47100000000ceb24e82508fe55a92fb6db70d03d1c1ec09cfee31639341756a4630a0eaaecac7bfbddf9d30c42cbd45eb181d5bd341307ad26f496bb042e2b655c03ac3dcc587acbf50f79b5c239be9938b62d3251b199f8413b020605d5d0552cfd9c39c9132719d6d0a326b000e12fcb51bc274df79d11430060d05978cdd50583f1bca82c57dbee605e2d00fcb5414af13a596d35cb5ba62de6a28cbccc857d23547b1c7fd5ac8fbf6758d5b8451fa46d9acc00344dc2e565674b1dd3547eb8f8aa5fff99042f8d1d59e6ad2f53379211e6832fcb68f5777eb2db85b28f724f4e4ce6342cf55713ff7b0cb4f7f47dd12a6566b86709eaefae024373267ce72a89e7f3e42ab48edcccc96b5d0403fe93a927e5ccf470014f220b8257393226cd7b996f20e6a34f81206733a9fdce03b701943c1b560d3eab68c2c225cf7f7f2b56123be2bb173e9e5b37f4d3348f6b987764ad07c2acd44514ff264d7eda31e5e517a179414841ad4553d51c08f435e05f10aa82d74b97a9ba3a133e6c9175fdcd4f3dc9c16d3be1d5bbaf13240177081ac1d56681bfa988a93af09868afd608520c0bfd71d857a6661fdaf6f2e166987eb007449dd26334ae932c5003fefc0f983b9e49cbfcea325f2de16a9ae935caa46f5b3433957fb370971ed957f138f08a60fed5b84995e428e7ae7d5c22021ff016baef0e713a118344c016a99ad469313ba7f2452da0dd82e019f64aa229cf80a69b3e08ac5847f10d247179855546313232f23e055c2f74ecef14e0fdcc29a9bf0976fbb249bd5c7903183d2a53c70960a183630e7d4928daa7091a85ad987d2a4a5b8f6be6612fa72d9fbb33c67bb38eff19f2e784f94e0354cf6d35a5b2c62233c039de3734b38e97ec72bd673fef09fd56fec329818cc68cdf12cb52f7d37a8350c16e94208880bfcd3e895d7aa4489e3dd15db4a9026f0d2a46f1e89c35845dbd976a1992b87c15a0c7580e6424b8792a7bb7b933d7c5433d4133ba4dbbcf7995d6ed3feaa32f876a287feeb9cc6107778c1f83e0119d980b9e994c2a3ae3de24a103efb3cacb746b49d1ad85746b233ab4aaf0e988ec2a786bc93f32040d3bdc3008031634cdfded5ac95b2279e096243228296591e7ba53c4a127772cc4620e6b238ccad250629194533d0a669ff3366c52d64928693e0b0cbb0b8e2c6029089d4dfe2b4b6c5dcd85f1a02770611e65001e48a32a8b0431a3b9d77fa3a95be38a0436a704c05a8e0183f3214c25531a63796f679bf72885aa766468d42b2543542d7e82544efc5c5e81e6a91a0f5d4e68000cff687d63e45c9a11d4ef515050daa592c9a828ac7c0488e7cdb3d6fdaef5e9176ee68d981ea50d386d74df3b40660351736deb03bfceb721878cf9894b0302df15964242ab6b9f77f98ba1c7993735983d2b022600ab74a19e3636e1400d08ba45d3a5c2774cb06a1c358bbfc11d27efaf7ca53c2e7757c8c76da24707d91a4a5244262898d68083ff91c514d9b9b1ebaa0cb0b10254fda1b1e82b9a1a47f117b5b280ddbec1f6732d11117ef1a7a674699df87fe795d1243cb9c4527e364e2b711b6562a87fafc130ce0baf1701686639b05f0c8dc708f008b1e6ab89e8d623bb83f3d54b7bcdbdacd055ac4eccbd36bbe0af0f65a00e3d6dd985ae8851d176976cfb5816d1fc2a63d3546aecaa4e712ca6961d1f181315d553de6b53485faed0dcfcf819a1ba3badffe797377d3d1ddaed8e7a0acc0c3d277762262a139f94de49faca167b11bf04f2104a5ab9a73367a6461f7124c91a2c4229ef98e6ebde9aac283c7d029400d71293f488ba169b62c1e94689cf5b248ed4aea62b88d65bb764cfe27d5231a58486e7381df518f4ed81cb905108c54a5050a94ca0e94da20d3794bc5fab9127dc95b6404b1e27b4e28136fc27806f7be798444c33aca88ffd45b860eba0d5033839f5a092863954604f1952bd61dad23b11643fe14f3ade08116aa2c13eee701ccd13e506bd65a1060bf69579aea8c8143cd38c0891a3065f251eba0c20ab9c69ddf28e3bd6400cc203bac8de1882239ad4e1b97b0ae2f1abb7bac7c0d8ef82b97ebfb1f5577f06a3a1377b09ada4db87d342f20ab0eca4b9c206042471307511429cb57a578211f92d3647189861cad9145f5eb26ab696abe50a2a6c1b469df97da28aba4e79b586c348a430f5ea61c4be1032fa61d18581f05a07fb8707c8996e0fff1c3eda59b992687fa12483b9327e10224b20d42e8b3fc4670bf070ced602283273d6818acd1f6da567c44d3f5e1377065d43d87d889843ae48e7fa8ba1634815695b8c480ca271e6e833799c70da80fd79acc09b989667a2294de5da73f0363df9a33ad4dab8d27cf7bed0a06838672e3d07d52b6396e9b5576021d5e925abd533bf161c944795065fdd44e8462e3070c479f1c118276653488dd9b2f1a673f8cad3612ca1fab4388ec9c8f834a01a499adb7b3a9a977672f6d75b41bbdd7f91ceb7e7a88568d17bb432be9e4e96e115075bce197ef4754d2914c2c59e2d7f4c08f0dbe34d31f229428f211bf1d7e8f5c319ed4a8273cb6255eb318851ac4557b0278fac63107a54d407c42f300b843a12abd3b893b46c7efac2e388ab42b87aebe2543bd4c15f459bc50aad10ffe1c1196fb52c26e54bdaa7fbd52451f207ffb073ef4b3f71eedd7da40c89505019739e3fa733bcdc84ff4919e8fe2358129ef28291be1d6426b8bafe88463b1d3cd7273745381c7f65221898e6ad361e88b24c54ccc7ac9a830145b6dc096e2d71ef71ec4f03524cb870b724e08d223bdec2f6fdde6200217a13b5136004d455d66547f5a1793e0cad85677d49e5c558852107007c8136812cf021afaf6f7e8f59883371be46cda412dd9c6fcf187c31252ceb5758901d39cd5355ab386d9a7fe6ea46ebf277aaf809c3023211ea9aa189de4d422080ebb9fec50ffab6b95ba4ae5018accc497e79149ed6047ce561ccc10e9194cdccd5c9fb75175c8dbc9d0a916ad59288f010defbbb50d263041ab37aac0f93253bef6f898cd0825d99d27224f26181f9713b8979da64756c95e7505f25a2688960d6155c3613dcc31b6c337a6dbfc6b12cfde1db22b93bbd5e48534fb0bda8b212577a14dcf665c834b0bd24e5f624d2455fe048dbe930328d7cb632db3b0e244bb5d43390b420b15157a339487fc78976f867d3a361aafdd3f50a93c01882da7c220089a544381db22e2c86b228dc2be01820468460437588952a549d37498e529e62aa62bad1580546bcb1e9a6ed1870b7838d05d12f6e3a041e78b1bdb80894626f20889ccb3a468aa4fb24b9c87cbb28623ce59c6b3c6286db366d08004551a25fe4d8d194a2bb7c52e1c85a5fbe4cb15b171489da121bea1c469a6bb185d63213084e3a81ee54dc03a94dc5ecdda7bfaad1df68021aaf4627c9d529f13e5c81b5ee4dd228949ca16b9a61d186211d153294470907557e5e14ae665013f285fe4d3766e7b3d8ce5e2a14692072d4d8f79354bcc8db8a2a36c8bcd00", 0x2000, &(0x7f00000020c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000066c0)={0x90, 0x0, 0x0, {0x9, 0x0, 0x1, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000}}}, 0x0, 0x0, 0x0, 0x0}) sendfile(r3, r0, &(0x7f0000000080)=0x3f, 0x1ff) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 277.476983][ T5248] FAULT_INJECTION: forcing a failure. [ 277.476983][ T5248] name failslab, interval 1, probability 0, space 0, times 0 [ 277.513984][ T5261] tipc: Started in network mode [ 277.514989][ T5248] CPU: 0 PID: 5248 Comm: syz-executor.2 Not tainted 5.4.119-syzkaller-00545-gabedbe9da982 #0 [ 277.528997][ T5248] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 277.539115][ T5248] Call Trace: [ 277.542394][ T5248] dump_stack+0x1d8/0x24e [ 277.546694][ T5248] ? devkmsg_release+0x11c/0x11c [ 277.551600][ T5248] ? show_regs_print_info+0x12/0x12 [ 277.556774][ T5248] ? avc_has_perm_noaudit+0x30c/0x400 [ 277.562121][ T5248] should_fail+0x6f6/0x860 [ 277.566598][ T5248] ? setup_fault_attr+0x3d0/0x3d0 [ 277.571713][ T5248] ? selinux_inode_permission+0x445/0x690 [ 277.577403][ T5248] ? __d_alloc+0x2a/0x6a0 [ 277.581700][ T5248] should_failslab+0x5/0x20 [ 277.586184][ T5248] kmem_cache_alloc+0x36/0x290 [ 277.590917][ T5248] ? selinux_inode_permission+0x377/0x690 [ 277.596605][ T5248] ? selinux_inode_permission+0x445/0x690 [ 277.602290][ T5248] __d_alloc+0x2a/0x6a0 [ 277.606417][ T5248] d_alloc_parallel+0xf3/0x1350 [ 277.611267][ T5248] ? security_inode_permission+0xda/0x110 [ 277.616954][ T5248] ? memset+0x1f/0x40 [ 277.620905][ T5248] ? success_walk_trace+0xa1/0x3c0 [ 277.625984][ T5248] ? __rcu_read_lock+0x50/0x50 [ 277.630713][ T5248] ? check_preemption_disabled+0x9e/0x330 [ 277.636399][ T5248] ? drop_links+0x170/0x170 [ 277.640869][ T5248] ? d_hash_and_lookup+0x1e0/0x1e0 [ 277.646036][ T5248] ? __d_lookup+0x4b8/0x510 [ 277.650511][ T5248] ? down_write+0xd8/0x150 [ 277.654896][ T5248] ? down_read_killable+0x220/0x220 [ 277.660063][ T5248] ? __mnt_want_write+0x1ee/0x270 [ 277.665056][ T5248] path_openat+0xbb8/0x3da0 [ 277.669549][ T5248] ? do_filp_open+0x450/0x450 [ 277.674197][ T5248] ? do_sys_open+0x33e/0x7c0 [ 277.678771][ T5248] ? do_syscall_64+0xcb/0x1e0 [ 277.683432][ T5248] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 277.689467][ T5248] do_filp_open+0x208/0x450 [ 277.694054][ T5248] ? vfs_tmpfile+0x210/0x210 [ 277.698614][ T5248] ? _raw_spin_unlock+0x49/0x60 [ 277.703462][ T5248] ? __alloc_fd+0x4f1/0x590 [ 277.707935][ T5248] do_sys_open+0x383/0x7c0 [ 277.712329][ T5248] ? check_preemption_disabled+0x154/0x330 [ 277.718126][ T5248] ? file_open_root+0x450/0x450 [ 277.722946][ T5248] do_syscall_64+0xcb/0x1e0 [ 277.727525][ T5248] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 277.733386][ T5248] RIP: 0033:0x4665d9 [ 277.737251][ T5248] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 277.756819][ T5248] RSP: 002b:00007f4d08ca6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 277.765203][ T5248] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 11:50:45 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0xb000000, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) 11:50:45 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000, 0xf}, 0x28) [ 277.773144][ T5248] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000300 [ 277.781102][ T5248] RBP: 00007f4d08ca61d0 R08: 0000000000000000 R09: 0000000000000000 [ 277.789044][ T5248] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 277.796984][ T5248] R13: 00007ffdef579b6f R14: 00007f4d08ca6300 R15: 0000000000022000 [ 277.809695][ T5261] tipc: Own node identity , cluster identity 4711 [ 277.816743][ T5261] tipc: Failed to obtain node identity 11:50:45 executing program 2 (fault-call:7 fault-nth:4): mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:45 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x1, 0x74, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) 11:50:45 executing program 1: ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000080)={'team_slave_1\x00', 0x81}) r0 = creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) preadv(r0, &(0x7f0000000680)=[{&(0x7f0000000480)=""/164, 0xa4}, {&(0x7f0000000540)=""/47, 0x2f}, {&(0x7f0000000580)=""/228, 0xe4}, {&(0x7f0000000880)=""/4096, 0x1000}], 0x4, 0x800, 0x6) fstat(r1, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@initdev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@empty}}, 0x0) mount$overlay(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x210030, &(0x7f0000000400)={[{@metacopy_on}, {@xino_auto}], [{@euid_lt={'euid<', r4}}, {@dont_measure}, {@pcr}]}) setxattr$security_capability(&(0x7f00000007c0)='./file0/../file0\x00', 0x0, &(0x7f0000000840)=@v3={0x3000000, [{0x9000, 0x7f}, {0x8, 0x7ff}], r4}, 0x18, 0x2) mount$fuseblk(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x81}}, {@max_read={'max_read', 0x3d, 0x4}}, {}], [{@obj_type={'obj_type', 0x3d, 'security.capability\x00'}}, {@dont_appraise}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}, {@uid_gt={'uid>', 0xffffffffffffffff}}, {@uid_eq={'uid', 0x3d, r4}}, {@smackfsroot={'smackfsroot', 0x3d, 'security.capability\x00'}}]}}) close(r2) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x3, 0x3, &(0x7f00000019c0)=[{&(0x7f0000000740)="b22218166c0b7825b159e58e422deed7023dcef2b1e7f28f02748e210e3947cf03995ec646bf3dca5da9a771715f9d3ece7095437215b3b82a", 0x39, 0x6}, {&(0x7f0000001880)="49b8bfea2915de84b8dee8e8ac18693f631c3e0d4a83862d9c89ddc8fd1e09406e1c6d52d8bb54072964b673de51dc7d53de68c771df9cc9ffccad80b16122124481f7ba72c1f59a25a303ef1dc86053784d233d0373bebe5aaa", 0x5a, 0x7fffffff}, {&(0x7f0000001900)="77c6f8eab6a48910d5591d9deefc46fafca04fa0022fab8dc254e44df53108c768d9edbd3ac3e3be5d6e75d2645b2ccce83d7cab519e7961376e8f371d996fa7dabeaed0730e68da11b7884bdfba427bb08d6f69d34c626e02851d98d14dc1276b7e3ab91c8728f1ecdcad385a1b34c0638462ca85a41144504cc985a9886fffdc00dd7753fb324f42e1da95bbd026ca52ae88c4c42beb5f2c349d78b5", 0x9d, 0x3}], 0x814a0, &(0x7f0000001a40)={[{@shortname_win95}, {@shortname_lower}, {@fat=@flush}], [{@fsuuid={'fsuuid', 0x3d, {[0x32, 0x35, 0x31, 0x0, 0x64, 0x62, 0x5467942eb77d5256, 0x37], 0x2d, [0x64, 0x61, 0x66, 0x64], 0x2d, [0x63, 0x38, 0x65, 0x65], 0x2d, [0x31, 0x36, 0x65, 0xc4], 0x2d, [0x0, 0x39, 0x64, 0x31, 0x33, 0x64, 0x34, 0x33]}}}, {@fowner_eq={'fowner', 0x3d, r4}}, {@subj_role}, {@subj_role={'subj_role', 0x3d, '\\]!+\\'}}, {@fsname={'fsname', 0x3d, '!'}}, {@audit}]}) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:45 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400", 0xc}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 277.830336][ T5261] tipc: Enabling of bearer rejected, failed to enable media [ 277.890854][ T5278] tipc: Started in network mode [ 277.899443][ T5277] FAULT_INJECTION: forcing a failure. [ 277.899443][ T5277] name failslab, interval 1, probability 0, space 0, times 0 [ 277.912184][ T5277] CPU: 0 PID: 5277 Comm: syz-executor.2 Not tainted 5.4.119-syzkaller-00545-gabedbe9da982 #0 [ 277.922326][ T5277] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 277.932361][ T5277] Call Trace: [ 277.935628][ T5277] dump_stack+0x1d8/0x24e [ 277.939930][ T5277] ? devkmsg_release+0x11c/0x11c [ 277.944836][ T5277] ? show_regs_print_info+0x12/0x12 [ 277.950020][ T5277] ? stack_trace_save+0x1f0/0x1f0 [ 277.955014][ T5277] should_fail+0x6f6/0x860 [ 277.959399][ T5277] ? setup_fault_attr+0x3d0/0x3d0 [ 277.964391][ T5277] ? ebitmap_cmp+0x1b8/0x220 [ 277.968962][ T5277] ? mls_compute_context_len+0x7dd/0x810 [ 277.974560][ T5277] ? context_struct_to_string+0x43b/0x8b0 [ 277.980246][ T5277] should_failslab+0x5/0x20 [ 277.984717][ T5277] __kmalloc+0x5f/0x2f0 [ 277.988838][ T5277] context_struct_to_string+0x43b/0x8b0 [ 277.994352][ T5277] ? security_bounded_transition+0x560/0x560 [ 278.000296][ T5277] ? symhash+0xe0/0xe0 [ 278.004341][ T5277] ? hashtab_search+0x1bf/0x200 [ 278.009158][ T5277] context_add_hash+0x13f/0x270 [ 278.013982][ T5277] ? security_sid_to_context_inval+0x40/0x40 [ 278.019930][ T5277] ? mls_context_isvalid+0x98/0x380 [ 278.025096][ T5277] ? policydb_context_isvalid+0x1b6/0x400 [ 278.030780][ T5277] security_compute_sid+0x1142/0x1d00 [ 278.036121][ T5277] ? __rcu_read_lock+0x50/0x50 [ 278.040857][ T5277] ? security_transition_sid+0x90/0x90 [ 278.046283][ T5277] ? avc_denied+0x1c0/0x1c0 [ 278.050755][ T5277] ? avc_has_perm_noaudit+0x400/0x400 [ 278.056093][ T5277] security_transition_sid+0x78/0x90 [ 278.061346][ T5277] may_create+0x62b/0x960 [ 278.065641][ T5277] ? show_sid+0x250/0x250 [ 278.070027][ T5277] ? revert_creds+0x87/0xb0 [ 278.074503][ T5277] ? ovl_permission+0xd4/0x1f0 [ 278.079256][ T5277] security_inode_create+0x96/0x120 [ 278.084422][ T5277] path_openat+0x1326/0x3da0 [ 278.088986][ T5277] ? do_filp_open+0x450/0x450 [ 278.093637][ T5277] ? do_sys_open+0x33e/0x7c0 [ 278.098200][ T5277] ? do_syscall_64+0xcb/0x1e0 [ 278.102857][ T5277] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 278.108889][ T5277] do_filp_open+0x208/0x450 [ 278.113360][ T5277] ? vfs_tmpfile+0x210/0x210 [ 278.117928][ T5277] ? _raw_spin_unlock+0x49/0x60 [ 278.122755][ T5277] ? __alloc_fd+0x4f1/0x590 [ 278.127237][ T5277] do_sys_open+0x383/0x7c0 [ 278.131620][ T5277] ? check_preemption_disabled+0x154/0x330 [ 278.137393][ T5277] ? file_open_root+0x450/0x450 [ 278.142225][ T5277] do_syscall_64+0xcb/0x1e0 [ 278.146700][ T5277] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 278.152557][ T5277] RIP: 0033:0x4665d9 [ 278.156439][ T5277] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 278.176027][ T5277] RSP: 002b:00007f4d08ca6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 278.184424][ T5277] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 278.192385][ T5277] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000300 [ 278.200325][ T5277] RBP: 00007f4d08ca61d0 R08: 0000000000000000 R09: 0000000000000000 [ 278.208351][ T5277] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 278.216292][ T5277] R13: 00007ffdef579b6f R14: 00007f4d08ca6300 R15: 0000000000022000 11:50:45 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x10000000, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) 11:50:45 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000, 0x10}, 0x28) 11:50:45 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x1, 0x7a, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) 11:50:45 executing program 2 (fault-call:7 fault-nth:5): mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) [ 278.237972][ T5278] tipc: Own node identity , cluster identity 4711 [ 278.244201][ T5283] fuse: Bad value for 'fd' [ 278.248683][ T5278] tipc: Failed to obtain node identity [ 278.252599][ T5284] FAT-fs (loop4): bogus number of reserved sectors [ 278.257699][ T5278] tipc: Enabling of bearer rejected, failed to enable media [ 278.262017][ T5284] FAT-fs (loop4): Can't find a valid FAT filesystem 11:50:45 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x11000000, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) [ 278.308290][ T5283] fuse: Bad value for 'fd' 11:50:45 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400", 0xc}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 278.356832][ T5301] tipc: Started in network mode [ 278.362452][ T5301] tipc: Own node identity , cluster identity 4711 [ 278.373828][ T5301] tipc: Failed to obtain node identity [ 278.390580][ T5306] FAULT_INJECTION: forcing a failure. [ 278.390580][ T5306] name failslab, interval 1, probability 0, space 0, times 0 [ 278.392733][ T5301] tipc: Enabling of bearer rejected, failed to enable media [ 278.404838][ T5306] CPU: 0 PID: 5306 Comm: syz-executor.2 Not tainted 5.4.119-syzkaller-00545-gabedbe9da982 #0 [ 278.421932][ T5306] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 278.432067][ T5306] Call Trace: [ 278.435341][ T5306] dump_stack+0x1d8/0x24e [ 278.439730][ T5306] ? devkmsg_release+0x11c/0x11c [ 278.444655][ T5306] ? show_regs_print_info+0x12/0x12 [ 278.449822][ T5306] ? check_preemption_disabled+0x9e/0x330 [ 278.455509][ T5306] ? stack_trace_save+0x120/0x1f0 [ 278.460501][ T5306] should_fail+0x6f6/0x860 [ 278.464886][ T5306] ? setup_fault_attr+0x3d0/0x3d0 [ 278.469887][ T5306] ? __rcu_read_lock+0x50/0x50 [ 278.474621][ T5306] ? __d_alloc+0x2a/0x6a0 [ 278.478935][ T5306] should_failslab+0x5/0x20 [ 278.483497][ T5306] kmem_cache_alloc+0x36/0x290 [ 278.488242][ T5306] __d_alloc+0x2a/0x6a0 [ 278.492366][ T5306] d_alloc_parallel+0xf3/0x1350 [ 278.497187][ T5306] ? avc_has_perm_noaudit+0x30c/0x400 [ 278.502525][ T5306] ? avc_denied+0x1c0/0x1c0 [ 278.506995][ T5306] ? d_hash_and_lookup+0x1e0/0x1e0 [ 278.512073][ T5306] ? from_kgid+0x206/0x350 [ 278.516478][ T5306] ? __rcu_read_lock+0x50/0x50 [ 278.521210][ T5306] ? selinux_inode_permission+0x445/0x690 [ 278.526909][ T5306] __lookup_slow+0x14f/0x450 [ 278.531491][ T5306] ? lookup_one_len+0x2c0/0x2c0 [ 278.536335][ T5306] ? generic_permission+0x130/0x490 [ 278.541499][ T5306] lookup_one_len_unlocked+0x13b/0x250 [ 278.546923][ T5306] ? __lookup_slow+0x450/0x450 [ 278.551653][ T5306] ? memset+0x1f/0x40 [ 278.555600][ T5306] ovl_lookup_single+0x60/0x830 [ 278.560506][ T5306] ovl_lookup_layer+0x422/0x510 [ 278.565323][ T5306] ? ovl_lookup+0x20a0/0x20a0 [ 278.569981][ T5306] ovl_lookup+0x4df/0x20a0 [ 278.574372][ T5306] ? avc_has_perm+0xd2/0x270 [ 278.578940][ T5306] ? avc_has_perm_noaudit+0x400/0x400 [ 278.584282][ T5306] ? ovl_path_next+0x270/0x270 [ 278.589027][ T5306] ? may_create+0x6f4/0x960 [ 278.593511][ T5306] ? revert_creds+0x87/0xb0 [ 278.597993][ T5306] ? ovl_permission+0xd4/0x1f0 [ 278.602726][ T5306] ? security_inode_create+0xdd/0x120 [ 278.608066][ T5306] path_openat+0x1734/0x3da0 [ 278.612635][ T5306] ? do_filp_open+0x450/0x450 [ 278.617337][ T5306] ? do_sys_open+0x33e/0x7c0 [ 278.621924][ T5306] ? do_syscall_64+0xcb/0x1e0 [ 278.626657][ T5306] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 278.632691][ T5306] do_filp_open+0x208/0x450 [ 278.637218][ T5306] ? vfs_tmpfile+0x210/0x210 [ 278.641778][ T5306] ? _raw_spin_unlock+0x49/0x60 [ 278.646610][ T5306] ? __alloc_fd+0x4f1/0x590 [ 278.651082][ T5306] do_sys_open+0x383/0x7c0 [ 278.655464][ T5306] ? check_preemption_disabled+0x154/0x330 [ 278.661257][ T5306] ? file_open_root+0x450/0x450 [ 278.666082][ T5306] do_syscall_64+0xcb/0x1e0 [ 278.670590][ T5306] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 278.676452][ T5306] RIP: 0033:0x4665d9 [ 278.680321][ T5306] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 278.699988][ T5306] RSP: 002b:00007f4d08ca6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 11:50:46 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000029fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000006504040001000000040400001c007d60b7030000000000006a0a00fe20000000850000000d000000b700000000000000950000fe00000000c9be17044171e1d3d7b1d6d0ff03000000000000c668a4b63e069efb297975738f538e31ec24925095a163b9d4e76be266e31a80212240baa44e080addde6033170000007b3f912f6906a6e2313091df61258a1fda45991fbdce6793c8a4785ee8b60092659b941bbd750045404b04bf97c0fea679c032b3203c6cd8bac9626bcc85e961509735a046171f5bebfa80dbdc0200379e731d3a8d8fea894a4ee293001f6ce7d5b40bf2a7399c23f84c6fa5f9be8173d05afe002c0e7821d406c967379e7521392d24d6c8034e2dc7c053498a9f413af569575de3b5c85546945e9bce678ee9a09806474947310bae538450a676d71c011705060000000000000000a3d39322942df819eea101000000000000009fc8f4b9276e9dc330c9cbac5d708570a14546aa89e13c65896d24684ee25f853b0858122c3d1de564d84638c7f6ec477f9ffece0ff3d9f4cf21c119b95eba4c925c80c3c33c81a68055fc8b3af4f32d16cf290f90d80f1da0db08da80f7a88b63885551371ee1febf833a4103e2f68d1aa3a2138953c0c41ead2824f4ae3260007396d42e0168a85fc6448b3f2eaab716abe53aa6c1ba9ace891ef38f9a00000000000000000000000000000000000200481ac0f54b7a913f3465c333429c19f5d01166a1c4edc2abdeb54e25bf47085689e16b524053ac75f36b5b6e7ddf0aa170ec19aee6ccb06c4708e4ec97194d713a36d9bbed4e832541318a8c13c55c40d100e58fb845049af5b02f8ba8fc1345d6442b96c2d17bd048a2ed0841470c424324db952a44b515d47945babf404c35fd608046f1640f05007842f01d3428843635d4f3e98399b396ea30fc8f9a911a64798a4cf7b63b48349cd630881342c6533f5a9ac85b040000000000000000090000000000009380513278d4701e78251bbc45b73f8d5665d369df748c068b23e3fe886aee0668e58e7158040e0156e332b122288e40fecb03cf4880dc047af0c3a73bab43736a168c57df0f88c1d2dc8d27ad24dbfce44c6a9082b178a2c0527b143c2cb1cd9ed565d1ad68953e031c168ec6280c2eee3550d34d34f66c40252798606cfb2a6d424b78933a9191"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000, 0x60}, 0x28) 11:50:46 executing program 1: creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x15a) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:46 executing program 2 (fault-call:7 fault-nth:6): mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) [ 278.708465][ T5306] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 278.716406][ T5306] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000300 [ 278.724348][ T5306] RBP: 00007f4d08ca61d0 R08: 0000000000000000 R09: 0000000000000000 [ 278.732288][ T5306] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 278.740230][ T5306] R13: 00007ffdef579b6f R14: 00007f4d08ca6300 R15: 0000000000022000 11:50:46 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x1, 0xc5, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) 11:50:46 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x12000000, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) 11:50:46 executing program 1: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x4, 0x6004) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000), 0x10010, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYRESOCT, @ANYRESDEC=0x0, @ANYRES32=r0, @ANYRES64]) read$FUSE(r1, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r1, &(0x7f0000004340)={0x50, 0x0, r2}, 0x50) write$FUSE_IOCTL(r0, &(0x7f0000000100)={0x20, 0x0, r2, {0xfff, 0x0, 0x4aa4, 0x1}}, 0x20) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f00000000c0)={0x37, 0x9, 0x8000, 0x4, 0x0, 0x10000, 0x5, 0xc4, 0xffffffffffffffff}) creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000500)=[{&(0x7f0000000300)=""/241, 0xf1}, {&(0x7f0000000800)=""/255, 0xff}, {&(0x7f0000000240)=""/107, 0x6b}], 0x3, 0xd9f, 0x4) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) write$binfmt_script(r4, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x137) close(r4) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 278.802268][ T5314] FAT-fs (loop4): bogus number of reserved sectors [ 278.830766][ T5314] FAT-fs (loop4): Can't find a valid FAT filesystem [ 278.831211][ T5321] tipc: Started in network mode [ 278.856611][ T5321] tipc: Own node identity , cluster identity 4711 [ 278.865139][ T5325] FAULT_INJECTION: forcing a failure. [ 278.865139][ T5325] name failslab, interval 1, probability 0, space 0, times 0 [ 278.868601][ T5321] tipc: Failed to obtain node identity [ 278.879659][ T5325] CPU: 0 PID: 5325 Comm: syz-executor.2 Not tainted 5.4.119-syzkaller-00545-gabedbe9da982 #0 [ 278.884782][ T5321] tipc: Enabling of bearer rejected, failed to enable media [ 278.893583][ T5325] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 278.893586][ T5325] Call Trace: [ 278.893603][ T5325] dump_stack+0x1d8/0x24e [ 278.893613][ T5325] ? devkmsg_release+0x11c/0x11c [ 278.893621][ T5325] ? show_regs_print_info+0x12/0x12 [ 278.893631][ T5325] should_fail+0x6f6/0x860 [ 278.893639][ T5325] ? setup_fault_attr+0x3d0/0x3d0 [ 278.893650][ T5325] ? kcalloc+0x2b/0x40 [ 278.893658][ T5325] should_failslab+0x5/0x20 [ 278.893665][ T5325] __kmalloc+0x5f/0x2f0 [ 278.893674][ T5325] kcalloc+0x2b/0x40 11:50:46 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000, 0x2c3}, 0x28) 11:50:46 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400", 0xc}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:46 executing program 2 (fault-call:7 fault-nth:7): mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) [ 278.893681][ T5325] ovl_lookup+0x844/0x20a0 [ 278.893691][ T5325] ? avc_has_perm_noaudit+0x400/0x400 [ 278.893703][ T5325] ? ovl_path_next+0x270/0x270 [ 278.970270][ T5325] ? may_create+0x6f4/0x960 [ 278.970281][ T5325] ? revert_creds+0x87/0xb0 11:50:46 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x13000000, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) 11:50:46 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x1, 0x300, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) [ 278.970287][ T5325] ? ovl_permission+0xd4/0x1f0 11:50:46 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200", 0x12}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:46 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000029fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000006504040001000000040400001c007d60b7030000000000006a0a00fe20000000850000000d000000b700000000000000950000fe00000000c9be17044171e1d3d7b1d6d0ff03000000000000c668a4b63e069efb297975738f538e31ec24925095a163b9d4e76be266e31a80212240baa44e080addde6033170000007b3f912f6906a6e2313091df61258a1fda45991fbdce6793c8a4785ee8b60092659b941bbd750045404b04bf97c0fea679c032b3203c6cd8bac9626bcc85e961509735a046171f5bebfa80dbdc0200379e731d3a8d8fea894a4ee293001f6ce7d5b40bf2a7399c23f84c6fa5f9be8173d05afe002c0e7821d406c967379e7521392d24d6c8034e2dc7c053498a9f413af569575de3b5c85546945e9bce678ee9a09806474947310bae538450a676d71c011705060000000000000000a3d39322942df819eea101000000000000009fc8f4b9276e9dc330c9cbac5d708570a14546aa89e13c65896d24684ee25f853b0858122c3d1de564d84638c7f6ec477f9ffece0ff3d9f4cf21c119b95eba4c925c80c3c33c81a68055fc8b3af4f32d16cf290f90d80f1da0db08da80f7a88b63885551371ee1febf833a4103e2f68d1aa3a2138953c0c41ead2824f4ae3260007396d42e0168a85fc6448b3f2eaab716abe53aa6c1ba9ace891ef38f9a00000000000000000000000000000000000200481ac0f54b7a913f3465c333429c19f5d01166a1c4edc2abdeb54e25bf47085689e16b524053ac75f36b5b6e7ddf0aa170ec19aee6ccb06c4708e4ec97194d713a36d9bbed4e832541318a8c13c55c40d100e58fb845049af5b02f8ba8fc1345d6442b96c2d17bd048a2ed0841470c424324db952a44b515d47945babf404c35fd608046f1640f05007842f01d3428843635d4f3e98399b396ea30fc8f9a911a64798a4cf7b63b48349cd630881342c6533f5a9ac85b040000000000000000090000000000009380513278d4701e78251bbc45b73f8d5665d369df748c068b23e3fe886aee0668e58e7158040e0156e332b122288e40fecb03cf4880dc047af0c3a73bab43736a168c57df0f88c1d2dc8d27ad24dbfce44c6a9082b178a2c0527b143c2cb1cd9ed565d1ad68953e031c168ec6280c2eee3550d34d34f66c40252798606cfb2a6d424b78933a9191"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000, 0xf00}, 0x28) 11:50:46 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x14000000, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) 11:50:46 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x1, 0x500, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) 11:50:46 executing program 2 (fault-call:7 fault-nth:8): mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:46 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x15000000, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) [ 278.970294][ T5325] ? security_inode_create+0xdd/0x120 [ 278.970301][ T5325] path_openat+0x1734/0x3da0 [ 278.970313][ T5325] ? do_filp_open+0x450/0x450 [ 278.970320][ T5325] ? do_sys_open+0x33e/0x7c0 [ 278.970326][ T5325] ? do_syscall_64+0xcb/0x1e0 [ 278.970333][ T5325] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 278.970341][ T5325] do_filp_open+0x208/0x450 [ 278.970347][ T5325] ? vfs_tmpfile+0x210/0x210 [ 278.970355][ T5325] ? _raw_spin_unlock+0x49/0x60 [ 278.970363][ T5325] ? __alloc_fd+0x4f1/0x590 [ 278.970369][ T5325] do_sys_open+0x383/0x7c0 [ 278.970375][ T5325] ? check_preemption_disabled+0x154/0x330 [ 278.970381][ T5325] ? file_open_root+0x450/0x450 [ 278.970388][ T5325] do_syscall_64+0xcb/0x1e0 [ 278.970394][ T5325] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 278.970401][ T5325] RIP: 0033:0x4665d9 [ 278.970408][ T5325] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 278.970411][ T5325] RSP: 002b:00007f4d08ca6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 278.970418][ T5325] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 278.970421][ T5325] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000300 [ 278.970424][ T5325] RBP: 00007f4d08ca61d0 R08: 0000000000000000 R09: 0000000000000000 [ 278.970427][ T5325] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 278.970431][ T5325] R13: 00007ffdef579b6f R14: 00007f4d08ca6300 R15: 0000000000022000 [ 279.038245][ T5335] FAT-fs (loop4): bogus number of reserved sectors [ 279.038251][ T5335] FAT-fs (loop4): Can't find a valid FAT filesystem [ 279.061128][ T5343] tipc: Started in network mode [ 279.061137][ T5343] tipc: Own node identity , cluster identity 4711 [ 279.061140][ T5343] tipc: Failed to obtain node identity [ 279.061149][ T5343] tipc: Enabling of bearer rejected, failed to enable media [ 279.063019][ T5339] FAULT_INJECTION: forcing a failure. [ 279.063019][ T5339] name failslab, interval 1, probability 0, space 0, times 0 [ 279.063030][ T5339] CPU: 0 PID: 5339 Comm: syz-executor.2 Not tainted 5.4.119-syzkaller-00545-gabedbe9da982 #0 [ 279.063034][ T5339] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 279.063036][ T5339] Call Trace: [ 279.063050][ T5339] dump_stack+0x1d8/0x24e [ 279.063061][ T5339] ? devkmsg_release+0x11c/0x11c [ 279.063069][ T5339] ? lookup_one_len_unlocked+0xf6/0x250 [ 279.063077][ T5339] ? show_regs_print_info+0x12/0x12 [ 279.063087][ T5339] should_fail+0x6f6/0x860 [ 279.063096][ T5339] ? setup_fault_attr+0x3d0/0x3d0 [ 279.063105][ T5339] ? ovl_lookup_layer+0x422/0x510 [ 279.063112][ T5339] ? kzalloc+0x16/0x20 [ 279.063120][ T5339] should_failslab+0x5/0x20 [ 279.063144][ T5339] __kmalloc+0x5f/0x2f0 [ 279.063152][ T5339] ? ovl_lookup+0x20a0/0x20a0 [ 279.063160][ T5339] ? kcalloc+0x2b/0x40 [ 279.063166][ T5339] kzalloc+0x16/0x20 [ 279.063173][ T5339] ovl_alloc_entry+0x1a/0x70 [ 279.063181][ T5339] ovl_lookup+0x157e/0x20a0 [ 279.063195][ T5339] ? ovl_path_next+0x270/0x270 [ 279.063203][ T5339] ? may_create+0x6f4/0x960 [ 279.063215][ T5339] ? revert_creds+0x87/0xb0 [ 279.063222][ T5339] ? ovl_permission+0xd4/0x1f0 [ 279.063231][ T5339] ? security_inode_create+0xdd/0x120 [ 279.063239][ T5339] path_openat+0x1734/0x3da0 [ 279.063255][ T5339] ? do_filp_open+0x450/0x450 [ 279.063263][ T5339] ? do_sys_open+0x33e/0x7c0 [ 279.063271][ T5339] ? do_syscall_64+0xcb/0x1e0 [ 279.063278][ T5339] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 279.063290][ T5339] do_filp_open+0x208/0x450 [ 279.063297][ T5339] ? vfs_tmpfile+0x210/0x210 [ 279.063308][ T5339] ? _raw_spin_unlock+0x49/0x60 [ 279.063316][ T5339] ? __alloc_fd+0x4f1/0x590 [ 279.063326][ T5339] do_sys_open+0x383/0x7c0 [ 279.063333][ T5339] ? check_preemption_disabled+0x154/0x330 [ 279.063342][ T5339] ? file_open_root+0x450/0x450 [ 279.063351][ T5339] do_syscall_64+0xcb/0x1e0 [ 279.063359][ T5339] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 279.063366][ T5339] RIP: 0033:0x4665d9 [ 279.063373][ T5339] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 279.063378][ T5339] RSP: 002b:00007f4d08ca6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 279.063385][ T5339] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 279.063389][ T5339] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000300 [ 279.063393][ T5339] RBP: 00007f4d08ca61d0 R08: 0000000000000000 R09: 0000000000000000 [ 279.063398][ T5339] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 279.063403][ T5339] R13: 00007ffdef579b6f R14: 00007f4d08ca6300 R15: 0000000000022000 [ 279.093564][ T5347] FAT-fs (loop4): invalid media value (0x00) [ 279.093570][ T5347] FAT-fs (loop4): Can't find a valid FAT filesystem [ 279.104946][ T5354] tipc: Started in network mode [ 279.104954][ T5354] tipc: Own node identity , cluster identity 4711 [ 279.104957][ T5354] tipc: Failed to obtain node identity [ 279.104966][ T5354] tipc: Enabling of bearer rejected, failed to enable media [ 279.173516][ T5359] FAULT_INJECTION: forcing a failure. [ 279.173516][ T5359] name failslab, interval 1, probability 0, space 0, times 0 [ 279.231895][ T5329] fuse: Bad value for 'fd' [ 279.238677][ T5359] CPU: 0 PID: 5359 Comm: syz-executor.2 Not tainted 5.4.119-syzkaller-00545-gabedbe9da982 #0 [ 279.626216][ T5359] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 279.626220][ T5359] Call Trace: [ 279.626238][ T5359] dump_stack+0x1d8/0x24e [ 279.626253][ T5359] ? devkmsg_release+0x11c/0x11c 11:50:47 executing program 1: creat(0x0, 0x0) inotify_init1(0x80000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = memfd_create(&(0x7f0000000080)='security.capability\x00', 0x0) ftruncate(r1, 0x7fff) lseek(0xffffffffffffffff, 0x0, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r3) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:47 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x1, 0x52c, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) 11:50:47 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000, 0x1f00}, 0x28) 11:50:47 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200", 0x12}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 279.648827][ T5359] ? show_regs_print_info+0x12/0x12 [ 279.654030][ T5359] ? ovl_alloc_entry+0x1a/0x70 [ 279.658819][ T5359] ? path_openat+0x1734/0x3da0 [ 279.663569][ T5359] ? do_filp_open+0x208/0x450 [ 279.668235][ T5359] ? do_sys_open+0x383/0x7c0 [ 279.668988][ T5366] FAT-fs (loop4): invalid media value (0x00) [ 279.672814][ T5359] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 279.672823][ T5359] should_fail+0x6f6/0x860 [ 279.672835][ T5359] ? setup_fault_attr+0x3d0/0x3d0 [ 279.678861][ T5366] FAT-fs (loop4): Can't find a valid FAT filesystem 11:50:47 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x1, 0x564, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) [ 279.684853][ T5359] ? ovl_alloc_inode+0x1b/0x80 [ 279.684862][ T5359] should_failslab+0x5/0x20 [ 279.684875][ T5359] kmem_cache_alloc+0x36/0x290 [ 279.698582][ T5372] tipc: Started in network mode [ 279.700825][ T5359] ? ovl_free_fs+0x640/0x640 [ 279.700833][ T5359] ovl_alloc_inode+0x1b/0x80 [ 279.700846][ T5359] ? ovl_free_fs+0x640/0x640 [ 279.705646][ T5372] tipc: Own node identity , cluster identity 4711 [ 279.710056][ T5359] new_inode_pseudo+0x61/0x220 [ 279.710064][ T5359] new_inode+0x25/0x1d0 [ 279.710072][ T5359] ovl_get_inode+0x2b6/0xee0 [ 279.710086][ T5359] ovl_lookup+0x197c/0x20a0 [ 279.714866][ T5372] tipc: Failed to obtain node identity [ 279.719644][ T5359] ? ovl_path_next+0x270/0x270 [ 279.719654][ T5359] ? may_create+0x6f4/0x960 [ 279.719666][ T5359] ? ovl_permission+0xd4/0x1f0 [ 279.719674][ T5359] ? security_inode_create+0xdd/0x120 [ 279.719687][ T5359] path_openat+0x1734/0x3da0 [ 279.727360][ T5372] tipc: Enabling of bearer rejected, failed to enable media [ 279.728828][ T5359] ? do_filp_open+0x450/0x450 [ 279.728837][ T5359] ? do_sys_open+0x33e/0x7c0 [ 279.728849][ T5359] ? do_syscall_64+0xcb/0x1e0 [ 279.809450][ T5359] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 279.815489][ T5359] do_filp_open+0x208/0x450 [ 279.819964][ T5359] ? vfs_tmpfile+0x210/0x210 [ 279.824524][ T5359] ? _raw_spin_unlock+0x49/0x60 [ 279.829343][ T5359] ? __alloc_fd+0x4f1/0x590 [ 279.833814][ T5359] do_sys_open+0x383/0x7c0 [ 279.838201][ T5359] ? check_preemption_disabled+0x154/0x330 [ 279.843974][ T5359] ? file_open_root+0x450/0x450 [ 279.848796][ T5359] do_syscall_64+0xcb/0x1e0 [ 279.853269][ T5359] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 279.859150][ T5359] RIP: 0033:0x4665d9 [ 279.863013][ T5359] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 279.882582][ T5359] RSP: 002b:00007f4d08ca6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 279.890977][ T5359] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 11:50:47 executing program 1: creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) close(r0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:47 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x1f020000, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) 11:50:47 executing program 2 (fault-call:7 fault-nth:9): mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:47 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000, 0x4000}, 0x28) 11:50:47 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200", 0x12}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 279.898921][ T5359] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000300 [ 279.906864][ T5359] RBP: 00007f4d08ca61d0 R08: 0000000000000000 R09: 0000000000000000 [ 279.914805][ T5359] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 279.922742][ T5359] R13: 00007ffdef579b6f R14: 00007f4d08ca6300 R15: 0000000000022000 [ 279.938817][ T5359] overlayfs: failed to get inode (-12) 11:50:47 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x3f000000, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) [ 279.994997][ T5382] tipc: Started in network mode [ 280.003525][ T5382] tipc: Own node identity , cluster identity 4711 [ 280.020951][ T5394] FAT-fs (loop4): invalid media value (0x00) [ 280.028696][ T5395] FAULT_INJECTION: forcing a failure. [ 280.028696][ T5395] name failslab, interval 1, probability 0, space 0, times 0 11:50:47 executing program 1: creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000080), 0x2, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000), 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000002000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r1, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r1, &(0x7f0000004340)={0x50, 0x0, r2}, 0x50) syz_fuse_handle_req(r1, &(0x7f0000000000)="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", 0x2000, &(0x7f00000020c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000066c0)={0x90, 0x0, 0x0, {0x9, 0x0, 0x1, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000}}}, 0x0, 0x0, 0x0, 0x0}) mmap(&(0x7f000035d000/0x3000)=nil, 0x3000, 0x3800007, 0x4000010, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r3) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:47 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x1, 0x5a8, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) [ 280.035078][ T5394] FAT-fs (loop4): Can't find a valid FAT filesystem [ 280.043653][ T5382] tipc: Failed to obtain node identity [ 280.066759][ T5382] tipc: Enabling of bearer rejected, failed to enable media [ 280.077468][ T5395] CPU: 0 PID: 5395 Comm: syz-executor.2 Not tainted 5.4.119-syzkaller-00545-gabedbe9da982 #0 [ 280.087617][ T5395] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 280.097658][ T5395] Call Trace: [ 280.101087][ T5395] dump_stack+0x1d8/0x24e [ 280.105408][ T5395] ? devkmsg_release+0x11c/0x11c [ 280.110433][ T5395] ? show_regs_print_info+0x12/0x12 [ 280.115604][ T5395] should_fail+0x6f6/0x860 [ 280.119995][ T5395] ? setup_fault_attr+0x3d0/0x3d0 [ 280.124996][ T5395] ? security_inode_alloc+0x32/0x1d0 [ 280.130260][ T5395] should_failslab+0x5/0x20 [ 280.134865][ T5395] kmem_cache_alloc+0x36/0x290 [ 280.139746][ T5395] ? from_kuid_munged+0x3b0/0x3b0 [ 280.144874][ T5395] security_inode_alloc+0x32/0x1d0 [ 280.149979][ T5395] inode_init_always+0x387/0x810 [ 280.154890][ T5395] ? ovl_free_fs+0x640/0x640 [ 280.159453][ T5395] new_inode_pseudo+0x90/0x220 [ 280.164209][ T5395] new_inode+0x25/0x1d0 [ 280.168339][ T5395] ovl_get_inode+0x2b6/0xee0 [ 280.172901][ T5395] ovl_lookup+0x197c/0x20a0 [ 280.177378][ T5395] ? ovl_path_next+0x270/0x270 [ 280.182129][ T5395] ? may_create+0x6f4/0x960 [ 280.186608][ T5395] ? ovl_permission+0xd4/0x1f0 [ 280.191362][ T5395] ? security_inode_create+0xdd/0x120 [ 280.196719][ T5395] path_openat+0x1734/0x3da0 [ 280.201305][ T5395] ? do_filp_open+0x450/0x450 [ 280.205953][ T5395] ? do_sys_open+0x33e/0x7c0 [ 280.210510][ T5395] ? do_syscall_64+0xcb/0x1e0 [ 280.215154][ T5395] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 280.221226][ T5395] do_filp_open+0x208/0x450 [ 280.225716][ T5395] ? vfs_tmpfile+0x210/0x210 [ 280.230279][ T5395] ? _raw_spin_unlock+0x49/0x60 [ 280.235124][ T5395] ? __alloc_fd+0x4f1/0x590 [ 280.239606][ T5395] do_sys_open+0x383/0x7c0 [ 280.244004][ T5395] ? check_preemption_disabled+0x154/0x330 [ 280.249789][ T5395] ? file_open_root+0x450/0x450 [ 280.254627][ T5395] do_syscall_64+0xcb/0x1e0 [ 280.259100][ T5395] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 280.264975][ T5395] RIP: 0033:0x4665d9 [ 280.268853][ T5395] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 11:50:47 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000, 0x6000}, 0x28) 11:50:47 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x40000000, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) 11:50:47 executing program 1: r0 = creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000080)={0x8, 0x8}) r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = openat(r1, &(0x7f00000009c0)='./file0\x00', 0x40, 0x10) lseek(r2, 0x30, 0x3) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r3) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:47 executing program 2 (fault-call:7 fault-nth:10): mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) [ 280.288424][ T5395] RSP: 002b:00007f4d08ca6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 280.296809][ T5395] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 280.304778][ T5395] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000300 [ 280.312735][ T5395] RBP: 00007f4d08ca61d0 R08: 0000000000000000 R09: 0000000000000000 [ 280.320676][ T5395] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 280.328702][ T5395] R13: 00007ffdef579b6f R14: 00007f4d08ca6300 R15: 0000000000022000 [ 280.338578][ T5395] overlayfs: failed to get inode (-12) 11:50:47 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400", 0x15}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 280.383386][ T5411] tipc: Started in network mode [ 280.390121][ T5411] tipc: Own node identity , cluster identity 4711 [ 280.401801][ T5414] FAULT_INJECTION: forcing a failure. [ 280.401801][ T5414] name failslab, interval 1, probability 0, space 0, times 0 [ 280.414516][ T5411] tipc: Failed to obtain node identity [ 280.421020][ T5411] tipc: Enabling of bearer rejected, failed to enable media [ 280.431285][ T5419] FAT-fs (loop4): invalid media value (0x00) [ 280.437454][ T5419] FAT-fs (loop4): Can't find a valid FAT filesystem [ 280.444131][ T5414] CPU: 0 PID: 5414 Comm: syz-executor.2 Not tainted 5.4.119-syzkaller-00545-gabedbe9da982 #0 [ 280.454346][ T5414] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 280.464398][ T5414] Call Trace: [ 280.467669][ T5414] dump_stack+0x1d8/0x24e [ 280.471978][ T5414] ? devkmsg_release+0x11c/0x11c [ 280.476890][ T5414] ? show_regs_print_info+0x12/0x12 [ 280.482061][ T5414] should_fail+0x6f6/0x860 [ 280.486450][ T5414] ? setup_fault_attr+0x3d0/0x3d0 [ 280.491451][ T5414] ? inode_doinit_use_xattr+0x58/0x3d0 [ 280.496901][ T5414] should_failslab+0x5/0x20 [ 280.501377][ T5414] kmem_cache_alloc_trace+0x39/0x2b0 [ 280.506633][ T5414] ? asan.module_dtor+0x20/0x20 [ 280.511456][ T5414] inode_doinit_use_xattr+0x58/0x3d0 [ 280.516712][ T5414] inode_doinit_with_dentry+0x8c2/0x11d0 [ 280.522351][ T5414] ? sb_finish_set_opts+0x7b0/0x7b0 [ 280.527524][ T5414] ? slab_free_freelist_hook+0x7b/0x150 [ 280.533042][ T5414] security_d_instantiate+0xa5/0x100 [ 280.538300][ T5414] d_splice_alias+0x71/0x590 [ 280.542876][ T5414] ovl_lookup+0x1cc8/0x20a0 [ 280.547361][ T5414] ? ovl_path_next+0x270/0x270 [ 280.552090][ T5414] ? may_create+0x6f4/0x960 [ 280.556563][ T5414] ? ovl_permission+0xd4/0x1f0 [ 280.561297][ T5414] ? security_inode_create+0xdd/0x120 [ 280.566638][ T5414] path_openat+0x1734/0x3da0 [ 280.571203][ T5414] ? do_filp_open+0x450/0x450 [ 280.575863][ T5414] ? do_sys_open+0x33e/0x7c0 [ 280.580425][ T5414] ? do_syscall_64+0xcb/0x1e0 [ 280.585071][ T5414] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 280.591123][ T5414] do_filp_open+0x208/0x450 [ 280.595607][ T5414] ? vfs_tmpfile+0x210/0x210 [ 280.600176][ T5414] ? _raw_spin_unlock+0x49/0x60 [ 280.605165][ T5414] ? __alloc_fd+0x4f1/0x590 [ 280.609651][ T5414] do_sys_open+0x383/0x7c0 [ 280.614036][ T5414] ? check_preemption_disabled+0x154/0x330 [ 280.619828][ T5414] ? file_open_root+0x450/0x450 [ 280.624651][ T5414] do_syscall_64+0xcb/0x1e0 [ 280.629121][ T5414] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 280.635002][ T5414] RIP: 0033:0x4665d9 [ 280.638865][ T5414] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 280.658439][ T5414] RSP: 002b:00007f4d08ca6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 280.666818][ T5414] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 280.674763][ T5414] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000300 11:50:48 executing program 1: r0 = creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r1}, 0x8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@initdev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@empty}}, 0x0) mount$overlay(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x210030, &(0x7f0000000400)={[{@metacopy_on}, {@xino_auto}], [{@euid_lt={'euid<', r4}}, {@dont_measure}, {@pcr}]}) setxattr$security_capability(&(0x7f00000007c0)='./file0/../file0\x00', 0x0, &(0x7f0000000840)=@v3={0x3000000, [{0x9000, 0x7f}, {0x8, 0x7ff}], r4}, 0x18, 0x2) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in=@multicast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private2}}}, &(0x7f0000000240)=0xe8) syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2, &(0x7f0000000300)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@default_permissions}, {@default_permissions}, {@default_permissions}], [{@seclabel}, {@fowner_lt={'fowner<', r5}}]}}) close(r2) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:48 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000, 0xc302}, 0x28) 11:50:48 executing program 2 (fault-call:7 fault-nth:11): mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:48 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x9effffff, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) 11:50:48 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x1, 0x5dc, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) [ 280.682702][ T5414] RBP: 00007f4d08ca61d0 R08: 0000000000000000 R09: 0000000000000000 [ 280.690654][ T5414] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 280.698594][ T5414] R13: 00007ffdef579b6f R14: 00007f4d08ca6300 R15: 0000000000022000 11:50:48 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400", 0x15}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 280.743146][ T5429] fuse: Bad value for 'fd' 11:50:48 executing program 1: creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000), 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000002000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r1, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r1, &(0x7f0000004340)={0x50, 0x0, r2}, 0x50) syz_fuse_handle_req(r1, &(0x7f0000000000)="9eda438838743bd4e9720bee57093515dc189a5ea685e9556c1c2c3cfc4df50d66d31a48aa312663b68d18c5826b5b55fb738208863dac0f10f423aee7a5d8ddc45ebdfeb7424bae859d7c37ecfc4b63914d5a56d91017dd22bc84f759a15969951aef9d5c88c96560896988fa18cd946cfcc3a0f1c993348377904eac32c980bdf7976ebca2b499cab63c4e841514277fc71d4620e29a92523402485de0e82896484c0ae497a4d686df23ca7b68c3fd5e624d3510d7f94838e54af877ca58a00c5a672bba11f5aa1ed1980dfef47b9973d0bf456ded5e72f1702b3dc5197fce39cba53a038d8dc0ec783ce70577107dc5e8b299e64a0b7f1191f0926bd25762370191710bab2f44e9069f55f8a3f87e4cb488a2fb3348c0bf3b3874291f83e4776b160ea73aafa3919c7c069c73c0052173a63158db8b65541d161f9c964926ad7f06bdd6cb6a32135b04e35701c2e13c49c1f75dc7a25d623378860692d172ec3f1e1f2d9dc77c015c13721efcb101c2390abb847e871132f472a37cc0163b39b1d575a5444e246a08a1afb1a696cabab29498a314429a3b9f44c43ba29f71fac1fbe0d01c3c16d22730932704bcfb0c1b7a432bc51dd3f5dd5afc3b342cbe6a6ff899039e28f9a51881b1d46fdcf31767cb6f5c5c69ab3c80615d77c4d1664fc4ec831b8cea2e752bbb7a9ce79df875b29f1e232751daf32a1a0c4ff8bd0688e2b8e2d668b8a77e20a9eb6ec2e2c23b94e507baeacbcfa31fb6e1ca3343668f43e3aa6d85e7c29bf0bb4dbdabddc92be7f4a6f5d21b19e6da17bfb6cc926e3847532fae29c7b62fb909130ec372d3c16cfe6aaf3ce2af0fe7610fde7aad61bc80d2f96b999c8ccf6d22cf903ca8ae8b879ec4a416f334982e9810c0140a18d4dc81b5edaae23e9f4abaf40ed71512aebbba5bb251545e188db789558a845a2877b14bdaeec3c738b7d730c0860531bf5517d4f0e8f95ed3571f8a35816d5116fcb8d7cbf42b7d5d5e65541508c898bb2e0fe96297d2ab7135662de39df099ebaed5871111f5346278cee5728cec512e6c0a0d65b51e3d627873195b84103341c2bc83b6c8fdd8ba17f5957413f61c69d618c9b9d0b1f08dc81921b6c662ee1da3bfa019b095e9a03c2db4d645ccb7364e895098cbf7d932c72d80663c7a1694d122f7348393079223c11d36c64a5856eae0397ab9a9d948204b74e56525a9d552dd0916de81cbb5af3c59b3d7f8f9154423ce2cb45a5bc808e24bef13212019a19545fe54ba84d01534358380192b8c7b0eda907810375bb66a578a58fec392b47991271c8367b91d710e8a176bc1a4e96f0e137d4c25fbb03eddc392f9f170dd744472b864fbbae7c93d86e682308b21b73c5652065d72cf02e1152b44024a90a3b52eb0bb3cb412e518d37a68aa4c7f46789c54ab30d3a73d0a8712fde612294cda2aa1ccf164930b9b1d17801d4fbb06e849d39bf2b5141330caa0d2618b616f1c67e1ca57080e79ed9092ba7a55e8121cfc825cd26a0199a479a7ab1b7b23d2a4dd82fa6d04ee41ca680435efc934f0451e865e8632ac2f1115f4cdd33b0fccb7a2326127faf20cba37c828613dba5a98f4e1ad25eb6b91078cf73d873df9ef91531476f64b83559ff7ccdc4c070d478b18196ea05fe8d4ea0216ee5273dfabbd04582f40f064c9781afd2cbf30901f28cd09cc934f1b2d50883778274177e3dba8af0a1b931d80ce1a6c4085780ea2195b65ecfd2953f78a5290fe560d0cd6a5e73890a5a82dc410b92a3ef2be05ec5607820fd4ca6b9c3aa258d59022fdcb21665f1ce4e8aad8fd918c43bd3c2afe3dc223ff9f48831d401c8b6996190793d1dd7551f8511b69283992398d8f9b4bd2b3398d3b8c6f3c5d8b802ca5282b70242df2b7be4b38e70c3065f8da888631375afcc05ce578089c4f783776b286b7a60d1b5e189e2742a3240c1036a953d886885422eef01413c38099b64505fd5a73488acb4e611820674c58ae74d6c64a885d4beda9bd7903bcdc71e3711e2a057c0eab2100c321050ab14c6e453c53182577ad3178603cd9afde40a701120e9a36074fd582428c74e02781318e6c65450f8f020bd22475696fe13b8c59260e53a06d16eabd135e887a0a6bbc8ad21be7661df76fec5b13844f68b8eed1a7379713738beac9f23c7a26520e19797a910cde9fb285179526889b908b7eb49bb06f70f6271fba8712c1a4269ebcf4b7d043e924e3d2c4c753fd7e547d95841e335179836f76424e728810d7f32b78256ea30c79d9238a6588426e1f2d4c0b03d5605bd826ed24f0f11326b4cf958632b86e017aa80e142db1580c44f76d9c98196f3f6852ab2bfc6a01a3553a130c2d171957f5a45c3550fbbc990ef8742a98a86b280a57b9f198ff436bc01161ada50e6f23026c3254adf2321bff7e20aa54080bbb57d8d52c6a6df6107706a2e5bc6da68f17b474c0edd39401d765086e885cf7992405f856557915603cbe8894676e996bbadbb649a5e7498b91f9bd2f697dd9ebbe4d386050258b9f4c94781e61c660651c3f1e3ae51f8c035eca365bf15d6db48ea9ce183515f4a208d010f7c23dcacbd6e225490d7e9c133525f5c9018d752b21b4897bf18b64b6a9936f538a0a8958fc934440aeeaad2b68ac844d76f0900a6c95bd0b353d85d4fb62eb88360112237fd8c636a80e3130b21d66ae8ec58a4b76cba0602f96da919f7e84fd37e3ec2379f58e389a39c78d2482e03c379e3c4649ad63a76e3707ecff07d2fcb0c9dfc524cab49e69a09c92e4f88714335cb57d3f6184d07bef9657280fb5c9fd2d8f940f7ac6c5407e3077aa2e4ba8e217e0ee19e302d6d90e3be05a86dade35d2e454e511afb5cf5936f1d11f2fa6be6ceaa817dbdc7a6aabf2fad8ff3efa8382a25099f0c5989d2ad56ae0f4968b2cfcfc67b4f1c161c75900b4848f59a3c0376dfcb7997bf28e9e85d6dd942a360516de38e1c1a038a796f9a77ff2b0c7e5e8f4932391a0e58e76dacc6f9764178a211dfde3e75d367d2911ff398126ffdf83cf2fbdf1ad5232bed9155f7a168638a572094a9e934d4969b358cf6e121d7fd2aeae2f499068b42c152f0e3403a230885d6f92f038ddaa23499f804ffb06abdbabb51f6c38c92fb1a6271a4b13d6d11125b8ec12efa5907dc65062797fb9cca15e2f254e76b182d3fcdb4e96ac4de36d6df7e7bba5c32f422286b1be3b79bffb6fd693761952d195a84ad9ceb07287a0fbefab9e0347b513c5f60233ccd4b52d90ec144a2f896d9dc7f279f8aa93038f3efa286e1c3006933a4d7183d952f8d28b141b28b2af355b5bd8198dfde1ffb8d09202aff0d16ca3fec194662892a49f829813970a4520f1228aa03d211a45bed3b2e05bf1f10b1a152761e7b6c6ddea863a3c02224256092c70ca70dc185c4c385dd98b09e2682661e1e66f71d9c4037048eb70e8a1cbe57de87ec43713abf5fdcf63b9c482f318e3bec37e878dadbae15a02d731e6c8574eb14c059d72f73be5174add786d06b585a28a06d349d8e434a491b34897b3c1ad786ec8280d7f57edd4fbc6aea5485d659b59d393e331cf91e6ed76f340fcf7cf460892fa7318fc42b883f61d888ad982a751accb613c66661fba5f3d6de751a6a9ef8a4700316aaad04e991aab7903f4ef012ec2a8c092234e74ef335daf360ae47bbd2bbc6ad8c1a4f81efe8bbd703cb55ef36b32b4e30cb5a3b165c02ba295d0e1c40ce6ff8f479a74f01275f113ebfa8ade37a59ce70e6ca2a6f48f1be085f61bf772e2c2da523a2cfe63e99c57bdb1ff23139d4fca49eff7547e9880eefd3f7511a677efa23b52098ba89037c48dfcda2e8c1cfb9f892161049e53f8cee55256279512aecab8c441600dae0fd957883273047cf5c66ba209f830aa2ce0cbe41ca08c0cef4aed7f4324009200661a7ce680e5a8df2d051c1d8b2f63d25d8d74d05c75c46c8f3f24d625539e63459650960498a54ec3b16225bbbf4d3930009df265839d72611f5332a904cdebada108236e4414a2909ad01ec44b9d7f75de4385ad7ca5152e890a0919b3639fd1bcbca3b737ebb8d9ae541b1271cf2166ba15830e66f3d3afd3b754a7f81ad4f0999704ae99c114907c5be4a4797f13b80564f234723a34dbe137dabfd7fa23562df679f54a6ab54def6d63deae9844f72fd73efd0413551f5c4b9ee826eb3b7faf92a59ea34a16723b4fea14d1c8815a4e2d39fc48d1dbce526a7c53f5a96d0ef6463a0cee73fd3505f5c764a264b83c4a21f80e8b61c82d24442d13da99d18dc1b2538e7a510f6093d9ef2bc5cc777d4f98411e93919eddfd69d6e20d227cb61c50f358ea227f4de941fb080c1cf6b1f6e25533768fe133dbfc3f9d29c603bed38aa3c5af5b81a706b0067b40b88f992610d04c7cc36b8f649697cd6a93fae51138161891ae75a7147780fc59af5a6e18c54f9d2a4fe7fa92314b399afba9a40d0ec24f70a2593acf8d179215e06b7a9a88224bafcb2cbf60caf5fe4ff38208a70793b5dc33cd572956260e1c86312d3ba9b3a4b2b44376f2e78c616a6c0880ac8dcbaa30b9f761d500fd03a8518dd0509157b184a2d95e0caf3ffc8ac2db6c54d80c71a1e5b9ea3bf51071e2118af204123daceeb04e4f6f31f32a4d3fbb76ee49440cabda2c121c1b99acab5b87cecc37c3f9066af34ab29d6598bbfd91047a2ac7ce3a8f3027ff5e6d743506f161087278896a98ed37122ba208b61cf54d3929555ab06b564cd5e4f46f4755a6cfa2ef2b30d29ea66f2749d4060d411fa9160c91b6f55cf071ac8222c6313df18759e2958cddfe3db4cbeb9cd39abcf5f0beaecae8437813995cb7ed0b87d42ca942ff7245ece204798d01361c5f008e0d82bdf76660515bc78f7f8f409ccf68614b2cb50f5af2615661326fd971bc57eeeade60ea906b8df1cb0dfafd318cd2c396309c329d0469ca192aa8f51d7c4227685440f073983255baf054b97b9d7be1d1470d7eabd5c09b2116b4e86b0567b7e97e088717a4fe3dbdd310a1c39136ea4d2c47492001f9885dba03bf97e7da376171d666441cdc2f999db137603d57df32b4260fa0165e82917bb1631ea314e7a7437e66fc68cef22cda8f456d6e583f6e3237e0bc79987a9103f7cf0918e26881f67ea582e1ff3a49177599d385bf6e42572a2547933aeddb826530e9adf30dd84c3a7fae5c4c26f6c6f3a9f0906decd314e2407825abef959c5416d18a92ff34e6c521a16e8a0a29937c77d4ee99b41d530a732acbe0bf5d274df9d496b47a9a624546bdcf9976cde12ec989cb2a70b33a7c8a3a77652023164695f9db30dfcf587f0cd4f73e385730bcbdd688f6dcb08ba0efbb9f579220afefa4acfea522e864fce9b1782ce9f14824d16e9d33a2609c23ba3c5a1af02549357a0dcc12e37819d778021762cf895abeac1125b744c8b8225a091e7be9ded9993cfa3ca9abb83e25c8f559009977a2ed9374a89619fae5ef6d164bb73d242004dc8428e44689b33ee3bbe88bb4962ab0a32a90e7aea044f08410752cb2d7aeaf3196648a3a99092665b478bb394b48f79b36db0efc7f50d6a5179c945f5298cfaac5e5dea715296f92abce7281d48a0c9c6b785a35ef5f1697c047ddb254fe9a8ab9f498b0c1ae09ffd01a3d8d427fee7e36c51e0e5c2fee2245fb8464626ab5c9857ebce91f7d22bf024d10c2d71021cd69268496799aa7f100411766e712aff08b731460f14f9d7356db12cf8e1c6121968dc68b1d81c086b325ca4ce6fe1f476707e08fa913144b757c6be17cf93150db29544d207f09a896f33b7335d9339215da751e7af2c6bdd19db6f521af2c8a5998dc607f97026d07111488741134c1c86eba123273d1fd5ee4b471e86f9ae9478a04c7482076ab34a1eca5c64f89e5106eed44bceec019c67c12fb4db4fdac153f4ac3b63ffeb6d30de58ec039e2dd3c181e254cd94d0a2b0b44490384cc5915b54ee1db2b6d059879bf8126c9ca976d0f7862da07ecd350930a081810a7afd72b2ad3f65b96ae9c7f91227a2b5513a559f36b90fe01be9ae5ad3ca65e2c26f358fc26b858a3633fda7ae49a5fb705220a5819b3cca41b1ccc21d7c40f5fa9c422288efa5394e4312675899d704a2aab62b8363f58fd4bc12a8bea6ffc45b4414237bf5f019321206dbba439acb5ef26641f30fdac20f964354bce94e4c9d73e137f9806deefaf6f4acaa0e76ad4fef9f6cb7fc01bbabda9612c05adbe46afcf94819e8a4b4b49ff764784fa432d47fb6d4230900043d1b4521cd6839fe8c5df4d1899fdfb13880e207cac73f0a29020bdd563bd9c2f6bcd1ec523b3e03ebf6164fc65af001830c51396f9df2d346f83a59cfc82201cf1150ea57259d579fc2ed199b3fbe42d5188c84e4354610743e5b23a265246313cc63913f17412fa00d98b379b80b96d936969572e11316bc8926cb23115186f3b2387b82c3898fa41bf16a308da62d5a3eb3609af1943fddde08a4036eb2a41b7292caad9eb082614b02a1fa255bc7abd4d0e3b4ec1801e131e68c7aa9da1a0ff10f9de87dec8fad1ad8bfa99caa49e203a7b9c33e044d4544a537471e7a452468b821959bc488c6b8cbf81e90081a26de273ad1203cc06adb6af242ab19f96c1c66b58c37e2c9309704fba63af99a8d9c5efc651afb631fe9f546b938cc3b8e526c4159e5c9f7afb29fd1d55fabf09367ce2a63a35e7a2062d1c772ed981fd77157a847f687a177cf9886ce41df8cc509302b46bc1e2ba896b1c1656a1bbfdf4cd9ac39cf8510d1c823075f16550fd044aacc8d42a56f03718f7b18475cdc3999faeb25ab3dd8a807ee04d8e5d831d08b4e309dff50330685138797e10c6362636f53f22bfc1f3d5090a5d369282d9de36bb4e2505411ccc6ea395afa1567b15a2fb4be2adeea7126b1a8e80034105e0d98bdd78e796ce1cdc06a4ae666fc0baec5c52614340ed997673e26ec47c88846c000bb7c9077337cd44f5c041fdcc64986e5e1c0f488148f0ee6f842c44c0b72e82109270341bba6e9080b70fcf930d0f10be5a36798e70111fed72727b72282ff164fc08319d74f1f57cde71b57cb397a9e753f87b97729bafba017a24cbfdee5dfe7fc296c112e93bb8fce560ca80a3afd8370baaa79ad783b51352b5440b144a47378c9ae22eda5794328e95bcca220fd07bb56915529b155c61858efe89ad36a79288e74c0e251addcfaf797432175a5562b46eff5e3aebeb74623e18beef85389383c604d8884431b07dc4bea0174aadc337ff41f558a63f16690feae47efa2a5d1318b7397e1e4ba398727d286791b71610e1d78d32800e7e113c12abf0f60b6ca4401ecd23b7aacd990633b2b017daf6bfef1b2361ece74b7dbcbb1a73d4bc1f9d2e5c9fb0b7980d25cc44d1b10c09ef5a6a05c84669294a5cadf0cd88ab449f9f0bcdd8c48590d416c5c1feaa494a2145949c2a3373df7c6014225f2745bbeb20ff294d22c0d96ca111e6926946207cab56a03162a49e68968e398f70690188ee3ca847ef421742d60b9a6ad029e8a3d607950b2bf8ad8ff297cb39acc94905635770436e134435e28205140331b5100d9f64469792fffac87bca0835cbc617446ff86a7b50418c305f32e658b32130e491e38709fd3697017ac8084cdf1ed81a28375aed092ab4e32ca88a933154dd3a9e99351acbada926b67b310c7070ac1a414a28c5abfe1f45476249a12f18ca2d981528d881ed3c5072e46a6eff3cdf37dcbc89c7f79c88a1f8d15d15beb66a0e4440c7b93e379c4e2bac1d5c8e85f1852887e2cfeb178fba1c67dc2adb0c87df8ca4444ca7f455509f492effb5001328b8cc696e2933207a2d78bbce8562ca34a248193c914406b161c8141479d891b0c6110ec1e25cad38299b489f2ec437017cadba67dcb58abd4933c95b3526f1d4747b8701a7d71e446e4b62e2941d4281faca0cf22914be5aad80f47100000000ceb24e82508fe55a92fb6db70d03d1c1ec09cfee31639341756a4630a0eaaecac7bfbddf9d30c42cbd45eb181d5bd341307ad26f496bb042e2b655c03ac3dcc587acbf50f79b5c239be9938b62d3251b199f8413b020605d5d0552cfd9c39c9132719d6d0a326b000e12fcb51bc274df79d11430060d05978cdd50583f1bca82c57dbee605e2d00fcb5414af13a596d35cb5ba62de6a28cbccc857d23547b1c7fd5ac8fbf6758d5b8451fa46d9acc00344dc2e565674b1dd3547eb8f8aa5fff99042f8d1d59e6ad2f53379211e6832fcb68f5777eb2db85b28f724f4e4ce6342cf55713ff7b0cb4f7f47dd12a6566b86709eaefae024373267ce72a89e7f3e42ab48edcccc96b5d0403fe93a927e5ccf470014f220b8257393226cd7b996f20e6a34f81206733a9fdce03b701943c1b560d3eab68c2c225cf7f7f2b56123be2bb173e9e5b37f4d3348f6b987764ad07c2acd44514ff264d7eda31e5e517a179414841ad4553d51c08f435e05f10aa82d74b97a9ba3a133e6c9175fdcd4f3dc9c16d3be1d5bbaf13240177081ac1d56681bfa988a93af09868afd608520c0bfd71d857a6661fdaf6f2e166987eb007449dd26334ae932c5003fefc0f983b9e49cbfcea325f2de16a9ae935caa46f5b3433957fb370971ed957f138f08a60fed5b84995e428e7ae7d5c22021ff016baef0e713a118344c016a99ad469313ba7f2452da0dd82e019f64aa229cf80a69b3e08ac5847f10d247179855546313232f23e055c2f74ecef14e0fdcc29a9bf0976fbb249bd5c7903183d2a53c70960a183630e7d4928daa7091a85ad987d2a4a5b8f6be6612fa72d9fbb33c67bb38eff19f2e784f94e0354cf6d35a5b2c62233c039de3734b38e97ec72bd673fef09fd56fec329818cc68cdf12cb52f7d37a8350c16e94208880bfcd3e895d7aa4489e3dd15db4a9026f0d2a46f1e89c35845dbd976a1992b87c15a0c7580e6424b8792a7bb7b933d7c5433d4133ba4dbbcf7995d6ed3feaa32f876a287feeb9cc6107778c1f83e0119d980b9e994c2a3ae3de24a103efb3cacb746b49d1ad85746b233ab4aaf0e988ec2a786bc93f32040d3bdc3008031634cdfded5ac95b2279e096243228296591e7ba53c4a127772cc4620e6b238ccad250629194533d0a669ff3366c52d64928693e0b0cbb0b8e2c6029089d4dfe2b4b6c5dcd85f1a02770611e65001e48a32a8b0431a3b9d77fa3a95be38a0436a704c05a8e0183f3214c25531a63796f679bf72885aa766468d42b2543542d7e82544efc5c5e81e6a91a0f5d4e68000cff687d63e45c9a11d4ef515050daa592c9a828ac7c0488e7cdb3d6fdaef5e9176ee68d981ea50d386d74df3b40660351736deb03bfceb721878cf9894b0302df15964242ab6b9f77f98ba1c7993735983d2b022600ab74a19e3636e1400d08ba45d3a5c2774cb06a1c358bbfc11d27efaf7ca53c2e7757c8c76da24707d91a4a5244262898d68083ff91c514d9b9b1ebaa0cb0b10254fda1b1e82b9a1a47f117b5b280ddbec1f6732d11117ef1a7a674699df87fe795d1243cb9c4527e364e2b711b6562a87fafc130ce0baf1701686639b05f0c8dc708f008b1e6ab89e8d623bb83f3d54b7bcdbdacd055ac4eccbd36bbe0af0f65a00e3d6dd985ae8851d176976cfb5816d1fc2a63d3546aecaa4e712ca6961d1f181315d553de6b53485faed0dcfcf819a1ba3badffe797377d3d1ddaed8e7a0acc0c3d277762262a139f94de49faca167b11bf04f2104a5ab9a73367a6461f7124c91a2c4229ef98e6ebde9aac283c7d029400d71293f488ba169b62c1e94689cf5b248ed4aea62b88d65bb764cfe27d5231a58486e7381df518f4ed81cb905108c54a5050a94ca0e94da20d3794bc5fab9127dc95b6404b1e27b4e28136fc27806f7be798444c33aca88ffd45b860eba0d5033839f5a092863954604f1952bd61dad23b11643fe14f3ade08116aa2c13eee701ccd13e506bd65a1060bf69579aea8c8143cd38c0891a3065f251eba0c20ab9c69ddf28e3bd6400cc203bac8de1882239ad4e1b97b0ae2f1abb7bac7c0d8ef82b97ebfb1f5577f06a3a1377b09ada4db87d342f20ab0eca4b9c206042471307511429cb57a578211f92d3647189861cad9145f5eb26ab696abe50a2a6c1b469df97da28aba4e79b586c348a430f5ea61c4be1032fa61d18581f05a07fb8707c8996e0fff1c3eda59b992687fa12483b9327e10224b20d42e8b3fc4670bf070ced602283273d6818acd1f6da567c44d3f5e1377065d43d87d889843ae48e7fa8ba1634815695b8c480ca271e6e833799c70da80fd79acc09b989667a2294de5da73f0363df9a33ad4dab8d27cf7bed0a06838672e3d07d52b6396e9b5576021d5e925abd533bf161c944795065fdd44e8462e3070c479f1c118276653488dd9b2f1a673f8cad3612ca1fab4388ec9c8f834a01a499adb7b3a9a977672f6d75b41bbdd7f91ceb7e7a88568d17bb432be9e4e96e115075bce197ef4754d2914c2c59e2d7f4c08f0dbe34d31f229428f211bf1d7e8f5c319ed4a8273cb6255eb318851ac4557b0278fac63107a54d407c42f300b843a12abd3b893b46c7efac2e388ab42b87aebe2543bd4c15f459bc50aad10ffe1c1196fb52c26e54bdaa7fbd52451f207ffb073ef4b3f71eedd7da40c89505019739e3fa733bcdc84ff4919e8fe2358129ef28291be1d6426b8bafe88463b1d3cd7273745381c7f65221898e6ad361e88b24c54ccc7ac9a830145b6dc096e2d71ef71ec4f03524cb870b724e08d223bdec2f6fdde6200217a13b5136004d455d66547f5a1793e0cad85677d49e5c558852107007c8136812cf021afaf6f7e8f59883371be46cda412dd9c6fcf187c31252ceb5758901d39cd5355ab386d9a7fe6ea46ebf277aaf809c3023211ea9aa189de4d422080ebb9fec50ffab6b95ba4ae5018accc497e79149ed6047ce561ccc10e9194cdccd5c9fb75175c8dbc9d0a916ad59288f010defbbb50d263041ab37aac0f93253bef6f898cd0825d99d27224f26181f9713b8979da64756c95e7505f25a2688960d6155c3613dcc31b6c337a6dbfc6b12cfde1db22b93bbd5e48534fb0bda8b212577a14dcf665c834b0bd24e5f624d2455fe048dbe930328d7cb632db3b0e244bb5d43390b420b15157a339487fc78976f867d3a361aafdd3f50a93c01882da7c220089a544381db22e2c86b228dc2be01820468460437588952a549d37498e529e62aa62bad1580546bcb1e9a6ed1870b7838d05d12f6e3a041e78b1bdb80894626f20889ccb3a468aa4fb24b9c87cbb28623ce59c6b3c6286db366d08004551a25fe4d8d194a2bb7c52e1c85a5fbe4cb15b171489da121bea1c469a6bb185d63213084e3a81ee54dc03a94dc5ecdda7bfaad1df68021aaf4627c9d529f13e5c81b5ee4dd228949ca16b9a61d186211d153294470907557e5e14ae665013f285fe4d3766e7b3d8ce5e2a14692072d4d8f79354bcc8db8a2a36c8bcd00", 0x2000, &(0x7f00000020c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000066c0)={0x90, 0x0, 0x0, {0x9, 0x0, 0x1, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000}}}, 0x0, 0x0, 0x0, 0x0}) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x8, 0x0, 0x6, 0x7da4}) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r3) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 280.772255][ T5432] fuse: Bad value for 'fd' [ 280.788528][ T5441] FAT-fs (loop4): invalid media value (0x00) [ 280.795107][ T5441] FAT-fs (loop4): Can't find a valid FAT filesystem [ 280.798813][ T5436] FAULT_INJECTION: forcing a failure. [ 280.798813][ T5436] name failslab, interval 1, probability 0, space 0, times 0 [ 280.815994][ T5440] tipc: Started in network mode 11:50:48 executing program 1: creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x1d) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v2={0x2000000, [{0x2000000, 0x1}, {0x8003, 0x23}]}, 0x14, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:48 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0xeaffffff, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) 11:50:48 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400", 0x15}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 280.826768][ T5440] tipc: Own node identity , cluster identity 4711 [ 280.840621][ T5436] CPU: 0 PID: 5436 Comm: syz-executor.2 Not tainted 5.4.119-syzkaller-00545-gabedbe9da982 #0 [ 280.850775][ T5436] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 280.858311][ T5440] tipc: Failed to obtain node identity [ 280.860818][ T5436] Call Trace: [ 280.860835][ T5436] dump_stack+0x1d8/0x24e [ 280.860850][ T5436] ? devkmsg_release+0x11c/0x11c [ 280.878789][ T5436] ? show_regs_print_info+0x12/0x12 [ 280.880748][ T5440] tipc: Enabling of bearer rejected, failed to enable media [ 280.883993][ T5436] should_fail+0x6f6/0x860 [ 280.884002][ T5436] ? setup_fault_attr+0x3d0/0x3d0 [ 280.884014][ T5436] ? inode_doinit_use_xattr+0x58/0x3d0 [ 280.907601][ T5436] should_failslab+0x5/0x20 [ 280.912092][ T5436] kmem_cache_alloc_trace+0x39/0x2b0 [ 280.917358][ T5436] ? asan.module_dtor+0x20/0x20 [ 280.922220][ T5436] inode_doinit_use_xattr+0x58/0x3d0 11:50:48 executing program 1: creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x20) lseek(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0xe2240, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x16) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="665307ac268659daf00942e87700ae897094e7b126b097eaa769be6d05c41bd34e677d114b654b49b374a8db38f609f975ceb0364d8627dc2c6c5bd27661ecbaff4483adf064c1315d505dab3c3424c0fbaa43d6d6254129e1971ea3910554197da377b6cf2c1758aaefdf6fecdf70817d0204550dd2c9e9bc1e53eaddb957984ea039e08e8765c957b82978d61c13ef1cc456acc8ed5536372d31d0546e3224115e6e5497d95e66d87758d511e287e24aa2223cf718dc9aadef0cd3b9316557615d12a8bce9ca37ec72b3a2eea6352cf4c299be159344e21644612cece16769b2bdb17fecc2e6ee294c3ba2e3007681e571c116d824399257565505edf6c0f728e2", 0x102}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 280.927494][ T5436] inode_doinit_with_dentry+0x8c2/0x11d0 [ 280.933117][ T5436] ? sb_finish_set_opts+0x7b0/0x7b0 [ 280.938307][ T5436] ? slab_free_freelist_hook+0x7b/0x150 [ 280.943840][ T5436] security_d_instantiate+0xa5/0x100 [ 280.949113][ T5436] d_splice_alias+0x71/0x590 [ 280.953701][ T5436] ovl_lookup+0x1cc8/0x20a0 [ 280.958212][ T5436] ? ovl_path_next+0x270/0x270 [ 280.962961][ T5436] ? may_create+0x6f4/0x960 [ 280.967453][ T5436] ? ovl_permission+0xd4/0x1f0 11:50:48 executing program 1: r0 = creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000200)=@ipx, 0x23, 0x0}}], 0x1, 0x0, 0x0) close(0xffffffffffffffff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r2, &(0x7f00000017c0), 0x3da, 0x0, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_lsm={0x1d, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="6043180004000000d011feff1000000018410000ffffffff850000007b000000950000000000000095000000000000006d050c00f0ffffff18130000", @ANYRES32=r3, @ANYBLOB="000000000000000018100000", @ANYRES32=r0, @ANYBLOB="000000000000000023720000fd00000f"], &(0x7f00000000c0)='GPL\x00', 0xff, 0x4a, &(0x7f0000000380)=""/74, 0x40f00, 0xa, '\x00', 0x0, 0x1b, r1, 0x8, &(0x7f0000000180)={0x6, 0x2000000}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x3, 0x10001}, 0x10, 0xffffffffffffffff}, 0x78) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r5, 0x400c6615, &(0x7f0000000480)={0x0, @aes256, 0x0, @desc4}) close(r4) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$KVM_GET_NR_MMU_PAGES(r2, 0xae45, 0x4) [ 280.972158][ T5456] FAT-fs (loop4): invalid media value (0x00) [ 280.972205][ T5436] ? security_inode_create+0xdd/0x120 [ 280.972219][ T5436] path_openat+0x1734/0x3da0 [ 280.978323][ T5456] FAT-fs (loop4): Can't find a valid FAT filesystem [ 280.983526][ T5436] ? do_filp_open+0x450/0x450 [ 280.983534][ T5436] ? do_sys_open+0x33e/0x7c0 [ 280.983546][ T5436] ? do_syscall_64+0xcb/0x1e0 [ 281.008509][ T5436] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 281.014611][ T5436] do_filp_open+0x208/0x450 [ 281.019085][ T5436] ? vfs_tmpfile+0x210/0x210 [ 281.023662][ T5436] ? _raw_spin_unlock+0x49/0x60 [ 281.028482][ T5436] ? __alloc_fd+0x4f1/0x590 [ 281.032957][ T5436] do_sys_open+0x383/0x7c0 [ 281.037339][ T5436] ? check_preemption_disabled+0x154/0x330 [ 281.043110][ T5436] ? file_open_root+0x450/0x450 [ 281.047939][ T5436] do_syscall_64+0xcb/0x1e0 [ 281.052444][ T5436] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 281.058302][ T5436] RIP: 0033:0x4665d9 11:50:48 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000, 0x1000000}, 0x28) 11:50:48 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x1, 0x600, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) [ 281.062182][ T5436] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 281.081756][ T5436] RSP: 002b:00007f4d08ca6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 281.090134][ T5436] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 281.098072][ T5436] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000300 [ 281.106041][ T5436] RBP: 00007f4d08ca61d0 R08: 0000000000000000 R09: 0000000000000000 [ 281.114003][ T5436] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 11:50:48 executing program 2 (fault-call:7 fault-nth:12): mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:48 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0xefffffff, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) 11:50:48 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f8", 0x16}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 281.121945][ T5436] R13: 00007ffdef579b6f R14: 00007f4d08ca6300 R15: 0000000000022000 11:50:48 executing program 1: creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendfile(r1, r2, &(0x7f0000000080)=0x5, 0x40) close(r1) stat(0x0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) umount2(&(0x7f0000000100)='./file0/../file0\x00', 0x2) syz_mount_image$tmpfs(&(0x7f0000000480), &(0x7f00000004c0)='./file0/../file0\x00', 0x7, 0x2, &(0x7f0000000600)=[{0x0, 0x0, 0x10001}, {&(0x7f0000000580)="6c7666fc207ef38857", 0x9, 0x9}], 0x3001028, &(0x7f0000000700)=ANY=[@ANYBLOB='euid>', @ANYRESDEC=r3, @ANYBLOB=',dont_hash,seclabel,pcr=00000000000000000031,Kowner<', @ANYRESDEC=0xee01, @ANYBLOB=',rootcontext=staff_u,subj_type=overlay\x00']) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0), &(0x7f00000001c0)=@v3={0x3000000, [], r3}, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:48 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0xf0ffffff, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) [ 281.189064][ T5476] tipc: Started in network mode [ 281.198947][ T5478] FAT-fs (loop4): bogus number of FAT sectors [ 281.201159][ T5479] FAULT_INJECTION: forcing a failure. [ 281.201159][ T5479] name failslab, interval 1, probability 0, space 0, times 0 [ 281.206317][ T5478] FAT-fs (loop4): Can't find a valid FAT filesystem [ 281.220859][ T5476] tipc: Own node identity , cluster identity 4711 11:50:48 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000, 0x2000000}, 0x28) 11:50:48 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f8", 0x16}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 281.239998][ T5476] tipc: Failed to obtain node identity [ 281.245758][ T5479] CPU: 1 PID: 5479 Comm: syz-executor.2 Not tainted 5.4.119-syzkaller-00545-gabedbe9da982 #0 [ 281.254767][ T5476] tipc: Enabling of bearer rejected, failed to enable media [ 281.255901][ T5479] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 281.255905][ T5479] Call Trace: [ 281.255923][ T5479] dump_stack+0x1d8/0x24e [ 281.255935][ T5479] ? devkmsg_release+0x11c/0x11c [ 281.255944][ T5479] ? show_regs_print_info+0x12/0x12 [ 281.255965][ T5479] should_fail+0x6f6/0x860 [ 281.255975][ T5479] ? setup_fault_attr+0x3d0/0x3d0 [ 281.255988][ T5479] ? security_context_to_sid_core+0x148/0x710 [ 281.255997][ T5479] should_failslab+0x5/0x20 [ 281.256006][ T5479] __kmalloc_track_caller+0x5d/0x2e0 [ 281.256013][ T5479] ? security_context_to_sid_core+0xbe/0x710 [ 281.256027][ T5479] ? kmemdup_nul+0x42/0xa0 [ 281.328079][ T5479] kstrdup+0x31/0x70 [ 281.331947][ T5479] security_context_to_sid_core+0x148/0x710 [ 281.337808][ T5479] ? security_context_to_sid+0x50/0x50 [ 281.343249][ T5479] ? vfs_getxattr_alloc+0x560/0x560 [ 281.348417][ T5479] ? inode_doinit_use_xattr+0x58/0x3d0 [ 281.353854][ T5479] security_context_to_sid_default+0x3a/0x50 [ 281.359803][ T5479] inode_doinit_use_xattr+0x1a4/0x3d0 [ 281.365148][ T5479] inode_doinit_with_dentry+0x8c2/0x11d0 [ 281.370751][ T5479] ? sb_finish_set_opts+0x7b0/0x7b0 [ 281.375916][ T5479] ? slab_free_freelist_hook+0x7b/0x150 [ 281.381424][ T5479] security_d_instantiate+0xa5/0x100 [ 281.386676][ T5479] d_splice_alias+0x71/0x590 [ 281.391238][ T5479] ovl_lookup+0x1cc8/0x20a0 [ 281.395709][ T5479] ? ovl_path_next+0x270/0x270 [ 281.400454][ T5479] ? may_create+0x6f4/0x960 [ 281.404927][ T5479] ? ovl_permission+0xd4/0x1f0 [ 281.409675][ T5479] ? security_inode_create+0xdd/0x120 [ 281.415018][ T5479] path_openat+0x1734/0x3da0 [ 281.419586][ T5479] ? do_filp_open+0x450/0x450 [ 281.424229][ T5479] ? do_sys_open+0x33e/0x7c0 [ 281.428795][ T5479] ? do_syscall_64+0xcb/0x1e0 [ 281.433439][ T5479] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 281.439475][ T5479] do_filp_open+0x208/0x450 [ 281.443960][ T5479] ? vfs_tmpfile+0x210/0x210 [ 281.448515][ T5479] ? _raw_spin_unlock+0x49/0x60 [ 281.453329][ T5479] ? __alloc_fd+0x4f1/0x590 [ 281.457796][ T5479] do_sys_open+0x383/0x7c0 [ 281.462192][ T5479] ? check_preemption_disabled+0x154/0x330 [ 281.467975][ T5479] ? file_open_root+0x450/0x450 [ 281.472795][ T5479] do_syscall_64+0xcb/0x1e0 [ 281.477267][ T5479] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 281.483124][ T5479] RIP: 0033:0x4665d9 [ 281.486988][ T5479] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 281.506568][ T5479] RSP: 002b:00007f4d08ca6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 281.514948][ T5479] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 281.522886][ T5479] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000300 [ 281.530837][ T5479] RBP: 00007f4d08ca61d0 R08: 0000000000000000 R09: 0000000000000000 11:50:49 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x1, 0x613, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) 11:50:49 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0xfcffffff, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) 11:50:49 executing program 2 (fault-call:7 fault-nth:13): mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) [ 281.538777][ T5479] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 281.546739][ T5479] R13: 00007ffdef579b6f R14: 00007f4d08ca6300 R15: 0000000000022000 [ 281.556514][ T5479] SELinux: inode_doinit_use_xattr: context_to_sid(system_u:object_r:unlabeled_t:s0) returned 12 for dev=overlay ino=13975 11:50:49 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000, 0x4000000}, 0x28) 11:50:49 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x1, 0x614, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) [ 281.601145][ T5496] tipc: Started in network mode [ 281.609358][ T5496] tipc: Own node identity , cluster identity 4711 [ 281.615850][ T5496] tipc: Failed to obtain node identity [ 281.621407][ T5496] tipc: Enabling of bearer rejected, failed to enable media 11:50:49 executing program 1: r0 = creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r2) fdatasync(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000080), 0x3, 0x100) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r0, &(0x7f00000000c0)={0x2000}) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 281.656815][ T5495] FAT-fs (loop4): bogus number of FAT sectors [ 281.665182][ T5495] FAT-fs (loop4): Can't find a valid FAT filesystem [ 281.677871][ T5507] tipc: Started in network mode [ 281.682847][ T5507] tipc: Own node identity , cluster identity 4711 [ 281.698456][ T5506] FAULT_INJECTION: forcing a failure. [ 281.698456][ T5506] name failslab, interval 1, probability 0, space 0, times 0 [ 281.711099][ T5506] CPU: 1 PID: 5506 Comm: syz-executor.2 Not tainted 5.4.119-syzkaller-00545-gabedbe9da982 #0 [ 281.721222][ T5506] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 281.731258][ T5506] Call Trace: [ 281.734526][ T5506] dump_stack+0x1d8/0x24e [ 281.738839][ T5506] ? devkmsg_release+0x11c/0x11c [ 281.743745][ T5506] ? stack_trace_save+0x120/0x1f0 [ 281.748737][ T5506] ? show_regs_print_info+0x12/0x12 [ 281.753903][ T5506] ? stack_trace_snprint+0x150/0x150 [ 281.759163][ T5506] should_fail+0x6f6/0x860 [ 281.763550][ T5506] ? setup_fault_attr+0x3d0/0x3d0 [ 281.768544][ T5506] ? ebitmap_cmp+0x1b8/0x220 [ 281.773106][ T5506] ? mls_compute_context_len+0x7dd/0x810 [ 281.778706][ T5506] ? context_struct_to_string+0x43b/0x8b0 [ 281.784392][ T5506] should_failslab+0x5/0x20 [ 281.788863][ T5506] __kmalloc+0x5f/0x2f0 [ 281.792986][ T5506] context_struct_to_string+0x43b/0x8b0 [ 281.798498][ T5506] ? security_bounded_transition+0x560/0x560 [ 281.804443][ T5506] context_add_hash+0x13f/0x270 [ 281.809266][ T5506] ? mls_context_isvalid+0x98/0x380 [ 281.814430][ T5506] ? security_sid_to_context_inval+0x40/0x40 [ 281.820404][ T5506] ? string_to_context_struct+0x486/0x640 [ 281.826093][ T5506] security_context_to_sid_core+0x3fc/0x710 [ 281.831958][ T5506] ? security_context_to_sid+0x50/0x50 [ 281.837398][ T5506] ? vfs_getxattr_alloc+0x560/0x560 [ 281.842565][ T5506] ? inode_doinit_use_xattr+0x58/0x3d0 [ 281.847989][ T5506] security_context_to_sid_default+0x3a/0x50 [ 281.853934][ T5506] inode_doinit_use_xattr+0x1a4/0x3d0 [ 281.859273][ T5506] inode_doinit_with_dentry+0x8c2/0x11d0 [ 281.864883][ T5506] ? sb_finish_set_opts+0x7b0/0x7b0 [ 281.870050][ T5506] ? slab_free_freelist_hook+0x7b/0x150 [ 281.875657][ T5506] security_d_instantiate+0xa5/0x100 [ 281.880914][ T5506] d_splice_alias+0x71/0x590 [ 281.885476][ T5506] ovl_lookup+0x1cc8/0x20a0 [ 281.889953][ T5506] ? ovl_path_next+0x270/0x270 [ 281.894686][ T5506] ? may_create+0x6f4/0x960 [ 281.899161][ T5506] ? ovl_permission+0xd4/0x1f0 [ 281.903895][ T5506] ? security_inode_create+0xdd/0x120 [ 281.909253][ T5506] path_openat+0x1734/0x3da0 [ 281.913819][ T5506] ? do_filp_open+0x450/0x450 [ 281.918465][ T5506] ? do_sys_open+0x33e/0x7c0 [ 281.923022][ T5506] ? do_syscall_64+0xcb/0x1e0 [ 281.927669][ T5506] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 281.933705][ T5506] do_filp_open+0x208/0x450 [ 281.938179][ T5506] ? vfs_tmpfile+0x210/0x210 [ 281.942740][ T5506] ? _raw_spin_unlock+0x49/0x60 [ 281.947559][ T5506] ? __alloc_fd+0x4f1/0x590 [ 281.952033][ T5506] do_sys_open+0x383/0x7c0 [ 281.956427][ T5506] ? check_preemption_disabled+0x154/0x330 [ 281.962212][ T5506] ? file_open_root+0x450/0x450 [ 281.967054][ T5506] do_syscall_64+0xcb/0x1e0 [ 281.971529][ T5506] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 281.977393][ T5506] RIP: 0033:0x4665d9 [ 281.981257][ T5506] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 11:50:49 executing program 1: creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3={0x3000000, [{0x0, 0xfffffffd}]}, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 282.000832][ T5506] RSP: 002b:00007f4d08ca6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 282.009210][ T5506] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 282.017324][ T5506] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000300 [ 282.025264][ T5506] RBP: 00007f4d08ca61d0 R08: 0000000000000000 R09: 0000000000000000 [ 282.033291][ T5506] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 282.041229][ T5506] R13: 00007ffdef579b6f R14: 00007f4d08ca6300 R15: 0000000000022000 11:50:49 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f8", 0x16}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 282.057092][ T5507] tipc: Failed to obtain node identity 11:50:49 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000, 0x8000000}, 0x28) 11:50:49 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x1, 0x615, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) 11:50:49 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0xfeffffff, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) [ 282.087788][ T5507] tipc: Enabling of bearer rejected, failed to enable media [ 282.101114][ T5506] SELinux: inode_doinit_use_xattr: context_to_sid(system_u:object_r:unlabeled_t:s0) returned 12 for dev=overlay ino=14124 [ 282.131864][ T5517] FAT-fs (loop4): bogus number of FAT sectors 11:50:49 executing program 1: creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) preadv(r1, &(0x7f0000000180)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f00000000c0)=""/21, 0x15}, {&(0x7f0000000300)=""/4096, 0x1000}, {&(0x7f0000000100)=""/46, 0x2e}], 0x4, 0xfffffffb, 0x8) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:49 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000, 0xf000000}, 0x28) 11:50:49 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0xffffff7f, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) 11:50:49 executing program 2 (fault-call:7 fault-nth:14): mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) [ 282.151511][ T5517] FAT-fs (loop4): Can't find a valid FAT filesystem [ 282.183800][ T5528] tipc: Started in network mode 11:50:49 executing program 1: r0 = creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r2) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) signalfd4(r0, &(0x7f0000000080)={[0x8]}, 0x8, 0x8f168f4c53e09b1a) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000), 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000002000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r3, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r3, &(0x7f0000004340)={0x50, 0x0, r4}, 0x50) syz_fuse_handle_req(r3, &(0x7f0000000000)="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", 0x2000, &(0x7f00000020c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000066c0)={0x90, 0x0, 0x0, {0x9, 0x0, 0x1, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000}}}, 0x0, 0x0, 0x0, 0x0}) sendfile(r1, r3, &(0x7f00000000c0)=0x100000001, 0x5) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:49 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000, 0x10000000}, 0x28) 11:50:49 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0xffffff9e, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) 11:50:49 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x1, 0x616, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) 11:50:49 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, 0x0) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 282.201163][ T5528] tipc: Own node identity , cluster identity 4711 [ 282.214291][ T5528] tipc: Failed to obtain node identity [ 282.220457][ T5528] tipc: Enabling of bearer rejected, failed to enable media 11:50:49 executing program 1: creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) fstat(r0, &(0x7f0000000080)) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100), 0x200180, 0x0) bind$unix(r2, &(0x7f0000000240)=@abs={0x0, 0x0, 0x4e20}, 0x6e) [ 282.273076][ T5550] tipc: Started in network mode [ 282.288811][ T5544] FAULT_INJECTION: forcing a failure. [ 282.288811][ T5544] name failslab, interval 1, probability 0, space 0, times 0 [ 282.304522][ T5550] tipc: Own node identity , cluster identity 4711 [ 282.313923][ T5550] tipc: Failed to obtain node identity 11:50:49 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000, 0x1f000000}, 0x28) [ 282.321017][ T5550] tipc: Enabling of bearer rejected, failed to enable media [ 282.323521][ T5544] CPU: 0 PID: 5544 Comm: syz-executor.2 Not tainted 5.4.119-syzkaller-00545-gabedbe9da982 #0 [ 282.339731][ T5544] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 282.349884][ T5544] Call Trace: [ 282.353145][ T5544] dump_stack+0x1d8/0x24e [ 282.357442][ T5544] ? devkmsg_release+0x11c/0x11c [ 282.362342][ T5544] ? show_regs_print_info+0x12/0x12 [ 282.367536][ T5544] ? mark_page_accessed+0x275/0x5b0 [ 282.372702][ T5544] should_fail+0x6f6/0x860 [ 282.377096][ T5544] ? setup_fault_attr+0x3d0/0x3d0 [ 282.382105][ T5544] ? write_boundary_block+0x150/0x150 [ 282.387454][ T5544] ? kzalloc+0x16/0x20 [ 282.391501][ T5544] should_failslab+0x5/0x20 [ 282.395973][ T5544] __kmalloc+0x5f/0x2f0 [ 282.400103][ T5544] kzalloc+0x16/0x20 [ 282.403967][ T5544] ext4_xattr_block_set+0x2ae/0x3fe0 [ 282.409219][ T5544] ? ext4_xattr_block_find+0x580/0x580 [ 282.414657][ T5544] ? ext4_xattr_ibody_find+0x83c/0x980 [ 282.420083][ T5544] ? ext4_xattr_block_find+0xed/0x580 [ 282.425426][ T5544] ext4_xattr_set_handle+0x1030/0x20c0 [ 282.430852][ T5544] ? ext4_xattr_set_entry+0x3a80/0x3a80 [ 282.436383][ T5544] ? __dquot_initialize+0x25e/0xe20 [ 282.441640][ T5544] ? dquot_initialize+0x20/0x20 [ 282.446464][ T5544] ? __ext4_journal_start_sb+0x299/0x430 [ 282.452067][ T5544] ext4_xattr_set+0x229/0x330 [ 282.456721][ T5544] ? ext4_xattr_set_credits+0x290/0x290 [ 282.462245][ T5544] ? avc_has_perm+0x173/0x270 [ 282.466901][ T5544] ? ext4_xattr_trusted_get+0x40/0x40 [ 282.472252][ T5544] __vfs_setxattr+0x3a7/0x3e0 [ 282.476924][ T5544] __vfs_setxattr_noperm+0x12a/0x3e0 [ 282.482175][ T5544] vfs_setxattr+0x11e/0x2d0 [ 282.486645][ T5544] ? xattr_permission+0x350/0x350 [ 282.491665][ T5544] ovl_set_impure+0x123/0x200 [ 282.496309][ T5544] ovl_copy_up_flags+0xfdb/0x2cc0 [ 282.501302][ T5544] ? inode_doinit_with_dentry+0x8c2/0x11d0 [ 282.507080][ T5544] ? ovl_set_origin+0xf0/0xf0 [ 282.511726][ T5544] ? _raw_spin_lock_irqsave+0xf8/0x210 [ 282.517159][ T5544] ? _raw_spin_lock+0x1b0/0x1b0 [ 282.521975][ T5544] ? lockref_put_return+0x1da/0x290 [ 282.527149][ T5544] ? __rcu_read_lock+0x50/0x50 [ 282.531887][ T5544] ? _raw_spin_unlock_irqrestore+0x57/0x80 [ 282.537679][ T5544] ? avc_has_perm_noaudit+0x37d/0x400 [ 282.543016][ T5544] ? avc_has_perm_noaudit+0x30c/0x400 [ 282.548355][ T5544] ? avc_denied+0x1c0/0x1c0 [ 282.552835][ T5544] ? preempt_count_add+0x66/0x130 [ 282.557838][ T5544] ? __mnt_want_write+0x1ee/0x270 [ 282.562829][ T5544] ovl_maybe_copy_up+0x154/0x180 [ 282.567751][ T5544] ovl_open+0xa1/0x320 [ 282.571792][ T5544] ? security_file_open+0x1f8/0x2c0 [ 282.576979][ T5544] ? ovl_mmap+0x520/0x520 [ 282.581280][ T5544] do_dentry_open+0x949/0x1100 [ 282.586028][ T5544] ? finish_open+0xd0/0xd0 [ 282.590422][ T5544] ? vfs_open+0x2b/0x80 [ 282.594541][ T5544] ? memcpy+0x38/0x50 [ 282.598489][ T5544] path_openat+0x1127/0x3da0 [ 282.603047][ T5544] ? do_filp_open+0x450/0x450 [ 282.607724][ T5544] ? do_sys_open+0x33e/0x7c0 [ 282.612291][ T5544] ? do_syscall_64+0xcb/0x1e0 [ 282.616945][ T5544] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 282.622988][ T5544] do_filp_open+0x208/0x450 [ 282.627473][ T5544] ? vfs_tmpfile+0x210/0x210 [ 282.632046][ T5544] ? _raw_spin_unlock+0x49/0x60 [ 282.636884][ T5544] ? __alloc_fd+0x4f1/0x590 [ 282.641370][ T5544] do_sys_open+0x383/0x7c0 [ 282.645754][ T5544] ? check_preemption_disabled+0x154/0x330 [ 282.651532][ T5544] ? file_open_root+0x450/0x450 [ 282.656444][ T5544] do_syscall_64+0xcb/0x1e0 [ 282.660919][ T5544] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 282.666779][ T5544] RIP: 0033:0x4665d9 [ 282.670655][ T5544] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 282.690237][ T5544] RSP: 002b:00007f4d08ca6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 282.698627][ T5544] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 282.706574][ T5544] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000300 [ 282.714514][ T5544] RBP: 00007f4d08ca61d0 R08: 0000000000000000 R09: 0000000000000000 11:50:50 executing program 2 (fault-call:7 fault-nth:15): mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:50 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, 0x0) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:50 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0xffffffea, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) 11:50:50 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x1, 0x617, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) [ 282.722540][ T5544] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 282.730478][ T5544] R13: 00007ffdef579b6f R14: 00007f4d08ca6300 R15: 0000000000022000 11:50:50 executing program 1: creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x0, 0xd9b, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000000c0), 0x200100, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x0, &(0x7f0000000180)='posixacl\x00', 0x0, 0x0) ioctl$TIOCGWINSZ(r0, 0x5413, &(0x7f0000000100)) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), &(0x7f00000001c0)=@v3, 0x18, 0x0) setresuid(0x0, 0x0, 0x0) mmap(&(0x7f000062f000/0x1000)=nil, 0x1000, 0xb, 0x40010, r1, 0xef80e000) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x40) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$binfmt_script(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="2321202e2f66696c6530207365637572696c69747900205de7202b285d0a4300fed56b210df7c86a3ea6fe1176873c001000000000000000"], 0x38) [ 282.829926][ T5565] FAULT_INJECTION: forcing a failure. [ 282.829926][ T5565] name failslab, interval 1, probability 0, space 0, times 0 [ 282.835561][ T5573] tipc: Started in network mode [ 282.851809][ T5573] tipc: Own node identity , cluster identity 4711 [ 282.858856][ T5565] CPU: 1 PID: 5565 Comm: syz-executor.2 Not tainted 5.4.119-syzkaller-00545-gabedbe9da982 #0 [ 282.862134][ T5573] tipc: Failed to obtain node identity [ 282.869026][ T5565] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 282.869030][ T5565] Call Trace: [ 282.869047][ T5565] dump_stack+0x1d8/0x24e [ 282.869058][ T5565] ? devkmsg_release+0x11c/0x11c [ 282.869073][ T5565] ? show_regs_print_info+0x12/0x12 [ 282.877622][ T5573] tipc: Enabling of bearer rejected, failed to enable media [ 282.884549][ T5565] ? mark_page_accessed+0x275/0x5b0 [ 282.884562][ T5565] should_fail+0x6f6/0x860 [ 282.920357][ T5565] ? setup_fault_attr+0x3d0/0x3d0 [ 282.925352][ T5565] ? write_boundary_block+0x150/0x150 [ 282.930688][ T5565] ? kzalloc+0x16/0x20 [ 282.934724][ T5565] should_failslab+0x5/0x20 [ 282.939193][ T5565] __kmalloc+0x5f/0x2f0 [ 282.943317][ T5565] kzalloc+0x16/0x20 [ 282.947175][ T5565] ext4_xattr_block_set+0x2ae/0x3fe0 [ 282.952429][ T5565] ? ext4_xattr_block_find+0x580/0x580 [ 282.957853][ T5565] ? ext4_xattr_ibody_find+0x83c/0x980 [ 282.963290][ T5565] ? ext4_xattr_block_find+0xed/0x580 [ 282.968627][ T5565] ext4_xattr_set_handle+0x1030/0x20c0 [ 282.974057][ T5565] ? ext4_xattr_set_entry+0x3a80/0x3a80 [ 282.979573][ T5565] ? __dquot_initialize+0x25e/0xe20 [ 282.984741][ T5565] ? dquot_initialize+0x20/0x20 [ 282.989563][ T5565] ? __ext4_journal_start_sb+0x299/0x430 [ 282.995162][ T5565] ext4_xattr_set+0x229/0x330 [ 282.999837][ T5565] ? ext4_xattr_set_credits+0x290/0x290 [ 283.005347][ T5565] ? avc_has_perm+0x173/0x270 [ 283.009991][ T5565] ? ext4_xattr_trusted_get+0x40/0x40 [ 283.015331][ T5565] __vfs_setxattr+0x3a7/0x3e0 [ 283.019987][ T5565] __vfs_setxattr_noperm+0x12a/0x3e0 [ 283.025242][ T5565] vfs_setxattr+0x11e/0x2d0 [ 283.029715][ T5565] ? xattr_permission+0x350/0x350 [ 283.034707][ T5565] ovl_set_impure+0x123/0x200 [ 283.039355][ T5565] ovl_copy_up_flags+0xfdb/0x2cc0 [ 283.044346][ T5565] ? inode_doinit_with_dentry+0x8c2/0x11d0 [ 283.050132][ T5565] ? ovl_set_origin+0xf0/0xf0 [ 283.054863][ T5565] ? _raw_spin_lock_irqsave+0xf8/0x210 [ 283.060287][ T5565] ? _raw_spin_lock+0x1b0/0x1b0 [ 283.065195][ T5565] ? lockref_put_return+0x1da/0x290 [ 283.070359][ T5565] ? __rcu_read_lock+0x50/0x50 [ 283.075086][ T5565] ? _raw_spin_unlock_irqrestore+0x57/0x80 [ 283.080855][ T5565] ? avc_has_perm_noaudit+0x37d/0x400 [ 283.086195][ T5565] ? avc_has_perm_noaudit+0x30c/0x400 [ 283.091532][ T5565] ? avc_denied+0x1c0/0x1c0 [ 283.096026][ T5565] ? preempt_count_add+0x66/0x130 [ 283.101016][ T5565] ? __mnt_want_write+0x1ee/0x270 [ 283.106023][ T5565] ovl_maybe_copy_up+0x154/0x180 [ 283.111019][ T5565] ovl_open+0xa1/0x320 [ 283.115056][ T5565] ? security_file_open+0x1f8/0x2c0 [ 283.120314][ T5565] ? ovl_mmap+0x520/0x520 [ 283.124621][ T5565] do_dentry_open+0x949/0x1100 [ 283.129389][ T5565] ? finish_open+0xd0/0xd0 [ 283.133771][ T5565] ? vfs_open+0x2b/0x80 [ 283.137892][ T5565] ? memcpy+0x38/0x50 [ 283.141841][ T5565] path_openat+0x1127/0x3da0 [ 283.146426][ T5565] ? do_filp_open+0x450/0x450 [ 283.151070][ T5565] ? do_sys_open+0x33e/0x7c0 [ 283.155624][ T5565] ? do_syscall_64+0xcb/0x1e0 [ 283.160265][ T5565] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 283.166300][ T5565] do_filp_open+0x208/0x450 [ 283.170771][ T5565] ? vfs_tmpfile+0x210/0x210 [ 283.175333][ T5565] ? _raw_spin_unlock+0x49/0x60 [ 283.180149][ T5565] ? __alloc_fd+0x4f1/0x590 [ 283.184632][ T5565] do_sys_open+0x383/0x7c0 [ 283.189014][ T5565] ? check_preemption_disabled+0x154/0x330 [ 283.194782][ T5565] ? file_open_root+0x450/0x450 [ 283.199613][ T5565] do_syscall_64+0xcb/0x1e0 [ 283.204090][ T5565] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 283.210038][ T5565] RIP: 0033:0x4665d9 11:50:50 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0xffffffef, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) 11:50:50 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000, 0x40000000}, 0x28) 11:50:50 executing program 2 (fault-call:7 fault-nth:16): mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:50 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x1, 0x700, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) [ 283.213908][ T5565] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 283.233481][ T5565] RSP: 002b:00007f4d08ca6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 283.241877][ T5565] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 283.249820][ T5565] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000300 [ 283.257763][ T5565] RBP: 00007f4d08ca61d0 R08: 0000000000000000 R09: 0000000000000000 [ 283.265899][ T5565] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 283.273844][ T5565] R13: 00007ffdef579b6f R14: 00007f4d08ca6300 R15: 0000000000022000 11:50:50 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, 0x0) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x15a) close(r1) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:50:50 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0xfffffff0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) 11:50:50 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000, 0x60000000}, 0x28) [ 283.331891][ T5587] tipc: Started in network mode [ 283.347937][ T5587] tipc: Own node identity , cluster identity 4711 [ 283.359992][ T5587] tipc: Failed to obtain node identity [ 283.367678][ T5587] tipc: Enabling of bearer rejected, failed to enable media 11:50:51 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, r2, 0x1, 0x900, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}}}}, 0x38}}, 0x0) [ 283.396079][ T5592] FAULT_INJECTION: forcing a failure. [ 283.396079][ T5592] name failslab, interval 1, probability 0, space 0, times 0 [ 283.422961][ T5592] CPU: 0 PID: 5592 Comm: syz-executor.2 Not tainted 5.4.119-syzkaller-00545-gabedbe9da982 #0 [ 283.433139][ T5592] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 283.443170][ T5592] Call Trace: [ 283.446443][ T5592] dump_stack+0x1d8/0x24e [ 283.450753][ T5592] ? devkmsg_release+0x11c/0x11c [ 283.455662][ T5592] ? show_regs_print_info+0x12/0x12 [ 283.460831][ T5592] should_fail+0x6f6/0x860 [ 283.465220][ T5592] ? setup_fault_attr+0x3d0/0x3d0 [ 283.470211][ T5592] ? ext4_xattr_block_csum+0x588/0x820 [ 283.475769][ T5592] ? mb_cache_entry_create+0x148/0x6c0 [ 283.481293][ T5592] should_failslab+0x5/0x20 [ 283.485769][ T5592] kmem_cache_alloc+0x36/0x290 [ 283.490508][ T5592] ? wake_up_bit+0x97/0x1c0 [ 283.494986][ T5592] mb_cache_entry_create+0x148/0x6c0 [ 283.500245][ T5592] ? ext4_xattr_block_set+0x2e3f/0x3fe0 [ 283.505762][ T5592] ext4_xattr_block_set+0x31e1/0x3fe0 [ 283.511160][ T5592] ? ext4_xattr_block_find+0x580/0x580 [ 283.516595][ T5592] ? ext4_xattr_ibody_find+0x83c/0x980 [ 283.522021][ T5592] ? ext4_xattr_block_find+0xed/0x580 [ 283.527363][ T5592] ext4_xattr_set_handle+0x1030/0x20c0 [ 283.532844][ T5592] ? ext4_xattr_set_entry+0x3a80/0x3a80 [ 283.538375][ T5592] ? __dquot_initialize+0x25e/0xe20 [ 283.543546][ T5592] ? dquot_initialize+0x20/0x20 [ 283.548474][ T5592] ? __ext4_journal_start_sb+0x299/0x430 [ 283.554101][ T5592] ext4_xattr_set+0x229/0x330 [ 283.558756][ T5592] ? ext4_xattr_set_credits+0x290/0x290 [ 283.564270][ T5592] ? avc_has_perm+0x173/0x270 [ 283.568916][ T5592] ? ext4_xattr_trusted_get+0x40/0x40 [ 283.574268][ T5592] __vfs_setxattr+0x3a7/0x3e0 [ 283.578917][ T5592] __vfs_setxattr_noperm+0x12a/0x3e0 [ 283.584172][ T5592] vfs_setxattr+0x11e/0x2d0 [ 283.588660][ T5592] ? xattr_permission+0x350/0x350 [ 283.593682][ T5592] ovl_set_impure+0x123/0x200 [ 283.598331][ T5592] ovl_copy_up_flags+0xfdb/0x2cc0 [ 283.603388][ T5592] ? inode_doinit_with_dentry+0x8c2/0x11d0 [ 283.609167][ T5592] ? ovl_set_origin+0xf0/0xf0 [ 283.613811][ T5592] ? _raw_spin_lock_irqsave+0xf8/0x210 [ 283.620712][ T5592] ? _raw_spin_lock+0x1b0/0x1b0 [ 283.625531][ T5592] ? lockref_put_return+0x1da/0x290 [ 283.630697][ T5592] ? __rcu_read_lock+0x50/0x50 [ 283.635433][ T5592] ? _raw_spin_unlock_irqrestore+0x57/0x80 [ 283.641207][ T5592] ? avc_has_perm_noaudit+0x37d/0x400 [ 283.646570][ T5592] ? avc_has_perm_noaudit+0x30c/0x400 [ 283.651921][ T5592] ? avc_denied+0x1c0/0x1c0 [ 283.656397][ T5592] ? preempt_count_add+0x66/0x130 [ 283.661391][ T5592] ? __mnt_want_write+0x1ee/0x270 [ 283.666426][ T5592] ovl_maybe_copy_up+0x154/0x180 [ 283.671332][ T5592] ovl_open+0xa1/0x320 [ 283.675384][ T5592] ? security_file_open+0x1f8/0x2c0 [ 283.680551][ T5592] ? ovl_mmap+0x520/0x520 [ 283.684857][ T5592] do_dentry_open+0x949/0x1100 [ 283.689590][ T5592] ? finish_open+0xd0/0xd0 [ 283.693974][ T5592] ? vfs_open+0x2b/0x80 [ 283.698100][ T5592] ? memcpy+0x38/0x50 [ 283.702053][ T5592] path_openat+0x1127/0x3da0 [ 283.706618][ T5592] ? do_filp_open+0x450/0x450 [ 283.711261][ T5592] ? do_sys_open+0x33e/0x7c0 [ 283.715819][ T5592] ? do_syscall_64+0xcb/0x1e0 [ 283.720465][ T5592] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 283.726522][ T5592] do_filp_open+0x208/0x450 [ 283.730994][ T5592] ? vfs_tmpfile+0x210/0x210 [ 283.735586][ T5592] ? _raw_spin_unlock+0x49/0x60 [ 283.740401][ T5592] ? __alloc_fd+0x4f1/0x590 [ 283.744872][ T5592] do_sys_open+0x383/0x7c0 [ 283.749260][ T5592] ? check_preemption_disabled+0x154/0x330 [ 283.755041][ T5592] ? file_open_root+0x450/0x450 [ 283.759863][ T5592] do_syscall_64+0xcb/0x1e0 [ 283.764334][ T5592] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 283.770198][ T5592] RIP: 0033:0x4665d9 [ 283.774062][ T5592] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 11:50:51 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0xfffffffc, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="400000001400210100000000000000000a000000", @ANYRES32=r2, @ANYBLOB="1400060000000001ffffffff00000000000000001400020000000000000000002e"], 0x40}}, 0x0) 11:50:51 executing program 2 (fault-call:7 fault-nth:17): mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000000180)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) creat(&(0x7f0000000300)='./bus/file1\x00', 0x0) 11:50:51 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518000800bb3a8d511f4bb387a5b813fee009001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000, 0xc3020000}, 0x28) [ 283.793631][ T5592] RSP: 002b:00007f4d08ca6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 283.802008][ T5592] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 283.809950][ T5592] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000300 [ 283.817889][ T5592] RBP: 00007f4d08ca61d0 R08: 0000000000000000 R09: 0000000000000000 [ 283.825830][ T5592] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 283.833771][ T5592] R13: 00007ffdef579b6f R14: 00007f4d08ca6300 R15: 0000000000022000 [ 283.903603][ T5605] tipc: Started in network mode [ 283.908516][ T5605] tipc: Own node identity , cluster identity 4711 [ 283.915066][ T5605] tipc: Failed to obtain node identity [ 283.921215][ T5605] tipc: Enabling of bearer rejected, failed to enable media [ 283.950065][ T5610] FAULT_INJECTION: forcing a failure. [ 283.950065][ T5610] name failslab, interval 1, probability 0, space 0, times 0 [ 283.969121][ T5610] CPU: 1 PID: 5610 Comm: syz-executor.2 Not tainted 5.4.119-syzkaller-00545-gabedbe9da982 #0 [ 283.979266][ T5610] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 283.989295][ T5610] Call Trace: [ 283.992565][ T5610] dump_stack+0x1d8/0x24e [ 283.996874][ T5610] ? devkmsg_release+0x11c/0x11c [ 284.001790][ T5610] ? show_regs_print_info+0x12/0x12 [ 284.006958][ T5610] ? __fsnotify_parent+0x310/0x310 [ 284.012067][ T5610] should_fail+0x6f6/0x860 [ 284.016453][ T5610] ? setup_fault_attr+0x3d0/0x3d0 [ 284.021449][ T5610] ? prepare_creds+0x20/0x370 [ 284.026098][ T5610] should_failslab+0x5/0x20 [ 284.030570][ T5610] kmem_cache_alloc+0x36/0x290 [ 284.035302][ T5610] prepare_creds+0x20/0x370 [ 284.039789][ T5610] selinux_inode_copy_up+0x4a/0x180 [ 284.044956][ T5610] security_inode_copy_up+0x53/0xb0 [ 284.050123][ T5610] ovl_copy_up_flags+0x1106/0x2cc0 [ 284.055209][ T5610] ? ovl_set_origin+0xf0/0xf0 [ 284.059855][ T5610] ? _raw_spin_lock_irqsave+0xf8/0x210 [ 284.065284][ T5610] ? _raw_spin_lock+0x1b0/0x1b0 [ 284.070106][ T5610] ? lockref_put_return+0x1da/0x290 [ 284.075276][ T5610] ? __rcu_read_lock+0x50/0x50 [ 284.080010][ T5610] ? _raw_spin_unlock_irqrestore+0x57/0x80 [ 284.085789][ T5610] ? avc_has_perm_noaudit+0x37d/0x400 [ 284.091126][ T5610] ? avc_has_perm_noaudit+0x30c/0x400 [ 284.096465][ T5610] ? avc_denied+0x1c0/0x1c0 [ 284.100963][ T5610] ? preempt_count_add+0x66/0x130 [ 284.105971][ T5610] ? __mnt_want_write+0x1ee/0x270 [ 284.110964][ T5610] ovl_maybe_copy_up+0x154/0x180 [ 284.115870][ T5610] ovl_open+0xa1/0x320 [ 284.119909][ T5610] ? security_file_open+0x1f8/0x2c0 [ 284.125070][ T5610] ? ovl_mmap+0x520/0x520 [ 284.129364][ T5610] do_dentry_open+0x949/0x1100 [ 284.134100][ T5610] ? finish_open+0xd0/0xd0 [ 284.138487][ T5610] ? vfs_open+0x2b/0x80 [ 284.142609][ T5610] ? memcpy+0x38/0x50 [ 284.146560][ T5610] path_openat+0x1127/0x3da0 [ 284.151122][ T5610] ? do_filp_open+0x450/0x450 [ 284.155763][ T5610] ? do_sys_open+0x33e/0x7c0 [ 284.160337][ T5610] ? do_syscall_64+0xcb/0x1e0 [ 284.164986][ T5610] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 284.171018][ T5610] do_filp_open+0x208/0x450 [ 284.175493][ T5610] ? vfs_tmpfile+0x210/0x210 [ 284.180053][ T5610] ? _raw_spin_unlock+0x49/0x60 [ 284.184872][ T5610] ? __alloc_fd+0x4f1/0x590 [ 284.189345][ T5610] do_sys_open+0x383/0x7c0 [ 284.193770][ T5610] ? check_preemption_disabled+0x154/0x330 [ 284.199564][ T5610] ? file_open_root+0x450/0x450 [ 284.204400][ T5610] do_syscall_64+0xcb/0x1e0 [ 284.208875][ T5610] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 284.214737][ T5610] RIP: 0033:0x4665d9 [ 284.218614][ T5610] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 284.238307][ T5610] RSP: 002b:00007f4d08ca6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 284.246869][ T5610] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 284.254820][ T5610] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000300 [ 284.262774][ T5610] RBP: 00007f4d08ca61d0 R08: 0000000000000000 R09: 0000000000000000 [ 284.270834][ T5610] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 284.278783][ T5610] R13: 00007ffdef579b6f R14: 00007f4d08ca6300 R15: 0000000000022000 [ 285.866391][ T5616] cgroup1: Unknown subsys name 'perf_event' [ 285.872714][ T5616] cgroup1: Unknown subsys name 'net_cls' [ 285.908653][ T5616] bridge0: port 1(bridge_slave_0) entered blocking state [ 285.915840][ T5616] bridge0: port 1(bridge_slave_0) entered disabled state [ 285.923063][ T5616] device bridge_slave_0 entered promiscuous mode [ 285.930368][ T5616] bridge0: port 2(bridge_slave_1) entered blocking state [ 285.937822][ T5616] bridge0: port 2(bridge_slave_1) entered disabled state [ 285.945336][ T5616] device bridge_slave_1 entered promiscuous mode [ 285.980231][ T5616] bridge0: port 2(bridge_slave_1) entered blocking state [ 285.987256][ T5616] bridge0: port 2(bridge_slave_1) entered forwarding state [ 285.994472][ T5616] bridge0: port 1(bridge_slave_0) entered blocking state [ 286.001779][ T5616] bridge0: port 1(bridge_slave_0) entered forwarding state [ 286.022421][ T118] bridge0: port 1(bridge_slave_0) entered disabled state [ 286.029859][ T118] bridge0: port 2(bridge_slave_1) entered disabled state [ 286.037813][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 286.045538][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 286.054684][ T147] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 286.062963][ T147] bridge0: port 1(bridge_slave_0) entered blocking state [ 286.070190][ T147] bridge0: port 1(bridge_slave_0) entered forwarding state [ 286.085974][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 286.094074][ T118] bridge0: port 2(bridge_slave_1) entered blocking state [ 286.101097][ T118] bridge0: port 2(bridge_slave_1) entered forwarding state [ 286.108725][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 286.117489][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 286.131459][ T147] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 286.145155][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 286.161643][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 286.170462][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 286.179321][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 286.765135][ T7] device bridge_slave_1 left promiscuous mode [ 286.771509][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 286.778971][ T7] device bridge_slave_0 left promiscuous mode [ 286.785251][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 287.807715][ T5626] cgroup1: Unknown subsys name 'perf_event' [ 287.813830][ T5626] cgroup1: Unknown subsys name 'net_cls' [ 287.849897][ T5626] bridge0: port 1(bridge_slave_0) entered blocking state [ 287.856995][ T5626] bridge0: port 1(bridge_slave_0) entered disabled state [ 287.864336][ T5626] device bridge_slave_0 entered promiscuous mode [ 287.871830][ T5626] bridge0: port 2(bridge_slave_1) entered blocking state [ 287.878914][ T5626] bridge0: port 2(bridge_slave_1) entered disabled state [ 287.886280][ T5626] device bridge_slave_1 entered promiscuous mode [ 287.923265][ T5626] bridge0: port 2(bridge_slave_1) entered blocking state [ 287.930309][ T5626] bridge0: port 2(bridge_slave_1) entered forwarding state [ 287.937631][ T5626] bridge0: port 1(bridge_slave_0) entered blocking state [ 287.944686][ T5626] bridge0: port 1(bridge_slave_0) entered forwarding state [ 287.952824][ T686] bridge0: port 1(bridge_slave_0) entered disabled state [ 287.960552][ T686] bridge0: port 2(bridge_slave_1) entered disabled state [ 287.985375][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 287.992808][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 288.000660][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 288.009905][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 288.018636][ T381] bridge0: port 1(bridge_slave_0) entered blocking state [ 288.025666][ T381] bridge0: port 1(bridge_slave_0) entered forwarding state [ 288.033078][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 288.041708][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 288.049902][ T381] bridge0: port 2(bridge_slave_1) entered blocking state [ 288.056950][ T381] bridge0: port 2(bridge_slave_1) entered forwarding state [ 288.075625][ T686] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 288.083588][ T686] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 288.091623][ T686] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 288.099811][ T686] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 288.108957][ T686] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 288.117389][ T686] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 288.125872][ T686] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 288.133639][ T686] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 288.146924][ T686] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 288.155211][ T686] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 288.171344][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 288.179671][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 288.188234][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 288.196496][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 288.806110][ T379] device bridge_slave_1 left promiscuous mode [ 288.812347][ T379] bridge0: port 2(bridge_slave_1) entered disabled state [ 288.819769][ T379] device bridge_slave_0 left promiscuous mode [ 288.826046][ T379] bridge0: port 1(bridge_slave_0) entered disabled state [ 289.860684][ T5635] cgroup1: Unknown subsys name 'perf_event' [ 289.867031][ T5635] cgroup1: Unknown subsys name 'net_cls' [ 289.902993][ T5635] bridge0: port 1(bridge_slave_0) entered blocking state [ 289.910070][ T5635] bridge0: port 1(bridge_slave_0) entered disabled state [ 289.917752][ T5635] device bridge_slave_0 entered promiscuous mode [ 289.924546][ T5635] bridge0: port 2(bridge_slave_1) entered blocking state [ 289.931800][ T5635] bridge0: port 2(bridge_slave_1) entered disabled state [ 289.939578][ T5635] device bridge_slave_1 entered promiscuous mode [ 289.976865][ T5635] bridge0: port 2(bridge_slave_1) entered blocking state [ 289.983894][ T5635] bridge0: port 2(bridge_slave_1) entered forwarding state [ 289.991199][ T5635] bridge0: port 1(bridge_slave_0) entered blocking state [ 289.998297][ T5635] bridge0: port 1(bridge_slave_0) entered forwarding state [ 290.015135][ T97] bridge0: port 1(bridge_slave_0) entered disabled state [ 290.022383][ T97] bridge0: port 2(bridge_slave_1) entered disabled state [ 290.045227][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 290.052609][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 290.060180][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 290.068903][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 290.077248][ T118] bridge0: port 1(bridge_slave_0) entered blocking state [ 290.084250][ T118] bridge0: port 1(bridge_slave_0) entered forwarding state [ 290.091549][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 290.099834][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 290.108103][ T118] bridge0: port 2(bridge_slave_1) entered blocking state [ 290.115219][ T118] bridge0: port 2(bridge_slave_1) entered forwarding state [ 290.122576][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 290.130662][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 290.138662][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 290.146745][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 290.156552][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 290.165177][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 290.185128][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 290.192957][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 290.201797][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 290.209928][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 290.218754][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 290.227253][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 290.235565][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 290.243702][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 290.884855][ T7] device bridge_slave_1 left promiscuous mode [ 290.891067][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 290.898881][ T7] device bridge_slave_0 left promiscuous mode [ 290.905345][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 291.982514][ T5644] cgroup1: Unknown subsys name 'perf_event' [ 291.988899][ T5644] cgroup1: Unknown subsys name 'net_cls' [ 292.025645][ T5644] bridge0: port 1(bridge_slave_0) entered blocking state [ 292.032668][ T5644] bridge0: port 1(bridge_slave_0) entered disabled state [ 292.040502][ T5644] device bridge_slave_0 entered promiscuous mode [ 292.047663][ T5644] bridge0: port 2(bridge_slave_1) entered blocking state [ 292.054877][ T5644] bridge0: port 2(bridge_slave_1) entered disabled state [ 292.062179][ T5644] device bridge_slave_1 entered promiscuous mode [ 292.110166][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 292.117877][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 292.127612][ T147] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 292.135860][ T147] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 292.143924][ T147] bridge0: port 1(bridge_slave_0) entered blocking state [ 292.150944][ T147] bridge0: port 1(bridge_slave_0) entered forwarding state [ 292.158472][ T147] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 292.174485][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 292.182737][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 292.191081][ T118] bridge0: port 2(bridge_slave_1) entered blocking state [ 292.198129][ T118] bridge0: port 2(bridge_slave_1) entered forwarding state [ 292.205459][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 292.213433][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 292.221512][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 292.229695][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 292.244609][ T147] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 292.252846][ T147] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 292.261450][ T147] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 292.270131][ T147] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 292.284546][ T147] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 292.292606][ T147] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 292.300766][ T147] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 292.309012][ T147] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 292.320800][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 292.329005][ T118] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 292.954658][ T379] device bridge_slave_1 left promiscuous mode [ 292.960924][ T379] bridge0: port 2(bridge_slave_1) entered disabled state [ 292.968679][ T379] device bridge_slave_0 left promiscuous mode [ 292.975355][ T379] bridge0: port 1(bridge_slave_0) entered disabled state [ 293.966090][ T5653] cgroup1: Unknown subsys name 'perf_event' [ 293.972287][ T5653] cgroup1: Unknown subsys name 'net_cls' [ 294.008551][ T5653] bridge0: port 1(bridge_slave_0) entered blocking state [ 294.015946][ T5653] bridge0: port 1(bridge_slave_0) entered disabled state [ 294.023450][ T5653] device bridge_slave_0 entered promiscuous mode [ 294.030925][ T5653] bridge0: port 2(bridge_slave_1) entered blocking state [ 294.038260][ T5653] bridge0: port 2(bridge_slave_1) entered disabled state [ 294.046077][ T5653] device bridge_slave_1 entered promiscuous mode [ 294.082889][ T5653] bridge0: port 2(bridge_slave_1) entered blocking state [ 294.089952][ T5653] bridge0: port 2(bridge_slave_1) entered forwarding state [ 294.097215][ T5653] bridge0: port 1(bridge_slave_0) entered blocking state [ 294.104246][ T5653] bridge0: port 1(bridge_slave_0) entered forwarding state [ 294.124824][ T97] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 294.132426][ T97] bridge0: port 1(bridge_slave_0) entered disabled state [ 294.140962][ T97] bridge0: port 2(bridge_slave_1) entered disabled state [ 294.165126][ T97] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 294.173419][ T97] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 294.181452][ T97] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 294.189830][ T97] bridge0: port 1(bridge_slave_0) entered blocking state [ 294.196853][ T97] bridge0: port 1(bridge_slave_0) entered forwarding state [ 294.204213][ T97] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 294.212434][ T97] bridge0: port 2(bridge_slave_1) entered blocking state [ 294.219493][ T97] bridge0: port 2(bridge_slave_1) entered forwarding state [ 294.226813][ T97] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 294.234812][ T97] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 294.248535][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 294.256655][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 294.273272][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 294.281524][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 294.289874][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 294.298237][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 294.964535][ T379] device bridge_slave_1 left promiscuous mode [ 294.970789][ T379] bridge0: port 2(bridge_slave_1) entered disabled state [ 294.978530][ T379] device bridge_slave_0 left promiscuous mode [ 294.984930][ T379] bridge0: port 1(bridge_slave_0) entered disabled state [ 295.931949][ T5662] cgroup1: Unknown subsys name 'perf_event' [ 295.938101][ T5662] cgroup1: Unknown subsys name 'net_cls' [ 295.975355][ T5662] bridge0: port 1(bridge_slave_0) entered blocking state [ 295.982378][ T5662] bridge0: port 1(bridge_slave_0) entered disabled state [ 295.990157][ T5662] device bridge_slave_0 entered promiscuous mode [ 295.997396][ T5662] bridge0: port 2(bridge_slave_1) entered blocking state [ 296.004584][ T5662] bridge0: port 2(bridge_slave_1) entered disabled state [ 296.011857][ T5662] device bridge_slave_1 entered promiscuous mode [ 296.048603][ T5662] bridge0: port 2(bridge_slave_1) entered blocking state [ 296.055643][ T5662] bridge0: port 2(bridge_slave_1) entered forwarding state [ 296.062946][ T5662] bridge0: port 1(bridge_slave_0) entered blocking state [ 296.069968][ T5662] bridge0: port 1(bridge_slave_0) entered forwarding state [ 296.090502][ T147] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 296.098271][ T147] bridge0: port 1(bridge_slave_0) entered disabled state [ 296.106284][ T147] bridge0: port 2(bridge_slave_1) entered disabled state [ 296.115531][ T97] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 296.123631][ T97] bridge0: port 1(bridge_slave_0) entered blocking state [ 296.130656][ T97] bridge0: port 1(bridge_slave_0) entered forwarding state [ 296.144771][ T147] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 296.152843][ T147] bridge0: port 2(bridge_slave_1) entered blocking state [ 296.159858][ T147] bridge0: port 2(bridge_slave_1) entered forwarding state [ 296.167256][ T147] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 296.175213][ T147] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 296.189722][ T97] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 296.205772][ T686] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 296.213621][ T686] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 296.226705][ T97] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 296.238662][ T686] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 296.964396][ T7] device bridge_slave_1 left promiscuous mode [ 296.970640][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 296.978681][ T7] device bridge_slave_0 left promiscuous mode [ 296.985175][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 297.970974][ T5671] cgroup1: Unknown subsys name 'perf_event' [ 297.977121][ T5671] cgroup1: Unknown subsys name 'net_cls' [ 298.012059][ T5671] bridge0: port 1(bridge_slave_0) entered blocking state [ 298.019125][ T5671] bridge0: port 1(bridge_slave_0) entered disabled state [ 298.026854][ T5671] device bridge_slave_0 entered promiscuous mode [ 298.033662][ T5671] bridge0: port 2(bridge_slave_1) entered blocking state [ 298.040900][ T5671] bridge0: port 2(bridge_slave_1) entered disabled state [ 298.048330][ T5671] device bridge_slave_1 entered promiscuous mode [ 298.084519][ T5671] bridge0: port 2(bridge_slave_1) entered blocking state [ 298.091592][ T5671] bridge0: port 2(bridge_slave_1) entered forwarding state [ 298.098847][ T5671] bridge0: port 1(bridge_slave_0) entered blocking state [ 298.105872][ T5671] bridge0: port 1(bridge_slave_0) entered forwarding state [ 298.126232][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 298.133819][ T67] bridge0: port 1(bridge_slave_0) entered disabled state [ 298.141431][ T67] bridge0: port 2(bridge_slave_1) entered disabled state [ 298.164629][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 298.172958][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 298.181308][ T67] bridge0: port 1(bridge_slave_0) entered blocking state [ 298.188347][ T67] bridge0: port 1(bridge_slave_0) entered forwarding state [ 298.197003][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 298.205437][ T67] bridge0: port 2(bridge_slave_1) entered blocking state [ 298.212432][ T67] bridge0: port 2(bridge_slave_1) entered forwarding state [ 298.219786][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 298.227773][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 298.236493][ T97] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 298.249826][ T686] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 298.264392][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 298.272831][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 298.884319][ T7] device bridge_slave_1 left promiscuous mode [ 298.890572][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 298.898038][ T7] device bridge_slave_0 left promiscuous mode [ 298.904261][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 299.902935][ T5680] cgroup1: Unknown subsys name 'perf_event' [ 299.909161][ T5680] cgroup1: Unknown subsys name 'net_cls' [ 299.945695][ T5680] bridge0: port 1(bridge_slave_0) entered blocking state [ 299.952751][ T5680] bridge0: port 1(bridge_slave_0) entered disabled state [ 299.960709][ T5680] device bridge_slave_0 entered promiscuous mode [ 299.968061][ T5680] bridge0: port 2(bridge_slave_1) entered blocking state [ 299.975400][ T5680] bridge0: port 2(bridge_slave_1) entered disabled state [ 299.982710][ T5680] device bridge_slave_1 entered promiscuous mode [ 300.019641][ T5680] bridge0: port 2(bridge_slave_1) entered blocking state [ 300.026686][ T5680] bridge0: port 2(bridge_slave_1) entered forwarding state [ 300.033991][ T5680] bridge0: port 1(bridge_slave_0) entered blocking state [ 300.041034][ T5680] bridge0: port 1(bridge_slave_0) entered forwarding state [ 300.061408][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 300.068939][ T67] bridge0: port 1(bridge_slave_0) entered disabled state [ 300.077628][ T67] bridge0: port 2(bridge_slave_1) entered disabled state [ 300.086910][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 300.095167][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 300.102224][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 300.114348][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 300.122450][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 300.129572][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 300.144223][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 300.152096][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 300.164415][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 300.174978][ T97] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 300.187639][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 300.202436][ T97] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 300.211311][ T97] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 300.804067][ T379] device bridge_slave_1 left promiscuous mode [ 300.810325][ T379] bridge0: port 2(bridge_slave_1) entered disabled state [ 300.817867][ T379] device bridge_slave_0 left promiscuous mode [ 300.824289][ T379] bridge0: port 1(bridge_slave_0) entered disabled state [ 301.825328][ T5689] cgroup1: Unknown subsys name 'perf_event' [ 301.831454][ T5689] cgroup1: Unknown subsys name 'net_cls' [ 301.866569][ T5689] bridge0: port 1(bridge_slave_0) entered blocking state [ 301.873590][ T5689] bridge0: port 1(bridge_slave_0) entered disabled state [ 301.881478][ T5689] device bridge_slave_0 entered promiscuous mode [ 301.888435][ T5689] bridge0: port 2(bridge_slave_1) entered blocking state [ 301.895724][ T5689] bridge0: port 2(bridge_slave_1) entered disabled state [ 301.902998][ T5689] device bridge_slave_1 entered promiscuous mode [ 301.939085][ T5689] bridge0: port 2(bridge_slave_1) entered blocking state [ 301.946139][ T5689] bridge0: port 2(bridge_slave_1) entered forwarding state [ 301.953362][ T5689] bridge0: port 1(bridge_slave_0) entered blocking state [ 301.960382][ T5689] bridge0: port 1(bridge_slave_0) entered forwarding state [ 301.982421][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 301.990132][ T17] bridge0: port 1(bridge_slave_0) entered disabled state [ 301.997906][ T17] bridge0: port 2(bridge_slave_1) entered disabled state [ 302.007809][ T686] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 302.015928][ T686] bridge0: port 1(bridge_slave_0) entered blocking state [ 302.022920][ T686] bridge0: port 1(bridge_slave_0) entered forwarding state [ 302.044534][ T686] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 302.053033][ T686] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 302.061771][ T686] bridge0: port 2(bridge_slave_1) entered blocking state [ 302.068800][ T686] bridge0: port 2(bridge_slave_1) entered forwarding state [ 302.076383][ T686] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 302.084355][ T686] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 302.094033][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 302.113234][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 302.122002][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 302.130777][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 302.764357][ T7] device bridge_slave_1 left promiscuous mode [ 302.770487][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 302.777955][ T7] device bridge_slave_0 left promiscuous mode [ 302.784159][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 303.746248][ T5698] cgroup1: Unknown subsys name 'perf_event' [ 303.752352][ T5698] cgroup1: Unknown subsys name 'net_cls' [ 303.789417][ T5698] bridge0: port 1(bridge_slave_0) entered blocking state [ 303.796690][ T5698] bridge0: port 1(bridge_slave_0) entered disabled state [ 303.804364][ T5698] device bridge_slave_0 entered promiscuous mode [ 303.811183][ T5698] bridge0: port 2(bridge_slave_1) entered blocking state [ 303.818242][ T5698] bridge0: port 2(bridge_slave_1) entered disabled state [ 303.825603][ T5698] device bridge_slave_1 entered promiscuous mode [ 303.863326][ T5698] bridge0: port 2(bridge_slave_1) entered blocking state [ 303.870382][ T5698] bridge0: port 2(bridge_slave_1) entered forwarding state [ 303.877652][ T5698] bridge0: port 1(bridge_slave_0) entered blocking state [ 303.884707][ T5698] bridge0: port 1(bridge_slave_0) entered forwarding state [ 303.905285][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 303.912892][ T382] bridge0: port 1(bridge_slave_0) entered disabled state [ 303.921406][ T382] bridge0: port 2(bridge_slave_1) entered disabled state [ 303.944825][ T97] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 303.953294][ T97] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 303.961738][ T97] bridge0: port 1(bridge_slave_0) entered blocking state [ 303.968787][ T97] bridge0: port 1(bridge_slave_0) entered forwarding state [ 303.978001][ T97] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 303.986221][ T97] bridge0: port 2(bridge_slave_1) entered blocking state [ 303.993224][ T97] bridge0: port 2(bridge_slave_1) entered forwarding state [ 304.000761][ T97] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 304.008782][ T97] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 304.024419][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 304.032454][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 304.047488][ T97] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 304.056284][ T97] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 304.764030][ T379] device bridge_slave_1 left promiscuous mode [ 304.770167][ T379] bridge0: port 2(bridge_slave_1) entered disabled state [ 304.778062][ T379] device bridge_slave_0 left promiscuous mode [ 304.784505][ T379] bridge0: port 1(bridge_slave_0) entered disabled state [ 305.765550][ T5707] cgroup1: Unknown subsys name 'perf_event' [ 305.771751][ T5707] cgroup1: Unknown subsys name 'net_cls' [ 305.809294][ T5707] bridge0: port 1(bridge_slave_0) entered blocking state [ 305.816615][ T5707] bridge0: port 1(bridge_slave_0) entered disabled state [ 305.824332][ T5707] device bridge_slave_0 entered promiscuous mode [ 305.831116][ T5707] bridge0: port 2(bridge_slave_1) entered blocking state [ 305.838475][ T5707] bridge0: port 2(bridge_slave_1) entered disabled state [ 305.846079][ T5707] device bridge_slave_1 entered promiscuous mode [ 305.882798][ T5707] bridge0: port 2(bridge_slave_1) entered blocking state [ 305.889850][ T5707] bridge0: port 2(bridge_slave_1) entered forwarding state [ 305.897116][ T5707] bridge0: port 1(bridge_slave_0) entered blocking state [ 305.904151][ T5707] bridge0: port 1(bridge_slave_0) entered forwarding state [ 305.924934][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 305.932627][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 305.941309][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 305.964634][ T147] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 305.973116][ T147] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 305.981458][ T147] bridge0: port 1(bridge_slave_0) entered blocking state [ 305.988502][ T147] bridge0: port 1(bridge_slave_0) entered forwarding state [ 305.997841][ T147] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 306.006067][ T147] bridge0: port 2(bridge_slave_1) entered blocking state [ 306.013072][ T147] bridge0: port 2(bridge_slave_1) entered forwarding state [ 306.020520][ T147] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 306.028467][ T147] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 306.044059][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 306.052127][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 306.067967][ T147] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 306.077140][ T147] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready 2021/05/19 11:51:13 executor 1 failed 11 times: executor 1: exit status 67 SYZFAIL: mmap of input file failed (errno 9: Bad file descriptor) SYZFAIL: child failed (errno 0: Success) loop exited with status 67 [ 306.913685][ T7] device bridge_slave_1 left promiscuous mode [ 306.919889][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 306.927779][ T7] device bridge_slave_0 left promiscuous mode [ 306.934136][ T7] bridge0: port 1(bridge_slave_0) entered disabled state